Authorities See Benefit of Bitcoin - WSJ

WSJ - U.S. Officials Examine Bitcoin at Senate Hearing

WSJ - U.S. Officials Examine Bitcoin at Senate Hearing submitted by o_bitcoin to Bitcoin [link] [comments]

Crypto Banking Wars: Can Non-Custodial Crypto Wallets Ever Replace Banks?

Crypto Banking Wars: Can Non-Custodial Crypto Wallets Ever Replace Banks?
Can they overcome the product limitations of blockchain and deliver the world-class experience that consumers expect?
https://reddit.com/link/i8ewbx/video/ojkc6c9a1lg51/player
This is the second part of Crypto Banking Wars — a new series that examines what crypto-native company is most likely to become the bank of the future. Who is best positioned to reach mainstream adoption in consumer finance?
---
While crypto allows the world to get rid of banks, a bank will still very much be necessary for this very powerful technology to reach the masses. As we laid out in our previous series, Crypto-Powered, we believe companies that build with blockchain at their core will have the best shot at winning the broader consumer finance market. We hope it will be us at Genesis Block, but we aren’t the only game in town.
So this series explores the entire crypto landscape and tries to answer the question, which crypto company is most likely to become the bank of the future?
In our last episode, we offered an in-depth analysis of big crypto exchanges like Coinbase & Binance. Today we’re analyzing non-custodial crypto wallets. These are products where only the user can touch or move funds. Not even the company or developer who built the application can access, control, or stop funds from being moved. These apps allow users to truly become their own bank.
We’ve talked a little about this before. This group of companies is nowhere near the same level of threat as the biggest crypto exchanges. However, this group really understands DeFi and the magic it can bring. This class of products is heavily engineer-driven and at the bleeding-edge of DeFi innovation. These products are certainly worth discussing. Okay, let’s dive in.

Users & Audience

These non-custodial crypto wallets are especially popular among the most hardcore blockchain nerds and crypto cypherpunks.
“Not your keys, not your coins.”
This meme is endlessly repeated among longtime crypto hodlers. If you’re not in complete control of your crypto (i.e. using non-custodial wallets), then it’s not really your crypto. There has always been a close connection between libertarianism & cryptocurrency. This type of user wants to be in absolute control of their money and become their own bank.
In addition to the experienced crypto geeks, for some people, these products will mean the difference between life and death. Imagine a refugee family that wants to safely protect their years of hard work — their life savings — as they travel across borders. Carrying cash could put their safety or money at risk. A few years ago I spent time in Greece at refugee camps — I know first-hand this is a real use-case.

https://preview.redd.it/vigqlmgg1lg51.png?width=800&format=png&auto=webp&s=0a5d48a63ce7a637749bbbc03d62c51cc3f75613
Or imagine a family living under an authoritarian regime — afraid that their corrupt or oppressive government will seize their assets (or devalue their savings via hyperinflation). Citizens in these countries cannot risk putting their money in centralized banks or under their mattresses. They must become their own bank.
These are the common use-cases and users for non-custodial wallets.

Products in Market

Let’s do a quick round-up of some of the more popular products already in the market.
Web/Desktop The most popular web wallet is MetaMask. Though it doesn’t have any specific integration with DeFi protocols yet, it has more than a million users (which is a lot in crypto land!). Web wallets that are more deeply integrated with DeFi include InstaDapp, Zerion, DeFi Saver, Zapper, and MyCrypto (disclosure: I’m an investor and a big fan of Taylor). For the mass market, mobile will be a much more important form-factor. I don’t view these web products as much of a threat to Genesis Block.
https://preview.redd.it/gbpi2ijj1lg51.png?width=1050&format=png&auto=webp&s=c039887484bf8a3d3438fb02a384d0b9ef894e1f
Mobile The more serious threats to Genesis Block are the mobile products that (A) are leveraging some of the powerful DeFi protocols and (B) abstracting away a lot of the blockchain/DeFi UX complexity. While none get close to us on (B), the products attempting this are Argent and Dharma. To the extent they can, both are trying to make interacting with blockchain technology as simple as possible.
A few of the bigger exchanges have also entered this mobile non-custodial market. Coinbase has Wallet (via Cipher Browser acquisition). Binance has Trust Wallet (also via acquisition). And speaking of acquisitions, MyCrypto acquired Ambo, which is a solid product and has brought MyCrypto into the mobile space. Others worth mentioning include Rainbow — well-designed and built by a small indy-team with strong DeFi experience (former Balance team). And ZenGo which has a cool feature around keyless security (their CEO is a friend).
There are dozens of other mobile crypto wallets that do very little beyond showing your balances. They are not serious threats.
https://preview.redd.it/6x4lxsdk1lg51.png?width=1009&format=png&auto=webp&s=fab3280491b75fe394aebc8dd69926b6962dcf5d
Hardware Wallets Holding crypto on your own hardware wallet is widely considered to be “best practice” from a security standpoint. The most popular hardware wallets are Ledger, Trezor, and KeepKey (by our friends at ShapeShift). Ledger Nano X is the only product that has Bluetooth — thus, the only one that can connect to a mobile app. While exciting and innovative, these hardware wallets are not yet integrated with any DeFi protocols.
https://preview.redd.it/yotmvtsl1lg51.png?width=1025&format=png&auto=webp&s=c8567b42839d9cec8dbc6c78d2f953b688886026

Strengths

Let’s take a look at some of the strengths with non-custodial products.
  1. Regulatory arbitrage Because these products are “non-custodial”, they are able to avoid the regulatory burdens that centralized, custodial products must deal with (KYC/AML/MTL/etc). This is a strong practical benefit for a bootstrapped startup/buildedeveloper. Though it’s unclear how long this advantage lasts as products reach wider audiences and increased scrutiny.
  2. User Privacy Because of the regulatory arbitrage mentioned above, users do not need to complete onerous KYC requirements. For example, there’s no friction around selfies, government-issued IDs, SSNs, etc. Users can preserve much of their privacy and they don’t need to worry about their sensitive information being hacked, compromised, or leaked.
  3. Absolute control & custody This is really one of the great promises of crypto — users can become their own bank. Users can be in full control of their money. And they don’t need to bury it underground or hide it under a mattress. No dependence, reliance or trust in any third parties. Only the user herself can access and unlock the money.

Weaknesses

Now let’s examine some of the weaknesses.
  1. Knowledge & Education Most non-custodial products do not abstract away any of the blockchain complexity. In fact, they often expose more of it because the most loyal users are crypto geeks. Imagine how an average, non-crypto user feels when she starts seeing words like seed phrases, public & private keys, gas limits, transaction fees, blockchain explorers, hex addresses, and confirmation times. There is a lot for a user to learn and become educated on. That’s friction. The learning curve is very high and will always be a major blocker for adoption. We’ve talked about this in our Spreading Crypto series — to reach the masses, the crypto stuff needs to be in the background.
  2. User Experience It is currently impossible to create a smooth and performant user experience in non-custodial wallets or decentralized applications. Any interaction that requires a blockchain transaction will feel sluggish and slow. We built a messaging app on Ethereum and presented it at DevCon3 in Cancun. The technical constraints of blockchain technology were crushing to the user experience. We simply couldn’t create the real-time, modern messaging experience that users have come to expect from similar apps like Slack or WhatsApp. Until blockchains are closer in speed to web servers (which will be difficult given their decentralized nature), dApps will never be able to create the smooth user experience that the masses expect.
  3. Product Limitations Most non-custodial wallets today are based on Ethereum smart contracts. That means they are severely limited with the assets that they can support (only erc-20 tokens). Unless through synthetic assets (similar to Abra), these wallets cannot support massively popular assets like Bitcoin, XRP, Cardano, Litecoin, EOS, Tezos, Stellar, Cosmos, or countless others. There are exciting projects like tBTC trying to bring Bitcoin to Ethereum — but these experiments are still very, very early. Ethereum-based smart contract wallets are missing a huge part of the crypto-asset universe.
  4. Technical Complexity While developers are able to avoid a lot of regulatory complexity (see Strengths above), they are replacing it with increased technical complexity. Most non-custodial wallets are entirely dependent on smart contract technology which is still very experimental and early in development (see Insurance section of this DeFi use-cases post). Major bugs and major hacks do happen. Even recently, it was discovered that Argent had a “high severity vulnerability.” Fortunately, Argent fixed it and their users didn’t lose funds. The tools, frameworks, and best practices around smart contract technology are all still being established. Things can still easily go wrong, and they do.
  5. Loss of Funds Risk Beyond the technical risks mentioned above, with non-custodial wallets, it’s very easy for users to make mistakes. There is no “Forgot Password.” There is no customer support agent you can ping. There is no company behind it that can make you whole if you make a mistake and lose your money. You are on your own, just as CZ suggests. One wrong move and your money is all gone. If you lose your private key, there is no way to recover your funds. There are some new developments around social recovery, but that’s all still very experimental. This just isn’t the type of customer support experience people are used to. And it’s not a risk that most are willing to take.
  6. Integration with Fiat & Traditional Finance In today’s world, it’s still very hard to use crypto for daily spending (see Payments in our DeFi use-cases post). Hopefully, that will all change someday. In the meantime, if any of these non-custodial products hope to win in the broader consumer finance market, they will undoubtedly need to integrate with the legacy financial world — they need onramps (fiat-to-crypto deposit methods) and offramps (crypto-to-fiat withdraw/spend methods). As much as crypto-fanatics hate hearing it, you can’t expect people to jump headfirst into the new world unless there is a smooth transition, unless there are bridge technologies that help them arrive. This is why these fiat integrations are so important. Examples might be allowing ACH/Wire deposits (eg. via Plaid) or launching a debit card program for spend/withdraw. These fiat integrations are essential if the aim is to become the bank of the future. Doing any of this compliantly will require strong KYC/AML. So to achieve this use-case — integrating with traditional finance —all of the Strengths we mentioned above are nullified. There are no longer regulatory benefits. There are no longer privacy benefits (users need to upload KYC documents, etc). And users are no longer in complete control of their money.

