Philippines’ Central Bank Issues Guidelines for Virtual ...

10-25 17:53 - 'Around the world on 1 BTC -- my book's all finished.' (self.Bitcoin) by /u/markfromearth removed from /r/Bitcoin within 0-6min

'''
Afternoon all,
And a happy afternoon it is, what with Bitcoin soaring!
Reminds me of my trip back in 2017.
I bought 1 BTC for $4.7k and set off to 20 countries for 12 months all on that 1 coin.
Wild ride. Met John McAfee and asked him about all the scams he's running. Asked Vitalik Buterin about life on mars. Got arrested by the police in Cairo. Slept under a bridge after my couchsurfing host bailed. A real roller coaster from start to finish.
Rode it to $20k in early 2018 before riding it back down to $5k.
Well, as promised, I finished writing the book about it. Or at least half the book.
Stolen Wallets: And Where to Buy Them
Here's the back cover blurb:
-------------------------------------
What's in your wallet?
You okay with a stranger poking through it? I'm not. Never in a million. My wallet is my private little hell. Receipts for things I can't afford and a picture of an ex I still miss. But there I was, standing in a grubby back alley in Bangkok. Wallets that once belonged to other people -- scattered on a table in front of me: Crocodile skin Gucci, scuffed generic brown leather, even a DIY duct-tape wallet -- each and every single one stolen. Curiosity killed my ethics. I picked one up. It was full. Not with money, of course, but with ...
These are the stories of my travels.
Before all this I was a desk jockey. Putting in my 9-to-5. Binge-watching Netflix alone. Then I bought 1 bitcoin -- and it started to skyrocket. Little did I know it was my golden ticket. From China to Europe. 20 countries, 12 months, and my skyrocketing bitcoin. A red carpet to a world of fast money, greed, hype, hope and corruption. Wild crypto parties. Fake tits on fake friends. Stacks of counterfeit money. Stolen wallets. Then the bubble popped -- and the world of the newly rich began burning down around me.
-----------------------------
It's a short book. 40 something pages. It's the first half of the whole story. That's why it's only $5.50 for the paperback on Amazon -- that's the lowest Amazon let's me go (break even).
I figured it's best to test the waters first. I'm not the best writer. No Pulitzer prize gathering dust on a mantel.
Putting together this first half took months of writing, re-writing, and drinking until the words looked right.
Not much more to say besides posting the "1st chapter" (It's more of a logbook entry) down below and a link to Amazon.
[[link]4
Previous Reddit post:
[[link]5
website:
[[link]6
-------------------------------------
Logbook. Entry 1.
T minus 2 days to launch.
On the black market…
My liver is worth: 55.78 bitcoins.
One of my kidneys: 16.41 bitcoins (if sold in China) and 4.11 bitcoins (if sold in India).
My skeleton: 0.99 Bitcoins -- spooky cheap.
My dick? Hm. I can’t seem to find a reliable source for black market cocks.
That’s not good.
Listen, say I get kidnapped -- which is entirely possible where I’m going. Then, after a few days of torture, the kidnappers say: “Deeply sorry about this, young man, but since no one came through with your ransom we’ll need to go ahead and harvest one of your major organs -- have a preference?”
If the black market ran rife with naughty bits -- and my drinking habits still required a functioning liver -- I’d go ahead and have them lop off my cock.
*sigh*
Welcome, ladies and gentlemen, to my brain at 2 o’clock in the morning. I can’t stop thinking. I can’t stop worrying. In a few very short days I fly away. Away from my family, my friends, the friendly neighborhood dog I pet on my way to work (Good old Charlie, with his lopsided ears and robber-scaring bark). In short -- away from everything I know. Away from home.
And for what?
To travel around the world … on 1 bitcoin.
  1. Beijing -- Bitcoin is banned. And I’m going during military prep for the 19th Congress of the Communist Party. Real solid timing on my part there.
  2. Shanghai -- China’s largest underground smuggling hub for opium, molly, cocaine, and black-tar heroin. Also -- I could be fined and jailed for jaywalking.
  3. Hong Kong -- I can buy a fake Rolex for $10, or a real one that ‘fell off the back of the truck’ for $1500. Do they accept Bitcoin?
  4. Burma (Myanmar)-- This is where shit hits the fan. There’s a genocide boiling in NorthWest Burma. The Army is herding minorities and burning their villages. I’ve heard BTC helps them escape.
  5. Cambodia -- Tourists are given the option to rent rocket launchers ... and blow up cows. Jesus Christ. Unreal. Are cryptocurrencies involved?
