Bitcoin mining energy costs raise concern, prompt little ...

U.S. Officials Set to Address Bitcoin at Senate Hearing

submitted by n3when to Bitcoin [link] [comments]

Meet Brock Pierce, the Presidential Candidate With Ties to Pedophiles Who Wants to End Human Trafficking

thedailybeast.com | Sep. 20, 2020.
The “Mighty Ducks” actor is running for president. He clears the air (sort of) to Tarpley Hitt about his ties to Jeffrey Epstein and more.
In the trailer for First Kid, the forgettable 1996 comedy about a Secret Service agent assigned to protect the president’s son, the title character, played by a teenage Brock Pierce, describes himself as “definitely the most powerful kid in the universe.” Now, the former child star is running to be the most powerful man in the world, as an Independent candidate for President of the United States.
Before First Kid, the Minnesota-born actor secured roles in a series of PG-rated comedies, playing a young Emilio Estevez in The Mighty Ducks, before graduating to smaller parts in movies like Problem Child 3: Junior in Love. When his screen time shrunk, Pierce retired from acting for a real executive role: co-founding the video production start-up Digital Entertainment Network (DEN) alongside businessman Marc Collins-Rector. At age 17, Pierce served as its vice president, taking in a base salary of $250,000.
DEN became “the poster child for dot-com excesses,” raising more than $60 million in seed investments and plotting a $75 million IPO. But it turned into a shorthand for something else when, in October of 1999, the three co-founders suddenly resigned. That month, a New Jersey man filed a lawsuit alleging Collins-Rector had molested him for three years beginning when he was 13 years old. The following summer, three teens filed a sexual-abuse lawsuit against Pierce, Collins-Rector, and their third co-founder, Chad Shackley. The plaintiffs later dropped their case against Pierce (he made a payment of $21,600 to one of their lawyers) and Shackley. But after a federal grand jury indicted Collins-Rector on criminal charges in 2000, the DEN founders left the country. When Interpol arrested them in 2002, they said they had confiscated “guns, machetes, and child pornography” from the trio’s beach villa in Spain.
While abroad, Pierce had pivoted to a new venture: Internet Gaming Entertainment, which sold virtual accessories in multiplayer online role-playing games to those desperate to pay, as one Wired reporter put it, “as much as $1,800 for an eight-piece suit of Skyshatter chain mail” rather than earn it in the games themselves. In 2005, a 25-year-old Pierce hired then-Goldman Sachs banker Steve Bannon—just before he would co-found Breitbart News. Two years later, after a World of Warcraft player sued the company for “diminishing” the fun of the game, Steve Bannon replaced Pierce as CEO.
Collins-Rector eventually pleaded guilty to eight charges of child enticement and registered as a sex offender. In the years that followed, Pierce waded into the gonzo economy of cryptocurrencies, where he overlapped more than once with Jeffrey Epstein, and counseled him on crypto. In that world, he founded Tether, a cryptocurrency that bills itself as a “stablecoin,” because its value is allegedly tied to the U.S. dollar, and the blockchain software company Block.one. Like his earlier businesses, Pierce’s crypto projects see-sawed between massive investments and curious deals. When Block.one announced a smart contract software called EOS.IO, the company raised $4 billion almost overnight, setting an all-time record before the product even launched. The Securities and Exchange Commission later fined the company $24 million for violating federal securities law. After John Oliver mocked the ordeal, calling Pierce a “sleepy, creepy cowboy,” Block.one fired him. Tether, meanwhile, is currently under investigation by the New York Attorney General for possible fraud.
On July 4, Pierce announced his candidacy for president. His campaign surrogates include a former Cambridge Analytica director and the singer Akon, who recently doubled down on developing an anonymously funded, $6 billion “Wakanda-like” metropolis in Senegal called Akon City. Pierce claims to be bipartisan, and from the 11 paragraphs on the “Policy” section of his website it can be hard to determine where he falls on the political spectrum. He supports legalizing marijuana and abolishing private prisons, but avoids the phrase “climate change.” He wants to end “human trafficking.” His proposal to end police brutality: body cams.
His political contributions tell a more one-sided story. Pierce’s sole Democratic contribution went to the short-lived congressional run of crypto candidate Brian Forde. The rest went to Republican campaigns like Marco Rubio, Rick Perry, John McCain, and the National Right to Life Political Action Committee. Last year alone, Pierce gave over $44,000 to the Republican National Committee and more than $55,000 to Trump’s re-election fund.
Pierce spoke to The Daily Beast from his tour bus and again over email. Those conversations have been combined and edited for clarity.
You’re announcing your presidential candidacy somewhat late, and historically, third-party candidates haven’t had the best luck with the executive office. If you don’t have a strong path to the White House, what do you want out of the race?
I announced on July 4, which I think is quite an auspicious date for an Independent candidate, hoping to bring independence to this country. There’s a lot of things that I can do. One is: I’m 39 years old. I turn 40 in November. So I’ve got time on my side. Whatever happens in this election cycle, I’m laying the groundwork for the future. The overall mission is to create a third major party—not another third party—a third major party in this country. I think that is what America needs most. George Washington in his closing address warned us about the threat of political parties. John Adams and the other founding fathers—their fear for our future was two political parties becoming dominant. And look at where we are. We were warned.
I believe, having studied systems, any time you have a system of two, what happens is those two things come together, like magnets. They come into collision, or they become polarized and become completely divided. I think we need to rise above partisan politics and find a path forward together. As Albert Einstein is quoted—I’m not sure the line came from him, but he’s quoted in many places—he said that the definition of insanity is making the same mistake or doing the same thing over and over and over again, expecting a different result. [Ed. note: Einstein never said this.] It feels like that’s what our election cycle is like. Half the country feels like they won, half the country feels like they lost, at least if they voted or participated.
Obviously, there’s another late-comer to the presidential race, and that’s Kanye West. He’s received a lot of flak for his candidacy, as he’s openly admitted to trying to siphon votes away from Joe Biden to ensure a Trump victory. Is that something you’re hoping to avoid or is that what you’re going for as well?
Oh no. This is a very serious campaign. Our campaign is very serious. You’ll notice I don’t say anything negative about either of the two major political candidates, because I think that’s one of the problems with our political system, instead of people getting on stage, talking about their visionary ideas, inspiring people, informing and educating, talking about problems, mentioning problems, talking about solutions, constructive criticism. That’s why I refuse to run a negative campaign. I am definitely not a spoiler. I’m into data, right? I’m a technologist. I’ve got digital DNA. So does most of our campaign team. We’ve got our finger on the pulse.
Most of my major Democratic contacts are really happy to see that we’re running in a red state like Wyoming. Kanye West’s home state is Wyoming. He’s not on the ballot in Wyoming I could say, in part, because he didn’t have Akon on his team. But I could also say that he probably didn’t want to be on the ballot in Wyoming because it’s a red state. He doesn’t want to take additional points in a state where he’s only running against Trump. But we’re on the ballot in Wyoming, and since we’re on the ballot in Wyoming I think it’s safe—more than safe, I think it’s evident—that we are not here to run as a spoiler for the benefit of Donald Trump.
In running for president, you’ve opened yourself up to be scrutinized from every angle going back to the beginning of your career. I wanted to ask you about your time at the Digital Entertainment Network. Can you tell me a little bit about how you started there? You became a vice president as a teenager. What were your qualifications and what was your job exactly?
Well, I was the co-founder. A lot of it was my idea. I had an idea that people would use the internet to watch videos, and we create content for the internet. The idea was basically YouTube and Hulu and Netflix. Anyone that was around in the ‘90s and has been around digital media since then, they all credit us as the creators of basically those ideas. I was just getting a message from the creator of The Vandals, the punk rock band, right before you called. He’s like, “Brock, looks like we’re going to get the Guinness Book of World Records for having created the first streaming television show.”