Wrap Up

One of the great powers of crypto is that we no longer depend on banks. Anyone can store their wealth and have absolute control of their money. That’s made possible with these non-custodial wallets. It’s a wonderful thing.
I believe that the most knowledgeable and experienced crypto people (including myself) will always be active users of these applications. And as mentioned in this post, there will certainly be circumstances where these apps will be essential & even life-saving.
However, I do not believe this category of product is a major threat to Genesis Block to becoming the bank of the future.
They won’t win in the broader consumer finance market — mostly because I don’t believe that’s their target audience. These applications simply cannot produce the type of product experience that the masses require, want, or expect. The Weaknesses I’ve outlined above are just too overwhelming. The friction for mass-market consumers is just too much.

https://preview.redd.it/lp8dzxeh1lg51.png?width=800&format=png&auto=webp&s=03acdce545cd032f7e82b6665b001d7a06839557
The winning bank will be focused on solving real user problems and meeting user needs. Not slowed down by rigid idealism like censorship-resistance and absolute decentralization, as it is with most non-custodial wallets. The winning bank will be a world-class product that’s smooth, performant, and accessible. Not sluggish and slow, as it is with most non-custodial wallets. The winning bank will be one where blockchain & crypto is mostly invisible to end-users. Not front-and-center as it is with non-custodial wallets. The winning bank will be one managed and run by professionals who know exactly what they’re doing. Not DIY (Do It Yourself), as it is with non-custodial wallets.
So are these non-custodial wallets a threat to Genesis Block in winning the broader consumer finance market, and becoming the bank of the future?
No. They are designed for a very different audience.
------
Other Ways to Consume Today's Episode:
Follow our social channels: https://genesisblock.com/follow/
Download the app. We're a digital bank that's powered by crypto: https://genesisblock.com/download
submitted by mickhagen to genesisblockhq [link] [comments]

Complete Guide to All r/neoliberal Flair Personalities [J-L]

Please see the first post [A-I] for more info about this post. Unfortunately, post character limit is 40k, so I will have to break this into multiple posts linked here:

[A-I]

[J-L]

[M-P]

[Q-Z]


James Heckman
1944 – Present Born: United States Resides: United States
· Professor in Economics at the University of Chicago. Professor at the Harris Graduate School of Public Policy Studies. Director of the Center for the Economics of Human Development (CEHD). Co-Director of Human Capital and Economic Opportunity (HCEO) Global Working Group. Heckman is also a Professor of Law at ‘the Law School’, a senior research fellow at the American Bar Foundation, and a research associate at the National Bureau of Economic Research.
· In 2000, Heckman shared the Nobel Memorial Prize in Economic Sciences with Daniel McFadden, for his pioneering work in econometrics and microeconomics.
· As of February 2019 (according to RePEc), he is the next most influential economist in the world behind Daniel McFadden.
· Heckman has received numerous awards for his work, including the John Bates Clark Medal of the American Economic Association in 1983, the 2005 and 2007 Dennis Aigner Award for Applied Econometrics from the Journal of Econometrics, the 2005 Jacob Mincer Award for Lifetime Achievement in Labor Economics, the 2005 Ulysses Medal from the University College Dublin, the 2007 Theodore W. Schultz Award from the American Agricultural Economics Association, the Gold Medal of the President of the Italian Republic awarded by the International Scientific Committee of the Pio Manzú Centre in 2008, the Distinguished Contributions to Public Policy for Children Award from the Society for Research in Child Development in 2009, the 2014 Frisch Medal from the Econometric Society, the 2014 Spirit of Erikson Award from the Erikson Institute, and the 2016 Dan David Prize for Combating Poverty from Tel Aviv University.
“The best way to improve the American workforce in the 21st century is to invest in early childhood education, to ensure that even the most disadvantaged children have the opportunity to succeed alongside their more advantaged peers”

Janet Yellen
1945 – Present Born: United States Resides: United States
· Successor to Ben Bernanke, serving as the Chair of the Federal Reserve from 2014 to 2018, and as Vice Chair from 2010 to 2014, following her position as President and Chief Executive Officer of the Federal Reserve Bank of San Francisco. Yellen was also Chair of the White House Council of Economic Advisers under President Bill Clinton.
· Yellen is a Keynesian economist and advocates the use of monetary policy in stabilizing economic activity over the business cycle. She believes in the modern version of the Phillips curve, which originally was an observation about an inverse relationship between unemployment and inflation. In her 2010 nomination hearing for Vice Chair of the Federal Reserve Board of Governors, Yellen said, “The modern version of the Phillips curve model—relating movements in inflation to the degree of slack in the economy—has solid theoretical and empirical support.”
· Yellen is married to George Akerlof, another notable economist, Nobel Memorial Prize in Economic Sciences laureate, professor at Georgetown University and the University of California, Berkeley..
· In 2014, Yellen was named by Forbes as the second most powerful woman in the world. She was the highest ranking American on the list. In October 2015, Bloomberg Markets ranked her first in their annual list of the 50 most influential economists and policymakers. In October 2015, Sovereign Wealth Fund Institute ranked Yellen #1 in the Public Investor 100 list. In October 2010, she received the Adam Smith Award from the National Association for Business Economics (NABE).
“In the long run, outsourcing is another form of trade that benefits the U.S. economy by giving us cheaper ways to do things.”
“I'm just opposed to a pure inflation-only mandate in which the only thing a central bank cares about is inflation and not unemployment.”

Jared Polis
1975 – Present Born: United States Resides: United States
· 43rd governor of Colorado since January 2019. Polis served on the Colorado State Board of Education from 2001 to 2007 and was the United States Representative for Colorado's 2nd congressional district from 2009 to 2019.
· Polis is the first openly gay person and second openly LGBT person (after Kate Brown of Oregon) to be elected governor in the United States.
· In 2000 Polis founded the Jared Polis Foundation, whose mission is to “create opportunities for success by supporting educators, increasing access to technology, and strengthening our community.” Polis has also founded two charter schools.
· Polis was named Outstanding Philanthropist for the 2006 National Philanthropy Day in Colorado. He has received many awards, including the Boulder Daily Camera's 2007 Pacesetter Award in Education; the Kauffman Foundation Community Award; the Denver consul general of Mexico “Ohtli”; the Martin Luther King Jr. Colorado Humanitarian Award; and the Anti-Defamation League's inaugural Boulder Community Builder Award.
“Having alternative currencies is great, right, because, historically, government's had a monopoly on currency. At the end of the day, why should only politicians—either directly or indirectly—control the currency? We can reduce transaction cost, provide an alternative, and—look, I don't know whether it'll be Bitcoin or not—but I think the concept of digital currencies is here to stay, and the fact that a politician would write to try to ban them in their infancy is just the wrong way to go about it. Let the market determine whether there's any value there or not.”