  6. Bangkok -- The sex trafficking capital of S.E. Asia. Massage parlors, ping-pong shows, and “happy endings.” Will this country be my happy ending? (Note to editor: delete that joke. I can do better).
  7. The Philippine’s -- “President Rodrigo Duterte urges citizens to shoot drug addicts in the streets.” He promised enough drug dealer bodies would be dumped in Manila Bay that fish there would grow fat from feeding on them. Does the same go for BTC traders?
  8. India -- Transplant tourism. The Red Market. Hearts, lungs, livers handed off for a digital wallet full of crypto -- none of which goes to the victims. Perhaps if I get desperate I’ll sell a kidney.
  9. Africa -- Not sure which country I’ll wind up in. Not sure if I’ll even make it. One bitcoin is not exactly a hefty sum. By this point I’ll be running out -- and that’s if the value of my single bitcoin hasn’t buried it’s two front teeth in the dirt.
  10. Europe -- who am I kidding? The odds of me arriving in Europe with my wallet in one hand and my dick in the other are as tiny as both those things.
The goal: 365 days. 12 months. 1 year… on 1 bitcoin. To survive I’ll need to couchsurf, eat cheap street food, and rely on the kindness of strangers -- cryptocurrency strangers.
If I accidentally trade my bitcoin for counterfeit money -- I’ll go to foreign prison. If I get food poisoning -- I’ll end up in a 3rd world hospital. If a couchsurfing host bails on me -- I’ll be sleeping under a bridge. If I trade my bitcoin in a non-public place -- I’ll get mugged. But if I trade in a public place I could be mistaken for a drug dealer -- and shot. In fact, I’ll need to make a supremely concentrated effort to not get jailed, mugged, stranded, or shot. Jesus, no wonder I can’t sleep. Why am I doing this?
2 weeks ago.
A local Denny’s Diner.
All-American breakfast -- a weekend routine for my father.
“Bitcoin is not money.”
“Dad.”
“Bitcoin will never be money.”
“Dad.”
“And you should shave off your beard.”
“....It’s a good beard, dad.”
The waitress politely offers to refill his coffee. He waves her away.
“You’re mother keeps calling me. She used to never call me. I’ve worked hard to keep it that way. Now she’s calling me day and night. Worried sick.”
“She’s a good mom.”
“She’s a pain in the ass. You’re a pain in the ass. She calls me, telling me to talk you out of going, reading me headlines,” he continues while salting his eggs aggressively, “Jealous Gay Husband Uses Bitcoin to Hire Hitman. Sex trafficking on the Silk Road with Bitcoin. Terrorism on the rise with the rise of Bitcoin. I’d hang up but she’d call me back with ten more.”
“Not to worry, sheriff. I won’t be financing a revolution.”
“What will you be financing, hm? With this magic internet money?” He waves a breakfast sausage at the grocery store across the street. “Say I have a mind to go shopping. Fill the fridge. Put bread, butter, and beer on my table tonight. Think the teller will let me pay with your Facebook likes? Hm? Because that’s what they are. These bitcoins, these junkie frequent flier miles. About as useful as condoms to the Pope.”
I had to laugh at that one. “That’s the spirit, sheriff. That’s what I’ll be traveling to find out. What the hell I can finance. What can I buy with my magic internet money.”
“And how much of this fairy dust do you own?”
“One. I bought one Bitcoin.”
“And how big a hole did it burn in your wallet?”
“Four thousand, seven hundred dollars...and change.”
Dad’s not the type to bulge his eyes out in surprise. His is the clench of the jaw that markes his disapproval. “You could have put that money toward getting your shit together.”
I met his disapproval. “This is me getting my shit together.”
“That a fact? And how much is your one pedobuck worth today?” he says, scrutinizing me over his cup of coffee. Waiting. He used to be a great cop. It’s why I never could get away with anything as a kid. Still can’t.
I look away. “Four thousand two hundred.”
“Down five hundred bucks, already?”
“Yup.”
“In one week?”
“Something like that.”
Times like this. Right here. Times like this remind me of those unimaginative books where the author writes “and then he picked at his food.” What a terrible line. Overused. Unimaginative. But here I am ... picking at my food. No matter how old I get, dad’s disapproval will always be something special.
“You know what you might have done with that money? Hm?” He tosses his used napkin on his empty breakfast plate. “Gone to a barber. Shaved your beard.” Down went the last swig of his coffee. “Looked for another engineering job. Got another engineering job. Used that fancy university degree you’re still in debt for.”
“I’ve been trying.”
“Try harder. Get your shit together.”