We did a lot of that stuff. We had 30 television shows. We had the top most prestigious institutions in the world as investors. The biggest names. High-net-worth investors like Terry Semel, who’s chairman and CEO of Warner Brothers, and became the CEO of Yahoo. I did all sorts of things. I helped sell $150,000 worth of advertising contracts to the CEOs of Pepsi and everything else. I was the face of the company, meeting all the major banks and everything else, selling the vision of what the future was.
You moved in with Marc Collins-Rector and Chad Shackley at a mansion in Encino. Was that the headquarters of the business?
All start-ups, they normally start out in your home. Because it’s just you. The company was first started out of Marc’s house, and it was probably there for the first two or three months, before the company got an office. That’s, like, how it is for all start-ups.
were later a co-defendant in the L.A. County case filed against Marc Collins-Rector for plying minors with alcohol and drugs, in order to facilitate sexual abuse. You were dropped from the case, but you settled with one of the men for $21,600. Can you explain that?
Okay, well, first of all, that’s not accurate. Two of the plaintiffs in that case asked me if I would be a plaintiff. Because I refused to be a part of the lawsuit, they chose to include me to discredit me, to make their case stronger. They also went and offered 50 percent of what they got to the house management—they went around and offered money to anyone to participate in this. They needed people to corroborate their story. Eventually, because I refused to participate in the lawsuit, they named me. Subsequently, all three of the plaintiffs apologized to me, in front of audiences, in front of many people, saying Brock never did anything. They dismissed their cases.
Remember, this is a civil thing. I’ve never been charged with a crime in my life. And the last plaintiff to have his case dismissed, he contacted his lawyer and said, “Dismiss this case against Brock. Brock never did anything. I just apologized. Dismiss his case.” And the lawyer said, “No. I won’t dismiss this case, I have all these out-of-pocket expenses, I refuse to file the paperwork unless you give me my out-of-pocket expenses.” And so the lawyer, I guess, had $21,000 in bills. So I paid his lawyer $21,000—not him, it was not a settlement. That was a payment to his lawyer for his out-of-pocket expenses. Out-of-pocket expenses so that he would file the paperwork to dismiss the case.
You’ve said the cases were unfounded, and the plaintiffs eventually apologized. But your boss, Marc Collins-Rector later pleaded guilty to eight charges of child enticement and registered as a sex offender. Were you aware of his behavior? How do you square the fact that later allegations proved to be true, but these ones were not?
Well, remember: I was 16 and 17 years old at the time? So, no. I don’t think Marc is the man they made him out to be. But Marc is not a person I would associate with today, and someone I haven’t associated with in a very long time. I was 16 and 17. I chose the wrong business partner. You live and you learn.
You’ve pointed out that you were underage when most of these allegations were said to take place. Did you ever feel like you were coerced or in over your head while working at DEN?
I mean, I was working 18 hours a day, doing things I’d never done before. It was business school. But I definitely learned a lot in building that company. We raised $88 million. We filed our [form] S-1 to go public. We were the hottest start-up in Los Angeles.
In 2000, you left the country with Marc Collins-Rector. Why did you leave? How did you spend those two years abroad?
I moved to Spain in 1999 for personal reasons. I spent those two years in Europe working on developing my businesses.
Interpol found you in 2002. The house where you were staying reportedly contained guns, machetes, and child pornography. Whose guns and child porn were those? Were you aware they were in the house, and how did those get there?
My lawyers have addressed this in 32 pages of documentation showing a complete absence of wrongdoing. Please refer to my webpage for more information.
[Ed. Note: The webpage does not mention guns, machetes, or child pornography. It does state:“It is true that when the local police arrested Collins-Rector in Spain in 2002 on an international warrant, Mr. Pierce was also taken into custody, but so was everyone at Collins-Rector’s house in Spain; and it is equally clear that Brock was promptly released, and no charges of any kind were ever filed against Brock concerning this matter.”]
What do you make of the allegations against Bryan Singer? [Ed. Note: Bryan Singer, a close friend of Collins-Rector, invested at least $50,000 in DEN. In an Atlantic article outlining Singer’s history of alleged sexual assault and statutory rape, one source claimed that at age 15, Collins-Rector abused him and introduced him to Singer, who then assaulted him in the DEN headquarters.]
I am aware of them and I support of all victims of sexual assault. I will let America’s justice system decide on Singer’s outcome.
In 2011, you spoke at the Mindshift conference supported by Jeffrey Epstein. At that point, he had already been convicted of soliciting prostitution from a minor. Why did you agree to speak?
I had never heard of Jeffrey Epstein. His name was not on the website. I was asked to speak at a conference alongside Nobel Prize winners. It was not a cryptocurrency conference, it was filled with Nobel Prize winners. I was asked to speak alongside Nobel Prize winners on the future of money. I speak at conferences historically, two to three times a week. I was like, “Nobel Prize winners? Sounds great. I’ll happily talk about the future of money with them.” I had no idea who Jeffrey Epstein was. His name was not listed anywhere on the website. Had I known what I know now? I clearly would have never spoken there. But I spoke at a conference that he cosponsored.
What’s your connection to the Clinton Global Initiative? Did you hear about it through Jeffrey Epstein?
I joined the Clinton Global Initiative as a philanthropist in 2006 and was a member for one year. My involvement with the Initiative had no connection to Jeffrey Epstein whatsoever.
You’ve launched your campaign in Minnesota, where George Floyd was killed by a police officer. How do you feel about the civil uprising against police brutality?
I’m from Minnesota. Born and raised. We just had a press conference there, announcing that we’re on the ballot. Former U.S. Senator Dean Barkley was there. So that tells you, when former U.S. Senators are endorsing the candidate, right?
[Ed. note: Barkley was never elected to the United States Senate. In November of 2002, he was appointed by then Minnesota Governor Jesse Venture to fill the seat after Sen. Paul Wellstone died in a plane crash. Barkley’s term ended on Jan. 3, 2003—two months later.]
Yes, George Floyd was murdered in Minneapolis. My vice-presidential running mate Karla Ballard and I, on our last trip to Minnesota together, went to visit the George Floyd Memorial. I believe in law and order. I believe that law and order is foundational to any functioning society. But there is no doubt in my mind that we need reform. These types of events—this is not an isolated incident. This has happened many times before. It’s time for change. We have a lot of detail around policy on this issue that we will be publishing next week. Not just high-level what we think, not just a summary, but detailed policy.
You said that you support “law and order.” What does that mean?
“Law and order” means creating a fair and just legal system where our number one priority is protecting the inalienable rights of “Life, Liberty and the pursuit of Happiness” for all people. This means reforming how our police intervene in emergency situations, abolishing private prisons that incentivize mass incarceration, and creating new educational and economic opportunities for our most vulnerable communities. I am dedicated to preventing crime by eliminating the socioeconomic conditions that encourage it.
I support accountability and transparency in government and law enforcement. Some of the key policies I support are requiring body-cams on all law enforcement officers who engage with the public, curtailing the 1033 program that provides local law enforcement agencies with access to military equipment, and abolishing private prisons. Rather than simply defund the police, my administration will take a holistic approach to heal and unite America by ending mass incarceration, police brutality, and racial injustice.
Did you attend any Black Lives Matter protests?
I support all movements aimed at ending racial injustice and inequality. I​ have not attended any Black Lives Matter protests.​ My running-mate, Karla Ballard, attended the March on Washington in support of racial justice and equality.
Your platform doesn’t mention the words “climate change.” Is there a reason for that?