Jeff Bezos
1964 – Present Born: United States Resides: United States
· Best known as the founder, CEO, and president of Amazon, Bezos is an American internet and aerospace entrepreneur, media proprietor, and investor. The first centi-billionaire on the Forbes wealth index, Bezos was named the “richest man in modern history” after his net worth increased to $150 billion in July 2018. In September 2018, Forbes described him as “far richer than anyone else on the planet” as he added $1.8 billion to his net worth when Amazon became the second company in history to reach a market cap of $1 trillion.
· Bezos supported the electoral campaigns of U.S. senators Patty Murray and Maria Cantwell, two Democratic U.S. senators from Washington. He has also supported U.S. representative John Conyers, as well as Patrick Leahy and Spencer Abraham, U.S. senators serving on committees dealing with Internet-related issues.
· Bezos has supported the legalization of same-sex marriage, and in 2012 contributed $2.5 million to a group supporting a yes vote on Washington Referendum 74, which affirmed same-sex marriage.
· After the 2016 presidential election, Bezos was invited to join Donald Trump's Defense Innovation Advisory Board, an advisory council to improve the technology used by the Defense Department. Bezos declined the offer without further comment.
· In September 2018, Business Insider reported that Bezos was the only one of the top five billionaires in the world who had not signed the Giving Pledge, an initiative created by Bill Gates and Warren Buffett that encourage wealthy people to give away their wealth.
“Percentage margins don't matter. What matters always is dollar margins: the actual dollar amount. Companies are valued not on their percentage margins, but on how many dollars they actually make, and a multiple of that.”
“We have the resources to build room for a trillion humans in this solar system, and when we have a trillion humans, we'll have a thousand Einsteins and a thousand Mozarts. It will be a way more interesting place to live.”

Jens Weidmann
1968 – Present Born: Germany Resides: Germany
· German economist and president of the Deutsche Bundesbank. Chairman of the Board of the Bank for International Settlements. From 1997 to 1999, Weidmann worked at the International Monetary Fund. In 2006, he began serving as Head of Division IV (Economic and Financial Policy) in the Federal Chancellery. He was the chief negotiator of the Federal Republic of Germany for both the summits of the G8 and the G20. He was given the 2016 Medal for Extraordinary Merits for Bavaria in a United Europe.
· Weidmann was involved in a series of major decisions in response to the financial crisis in Germany and Europe: preventing the meltdown of the bank Hypo Real Estate, guaranteeing German deposits and implementing a rescue programme for the banking system, piecing together two fiscal-stimulus programmes, and setting up the Greek bail-out package and the European Financial Stability Facility (EFSF).
· In a 2011 speech, Weidmann criticized the errors and “many years of wrong developments” of the European Monetary Union (EMU) peripheral states, particularly the wasted opportunity represented by their “disproportionate investment in private home-building, high government spending or private consumption”. In May, 2012, Weidmann's stance was characterized by US economist and columnist Paul Krugman as amounting to wanting to destroy the Euro. In 2016, Weidmann dismissed deflation in light of the European Central Bank's current stimulus program, pointing out the healthy condition of the German economy and that the euro area is not that bad off.
“I share the concerns regarding monetary policy that is too loose for too long. … As you know I have concerns about granting emergency liquidity on account of the fact that the banks are not doing everything to improve their liquidity situation.”

Jerome Powell
1953 – Present Born: United States Resides: United States
· Current Chair of the Federal Reserve, nominated by Trump. Powell has faced substantial and repeated criticism from Trump after his confirmation. The Senate Banking Committee approved Powell's nomination in a 22–1 vote, with Senator Elizabeth Warren casting the lone dissenting vote.
· Powell briefly served as Under Secretary of the Treasury for Domestic Finance under George H. W. Bush in 1992. He has served as a member of the Federal Reserve Board of Governors since 2012. He is the first Chair of the Federal Reserve since 1987 not to hold a Ph.D. degree in Economics.
· Powell has described the Fed's role as nonpartisan and apolitical. Trump has criticized Powell for not massively lowering federal interest rates and instituting quantitative easing.
· The Bloomberg Intelligence Fed Spectrometer rated Powell as neutral (not dove nor hawk). Powell has been a skeptic of round 3 of quantitative easing, initiated in 2012, although he did vote in favor of implementation.
· Powell stated that higher capital and liquidity requirements and stress tests have made the financial system safer and must be preserved. However, he also stated that the Volcker Rule should be re-written to exclude smaller banks. Powell supports ample amounts of private capital to support housing finance activities.
“The Fed's organization reflects a long-standing desire in American history to ensure that power over our nation's monetary policy and financial system is not concentrated in a few hands, whether in Washington or in high finance or in any single group or constituency.”

John Cochrane
1957 – Present Born: United States Resides: United States
· Senior Fellow of the Hoover Institution at Stanford University and economist, specializing in financial economics and macroeconomics.
· The central idea of Cochrane's research is that macroeconomics and finance should be linked, and a comprehensive theory needs to explain both 1.) how, given the observed prices and financial returns, households and firms decide on consumption, investment, and financing; and 2.) how, in equilibrium, prices and financial returns are determined by households and firms decisions.
· Cochrane is the author of ‘Asset Pricing,’ a widely used textbook in graduate courses on asset pricing. According to his own words, the organizing principle of the book is that everything can be traced back to specializations of a single equation: the basic pricing equation. Cochrane received the TIAA-CREF Institute Paul A. Samuelson Award for this book.
“Regulators and politicians aren’t nitwits. The libertarian argument that regulation is so dumb — which it surely is — misses the point that it is enacted by really smart people. The fact that the regulatory state is an ideal tool for the entrenchment of political power was surely not missed by its architects.”

John Keynes (John Maynard Keynes, 1st Baron Keynes)
1883 – 1946 Born: England Died: England
· British economist, whose ideas fundamentally changed the theory and practice of macroeconomics and the economic policies of governments. Originally trained in mathematics, he built on and greatly refined earlier work on the causes of business cycles, and was one of the most influential economists of the 20th century. Widely considered the founder of modern macroeconomics, his ideas are the basis for the school of thought known as Keynesian economics, and its various offshoots. Keynes was a lifelong member of the Liberal Party, which until the 1920s had been one of the two main political parties in the United Kingdom.
· During the 1930s Great Depression, Keynes challenged the ideas of neoclassical economics that held that free markets would, in the short to medium term, automatically provide full employment, as long as workers were flexible in their wage demands. He argued that aggregate demand (total spending in the economy) determined the overall level of economic activity, and that inadequate aggregate demand could lead to prolonged periods of high unemployment. Keynes advocated the use of fiscal and monetary policies to mitigate the adverse effects of economic recessions and depressions.
· Keynes's influence started to wane in the 1970s, his ideas challenged by those who disputed the ability of government to favorably regulate the business cycle with fiscal policy. However, the advent of the global financial crisis of 2007–2008 sparked a resurgence in Keynesian thought. Keynesian economics provided the theoretical underpinning for economic policies undertaken in response to the crisis by President Barack Obama of the United States, Prime Minister Gordon Brown of the United Kingdom, and other heads of governments.
· Keynes was vice-chairman of the Marie Stopes Society which provided birth control education and campaigned against job discrimination against women and unequal pay. He was an outspoken critic of laws against homosexuality. Keynes thought that the pursuit of money for its own sake was a pathological condition, and that the proper aim of work is to provide leisure. He wanted shorter working hours and longer holidays for all. Keynes was ultimately a successful investor, building up a private fortune.
“How can I accept the Communist doctrine, which sets up as its bible, above and beyond criticism, an obsolete textbook which I know not only to be scientifically erroneous but without interest or application to the modern world? How can I adopt a creed which, preferring the mud to the fish, exalts the boorish proletariat above the bourgeoisie and the intelligentsia, who with all their faults, are the quality of life and surely carry the seeds of all human achievement? Even if we need a religion, how can we find it in the turbid rubbish of the red bookshop? It is hard for an educated, decent, intelligent son of Western Europe to find his ideals here, unless he has first suffered some strange and horrid process of conversion which has changed all his values.”