“Sheriff, I -”
“Listen, my genius son, I will not bail you out. I will not let your mother bail you out. We do not have the money. What you are doing is a mistake. It will end in failure.”
“Sheriff-”
“I am not finished. You have never taken a trip remotely like this in your entire life.” He always had a remarkable way of raising his voice without actually raising his voice. “I will not be speaking ching-chong Chinese to some oriental dipshit deputy because you stuck your finger in someone’s else’s dumpling. Your mother will not fly out to Cambodia with a steaming bowl of chicken noodle soup because you ate tapeworm salad. And God forbid. God forbid you get taken, held for ransom, or sliced open.”
“I understand.”
“You do not understand.” He begins ticking off fingers. “If you get stranded. If you get imprisoned. If you get hospitalized. If someone steals your magic computer fairy dust. Nobody will bail you out. There will be no cavalry. You will be on your own. Alone.”
And now the silence. Silence like a large wave going out, giving you time to change your mind, time to rethink your life choices. Before the wave returns to knock your sandcastle out.
“No, Sheriff, I’m doing this.”
“Why?”
“To find out if bitcoin is money. If it has a future.”
“Unacceptable. Stick your nose in a book about it. Why do you want to go?”
“I’ve never done anything like this before. This’ll test me. Make me grow.”
“Pussy of a reason,” he growls. “Why are you going?”
“I don’t know. But I’ll find out.”
……….
….
After awhile he stands. “Remember.” He takes out his wallet. “You get on that plane --- and there won’t be no cavalry.” Withdraws a few crisp bills. Tosses them on the table. “And only money … is money.”
------------------------------------------------------------------------------------------------
Let me know if you enjoyed it or not.
I could keep posting logbook entries? Or I could read it on Youtube. Post the whole book chapter by chapter. Not like Amazon needs the money, amiright?
And if it's no good, say that too. Saves me time since I won't need to write the rest.
'''
Around the world on 1 BTC -- my book's all finished.
Go1dfish undelete link
unreddit undelete link
Author: markfromearth
1: www*amaz*n.com/St**e**W**let*-W**re-Buy-Th*m*dp/108*0855*6/ 2: *ww.reddit.com**itco*n/com*ents/*gh*eb/i_***vele*_the_w*r*d_on_*_bt*_*nd**i**ll*/ 3: bitcoi*a*oun**heworld*com* 4: ww*.amazo****m/S**len-W*llets-Where**uy*The*/dp/10*608556**]*^1 5: ww*.r*d*it.*om/Bitcoi*/com*ents/**h*eb*i\*trave*ed\*the\_wor*d*_o*\_**_btc\***d\_final*y/**^2 6: bitco*nar*u*d**e*o*ld.com/]^*3
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

Amir Taaki - Breaking Bitcoin presentation (transcript)

Below I transcribed Amir's talk from Breaking Bitcoin (see previous post here, start of presentation (youtube): here). Excuse the errors (will fix if you point me to them).
What was most interesting for me:
Amir:
Thank you for having me here.
I believe that ideas play an important role in shaping human history. What I want to talk about is how technology has been shaped by key ideas. In particular how certain mechanical ideas of human society got mixed up with with politics and technology.
What I want to talk about is the free technology movement. It was a movement that showed great potential promise to liberate humanity. At the heart of it was a idea that technology offered a new way to construct a radially different kind of society that never before was possible in history, this movement was influenced by the visions of early scientists who believed in the power of computer technology not just to serve large industry and military but everybody to have access to this new power.
Influenced of by the 60s counterculture, this movement went on to develop the first personal computers. But that's not the end of the story because this radical vision mutated into the idea of self-regulating systems which see human beings as object managed by computer algorithms. In this vision, the value of human ideas to transform the world was diminished into a strange kind of consensus where everybody satisfies their personal desires.
We now find ourselves in a strange static dreamworld while dark forces are returning to threaten to penetrate our reality and all of the dreams of the techno-utopiasts play the role in creating this fake virtual world in which human beings driven by desires, devoid of all sense of higher purpose become slaves to algorithms and vast computer intelligences.
What is interesting about this story is the significance it has for Bitcoin. A project which is created for the purpose of creating a decentralized peer-to-peer money that cannot be controlled by governments and central banks but which now finds itself monopolized by large mining cartels. A lack of vision to guide the project forwards and increasing irrelevance in a world facing a global breakup of power.
Lastly I want to explain my project to revitalize the free technology movement to formulate a wider vision to restore back the potential of the technology to transform human society and train the next generation of revolutionary hackers dedicated to the cause of using the technology to support the cause of freedom.