I’m not sure what you mean. Our policy platform specifically references human-caused climate change and we have a plan to restabilize the climate, address environmental degradation, and ensure environmental sustainability.
[Ed. Note: As of writing the Pierce campaign’s policy platform does not specifically reference human-caused climate change.]
You’ve recently brought on Akon as a campaign surrogate. How did that happen? Tell me about that.
Akon and I have been friends for quite some time. I was one of the guys that taught him about Bitcoin. I helped make some videogames for him, I think in 2012. We were talking about Bitcoin, teaching him the ropes, back in 2013. And in 2014, we were both speaking at the Milken Global Conference, and I encouraged him to talk about how Bitcoin, Africa, changed the world. He became the biggest celebrity in the world, talking about Bitcoin at the time. I’m an adviser to his Akoin project, very interested in the work that he’s doing to build a city in Africa.
I think we need a government that’s of, for, and by the people. Akon has huge political aspirations. He obviously was a hugely successful artist. But he also discovered artists like Lady Gaga. So not only is he, himself, a great artist, but he’s also a great identifier and builder of other artists. And he’s been a great businessman, philanthropist. He’s pushing the limits of what can be done. We’re like-minded individuals in that regard. I think he’ll be running for political office one day, because he sees what I see: that we need real change, and we need a government that is of, for, and by the people.
You mentioned that you’re an adviser on Akoin. Do you have any financial investments in Akoin or Akon City?
I don’t believe so. I’d have to check. I have so much stuff. But I don’t believe that I have any economic interests in his stuff. I’d have to verify that. We’ll get back to you. I don’t believe that I have any economic interests. My interest is in helping him. He’s a visionary with big ideas that wants to help things in the world. If I can be of assistance in helping him make the world a better place, I’m all for it. I’m not motivated by money. I’m not running for office because I’m motivated by power. I’m running for office because I’m deeply, deeply concerned about our collective future.
You’ve said you’re running on a pro-technology platform. One week into your campaign last month, a New York appeals court approved the state Attorney General’s attempt to investigate the stablecoin Tether for potentially fraudulent activity. Do you think this will impact your ability to sell people on your tech entrepreneurship?
No, I think my role in Tether is as awesome as it gets. It was my idea. I put it together. But I’ve had no involvement in the company since 2015. I gave all of my equity to the other shareholders. I’ve had zero involvement in the company for almost six years. It was just my idea. I put the initial team together. But I think Tether is one of the most important innovations in the world, certainly. The idea is, I digitized the U.S. dollar. I used technology to digitize currency—existing currency. The U.S. dollar in particular. It’s doing $10 trillion a year. Ten trillion dollars a year of transactional volume. It’s probably the most important innovation in currency since the advent of fiat money. The people that took on the business and ran the business in years to come, they’ve done things I’m not proud of. I’m not sure they’ve done anything criminal. But they certainly did things differently than I would do. But it’s like, you have kids, they turn 18, they go out into the world, and sometimes you’re proud of the things they do, and sometimes you shake your head and go, “Ugh, why did you do that?” I have zero concerns as it relates to me personally. I wish they made better decisions.
What do you think the investigation will find?
I have no idea. The problem that was raised is that there was a $5 million loan between two entities and whether or not they had the right to do that, did they disclose it correctly. There’s been no accusations of, like, embezzlement or anything that bad.
[Ed. Note: The Attorney General’s press release on the investigation reads: “Our investigation has determined that the operators of the ‘Bitfinex’ trading platform, who also control the ‘tether’ virtual currency, have engaged in a cover-up to hide the apparent loss of $850 million dollars of co-mingled client and corporate funds.”]
But there’s been some disclosure things, that is the issue. No one is making any outrageous claims that these are people that have done a bunch of bad—well, on the internet, the media has said that the people behind the business may have been manipulating the price of Bitcoin, but I don’t think that has anything to do with the New York investigation. Again, I’m so not involved, and so not at risk, that I’m not even up to speed on the details.
[Ed note: A representative of the New York State Attorney General told Forbes that he “cannot confirm or deny that the investigation” includes Pierce.]
We’ve recently witnessed the rise of QAnon, the conspiracy theory that Hollywood is an evil cabal of Satanic pedophiles and Trump is the person waging war on them. You mentioned human trafficking, which has become a cause for them. What are your thoughts on that?
I’ve watched some of the content. I think it’s an interesting phenomenon. I’m an internet person, so Anonymous is obviously an organization that has been doing interesting stuff. It’s interesting. I don’t have a big—conspiracy theory stuff is—I guess I have a question for you: What do you think of all of it, since you’re the expert?
You know, I think it’s not true, but I’m not running for president. I do wonder what this politician [Georgia congressional candidate Marjorie Taylor Greene], who’s just won her primary, is going to do on day one, once she finds out there’s no satanic cabal room.
Wait, someone was running for office and won on a QAnon platform, saying that Hollywood did—say what? You’re the expert here.
She won a primary. But I want to push on if we only have a few minutes. In 2006, your gaming company IGE brought on Steve Bannon as an investor. Goldman later bought out most of your stock. Bannon eventually replaced you as CEO of Affinity. You’ve described him as your “right-hand man for, like, seven years.” How well did you know Bannon during that time?
Yes, so this is in my mid-twenties. He wasn’t an investor. He worked for me. He was my banker. He worked for me for three years as my yield guide. And then he was my CEO running the company for another four years. So I haven’t worked with Steve for a decade or so. We worked in videogame stuff and banking. He was at Goldman Sachs. He was not in the political area at the time. But he was a pretty successful banker. He set up Goldman Sachs Los Angeles. So for me, I’d say he did a pretty good job.
During your business relationship, Steve Bannon founded Breitbart News, which has pretty consistently published racist material. How do you feel about Breitbart?
I had no involvement with Breitbart News. As for how I feel about such material, I’m not pleased by any form of hate-mongering. I strongly support the equality of all Americans.
Did you have qualms about Bannon’s role in the 2016 election?
Bannon’s role in the Trump campaign got me to pay closer attention to what he was doing but that’s about it. Whenever you find out that one of your former employees has taken on a role like that, you pay attention.
Bannon served on the board of Cambridge Analytica. A staffer on your campaign, Brittany Kaiser, also served as a business director for them. What are your thoughts on their use of illicitly-obtained Facebook data for campaign promotional material?
Yes, so this will be the last question I can answer because I’ve got to be off for this 5:00 pm. But Brittany Kaiser is a friend of mine. She was the whistleblower of Cambridge Analytica. She came to me and said, “What do I do?” And I said, “Tell the truth. The truth will set you free.”
[Ed. Note: Investigations in Cambridge Analytica took place as early as Nov. 2017, when a U.K. reporter at Channel 4 News recorded their CEO boasting about using “beautiful Ukranian girls” and offers of bribes to discredit political officials. The first whistleblower was Christopher Wylie, who disclosed a cache of documents to The Guardian, published on Mar. 17, 2018. Kaiser’s confession ran five days later, after the scandal made national news. Her association with Cambridge Analytica is not mentioned anywhere on Pierce’s campaign website.]
So I’m glad that people—I’m a supporter of whistleblowers, people that see injustice in the world and something not right happening, and who put themselves in harm’s way to stand up for what they believe in. So I stand up for Brittany Kaiser.
Who do you think [anonymous inventor of Bitcoin] Satoshi Nakamoto is?
We all are Satoshi Nakamoto.
You got married at Burning Man. Have you been attending virtual Burning Man?
I’m running a presidential campaign. So, while I was there in spirit, unfortunately my schedule did not permit me to attend.
OP note: please refer to the original article for reference links within text (as I've not added them here!)
submitted by Leather_Term to Epstein [link] [comments]

Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.

Flatten the Curve. Part 48. Source Here
It's getting crazier day by day now, so are you following the Boy Scout motto?
On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.”
Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it.
But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court.
'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act.
Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies.
The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here
Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you.
Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.
PACOM? Why isn't that command group responsible for the South China Sea?
Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India.
Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
Nah. I'm just fear mongering and Doomscrolling again.
Heads up and eyes open. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]

[Part 1] KAVA Historical AMA Tracker! (Questions & Answers)

ATTN: These AMA questions are from Autumn 2019 - before the official launch of the Kava Mainnet, and it's fungible Kava Token.
These questions may no longer be relevant to the current Kava landscape, however, they do provide important historical background on the early origins of Kava Labs.
Please note, that there are several repeat questions/answers.

Q1:

Kava is a decentralized DEFI project, why did you implement the countries restrictions to run the node? Will there be such restrictions by the time of the mainnet?

Q2:

According to the project description it has been indicated that staking reward (in KAVA tokens) varies from 3 to 20% per annum. But how will you fight with inflation?

We all know how altcoins prices are falling, and their bottom is not visible. And in fact, we can get an increase in the number of tokens for staking, but not an increase in the price of the token itself and become a long-term investor.

  • Answer: Kava is both inflationary with block rewards, but deflationary when we burn CDP fees. Only stakers who bond their Kava receive inflationary rewards - users and traders on exchanges do not get this. In this way, rewards are inflated, but given to stakers and removed value from the traders who are speculating like a tax. The Deflationary structure of fees should help counterbalance the price drops from inflation if any. In the long-term as more CDPs are used, Kava should be a deflationary asset by design if all things go well

Q3:

In your allocation it is indicated that 28.48% of the tokens are in the "Token treasury" - where will these tokens be directed?

  • Answer: Investors in financing rounds prior to the IEO have entered into long-term lock-up agreements in-line with their belief in Kava’s exciting long-term growth potential and to allow the projects token price to find stability. Following the IEO, the only tokens in circulation will be those sold through the IEO on Binance and the initial Treasury tokens released.
  • No private sale investor tokens are in circulation until the initial release at the end of Q1 2020 and then gradually over the [36] months The initial Treasury tokens in circulation will be used for a mixture of ecosystem grants, the expenses associated with the IEO as well as initial market making requirements as is typical with a listing of this size. Kava remains well financed to execute our roadmap following the IEO and do not envisage any need for any material financings or token sales for the foreseeable future.

Q4:

Such a platform (with loans and stable coins) is just the beginning since these aspects are a small part of many Defi components. Will your team have a plan to implement other functions, such as derivatives, the dex platform once the platform is successfully launched?

  • Answer: We believe Kava is the foundation for many future defi products. We need stable coins, oracles, and other infrastructure first that Kava provides. Once we have that, we can apply these to derivatives and other synthetics more easily. For example, we can use the price feeds and USDX to enable users to place 100x leverage bets with each other. If they both lock funds into payment channels, then they can use a smart contract based on the price feed to do the 100x trade/bet automatically without counter party risk. In this way, Kava can expand its financial product offerings far beyond loans and stable coins in the future.

Q5:

There are several options for using USDX on the KAVA platform, one of which is Margin Trading / Leverage. Is this a selection function or a compulsory function? Wondering since there are some investors who don`t like margin. What is the level of leverage and how does a CDP auction work?

  • Answer: This is a good #Q . Kava simply provides loans to users in USDX stable coins. What the users do is completely up to them. They can use the loans for everyday payments if they like. Leverage and hedging are just the main use cases we foresee - there are many ways people can use the CDP platform and USDX.