John Locke
1632 – 1704 Born: England Died: England
· Known as the “Father of Liberalism,” Locke was an English philosopher and physician, widely regarded as one of the most influential of Enlightenment thinkers. His work greatly affected the development of epistemology and political philosophy. His writings influenced Voltaire and Jean-Jacques Rousseau, many Scottish Enlightenment thinkers, as well as the American revolutionaries. His contributions to classical republicanism and liberal theory are reflected in the United States Declaration of Independence.
· Locke's political theory was founded on social contract theory. Social contract arguments typically posit that individuals have consented, either explicitly or tacitly, to surrender some of their freedoms and submit to the authority (of the ruler, or to the decision of a majority) in exchange for protection of their remaining rights or maintenance of the social order.
· Locke advocated for governmental separation of powers and believed that revolution is not only a right but an obligation in some circumstances. Locke was vehemently opposed to slavery, calling it “vile and miserable … directly opposite to the generous Temper and Courage of our Nation.”
· Locke uses the word “property” in both broad and narrow senses. In a broad sense, it covers a wide range of human interests and aspirations; more narrowly, it refers to material goods. He argues that property is a natural right and it is derived from labour aand that the individual ownership of goods and property is justified by the labour exerted to produce those goods
· According to Locke, unused property is wasteful and an offence against nature, but, with the introduction of “durable” goods, men could exchange their excessive perishable goods for goods that would last longer and thus not offend the natural law. In his view, the introduction of money marks the culmination of this process, making possible the unlimited accumulation of property without causing waste through spoilage.
“The power of the legislative, being derived from the people by a positive voluntary grant and institution, can be no other than what that positive grant conveyed, which being only to make laws, and not to make legislators, the legislative can have no power to transfer their authority of making laws, and place it in other hands.”
“No man in civil society can be exempted from the laws of it: for if any man may do what he thinks fit, and there be no appeal on earth, for redress or security against any harm he shall do; I ask, whether he be not perfectly still in the state of nature, and so can be no part or member of that civil society; unless any one will say, the state of nature and civil society are one and the same thing, which I have never yet found any one so great a patron of anarchy as to affirm.”

John Mill (John Stuart Mill a.k.a. J. S. Mill)
1806 – 1873 Born: England Died: France
· John Stuart Mill was arguably the most influential English speaking philosopher of the nineteenth century. He was a naturalist, a utilitarian, and a liberal, whose work explores the consequences of a thoroughgoing empiricist outlook. In doing so, he sought to combine the best of eighteenth-century Enlightenment thinking with newly emerging currents of nineteenth-century Romantic and historical philosophy. His most important works include System of Logic (1843), On Liberty (1859), Utilitarianism (1861) and An Examination of Sir William Hamilton’s Philosophy (1865).
· Mill's conception of liberty justified the freedom of the individual in opposition to unlimited state and social control. A member of the Liberal Party and author of the early feminist work The Subjection of Women (in which he also condemned slavery), he was also the second Member of Parliament to call for women's suffrage after Henry Hunt in 1832.
· Mill, an employee for the British East India Company from 1823 to 1858, argued in support of what he called a “benevolent despotism” with regard to the colonies. Mill argued that “To suppose that the same international customs, and the same rules of international morality, can obtain between one civilized nation and another, and between civilized nations and barbarians, is a grave error. ... To characterize any conduct whatever towards a barbarous people as a violation of the law of nations, only shows that he who so speaks has never considered the subject.”
· John Stuart Mill believed in the philosophy of Utilitarianism, which he described as the principle that holds “that actions are right in the proportion as they tend to promote happiness [intended pleasure, and the absence of pain], wrong as they tend to produce the reverse of happiness [pain, and the privation of pleasure].” Mill asserts that even when we value virtues for selfish reasons we are in fact cherishing them as a part of our happiness.
· Mill's early economic philosophy was one of free markets. However, he accepted interventions in the economy, such as a tax on alcohol, if there were sufficient utilitarian grounds. Mill originally believed that “equality of taxation” meant “equality of sacrifice” and that progressive taxation penalized those who worked harder and saved more. Given an equal tax rate regardless of income, Mill agreed that inheritance should be taxed.
· His main objection of socialism was on that of what he saw its destruction of competition. According to Mill, a socialist society would only be attainable through the provision of basic education for all, promoting economic democracy instead of capitalism, in the manner of substituting capitalist businesses with worker cooperatives.
· Mill's major work on political democracy defends two fundamental principles at slight odds with each other: extensive participation by citizens and enlightened competence of rulers. He believed that the incompetence of the masses could eventually be overcome if they were given a chance to take part in politics, especially at the local level.
· Mill is one of the few political philosophers ever to serve in government as an elected official. In his three years in Parliament, he was more willing to compromise than the “radical” principles expressed in his writing would lead one to expect.
“He who knows only his own side of the case knows little of that. His reasons may be good, and no one may have been able to refute them. But if he is equally unable to refute the reasons on the opposite side, if he does not so much as know what they are, he has no ground for preferring either opinion... Nor is it enough that he should hear the opinions of adversaries from his own teachers, presented as they state them, and accompanied by what they offer as refutations. He must be able to hear them from persons who actually believe them...he must know them in their most plausible and persuasive form.”
“The only freedom which deserves the name is that of pursuing our own good in our own way, so long as we do not attempt to deprive others of theirs, or impede their efforts to obtain it. Each is the proper guardian of his own health, whether bodily, or mental or spiritual. Mankind are greater gainers by suffering each other to live as seems good to themselves, than by compelling each to live as seems good to the rest.”

John Rawls
1921 – 2002 Born: United States Died: United States
· Liberal American moral and political philosopher who received both the Schock Prize for Logic and Philosophy and the National Humanities Medal in 1999, the latter presented by President Bill Clinton, who acclaimed Rawls for having “helped a whole generation of learned Americans revive their faith in democracy itself.” He is frequently cited by the courts of law in the United States and Canada.
· Rawls's most discussed work is his theory of a just liberal society, called justice as fairness. Rawls first wrote about this theory in his book A Theory of Justice. Rawls spoke much about the desire for a well-ordered society; a society of free and equal persons cooperating on fair terms of social cooperation.
· Rawls’s most important principle (the Liberty Principal) states that every individual has an equal right to basic liberties. Rawls believes that “personal property” constitutes a basic liberty, but an absolute right to unlimited private property is not.
· Rawls's argument for his principles of social justice uses a thought experiment called the “original position”, in which people select what kind of society they would choose to live under if they did not know which social position they would personally occupy.
“Justice is the first virtue of social institutions, as truth is of systems of thought. A theory however elegant and economical must be rejected or revised if it is untrue; likewise laws and institutions no matter how efficient and well-arranged must be reformed or abolished if they are unjust. Each person possesses an inviolability founded on justice that even the welfare of society as a whole cannot override. For this reason justice denies that the loss of freedom for some is made right by a greater good shared by others. It does not allow that the sacrifices imposed on a few are outweighed by the larger sum of advantages enjoyed by many. Therefore in a just society the liberties of equal citizenship are taken as settled; the rights secured by justice are not subject to political bargaining or to the calculus of social interests.”

Joseph Nye
1937 – Present Born: United States Resides: United States
· American political scientist and co-founder of the international relations theory of neoliberalism (a theory concerned first and foremost with absolute gains rather than relative gains to other states), developed in the 1977 book Power and Interdependence. He is noted for his notion of “smart power” (“the ability to combine hard and soft power into a successful strategy”), which became a popular phrase with the Clinton and Obama Administrations.
· Secretary of State John Kerry appointed Nye to the Foreign Affairs Policy Board in 2014. In 2014, Nye was awarded the Order of the Rising Sun, Gold and Silver Star in recognition of his “contribution to the development of studies on Japan-U.S. security and to the promotion of the mutual understanding between Japan and the United States.”
· From 1977 to 1979, Nye was Deputy to the Undersecretary of State for Security Assistance, Science, and Technology and chaired the National Security Council Group on Nonproliferation of Nuclear Weapons. In recognition of his service, he was awarded the State Department's Distinguished Honor Award in 1979. In 1993 and 1994, he was Chairman of the National Intelligence Council, which coordinates intelligence estimates for the President, and was awarded the Intelligence Community's Distinguished Service Medal. In the Clinton Administration from 1994 to 1995, Nye served as Assistant Secretary of Defense for International Security Affairs, and was awarded the Department's Distinguished Service Medal with Oak Leaf Cluster. Nye was considered by many to be the preferred choice for National Security Advisor in the 2004 presidential campaign of John Kerry.
· Nye has been a member of the Harvard faculty since 1964. He is a fellow of the American Academy of Arts & Sciences and a foreign fellow of The British Academy. Nye is also a member of the American Academy of Diplomacy. The 2011 TRIP survey of over 1700 international relations scholars ranks Joe Nye as the sixth most influential scholar in the field of international relations in the past twenty years. He was also ranked as most influential in American foreign policy. In 2011, Foreign Policy magazine named him to its list of top global thinkers. In September 2014, Foreign Policy reported that the international relations scholars and policymakers both ranked Nye as one of the most influential scholars.
“When you can get others to admire your ideals and to want what you want, you do not have to spend as much on sticks and carrots to move them in your direction. Seduction is always more effective than coercion, and many values like democracy, human rights, and individual opportunities are deeply seductive.”