My aim here is to find sponsors, find the place for establishing our hacker Academy, to find partner organisations to develop new technology projects with and to find people ready to dedicate themselves in advancing the free technology movement. People ready to be at the forefront of writing history.

At the heart of this story lies a conflict between two men in 1968. One of them is good B.F. Skinner, the other is good Lewis Mumford. It was one moment when two ideas about how technology could be used to advance human society first XXX ((unintelligible)) to take hold.
There's a documentary from this time made in mid-60s called "Towards tomorrow". And in this documentary, it described two possible future visions for human society. In a society where old forms of authority were declining, what would be the way that we could organize masses of human beings in a future society.
One of these visions for this society was a world managed by an elite group of technocrats, a specialized elite who managed a large population of passive human beings who constantly needed to be monitored and managed to be able to to keep them happy. B.F. Skinner described a new way of controlling and ordering people. He posed the question in this age of mass democracy and individualism the old forms of coercion was simply not possible and he put forth the idea of using reward. And he described an experiment where you have a cage with a pigeon inside and the pigeon can be trained to peck symbols, buttons, and depending on which symbol they peck, they get a pellet of food. In this way, by giving the pigeons the right reward for the correct behavior, they train the pigeon as a mechanical object.
He then took this farther and he went to a mental hospital in San Bernardino in California and in the mental hospital, what they did is they gave the mental patients small reward every time they did a good behavior. With this reward, when it was a lunch time or a dinner time, the patients could sit at a nicer table. So, inside the mental hospital, they created a new ordered hierarchy from a system of reward in which people don't feel controlled but feel empowered. Skinner describes this model as a model for the future of humanity. What's really interesting about this video by Skinner is it there's something very eerily similar to what we see today in which there is a technocratic elite that has interest in politics only in managing human society to keep us happy to keep everything stable and to keep themselves rich. A lot of this was powered in the mid-80s with the fake consumer credit to reward us as a form of social management - much like the experiment with the hospital, the mental hospital.
Lewis Mumford put forward an alternative vision for a society. In this video I'm going to show you - he first criticises Skinner and then he puts forward an alternative vision where everybody in the society is a participant. Everybody is an active human being deciding their destiny.

There were many forms the computer could have taken. In 1800s, the computer was proposed by Babbage. And popularized by Ada Lovelace. It was seen as a tool that would have huge social uses and that should be in the hands of many people, but when the computer was first developed during WWII - for cracking German codes for the military and for guiding ballistic missiles - computers became a very large centralized machine.
By the 80s, communities of hackers started to emerge which started to be fascinated with these huge machines - which at the time you had to get the time slice, to get the appointment to get to get some time to use the machine - they started to get jobs near these computing devices, because they wanted to know how these machines could work. They started to build their own computers in their garages, in their houses and universities - and that was the birth of the personal computers, the reason why we now have laptops and telephones.
What happened was: a lot of big companies started to come along and they started to invest a lot of capital. All of the hacker community - who up until that point had never seen money before in their life - to throw themselves at, at the proprietary industry. And whereas before the culture that had created this personal computers, this liberatory technology, really believed in power to use the technology to improve the humanity for the better, who really believed in free technology, in sharing techniques and code with each other - instead became siloed off.
But there was one guy - Richard Stallman - he was just a guy - he found this ethically wrong. If enough people got together, we could give a challenge against the proprietary industry. He made that as a proposal to the community - that it doesn't have to be this way, if we together put our energies we can build our own operating system. A lot of people at that time thought that he was crazy or that his ideas weren't feasible.
This is early video of Richard Stallman.

So, in 1991, the cryptography was classified as ammunitions and Philip Zimmermann wrote the first freely available encryption software for anybody to use and he uploaded it to the Internet. The American government arrested him and he was facing a decade in prison. What Philip Zimmerman did was to print the source code of PGP - of this encryption software - which he sold internationally, which is something that in America is protected under the First Amendment. And the American government was realizing that they couldn't continue with the case, they dropped the case. And since that time, because of the action of Philip Zimmermann, software became classified as a form of speech. And cryptography became widely available. It's now reason why cryptography is available everywhere.
Also, in early 90s, Stallman has started to piece together his operating system. And by now a community a community of people has emerged around him. It was the birth of Linux - a really important piece of technology. Not just in the free technology world, but in general, in hi-tech space it place a very key role. And that was a rise of the whole bunch of movements: free software movement, hacker movement, crypto-anarchist movement. Movements were invigorated with creating a lot of new ideas and a lot of new concepts about how we could use the technology to shape the world around us. These were collective movements driven by the shared sense of purpose.