Q6:

Most credit platforms do not work well in the current market. What will you do to attract more people to use your platform and the services you provide? Thank you

  • Answer: Most credit platforms do not work well in the current market? I think that isn't correct at least for DeFi. Even in the bear market, MakerDao and Compound saw good user growth. Regardless, our efforts at Kava to build the market are fairly product and BD focused. 1) we build more integrations of assets and expand financial services to attract new communities and users. 2) we focus on building partnerships with high quality teams to promote and build Kava's core user base. Kava is just the developer. Our great partners like Ripple, Stakewith.Us, P2P, Binance - they have the real users that demand Kava. They are like our system integrators that package Kava up nicely and present it to their users. In order to grow, we need to deepen our partnerships and bring in new ones around the world.

Q7:

KAVA functions as a reserve currency in situations where the system is undercollateralized. In such cases new KAVA is minted and used to buy USDX off the market until USDX becomes safely overcollateralized.

Meaning, there will be no max supply of KAVA?

  • Answer: Yes, there is no max supply of Kava.

Q8:

Why Kava?

  • Answer: ...because people are long BTC and the best way to go long BTC without giving up custody is Kava's platform. Because it is MakerDao for bitcoin. Bitcoin has a 10x market cap of ETH and Maker is 10x the size of Kava. I think we're pretty undervalued right now.

Q9:

How do you plan to make liquidity in Kava?

  • Answer: Working with Binance for the IEO and as the first exchange for KAVA to trade on will be a huge boost in increasing the liquidity of trading KAVA.

Q10:

Most crypto investors or crypto users prefer easy transaction and low fees, what can we expect from KAVA about this?

  • Answer: Transaction fees are very low and confirm if seconds. The user experience is quite good on Tendermint-based blockchains.

Q11:

How do I become a note validator on KavA?

Q12:

It is great to know that KAVA is the first DEFI-supported project sponsored by Binance Launchpad, do you think this is the meaning that CZ brings: Opening the DEFI era, as a leader, you feel like how ?

  • Answer: We are the first DeFi platform that Launchpad has supported. We are a very strategic blockchain for major crypto like BNB. Kava's platform will bring more utility to the users of BNB and the Binance DEX. It feels good of course to have validation from the biggest players in the space like Cosmos, Ripple, CZ/Binance, etc.

Q13:

Since decentralized finance applications is already dominating, how do you intend to surpass those leading in the market?

  • Answer: The leaders are only addressing ethereum. BTC, XRP, BNB, ATOM is a much larger set to go after that current players cannot.

Q14:

What does Ripple play in the Kava's ecosystem, since Ripple is like a top tier company and it’s impressive that you are partnered with them?

  • Answer: Ripple is an equity investor in Kava and a big supporter of our work in cross-chain settlement research and implementations. Ripple's XRP is a great asset in terms of users and liquidity that the Kava platform can use. In addition, Ripple's money service business customers are asking for a stable coin for remittances to avoid the currency heading risk that XRP presents. Ripple will not use USDC or other stable coins, but they are open to using USDX as it can be XRP-backed.

Q15:

Considering the connectivity, Libra could be the biggest competitor if KAVA leverages interchain for efficiency.

  • Answer: With regard to USDX, it is important to understand the users interacting with the Kava blockchain have no counterparty that people could go after for legal actions. A user getting a USDX loan has no counterparty. The software holds the collateral and creates the loan. The only laws that would apply are to the very users that are using the system.

Q16:

Wonder how KAVA will compete with the tech giants

  • Answer: Libra is running into extreme issues with the US Senate and regulators. Even the G7-G20 groups are worried. Its important to understand that Libra is effectively a permissioned system. Only big companies that law makers can go after are able to run nodes. In Kava, nodes can be run by anyway and our nodes are based all over the world. It's incredibly hard for a law maker to take down Kava because they would need to find and legally enforce hundreds of business in different jurisdictions to comply. We have an advantage in this way over the larger projects like Libra or Clayton.

Q17:

In long-term, what's the strategy that KAVA has for covering the traditional finance users as well? Especially regarding the "stability"

  • Answer: Technical risk is unavoidable for DeFi. Only time will tell if a system is trustworthy and its never 100% that it will not fail or be hacked. This is true with banks and other financial systems as well. I think for DeFi, the technical risk needs to be priced in to the expected returns to compensate the market. DeFi does have a better user experience - requiring no credit score, identity, or KYC over centralized solutions.
  • With our multi-collateral CDP system, even with it overcollateralized, people can get up to 3x leverage on assets. Take 100 USD in BTC, get a USDX loan for 66 USDX, then buy $66 BTC and do another loan - you can do this with a program to get 3x leverage with the same risk profile. This is enough for most people.
  • However, it will be possible once we have Kava's CDP platform to extend it into products that offer undercollateralized financial products. For example, if USER 1 + USER 2 use payment channels to lock up their USDX, they can use Kava's price feeds to place bets between each other using their locked assets. They can bet that for every $1 BTC/USD moves, the other party owes 3x. In this way we can even do 100x leverage or 1000x leverage and create very fun products for people to trade with. Importantly, even in places where margin trading is regulated and forbidden, Kava's platform will remain open access and available.

Q18:

In long-term, what's the strategy that KAVA has for covering the traditional finance users as well? Especially regarding the "stability"

  • Answer: Kava believes that stable coins should be backed not just by crypto or fiat, but any widely used, highly liquid asset. We think in the future the best stablecoin would be backed by a basket of very stable currencies that include crypto and fiat or whatever the market demands.

Q19:

Compound, maker they're trying to increase their size via the competitive interests rates. THough it shows good return in terms of growth rate, still it's for short-term. Wonder other than financial advantage, KAVA has more for the users' needs?

  • Answer: Robert, the CEO of Compound is an investor and advisor to Kava. We think what Compound does with money markets is amazing and hope to integrate when they support more than just Ethereum assets. Kava's advantage vs others is to provide basic DeFi services like returns on crypto and stable coins today when no other platform offers that. Many platforms support ETH, but no platform can support BTC, XRP, BNB, and ATOM in a decentralized way without requiring centralized custody of these assets.

Q20:

The vast majority of the cryptocurrency community's priorities is symbolic pricing. When prices rise, the community rejoices and grows. When they fall, many people begin to cast in a negative way. How will KAVA solve the negative problem when the price goes down? What is your plan to strengthen and develop the community to persuade more people to look at the product than the price?

  • Answer: We believe price is an important factor for faith in the market. One of Kava's key initiatives was selecting only long-term partners that are willing to work with kava for 2 years. That is why even after 6 months, 0 private investor or kava team tokens will be liquid on the market.
  • We believe not in fast pumps and then dumps that destroy faith, but rather we try and operate the best we can for long-term sustainable growth over time. It's always hard to control factors in the market, and some factors are out of our control such as BTC price correlations, etc - however, we treat this like a public company stock - we want long-term growth of Kava and try to make sure our whole community of Kava holders is aligned with that the best we can.

Q21:

Do you have any plans to attract non-crypto investors to Kava and how? What are the measures to increase awareness of kava in non-crypto space?