Karl Popper
1902 – 1994 Born: Austria-Hungary Died: England
· Karl Popper is generally regarded as one of the greatest philosophers of science of the 20th century. He was a self-professed critical-rationalist, a dedicated opponent of all forms of scepticism, conventionalism, and relativism in science and in human affairs generally and a committed advocate and staunch defender of the ‘Open Society’.
· In ‘The Open Society and Its Enemies’ and ‘The Poverty of Historicism’, Popper developed a critique of historicism and a defense of the “Open Society”. Popper considered historicism to be the theory that history develops inexorably and necessarily according to knowable general laws towards a determinate end. He argued that this view is the principal theoretical presupposition underpinning most forms of authoritarianism and totalitarianism. He argued that historicism is founded upon mistaken assumptions regarding the nature of scientific law and prediction. Since the growth of human knowledge is a causal factor in the evolution of human history, and since “no society can predict, scientifically, its own future states of knowledge”, it follows, he argued, that there can be no predictive science of human history. For Popper, metaphysical and historical indeterminism go hand in hand.
· Popper is known for his vigorous defense of liberal democracy and the principles of social criticism that he believed made a flourishing open society possible. His political philosophy embraced ideas from major democratic political ideologies, including socialism/social democracy, libertarianism/classical liberalism and conservatism, and attempted to reconcile them.
“Unlimited tolerance must lead to the disappearance of tolerance. If we extend unlimited tolerance even to those who are intolerant, if we are not prepared to defend a tolerant society against the onslaught of the intolerant, then the tolerant will be destroyed, and tolerance with them. In this formulation, I do not imply, for instance, that we should always suppress the utterance of intolerant philosophies; as long as we can counter them by rational argument and keep them in check by public opinion, suppression would certainly be most unwise. But we should claim the right to suppress them if necessary even by force; for it may easily turn out that they are not prepared to meet us on the level of rational argument, but begin by denouncing all argument; they may forbid their followers to listen to rational argument, because it is deceptive, and teach them to answer arguments by the use of their fists or pistols. We should therefore claim, in the name of tolerance, the right not to tolerate the intolerant. We should claim that any movement preaching intolerance places itself outside the law, and we should consider incitement to intolerance and persecution as criminal, in the same way as we should consider incitement to murder, or to kidnapping, or to the revival of the slave trade, as criminal.”

Lawrence Summers
1954 – Present Born: United States Resides: United States
· American economist, former Vice President of Development Economics and Chief Economist of the World Bank, senior U.S. Treasury Department official throughout President Clinton's administration, Treasury Secretary 1999–2001, and former director of the National Economic Council for President Obama (2009–2010). Summers served as the 27th President of Harvard University from 2001 to 2006. Current professor and director of the Mossavar-Rahmani Center for Business and Government at Harvard's Kennedy School of Government.
· As a researcher, Summers has made important contributions in many areas of economics, primarily public finance, labor economics, financial economics, and macroeconomics. Summers has also worked in international economics, economic demography, economic history and development economics.[ He received the John Bates Clark Medal in 1993 from the American Economic Association. In 1987, he was the first social scientist to win the Alan T. Waterman Award from the National Science Foundation. Summers is also a member of the National Academy of Sciences.
· In 1983, at age 28, Summers became one of the youngest tenured professors in Harvard's history. In 2006, Summers resigned as Harvard's president in the wake of a no-confidence vote by Harvard faculty. Summers viewed his beliefs on why science and engineering had an under-representation of women to be a large part in the vote, saying, “There is a great deal of absurd political correctness. Now, I'm somebody who believes very strongly in diversity, who resists racism in all of its many incarnations, who thinks that there is a great deal that's unjust in American society that needs to be combated, but it seems to be that there is a kind of creeping totalitarianism in terms of what kind of ideas are acceptable and are debatable on college campuses.”
· As the World Bank's Vice President of Development Economics and Chief Economist, Summers played a role in designing strategies to aid developing countries, worked on the bank's loan committee, guided the bank's research and statistics operations, and guided external training programs. The World Bank's official site reports that Summer's research included an “influential” report that demonstrated a very high return from investments in educating girls in developing nations. According to The Economist, Summers was “often at the centre of heated debates” about economic policy, to an extent exceptional for the history of the World Bank in recent decades.
· In 1999 Summers endorsed the Gramm–Leach–Bliley Act which removed the separation between investment and commercial banks. In February 2009, Summers quoted John Maynard Keynes, saying “When circumstances change, I change my opinion”, reflecting both on the failures of Wall Street deregulation and his new leadership role in the government bailout.
submitted by learnactreform to neoliberal [link] [comments]

The Decade in Blockchain — 2010 to 2020 in Review

2010

February — The first ever cryptocurrency exchange, Bitcoin Market, is established. The first trade takes place a month later.
April — The first public bitcoin trade takes place: 1000BTC traded for $30 at an exchange rate of 0.03USD/1BTC
May — The first real-world bitcoin transaction is undertaken by Laszlo Hanyecz, who paid 10000BTC for two Papa John’s pizzas (Approximately $25 USD)
June — Bitcoin developer Gavin Andreson creates a faucet offering 5 free BTC to the public
July — First notable usage of the word “blockchain” appears on BitcoinTalk forum. Prior to this, it was referred to as ‘Proof-of-Work chain’
July — Bitcoin exchange named Magic The Gathering Online eXchange—also known as Mt. Gox—established
August —Bitcoin protocol bug leads to emergency hard fork
December — Satoshi Nakamoto ceases communication with the world

2011

January — One-quarter of the eventual total of 21M bitcoins have been generated
February — Bitcoin reaches parity for the first time with USD
April — Bitcoin reaches parity with EUR and GBP
June — WikiLeaks begins accepting Bitcoin donations
June — Mt. Gox hacked, resulting in suspension of trading and a precipitous price drop for Bitcoin
August — First Bitcoin Improvement Proposal: BIP Purpose and Guidelines
October — Litecoin released
December — Bitcoin featured as a major plot element in an episode of ‘The Good Wife’ as 9.45 million viewers watch.

2012

May — Bitcoin Magazine, founded by Mihai Alisie and Vitalik Buterin, publishes first issue
July — Government of Estonia begins incorporating blockchain into digital ID efforts
September — Bitcoin Foundation created
October — BitPay reports having over 1,000 merchants accepting bitcoin under its payment processing service
November — First Bitcoin halving to 25 BTC per block

2013

February — Reddit begins accepting bitcoins for Gold memberships
March — Cyprus government bailout levies bank accounts with over $100k. Flight to Bitcoin results in major price spike.
May —Total Bitcoin value surpasses 1 billion USD with 11M Bitcoin in circulation
May — The first cryptocurrency market rally and crash takes place. Prices rise from $13 to $220, and then drop to $70
June — First major cryptocurrency theft. 25,000 BTC is stolen from Bitcoin forum founder
July — Mastercoin becomes the first project to conduct an ICO
August — U.S. Federal Court issues opinion that Bitcoin is a currency or form of money
October — The FBI shuts down dark web marketplace Silk Road, confiscating approximately 26,000 bitcoins
November — Vitalik Buterin releases the Ethereum White Paper: “A Next-Generation Smart Contract and Decentralized Application Platform
December — The first commit to the Ethereum codebase takes place