Towards the end of the 90s (the baby boomer generation), the western society became overly optimistic. Something the Jean Baudrillard called 'the dead of society' and 'obsession with desert-like forms / with the simulacrum'.
Stallman free software movement failed to capitalize on institutionalizing his movement. And what happen was what emerged was the open source movement. It was a movement that said: making this technology is not a question of freedom/ethics, it's simply when you have access to source code of a program it's more efficient, it's cheaper, it makes more quality code. I don't think that's true, but that was their argument. One of the main spokesmen was Eric Raymond who released a book called 'A cathedral and a bazaar'. In that book, Eric Raymond has described the open source development philosophy as open bazaar where everybody, dozens or hundreds of people, a wide number of people all collaborated in a horizontal manner. He coined an idea that given enough eyes all bugs are shallow. When we have a piece of source code, if there are enough people - all contributing a small amount of time and looking at the source code - then if there is a bug, that bug will be found. The idea that given a huge amount of people with a small amount of contribution of each, that we can develop projects and advance technology.
Then what happened was the biggest event in the modern western history - which was the collapse of the twin towers, the twin idols of capitalism, perfect in a reflections, reaching into the skyline of New York - which realized our deepest most hidden desires to see the destruction of this passive lifeless world. And what it represented was the return of the real (of the) dark forces - that we ignored - back to penetrate into our reality.
In early 2000s we saw a lot of optimism and momentum for change. We saw the Arab spring, we saw The occupy, we saw the orange revolutions. In the technology world, we saw a lot of advances, there was a huge amount of optimism for Linux on the desktop. Every year the people were saying: this is going be the year of the desktop. Everybody was waiting for that sudden single breakthrough. One of the major developments in technology world was the confrontation that took place between Hollywood and a Manhattan programmer called Bram Cohen. ((...)) He developed BitTorrent. The concept started with sites like Napster or Kazaa - that were centralized services that were shut down by authorities.
Cohen came up with a concept: if enough people downloading files and seeding them at the same time - then the more people that download the file the more that file will become widely distributed in the network. So, that file will become shared in a self-regulating network. It was a big success and the movie studios didn't know what to do about this, they were completely powerless in face of this technology. The idea of creating a functional self-regulating system outside of power proved itself and it's something wildly popular among technologists.
The next major development is the shutdown of the Pirate bay which led to the development of the Pirate party that at one point had double digits in elections and even entered into the EU parliament. There is huge momentum behind it. Wikipedia was also developed - the idea that given thousands and thousands of people all contributing small edits, one line at time, could build this huge knowledge resource . Around this movements started to emerge the new priests of this internet-centric decentralization technology - people like Yochai Benkler, academics who would go to conferences and sell this ideology to people.
But something strange started to emerge. Wikipedia released statistics about edits on Wikipedia. We found that it was a small group of dedicated people that wrote the majority of Wikipedia, people who really believed in the project and spent all their time writing the majority of the articles on the website. When we started to look closer at these decentralized systems, what we observed was small groups of leaders surrounded by a wider community. In BitTorent, it wasn't that everybody was seeding in the network. Most people, after they downloaded, didn't continue to run the software. In fact, it was a small group of users, who wanted to challenge Hollywood and promote BitTorrent, who would leave their software running seeding torrents.
In open source, we observed that there were small groups of dedicated developers in a project surrounded by wider community. And in fact, what Stallman has done was not just to write Linux and put that in the community, but he had written articles, he had written manifestos, he had put forward a vision and an ideology that pulled together enough people and drove this movement of hackers forwards.
So what drove these projects for freedom was not a new model or a new technique. It was a vision that pulled together enough people to realize an idea. To understand why Occupy and Arab Spring and orange revolutions and the Pirate Party and a lot of these movements had a huge of amount of will and movement - fail, it's really instructive to understand what happened to Egypt. In Egypt, huge amounts of youths started to mobilize through Facebook and they started to go to this center in Cairo to front the military dictatorship. Huge amount of people died in that struggle. And after they threw out ((?)) the military dictatorship, the youth then sat down and said: "Okay, now what we are gonna do? What's next?". So they started to discuss.
And into that, came a group of people, with a vision, with an ideology, that was well organized and able to pull together enough strands of the society behind them. But they could put their vision into power. And that was the Muslim Brotherhood.
And then the same youth hood - that kicked out the military dictatorship - came back to the square to ask the military dictatorship to come back and rescue them from the Islamists.