  • Answer: We are 100% focused on crypto, not the general market. We solve the problems of crypto traders and investors - not the average grandma who needs a payment solution. Kava is geared for decentralized leverage and hedging.

Q22:

Adoption is crucial for all projects and crypto companies, what strategy are you gonna use/follow or u are now following to get Kava adopted and used by many people all over the world?

Revenue is an important aspect for all projects in order to survive and keep the project/company up and running for long term, what are the ways that Kava generates profits/revenue and what is its revenue model?

  • Answer: We have already partnered with several large exchanges, long-term VCs, and large projects like Ripple and Cosmos. These are key ways for us to grow our community. As we build support for more assets, we plan to promote Kava's services to those new communities of traders.
  • Kava generates revenue as more people use the platform. As the platform is used, KAVA tokens are burned when users pay stability fees. This deflates the total supply of Kava and should in most cases give rise to the value of KAVA like a stock-buyback in the public markets.

Q23:

In order to be success in Loan project of Cryptocurrency, I think marketing is very important to make people using this service without any registration. What is main strategy for marketing?

  • Answer: Our main strategy is to build a great experience and offer products that are not available to communities with demand. Currently no DeFi products can serve BTC users for example. Centralized exchanges can, but nothing truly trustless. Kava's platform can finally give the vast audiences of BTC, BNB, and ATOM holders access to core DeFi services they cannot get on their own due to the smart contract limitations of those platforms.

Q24:

Currently, some project have policies for their ambassadors to create a contribution and attract recognition for the project! So the KAVA team plans to implement policies and incentives for KAVA ambassadors?

  • Answer: Yes, we will be creating a KAVA ambassador program and releasing that soon. Please follow our social media channels to learn about it in the coming weeks.

Q25:

Currently there are so many KAVA tokens sold on exchanges, why is this happening while KAVA is going to IEO on Binance? Are those KAVA codes fake or not?

  • Answer: For everyone's safety, please understand Kava tokens do not exist yet and they will only exist starting with the Binance IEO. Any other token listings or offerings of Kava are not supported by Kava Labs and I highly discourage you all from trying to get them there. It is most likely a big scam. Please only trust Binance for this.

Q26:

KAVA have two tokens, the first is called Kava - a governance and staking token; the second is called USDX - an algorithmically managed crypto-backed stable coin. What are the advantages of USDX compared to other stablecoins such as: USDT, USDC, TUSD, GUSD, ...?

  • Answer: USDX is one of the few stablecoins to be fully backed by crypto-assets. This means that we do not deal with fiat to back the value, and thus we don't have some of the issues when it comes to storing fiat funds with banks and custodians. This also makes our product fully digital and built for the future of crypto growth.

Q27:

As a CEO, does your background in Esports and Gaming industry help anything to your management and development of KAVA Labs?

  • Answer: Esports no. But having been a multi-time venture-backed foundeCEO and have gone through the start-up phase before has made creating and running a 2nd company easier. Right now Kava is still small, Fnatic had over 80 employees. It was at a larger scale. I would say developing software is much more than doing the hardware at fnaticgear.com

Q28:

Why did Kava choose to launch IEO on Binance and not other exchanges like: Kucoin, Houbi, Gate, ....?

  • Answer: Kava had a lot of interest from exchanges to partner with for IEO. We decided based on a lot of factors such as userbase, diverse exposure across multiple regions and countries, and an amazing team that provides so much insight into so many communities such as this one. Binance has been a tremendous partner and we also look forward to continuing our partnership far into the future.

Q29:

Currently if Search on coinmarketcap has 3 types of stablecoins bearing the USDX symbol (but these 3 stablecoins are no information). So, what will KAVA do to let users know that Kava's USDX is another stablecoin?

  • Answer: All these USDX have no volume or listings. We will be on Binance. I am not worried.

Q30:

In addition to the Token Allocation for Binance Launchpad, what is the Token Treasury in the Initial Circulating Supply?

  • Answer: This is controlled by Kava Labs, but with the big cash we have saved from fundraising, we see no reason why these tokens would be sold on the market. The treasury tokens are for use in grants, ecosystem growth initiatives, development, and other incentive programs to drive adoption of the platform.

Q31:

How you will compete with your competitors? Currently i don't see much but for future how you will maintain this consistency ? No doubt it is Great and Unique project, what is the main problem that #KAVA is currently facing?

  • Answer: Because our industry is just starting out, I don't like to think of them as our direct competitors. We are all working to grow the size of the pie rather than get a larger slice from a small pie. The one thing that we believe will allow us to stand apart is the community we are building. Being able to utilize our own community along with Cosmos and our other partners like Binance for the IEO, we have a strong footing to get a lot of early users onto our platform. Also, we are also focusing on growing Kava internationally particularly Asia. We hope to build our platform for an even larger userbase than just the west.

Q32:

How do you explain your project to a random person who has never heard of your project?

  • Answer: non-crypto = Kava is a lending platform for users of cryptocurrencies.
  • crypto = Kava is a cross-chain DeFi platform for loans and stablecoins backed by BTC, BNB, XRP, ATOM and other major cryptocurrencies.

Q33:

Will KAVA team have a plan on implementing DAO module on your platform since its efficiency on autonomy, decentralization and transparency?

  • Answer: All voting is already transparent on the Kava blockchain. We approved a number of proposals on our test net.

Q34:

how to use usdx token :only for your platform or you have plan to use usdx for payment ?

  • Answer: Payments is a nice use case, but demand for crypto payments is still small. We may choose to focus here later if demand for crypto payments increases. Currently it is quite small with the bulk of use remaining in trading and speculative use cases.

Q35:

Do you have plans to spread KAVA ecosystem across other continents. if yes, what are the strategies and how can I as a community member contribute to making it possible?

  • Answer: We are already across many continents - I don't think we are in antarctica yet. Africa might be light on nodes as well. I think as we grow on major exchanges like Binance, new node operators will get interested and help decentralize Kava further.

Q36:

Maker's CDP lending system is on top in this market and its Dominance is currently sitting on 64.90 % , how kava will compete will maker and compound?

  • Answer: adding assets like bitcoin which have more value and more users than ETH. It's a bigger market that Maker cannot compete with Kava in.

Q37:

Currently, the community is too concerned about the price. As prices rise, the community rejoice and grow, when falling, many people start throwing negatively. So what is KAVA's solution to getting people to focus on the project rather than the price of the token?

What is your plan to strengthen and grow the community to persuade more individuals to look at the product than the price?

  • Answer: We also share similar concerns as price and price direction is always a huge factor in the crypto industry. A lot of people of course are very short-term focused on flipping for bigger profits. One of the solutions, and what Kava has done, is to make sure that everything structured is for the long-term. So that makes sure that our investors and employees are all focused on long-term gains and growth. Locking vesting periods are part of that alignment. Another thing is that we at Kava are very transparent in our progress and development. We will be regularly posting updates within our own communities to allow our users and followers to keep up with everything we're up to. Please follow us or look at our github if you're interested!