2014

January — Vitalik Buterin announces Ethereum at the North American Bitcoin Conference in Miami
February — HMRC in the UK classifies Bitcoin as private money
March — Newsweek claims Dorian Nakamoto is Bitcoin creator. He is not
April — Gavin Wood releases the Ethereum Yellow Paper: “Ethereum: A Secure Decentralised Generalised Transaction Ledger
June — Ethereum Foundation established in Zug, Switzerland
June — US Marshals Service auctions off 30,000 Bitcoin confiscated from Silk Road. All are purchased by venture capitalist Tim Draper
July — Ethereum token launch raises 31,591 BTC ($18,439,086) over 42 days
September — TeraExchange launches first U.S. Commodity Futures Trading Commission approved Bitcoin over-the-counter swap
October — ConsenSys is founded by Joe Lubin
December — By year’s end, Paypal, Zynga, u/, Expedia, Newegg, Dell, Dish Network, and Microsoft are all accepting Bitcoin for payments

2015

January — Coinbase opens up the first U.S-based cryptocurrency exchange
February — Stripe initiates bitcoin payment integration for merchants
April — NASDAQ initiates blockchain trial
June — NYDFS releases final version of its BitLicense virtual currency regulations
July — Ethereum’s first live mainnet release—Frontier—launched.
August — Augur, the first token launch on the Ethereum network takes place
September — R3 consortium formed with nine financial institutions, increases to over 40 members within six months
October — Gemini exchange launches, founded by Tyler and Cameron Winklevoss
November — Announcement of first zero knowledge proof, ZK-Snarks
December — Linux Foundation establishes Hyperledger project

2016

January — Zcash announced
February — HyperLedger project announced by Linux Foundation with thirty founding members
March — Second Ethereum mainnet release, Homestead, is rolled out.
April — The DAO (decentralized autonomous organization) launches a 28-day crowdsale. After one month, it raises an Ether value of more than US$150M
May — Chinese Financial Blockchain Shenzhen Consortium launches with 31 members
June — The DAO is attacked with 3.6M of the 11.5M Ether in The DAO redirected to the attacker’s Ethereum account
July — The DAO attack results in a hard fork of the Ethereum Blockchain to recover funds. A minority group rejecting the hard fork continues to use the original blockchain renamed Ethereum Classic
July — Second Bitcoin halving to 12.5BTC per block mined
November — CME Launches Bitcoin Price Index

2017

January — Bitcoin price breaks US$1,000 for the first time in three years
February — Enterprise Ethereum Alliance formed with 30 founding members, over 150 members six months later
March — Multiple applications for Bitcoin ETFs rejected by the SEC
April — Bitcoin is officially recognized as currency by Japan
June — EOS begins its year-long ICO, eventually raising $4 billion
July — Parity hack exposes weaknesses in multisig wallets
August — Bitcoin Cash forks from the Bitcoin Network
October — Ethereum releases Byzantium soft fork network upgrade, part one of Metropolis
September — China bans ICOs
October — Bitcoin price surpasses $5,000 USD for the first time
November — Bitcoin price surpasses $10,000 USD for the first time
December — Ethereum Dapp Cryptokitties goes viral, pushing the Ethereum network to its limits

2018


January — Ethereum price peaks near $1400 USD
March — Google bans all ads pertaining to cryptocurrency
March — Twitter bans all ads pertaining to cryptocurrency
April — 2018 outpaces 2017 with $6.3 billion raised in token launches in the first four months of the year
April — EU government commits $300 million to developing blockchain projects
June — The U.S. Securities and Exchange Commission states that Ether is not a security.
July — Over 100,000 ERC20 tokens created
August — New York Stock Exchange owner announces Bakkt, a federally regulated digital asset exchange
October — Bitcoin’s 10th birthday
November — VC investment in blockchain tech surpasses $1 billion
December — 90% of banks in the US and Europe report exploration of blockchain tech

2019

January — Coinstar machines begin selling cryptocurrency at grocery stores across the US
February — Ethereum’s Constantinople hard fork is released, part two of Metropolis
April — Bitcoin surpasses 400 million total transactions
June — Facebook announces Libra
July — United States senate holds hearings titled ‘Examining Regulatory Frameworks for Digital Currencies and Blockchain”
August — Ethereum developer dominance reaches 4x that of any other blockchain
October — Over 80 million distinct Ethereum addresses have been created
September — Santander bank settles both sides of a $20 million bond on Ethereum
November — Over 3000 Dapps created. Of them, 2700 are built on Ethereum
submitted by blockstasy to CryptoTechnology [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

Interview With Achain founder Cui Meng and his ideas that led to the creation of the Achain platform.

Link: http://www.8btc.com/achain-cui-meng
English Translation:
Cui Meng, founder of Achain, from digital assets to smart contracts: "This time we are all in." Meng greatly 2017-07-07 11:15 Published in the chain circle 1 31383 Less than 30 years old, won the title of outstanding entrepreneurs in the national electronic information industry, was selected Zhongguancun 2016 Star of the future venture, selected well-known entrepreneurial service media "entrepreneurial state" entrepreneurial list ...... Cui Meng, a young post-85 youth, which A large part of the special life experience is attributed to the "blockchain."
WeChat picture _20170707103945
2010 graduated from Beijing University of Aeronautics and Astronautics, Cui Meng entered the community early to join a state-owned enterprises BOE. In 2012, by chance, two friends introduced the bitcoin to Cui Meng within a week. After studying the bitcoin white paper, Cui Meng believes that bitcoin has many technological innovations and is trying to invest in digital currency And the origins of the blockchain began.
As one of the earliest group of investors who entered the industry, Cui Meng recalled that she first bought bitcoin or was on a small website called FXBTC. "The user experience is particularly poor and there is no customer service, so later, the user experience A good trading platform to win is definitely a reason. "
On November 19, 2013, this special timeline, the U.S. Senate Department of Homeland Security and Government Affairs held a hearing to discuss the "prospects and risks" that bitcoin may bring to the "government and society." Bitcoin soared overnight Early players like Cui Meng became obsessed with the middle-high class from obscurity.
Easy to earn the pot of gold, coupled with a strong interest in the blockchain, in May 2014, Cui Meng made a special trip to Beijing to participate in the 2014 bitcoin International Summit · Beijing Railway Station, met the leadership of Sun Jiangtao internship, two People agree on the blockchain, the idea of ​​entrepreneurship in the blockchain sprout.
In 2015, Cui Meng founded the blockchain-based digital currency wallet, Fruit Compal, which won ten-million U.S. dollars in less than two years and at the same time extended the team to 100 from the very beginning There are many famous graduates, famous enterprises from the industry elite.
Cui Meng divided himself into two stages in the block chain industry over the past few years. From 12 to 14 years, he focused on speculation and speculation. Like most people in the industry, he defined the time as "speculation Who has become a veritable entrepreneur 14 years to the present, or participates in multiple blockchain projects, either in depth or in depth.
In the sector of digital currency and blockchain, we see too many examples of the rise of the grassroots, but Cui Meng and the team behind him are taking the other route. There are group companies do support, have a good Internet background, there are several Internet companies have been the United States and other companies to buy, a successful listing in Hong Kong. With the domestic traditional investment institutions, and the Internet industry has a good link.
However, how much of Achain's resources can be devoted to as part of a large group company operating? Asked about this issue, Cui Meng without hesitation, "must be all in, we attach great importance to the Achain project and tilt."
Strategic adjustment, from digital assets to smart contracts
Cui Meng frankly, a few years ago did not devote too much resources in the smart contract platform, now it belongs to judge the direction of deviation, "in the early overall planning, do not think smart contracts can develop so good, so the emphasis on other An app promotion and user accumulation, the smart contract platform only silently research, make technical reserves, no effort to promote.
And now decided to Achain project to the public reasons, Cui Meng said,
"In fact, a large part of the reason is that the rise of Ethereum has caused a great impact on us and made me re-examine the development opportunities in this market and the blockchain. At the same time, we are very confident that at this time, Square of the public chain, we hope to stand up and build China's technical standards and brands. " Almost with Ethereum in the area of ​​smart contracts, the Achain team has so far accumulated more than two years of technology. Why do you say that? According to official reports, Achain team from the original letter and cloud and fruit Compal part of the elite team composed. Li Yuan, general manager of letter and cloud are also mentioned in a road show,
"Achain is the open source project of Sino-Cloud before the chain project can be understood as similar to the combination of Ethereum and bit shares, because bit shares in the open source sharing system is a tremendous expansion, and Ethereum proposed smart contracts This new concept.Achain in the bit shares of the prototype technology up the independent research and development to achieve a smart contract.Etherfair is currently doing is to put it based on the POW mechanism to POS upstairs, that is, Ethereum now dry Achain has done two years. "
Multi-party improvements, more suitable for enterprise applications
So, as a "new generation of smart contract platform," Achain What are the technical characteristics? Cui Meng introduction, Achain in many ways to improve:
Achain provided a mechanism for 0-cost simulation test smart contracts from the beginning of the design. Users are able to test full paths in a comprehensive test framework to maximize the loopholes in the smart contract, all without user tokens. Unlike other test solutions, this solution enables smart contracts to be tested on the official chain, providing a complete test framework that is closer to the real world than the test chain scenario.
Achain emphasizes the efficiency of smart contracts. Tuning from the virtual machine to start, to maximize the contract call close to the performance of ordinary transactions. At the same time, Achain designed scalable smart contracts to make up for the lack of BUGs in the contracts with limited and supervised privileges. Consensus mechanism, Achain uses a self-developed RDPOS distributed consensus, based on the DPOS to optimize the different mechanisms of consensus required to deal with smart contracts;
Achain's chain trading performance can reach 1000TPS, compared with the theoretical value of Ethereum 25TPS. And its modular design, configurable encryption algorithm, the formula module can be replaced, any combination of flexibility to respond to changes in business needs may occur, to prevent congestion.
Officially, unlike most of the ongoing blockchain projects, Achain has been validated in the marketplace, especially in the area of ​​digital asset issuance
submitted by Dirtybird204 to Achain_Official [link] [comments]