At the same time, Satoshi developed Bitcoin. I remember on Satoshi's early website he described it as a peer-to-peer form of money that cannot be controlled by central banks and governments. And it's something that attracted libertarians, cryptographers and hackers. Bitcoin is kind of a technology - free technology project - that was a little late to the party. Interestingly, it finds itself in the same place as the movements that preceded it. The fundamental problem with Bitcoin is not a problem of missing this or that technology, it's a problem of a lack of vision, a lack of how this technology is -
And it's not just about Bitcoin - it's something to do with the wider technology movement. We have to understand the global situation now. Humanity is facing a future with a huge amount of suffering. We are facing the threats from terrorism, from immigration. There's the rise of new ideological movements - ISIS just went and took a city in southern Philippines for more than a month - which is right next to Indonesia, the biggest Muslim country in the world. And in Europe the new right movement is getting very strong, organizing training camps, becoming well-organized, getting into political power and well-funded. This is the reality of our situation now.
We have to think about how this technologies that we make -, where do they situate themselves in the wider global context.
In Rojava, there is also a really important movement with the ideology of democratic confederalism which is the way forward from anarchism. And offers a really good analysis of what is the current society and what is the crisis that we're facing. And how, in that place, revolutionaries from all over the world are going to learning the methodology and ideology of this movement. It's a new emerging movement outside of any one person's control, but new forces can be harnessed. What we have to understand is that anarchist movement and the hacker movement is something deeply connected. The problem with anarchism is that it failed in it's potential to advance humanity forward, it's simply an ideology that no longer is able to work. What we have in Rojava is a libertarian revolution of 5 million people. What is democratic confederalism? It's an ideological movement that opposes the state as a mechanical worldview and sees the nature as something that is divine, that seeks to restore the balance back between internal+subjective and external+material world. The freedom comes from reaching our destiny as human beings, not simply through pleasure seeking. (Liberalism is the destruction of the free society.) And the better humanity it's not simply a happier humanity but stronger freer humanity. The crisis in the West not simply an economic crisis, but social crisis - we're facing a deep cultural issue.
All of the ideas in hacker movement - such as BitLaw, digital governance, cryptographic economy, decentralized organization, new economic models, new technical tools - unless we are able to take all of these concepts and put them into a plan, with a sense of direction, that we can put these into practice - then it's something that's going to be lost. Now, what's presenting itself is a massive opportunity for hackers to put their ideas into practice.
So, right now we are building a hacker team. There's 3 tasks we have to do: study of all the ideas and concepts in technology. From this study we have to develop a long- term plan. And thirdly, we have to devote ourselves to build the technical base of this new emerging democratic confederalism movement, we have to create revolutionary hackers dedicated to the course. If we don't, then all of the technology we are making is outside of the society, it's a toy, and what is relevant in this world is not making new products to fill the spaces in the environment around us, but using technology to shape politics that influence the world around us.
This revolution in North Syria or Rojava is the biggest opportunity in the entire history of modernity. Through this we can give direction to the hacker movement. One of our main projects is a Bitcoin project. We have a nation of 5 million people and - and - and there is a financial situation where they're under financial embargo, they use - , they don't have the financial infrastructure so they use paper money and Syrian Lira is inflating massively. Because there's embargo so you can't send money in and out. Also there is a project to create decentralized economy and there's a lot of real concrete uses for Bitcoin. And also the ideology of the revolutionary nation is in line with the vision and values of the Bitcoin.
When we decide to look at deploying Bitcoin, what we realize is that Bitcoin is not ready and there's a lot of new things that need to be developed in Bitcoin, they should make it so it's able to be deployed on a scale of 5 million people. We are assembling a project to deploy Bitcoin as the national currency of Rojava. We want to create new products in practical use on a large scale. Products that solve real problems and serve the cause of freedom.
Towards this goal, we're assembling a team of 20 hackers dedicated for two years. We're looking to establish links with companies and sponsors to make this happen. The first step is to establish a hacker's academy in Greece - to train groups of revolutionary self-sufficient hackers that we're going to deploy on projects. Our needs now: partners, sponsors, space, support.
Our first plan is to setup exchange shops and localized wallets in Bitcoin where people come buy vouchers and use Bitcoin to create a local Bitcoin market. We have to create brochures, lots of information. Once this system gets bigger, then we also need to think of bigger financial infrastructure - so one of the things is paper wallets. At the moment, 100 thousands paper wallet cost $6000. Unfortunately the counterfeiting measures on the paper wallets aren't very well made. There needs to be a lot research done. There is a small USB device called ESP 12 which can be programmed with micro Python and C and it has on-board Wi-Fi, plus you can fit modules for radio. Through that you can create a large scale payments networks with cheap consumer devices that cost fie dollars each for people to transact bitcoins.