Q38:

How did Kava get on Piexgo?

  • Answer: We did not work with Piexgo. We have not distributed tokens to any exchange other than Binance. I cannot speak to what is going on there, but I would be very wary of what is happening there.

Q39:

Why was the 1st round price so much lower than the current price

  • Answer: It is natural to worry that early investors got better pricing and could dump on the market. I can assure you that our investors are in this for the long-term. All private sale rounds signed 2 year contracts to run validators - and if they don't they forfeit their tokens. You can compare our release schedule to any other project. We have one of the most restricted circulating supply schedules of any project EVER and its because all our investors are commiting to the long-term success of the project and believe in Kava.
  • About the pricing itself - it is always a function of traction like for any start-up. When we made our public announcement about the project in June, we were only a 4 man team with just some github code. We could basically run a network with a single node, our own. Which is relatively worthless. I think our pricing of Kava at this time was justified. We were effectively a seed-stage company without a product or working network.
  • By July we made severe progress on the development side and the business side. We successful launched our first test net with the help of over 70 validator business partners around the world. We had a world-wide network of hundreds of people supporting us with people and resources at this point and the risk we would fail in launching a working product was much lower. At this point, the Kava project was valued at $25M. At this point, we had many VCs and investors asking for Kava tokens that we turned away. We only accepted validators that would help us launch the network. It was our one and only goal.
  • Fast forward to today, the IEO price simply reflects the traction and market demand for Kava. Our ecosystem is much larger than it was even a month ago. We have support from Ripple, Cosmos, and Binance amongst other large crypto projects. We have 100+ validators securing our network with very sophisticated high-availability set-ups. In addition, our ecosystem partners have built products for Kava - such as block explorers and others are working on native integrations to wallets and exchanges. Launchpad will be very big for us. Kava is a system designed to cater to crypto traders and investors and in a matter of days we distributed via Binance Launchpad and put in the hands of 130+ countries and tens of thousands of users overnight. It doesn't get more DeFi than that.

Q40:

What is the treasury used for?

  • Answer: Kava's treasury is for ecosystem growth activities.
  • Investors in financing rounds prior to the IEO have entered into long-term lock-up agreements in-line with their belief in Kava’s exciting long-term growth potential and to allow the projects token price to find stability. Following the IEO, the only tokens in circulation will be those sold through the IEO on Binance and the initial Treasury tokens released. No private sale investor tokens are in circulation until the initial release at the end of Q1 2020 and then gradually over the [36] months The initial Treasury tokens in circulation will be used for a mixture of ecosystem grants, the expenses associated with the IEO as well as initial market making requirements as is typical with a listing of this size. Kava remains well financed to execute our roadmap following the IEO and do not envisage any need for any material financings or token sales for the foreseeable future.

Q41:

Everyone have heard about the KAVA token, and read about it. But it would be great to hear your explanation about it. What is the Kava token, what is it's utility? :)

  • Answer: The Kava token plays many roles. KAVA is the native staking token of the Kava blockchain and is used for securing the network. KAVA is delegated to validators, basically professional node operators that run highly-available servers to secure the Kava blockchain. The top 100 validators by weight of staked KAVA earn block rewards that range from 3-20% APR based on the total amount staked in the network. These rewards are split between the validators and the KAVA holders.
  • When users of the platform repay their loans, they must a stability fee (a percentage of the loan) in KAVA tokens. These tokens are burned by the system, effectively deflating the total supply overtime as more users use the CDP system.
  • KAVA is also the primary token used in governance of the platform. KAVA token holders can vote on key system parameter changes and upgrades such as what assets to support, how much USDX in total can be loaned by the system, what the debt-to-collateral ratio needs to be, the stability fees, etc. KAVA holders have a very important responsibility to govern the system well.
  • Lastly, Kava functions as a "Lender of Last Resort" meaning if USDX ever gets undercollateralized because the underlying asset prices drop suddenly and the system manages it poorly, KAVA is inflated in these emergency situations and used to purchase USDX off the market until USDX reaches a state of being over collateralized again. KAVA holders have incentive to only support the good high quality assets so risk of the system is managed responsibly.

Q42:

No matter how perfect and technically thought-out a DeFi protocol is, it cannot be completely protected from any unplanned situations (such as extreme market fluctuations, some legal issues, etc.)

Ecosystem members, in particular the validators on whom KAVA relies on fundamental decision-making rights, should be prepared in advance for any "critical" scenario. Considering that, unlike the same single-collateral MakerDAO, KAVA will be a multi-collateral CDP system, this point is probably even more relevant here.

In this regard, please answer the following question: Does KAVA have a clear risk management model or strategy and how decentralized is / will it be?

  • Answer: Simialar to other CDP systems and MakerDAO we do have a system freeze function where in cases of extreme issues, we can stop the auction mechanisms and return all collateral.

Q43:

Did you know that "Kava" is translated into Ukrainian like "Coffee"? I personally do love drinking coffee. I plunge into the fantasy world. Why did you name your project "Kava" What is the story behind it? What idea / fantasy did your project originate from, which inspired you to create it?

  • Answer: Kava is coffee to you.
  • Kava is Hippopotamus to Japanese.
  • Cava is a region in Spain
  • Kava is also a root that is used in tea which makes your mouth numb.
  • Kava is also crow in Hindi.
  • Kava last but not least is a DeFi platform launching on Binance :)
  • We liked the sound of Kava it was as simple as that. It doesn't have much meaning in the USA where I am from. But it's short sweet and when we were just starting, Kava.io was available for a reasonable price

Q44:

What incentives does a lender get if a person chooses to pay with KAVA? Is there a discount on interest rates on the loan amount if you pay with KAVA? Do I have to pass the KYC procedure to apply for a small loan?

  • Answer: There is no KYC for Kava. Its an open blockchain software platform where anyone with a computer can connect to it and use it.

Q45:

Let's say, I decided to bond my cryptocurrency and got USDX stable coins. For now, it`s an unknown stable coin (let's be honest). Do you plan to add USDX to other famous exchanges? Also, you have spoken about the USDX staking and that the percentage would be higher than for other stable coins. Please be so kind to tell us what is the average annual interest rate and what are the conditions of staking?

  • Answer: Yes we have several large exchanges willing to support USDX from the start. Binance/Binance-DEX is one you should all know ;)
  • The average annual rates for USDX will depend on market conditions. The rate is actually provided by the CDP fees users pay. The system reallocates a portion of those fees to USDX users. In times when USDX use needs to grow, the rates will be higher to incentivize use. When demand is strong, we can reduce the rates.