A few thoughts - Monday, July 7, 2014

A few thoughts for breakfast today:

There is no "low-hanging" fruit for P2Pool

Some bloggers have recently been claiming that P2Pool adoption can be increased by addressing so-called "low-hanging fruit," which in software development generally refers to issues that require little time to resolve and provide a significant benefit. The idea is that the serious technical challenges could be postponed until later because the little things done now would make those serious challenges less pressing.
P2Pool has some issues that could prevent pools from adopting it, but it is naive to claim that doing things like changing the P2Pool website address is one of them. Apparently, p2pool.in is the official P2Pool site. P2Pool.org is a pool that runs on top of P2Pool and charges a fee. The flaw with the reasoning of "low hanging fruit" is that if people were indeed being fooled into thinking that P2Pool.org is P2Pool's official site, then the results won't make any difference in P2Pool's hashrate anyway. Since P2Pool.org is a "P2Pool pool," people joining the .org pool would simply add to P2Pool's hashrate. Therefore, spending lots of money in an attempt to acquire the P2Pool.org domain is unlikely to have any effect on the actual P2Pool hashrate.

Why bitcoins aren't widely used

I want to devote a section today to examine why bitcoins aren't widely used now. First, everyone can agree that bitcoins have some issues with how they are implemented now, like a lack of insurance and so on. However, despite the shortcomings, I still think it's pretty clear that bitcoins, even in their current state, are already superior to the other options. Anyone trying to send money internationally has found that out long ago. Trying to pay someone with PayPal is a significant challenge, and requires both parties to have a PayPal account and to incur large fees in the transaction.
Meanwhile, if you want to send money to someone without worrying about volatility, you can at the very least have two people sign up for Coinbase accounts. The Coinbase signup process is less difficult than the PayPal signup process. The fee totals are only 2%, instead of 2.9% plus 30 cents, and Coinbase will pull the money out of the account just in time. If you want to buy things at most stores, you can save large amounts of money using the gift card sites, which can save 3% or even 6%.
And it isn't true that it is particularly difficult to secure bitcoins using this method. Simply choosing a strong password and enabling two-factor authentication will be good enough for the majority of people who aren't holding thousands of bitcoins. Therefore, there is something that is preventing uptake of bitcoins quickly as many people here believed that is unrelated to the benefits of the technology. I do not agree with the assertion that ease of use is preventing bitcoin adoption anymore. A few months ago, that might have been true, but the technology has advanced rapidly and anyone who can go to a website (the most basic form of Internet usage) can sign up for Coinbase.
The stubbornness of the market to move isn't due to usability follies; it's due to something else, whether it be the development issues I talked about, less interest by institutions than believed, or something else.

Why usability is a false argument

I just wanted to add one short section about why the "usability" issue is an excuse that does not explain the reason for the price movement. It doesn't require a lot of explanation or many paragraphs.
Why is usability suddenly an issue now, but it wasn't an issue during the harder-to-use times when buyers were running up the price to $1100?

What happens if a new all-time high isn't reached

On Friday, I spent a paragraph discussing the effects on the bubble cycle if a bubble doesn't form within a week or two of July 24. Long ago, I discussed how we would know that the cycle has broken, but I realized since then that the cycle may not break at all. There has been precedent in the earlier cycles for there to be "false" bubbles that cause only a slight rise before another period of bad news and stagnation, but where the price still remains above the lower boundary.
Therefore, I'll suggest that there are three possible outcomes as the July 24 date approaches. First, the rise begins and the cycle resumes. Second, the cycle breaks because the price falls below the lower boundary, and I and a lot of people were wrong. Third, this is one of those "false bubbles" where there will be a crash, followed by another few months of bad news like happened earlier this year, with the next bubble not happening for another 235 days or so.
Of the three, I'd probably say that #1 or #3 are more likely, because I don't see what has changed in the fundamentals to cause the cycle to break.

Cannot extrapolate to a longer cycle

There is a fourth possible outcome that I discount because it does not seem likely to me, but in which other commenters have placed some credence. This outcome is the idea that the current bubble is delayed until September. The reason that I discount the suggestion is because there is little evidence to support the assertion. The theory of a "longer cycle" seems to be a way of changing the data to fit the prediction.
Looking at the charts, the current price movement does not resemble any phase of any of the other cycles. In the other cycles, there has been a crash, followed by a stability period, then a rise. Some people say that there has been a second stability period after the first, but even if they are right, those periods did not result in a decline like the current period has. Rather than the auction producing a run or a crash, there has been the perplexing behavior of bitcoins slowly losing value, which is simply a continuation of the trend that was in place before the auction occurred. Those with a short time horizon might think we are in a bear market, given that the predominant trend has been a slow leeching of money out of the system despite hundreds of "good news" stories. This behavior is not like the upside of any previous bubble.
In moral_agent's bubble charts, there are few slow downtrends anywhere, let alone in the upside of bubbles. We can continue to use the current model without needing to massage the data if we acknowledge that we are starting turn into a bear market rather than suggesting the model failed and that we can fix it by making this cycle 300 days long.
Should this pattern continue, people are going to see this slow decline, look at the calendar, and realize that something is different this time. Bad news will give people excuses to sell. That's why, if things don't turn around soon, there will be a crash that ends this cycle. The number of people who are precariously perched in massive long positions will see a huge squeeze, hastening the crash. However, since the high of $680 won't have been that high, we could probably expect the end of this bubble to be less dramatic than the end of the previous bubble in December. In that case, we wouldn't expect the next really high bubble to form until mid-March.
If this were /bitcoinmarkets, I think that if things don't turn around within two weeks, I would change my flair to bearish. A failure for this bubble to occur doesn't mean that it will just be delayed a month; it means that it will be a weak, false bubble, and we won't see any significant gains until early next year as the next cycle approaches.

Why good news doesn't affect the markets

As a final thought on this issue, it's almost a given that bad news causes crashes, while merchant adoption and good news doesn't affect the markets. But that hasn't always been the case. In November, good news like the Senate hearings caused astronomical rises. What if that assumption is wrong, and the cycle dictating people's reaction to the news is correct? In the past week or two, it seems that the bad news, like that European ruling, is starting to have an effect again.
This supports the notion that perhaps this bubble already peaked, with the date moving towards the past, not the future, as I suggested it might. We may already be in a downtrend and won't know it until we see it in retrospect.

Other

submitted by quintin3265 to BitcoinThoughts [link] [comments]

What A Day: This makes no census by Priyanka Aribindi, Brian Beutler & Crooked Media (3/27/18)

Thumb On The Scale

The Trump administration wants the 2020 Census to include a question about citizenship status for the first time in 70 years. Why is this a problem? Undocumented immigrants might be afraid to respond, even though courts have ruled that citizens and non-citizens must be counted. If immigrants are undercounted, many communities won’t get the funding or representation in Congress that they deserve. Because the Census is only conducted every 10 years, the damage would be long-lasting.
This proposal is already facing legal challenges from multiple state Attorneys General as well as the National Democratic Redistricting Committee, led by former Attorney General Eric Holder.
From Brian Beutler: Part of the reason Democrats aren’t runaway favorites to capture the House in the fall is that they are still living under the gerrymandered maps Republicans drew after winning landslide majorities in the 2010 midterms, a Census year that gave them control over redistricting. This latest change to the Census is a bid to hold on to as much control over the next round of redistricting as they can, and in a way that panders to the Trumpiest faction of the GOP base. It’s antidemocratic, anti-empirical, and racist, and shouldn’t be allowed to stand.