There is also a big market for Bitcoin because sending money between Rojava and Istanbul currently costs 5 %. Later, we also can create plastic card system where we print cards and also establish payments network using radio systems. There needs to be a lot of development and investigations in Lightning Networks and other technologies.
This is why I [want to ((?))] have a laboratory - if I take a group of people there - I can create all kinds of technology projects and a lot of concepts we've been theorizing for a long time. We can see that it works practically.
There is also the project of the Pirates to create liquid democracy - there is a system of local councils in every neighborhood which - , a lot of these digital platforms that have been developed for many years - we can deploy them. There was also the economy being based on cooperatives - all of the ideas about economic management, about collective management of resources about using cryptography and currencies to manage cooperatives. These all things we can deploy - but what it's going to take is a group of people who's doing this research, who's going deep - not only in terms of developing new concepts - but looking back into the literature about what were - , what is the history of the movement, where we situated it and also what are the concepts and how we can apply them towards our goal.
I'm gonna to finish my talk on that. Does anybody have questions?
submitted by vbenes to Bitcoin [link] [comments]

Shadow Brokers release NSA hacking tools, but were the tools used in a series of bank robberies involving the SWIFT transfer system?

Shadow Brokers Leak Reveals The NSA's Deep Access Into SWIFT Banking Network

In August of 2016, a group calling itself the Shadow Brokers emerged with a treasure trove of purported NSA hacking tools. The group released only a small portion of its take and eventually tried unsuccessfully to auction the good stuff. When no one offered to pay, Shadow Brokers decided to give it away for free.
In an enterprise setting, however, disabling the Windows Firewall and allowing remote desktop connections is quite common. That's where these exploits were designed to work, and the Shadow Brokers data appears to reveal that the NSA used these tools against at least one eyebrow-raising target: a SWIFT bureau in the Middle East.
Following The Money
As part of the Bush administration's War on Terrorism the Terrorist Finance Tracking program was set up. Under TFTP, the U.S. gained the ability to monitor transactions carried out via SWIFT. Why target SWIFT specifically? There are upwards of 11,000 banks in 200 countries that use it, and they exchange around 15 million messages a day. If you need to keep an eye on large amounts of money moving internationally, SWIFT is the key.
•••
A leaked PowerPoint slide appears to confirm that the NSA had successfully set up backdoor monitoring on 9 banks running SWIFT Alliance Access (SAA) servers. At least three others at another SWIFT Bureau were targeted, but they had not been compromised at the time of creation of the PowerPoint presentation in 2013.
A Rundown of the Biggest Cybersecurity Incidents of 2016

Most expensive attacks: Leoni and Bangladesh Bank

Large multinational companies are the prime targets of Business Email Compromise (BEC), which is a type of online scam that usually begins with an attacker compromising a legitimate email account and tricking the company’s financial officer to wire funds to their accounts. Typically the companies that fall victim to these scams deal with foreign suppliers and habitually use wire transfer payments. Victims of BEC scams have increased 270% since the start of 2015, and this year saw one of the largest amounts lost by an enterprise. Read more

Biggest attack vector in finance: SWIFT

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a global transaction messaging network used by banks and other financial entities such as foreign exchanges and investment firms. Unfortunately, this year saw attackers targeting SWIFT clients, compromising and manipulating organizations into sending fraudulent money transfer requests. It’s unclear how many of these attacks were actually successful, but in June, SWIFT sent its clients a letter warning them about the possible dangers. The organization also urged clients to update their software and tighten their cyber defenses.
Shadow Brokers Dump Alleged Windows Exploits and NSA Presentations on Targeting Banks
The post includes a link to a selection of files and folders. One sub-folder called "exploits" includes executable files with apparent codenames such as "Eternalsynergy," "Erraticgopher," and "Emeraldthread."
•••
"This is phenomenal data, it has all the hallmarks of slickly produced internal attack tools," Hacker Fantastic continued. "I am certain that analysis on this data will turn up another 0day [zero day]."
Security architect Kevin Beaumont told Motherboard in a Twitter direct message, "All of the Windows implants are new to VirusTotal [an online file scanning tool], which suggests they've not been seen before."
Targets of NSA hacking operations may also be able to determine whether they were compromised thanks to these new files. Cybersecurity company Symantec recently did something similar but with details of alleged CIA hacking tools released by Wikileaks.