Q46:

Why should i use and choose Kava's loan if i can use the similar margin trade on Binance?

  • Answer: If margin is available to you and you trust the exchange then you should do whatever is cheaper. For a US citizen and others, margin is often not available and if it is, only for a few asset types as collateral. Kava aims to address this and offer this to everyone.

Q47:

The IEO price is $ 0.46 while the price of the first private sale is $ 0.075. Don't you think that such price gap can negatively affect the liquidity of the token and take away the desire to buy a token on the exchange?

  • Answer: It is natural to worry that early investors got better pricing and could dump on the market. I can assure you that our investors are in this for the long-term. All private sale rounds signed 2 year contracts to run validators - and if they don't they forfeit their tokens. You can compare our release schedule to any other project. We have one of the most restricted circulating supply schedules of any project EVER and its because all our investors are commiting to the long-term success of the project and believe in Kava.
  • About the pricing itself - it is always a function of traction like for any start-up. When we made our public announcement about the project in June, we were only a 4 man team with just some github code. We could basically run a network with a single node, our own. Which is relatively worthless. I think our pricing of Kava at this time was justified. We were effectively a seed-stage company without a product or working network.
  • By July we made severe progress on the development side and the business side. We successful launched our first test net with the help of over 70 validator business partners around the world. We had a world-wide network of hundreds of people supporting us with people and resources at this point and the risk we would fail in launching a working product was much lower. At this point, the Kava project was valued at $25M. At this point, we had many VCs and investors asking for Kava tokens that we turned away. We only accepted validators that would help us launch the network. It was our one and only goal.
  • Fast forward to today, the IEO price simply reflects the traction and market demand for Kava. Our ecosystem is much larger than it was even a month ago. We have support from Ripple, Cosmos, and Binance amongst other large crypto projects. We have 100+ validators securing our network with very sophisticated high-availability set-ups. In addition, our ecosystem partners have built products for Kava - such as block explorers and others are working on native integrations to wallets and exchanges. Launchpad will be very big for us. Kava is a system designed to cater to crypto traders and investors and in a matter of days we distributed via Binance Launchpad and put in the hands of 130+ countries and tens of thousands of users overnight. It doesn't get more DeFi than that.
  • TLDR - I think KAVA is undervalued and the liquid supply of tokens is primarily from the IEO so its a safer bet than other IEOs. If the price drops, it will be from the overall market conditions or fellow IEO users not due private sale investors or team sell-offs.

Q48:

Can you introduce some information abouts KAVA Deflationary Fee Structure? With the burning mechanism, does it mean KAVA will never reach its max supply?

  • Answer: When loans are repaid, users pay a fee in Kava. This is burned. However, Kava does not have a max supply. It has a starting supply of 100M. It inflates for block rewards 3-20% APR AND it inflates when the system is at risk of under collateralization. At this time, more Kava is minted and used to purchase USDX off the market until it reaches full collateralization again.
  • TLDR: If things go well, and governance is good, Kava deflates and hopefully appreciates in value. If things go wrong, Kava holders get inflated.

Q49:

In your opinion what are advantage of decentralized finance over centralized?

  • Answer: One of the main advantages is not needing to pay the costs of regulation and compliance. Open financial software that is usable by anyone removes middle men fees and reduces the barrier for new entrants to enter and make new products. Also DeFI has an edge in terms of onboarding - to get a bank account or an exchange account you need to do lots of KYC and give private info. That takes time and is troublesome. With DeFi you just load up your funds and transact. Very fast user flows.

Q50:

Plan, KAVA how to raise capital? Kava is being supported by more than 100 business entities around the world, including major cryptocurrency investment funds like Ripple and Cosmos, so what did kava do to convince investors to join the project?

  • Answer: We have been doing crypto research and development for years. Ripple and Cosmos were partners before we even started this blockchain with Kava Labs. When we announced Kava the DeFi platform they knew us already to do good work and they liked the idea so they support us.
submitted by Kava_Mod to KavaUSDX [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

PFAS Hearing Libra Hearing Day 1: Biggest Facepalm Moments Sen. Chuck Schumer Responds to Sen. McConnell's Address On Mueller Andreas M. Antonopoulos educates Senate of Canada about ... Senate addresses Facebook's Libra cryptocurrency and data privacy

Crypto Defender Spars With Famed Critic During US Senate Hearing. Oct 11, 2018 at 19:40 UTC Updated Oct 12, 2018 at 16:56 UTC. Nikhilesh De. Crypto Defender Spars With Famed Critic During US ... For lawmakers on the Senate Banking Committee, their hearing this morning elucidated a fresh sense that federal law may not be fully equipped to deal with a virtual currency that’s now valued at ... While bitcoin is yet to be listed in the official set of rules given to members of Congress and federal officials, they are advised to disclose all their bitcoin and other crypto holdings of more than $1,000. In Senate Hearing, Facebook’s Iffy Reputation Looms Over Libra Plans. by Colin Harper. July 16, 2019 . Today, Libra project head David Marcus testified in front of the United States Senate Banking Committee on Facebook’s incipient “cryptocurrency.” The discussion was largely overshadowed by Facebook’s tarnished reputation for user privacy and the mistrust its business practices have ... Senate Calendar (latest issue) Executive Calendar (latest issue, PDF) Previous Meeting Friday, Oct 09, 2020 The Senate convened at 10:00 a.m. for a pro forma session. Floor Activity; Daily Digest (latest issue) Congressional Record (latest issue, PDF) Tentative Floor Schedule; Scheduled Hearings Tuesday, Oct. 13, 2020. Judiciary

[index] [27602] [31301] [27513] [14005] [22395] [13370] [4797] [19734] [45263] [44967]

PFAS Hearing

Canadian Senate Testimony on Bitcoin - Duration: 1 ... The Bitcoin Address - Duration: 1:38:51. CoinJar 26,118 views. 1:38:51 . Bitcoin and the Banks - Five Stages of Grief by Andreas M ... Homan blasts Congress for the delay in additional funding for the humanitarian crisis, urges lawmakers to fix the situation; FBN's Hillary Vaughn reports fro... I watched the Senate Banking Committee hearing on Facebook's Libra cryptocurrency so you didn't have to! This is the first of many videos I'll be doing to cover this topic, and this one shows off ... Apple CEO Tim Cook Testifies at Senate Hearing ... Andreas M. Antonopoulos educates Senate of Canada about Bitcoin (Oct 8, ENG ) - Duration: 1:52:47. Bitcoin Embassy 414,997 views. 1:52:47 ... U.S. Senate Majority Leader Mitch McConnell is set Tuesday to proclaim “case closed” on Robert Mueller’s investigation into Russian interference in the 2016 election and the Trump campaign.

#