Another Brick In The Dumb Wall

President Trump now says the Department of Defense (America’s, not Mexico’s, FYI) should pay for his border wall using tax dollars appropriated to the Pentagon for other purposes. Trump floated the plan to House Speaker Paul Ryan last week, who reportedly “offered little reaction,” which is probably what he does when the President suggests dumb ideas that Ryan is too chickenshit to oppose. Paul Ryan’s eyes must roll so hard before he fails to confront the president in private and/or in public.
The truth: Trump won’t get his wall unless Congress funds it. Right now, they don’t have the votes to do that unless Trump agrees to protect the Dreamers. If Trump could maintain interest in a topic for more than the length of a cable news segment, he would make that deal.
When asked about it, Press Secretary Sarah Huckabee Sanders responded: “I can’t get into the specifics of that at this point.” Translation: “There’s no way for me to explain this without making myself and my boss look very stupid. I chose this life.”

Go to Hill

Mark Zuckerberg will testify before Congress about Facebook’s data policies and its role in the Cambridge Analytica scandal. This is the most hotly anticipated congressional hearing since James Comey testified that he wouldn’t do anything differently(!). Zuckerberg is famous for speaking his mind, giving us all the facts, and not getting bogged down in consultant-speak, so this should be a hoot.
A clip from Zuckerberg’s last interview got the “Ok, stop” treatment on last week’s Lovett or Leave It (29:30).

What Else

Today Trump secured a trade deal with South Korea—the first significant deal of its kind of his presidency. According to The New York Times, the deal leverages Trump’s threat of steel and aluminum tariffs to allow for auto imports from American companies like Ford and General Motors, extend tariffs on South Korean truck exports, and reduce the amount of steel South Korea can export to the United States. The deal is expected to be formally announced as soon as tomorrow.
Multiple groups of senators, including Chris Coons (D-DE) and Thom Tillis (R-NC)—the bipartisan sponsors of a bill to protect Robert Mueller—seem very concerned that Trump may have the special counsel in his sights—on what was otherwise a quiet day. It may be a coincidence, or they may have learned something behind the scenes. Either way, we’ll be watching very closely. Though, let’s be honest, we watch everything very closely.
No charges will be filed against the two Baton Rouge police officers who shot and killed Alton Sterling in 2016 after an investigation determined that they acted in a “reasonable” and “justifiable" manner. Two cell phone videos documenting the officers’ roles in Sterling’s death prompted Black Lives Matter protests nationwide. Crooked contributor Brittany Packnett said it best: “Alton Sterling is a victim of gun violence too. Don’t you dare stay silent.”
The NRA says it receives foreign funding, but none of it goes towards elections. The organization issued this response after reporting that suggested a Russian banker used the NRA to funnel money to the Trump campaign. Now, Sen. Ron Wyden (D-OR) of the Senate Finance Committee is asking them to detail the media expenditures they’ve made with foreign funds in the past three years. Could be a blot on an otherwise stellar reputation.
Beijing has confirmed to South Korea that North Korean leader Kim Jong Un visited China in his first diplomatic trip since assuming power in 2011. As North Korea’s only notable military ally, the visit to China was expected by some ahead of Kim Jong Un’s upcoming meeting with Trump.
White House lawyers examined two large loans to Jared Kushner’s family business, and, in the most convincing exoneration since Devin Nunes terminated the House Russia investigation, have found no ethics or criminal law violations. In other news, Butch says Sundance didn’t do it either.
The White House explained why Trump has been silent about Stormy Daniels. “I didn’t say he punches back on every topic,” said White House Press Secretary Sarah Huckabee Sanders. THEY CONSTANTLY DEFEND HIS CRAZY OUTBURSTS BY SAYING HE ALWAYS HITS BACK. Par example:
Donald J. Trump on Twitter: "Did Crooked Hillary help disgusting (check out sex tape and past) Alicia M become a U.S. citizen so she could use her in the debate?"
Mitt Romney says he’s more conservative than Trump on the issue of immigration—a reminder that Trump is a product of Republican politics, not an aberration.
The city of Atlanta has been under a ransomware attack for four days, preventing it from collecting online payments of bills and fees. Hackers are demanding a ransom of $51,000 in bitcoin. You never get the dystopia you expect.
Someone made a Craigslist ad in DC seeking a lead attorney for a “difficult client”

Look No Further than the Crooked Media

On Pod Save the People: “They live and die with the world ignoring their very existence.” Sen. Tammy Duckworth talks to DeRay about the gun violence that students on the South Side of Chicago endure.
Listen

Did You Read That Thing?

Former Supreme Court Justice John Paul Stevens has called for the Second Amendment to be repealed. Stephens, a Gerald Ford nominee, wrote the dissenting opinion in Heller v. District of Columbia, in which the Court held that the Second Amendment protected an individual’s right to bear arms outside of militia service for self defense. For the record, 1 in 5 Americans agree with him.
“That simple but dramatic action would move Saturday’s marchers closer to their objective than any other possible reform. It would eliminate the only legal rule that protects sellers of firearms in the United States — unlike every other market in the world. It would make our school children safer than they have been since 2008 and honor the memories of the many, indeed far too many, victims of recent gun violence.”
Read

On Trump's TiVo

Roseanne’s getting a reboot, and now she loves Trump
Billy Eichner on Twitter: "If Roseanne is a hit they should do an I Love Lucy reboot where it turns out Lucy loves Stalin"

Enjoy

As far as marketing ploys go, the Wendy’s mixtape (complete with diss tracks) has worked on me.
submitted by kittehgoesmeow to FriendsofthePod [link] [comments]

Congressional Hearing On White Supremacy And Hate Crimes PART.1 US Senate Congress Bitcoin & Money Laundering Hearing $450 Per Week Stimulus Proposal From the Senate Hearing On Obama Relinquishing Control Of The Internet Domain Name System Big Tech addresses extremism online at Senate hearing – 09/18/2019

Senate Hearing Scheduled for Facebook’s ‘Cryptocurrency’ Libra. Written by ... government officials have asked to halt work on the project until hearings are held. ... hold any amount of Bitcoin, cryptocurrency, other digital currency, or financial instruments — including but not limited to any that appear in the contents of this ... “Cryptocurrencies such as bitcoin have been exploited to support billions of dollars of illicit activity like cyber crime, tax evasion, extortion, ransomware, illicit drugs and human trafficking On Monday, Mr. Mnuchin cited the use of Bitcoin in terrorist financing, tax evasion and human trafficking, though so far, law enforcement officials have brought few cases in those areas. A US Senate subcommittee will hold a hearing next week to examine the state of security in 5G networks. The 5G Supply Chain Security: Threats and Solutions hearing will take place on March 4 at 10 a.m. ET. The committee will hear from experts out of global networking giants Nokia and Ericsson. “The hearing will examine the security and integrity of the telecommunications supply chain and ... The US Senate Appointed Hearing On Facebook’s Libra At The Middle Of July Facebook’s global coin has finally seen the world, however, not everyone is happy about that, especially banking regulators and government of some countries.

[index] [1206] [18360] [25327] [30493] [28570] [5718] [34561] [14029] [16499] [26103]

Congressional Hearing On White Supremacy And Hate Crimes PART.1

This video is unavailable. Watch Queue Queue. Watch Queue Queue Sen. Moran Questions Panelists During Hearing to Examine Extremist Propaganda on Social Media ... Yahoo! Officials on Recent Major Data ... Sen. Moran Holds First Senate Hearing on Student-Athlete ... The Senate Judiciary Committee held a hearing to examine the problems associated with the international gang known as MS-13. The criminal group originated in Los Angeles and has spread through ... MOX NEWS NEEDS YOUR HELP TO CONTINUE!! Paypal Donations https://www.paypal.com/cgi-bin/webscr... My Bitcoin Wallet Is: 18atzCBj9zt7HgMnSYajcpGJwq8BipDcta The hearing will examine the increasing extremism online and explore the industry efforts to remove violent content from social media platforms. ... Big Tech addresses extremism online at Senate ...

#