Another section of the [dump]( (https://gist.github.com/misterch0c/08829bc65b208609d455a9f4aeaa2a6c) includes several alleged presentations marked "TOP SECRET" concerning "[JEEPFLEA_MARKET](
)." According to a previous analysis by Electrospaces.net, which searches through previously released government documents including the Snowden files for additional clues, Jeepflea is a hacking project from Tailored Access Operations (TAO), the NSA's elite hacking unit.
NSA's powerful Windows hacking tools leaked online
Shadow Brokers leak NSA documents that may reveal operation aimed at Middle Eastern banks
So here are the dots not being connected...
In 2016 Shadow Brokers placed a trove of NSA hacking tools up for sale last year. On 08.17.16 wired reported that that stolen NSA exploit tools were being held hostage for a Bit Coin pay out. When no one came up with the ransom the Shadow Brokers began selling the apps individually for prices that range from 1 to 1000 Bit Coins.
This is only half the story because prior to the release of the information in August 2016 maybe as far back as several years a series of attacks and robberies through the SWIFT system occurred.
Swift Hack Probe Expands to Up to a Dozen Banks Beyond Bangladesh
That Insane, $81M Bangladesh Bank Heist? Here’s What We Know 05.17.16 - 7:00 am
Once Again, Thieves Enter Swift Financial Network and Steal
New details about a second attack involving Swift — the messaging system used by thousands of banks and companies to move money around the world — are emerging as investigators are still trying to solve the $81 million heist from the central bank of Bangladesh in February. In that theft, the attackers were able to compel the Federal Reserve Bank of New York to move money to accounts in the Philippines.
The second attack involves a commercial bank, which Swift declined to identify. But in a letter Swift plans to share with its users on Friday, the messaging network warned that the two attacks bore numerous similarities and were very likely part of a “wider and highly adaptive campaign targeting banks.”
FOURTH bank hit by SWIFT hackers
Evidence is emerging that the SWIFT (Society for Worldwide Interbank Financial Telecom) attacks began as far back as October 2015 when the Philippines bank was first hit, two months prior to the discovery of the failed attack on Tien Phong Bank in Vietnam.
There are many more articles beyond these, but what it looks like is the Shadow Brokers or some associated individuals pulled off a series of bank heists prior to releasing the applications to the open market. That also open the question of what the NSA was doing with the applications? They could have have been tracking "suspects" but it seems they could have also been moving money for any reason they chose without records being left in the banking system. The possible exploits were only exposed after a series of bank robberies exposed the power of the tools the NSA had developed.
It seems once again crimes have exposed the government's illicit powers concealed by the intelligence community (IC). It is entirely possible that the tools were used legally and only to expose private records of terrorists and spies under FISA warrants, but who knows. The only thing that exposed these exploits was the theft. Kinda makes ya wonder, huh?
The evidence and the different styles of hacking listed in the articles about the bank heists suggests that an initial group stole some NSA hacking tools and pulled off the Bangladesh heist. They may or may not have done Ecuador or the Philippines but it seems that at some point the exploits were sold on the open market, but that does not exclude some clandestine deals with other groups that also have employed the exploits. Once the initial 81 million was stolen they distributed the exploits to other groups who may have also attacked the SWIFT system and other targets to make forensics on nation state level zero day attacks that much more difficult. Several groups attempting independent attacks increased the attack vectors making identification even more difficult. It also appears that the hackers may have targeted banks that had the Trojans installed initially. So why would they go for relatively small scores when they essentially owned the SWIFT system. Could the hackers be attacking networks already infected with the Trojan.
It really makes sense when you think about the banks they hit. The NSA installs the Trojans to "observe" suspected transactions. The hackers obtain the exploits, found the Trojans phoning home and used them to own the infected systems, modified the attack vectors to transfer money. Why not skip the phishing attack when there was already infected banks. Take the path of least resistance that leads back to someone the American government would never admit lead away from the hackers.
Of course that means anyone including the IC could have manipulated transactions, but hey that wouldn't have been a robbery would it. Really the tools could have been used to track transactions, but they could have facilitated the IC surreptitious movement of money to fund operations.
In all reality it was very clever, make a score, don't get greedy, prevent the creation of a M.O. to narrow investigations and identify the perpetrators. But identifying clever when they managed to steal exploits from the NSA and could use the exploits to attack the banking system. Just the fact that they can't be identified means they are pretty slick and the exploits are not for the novice user. There were some skills at work here.
What else was done with the exploits and who are they?
Shadow Brokers Group Releases More Stolen NSA Hacking Tools & Exploits Saturday, April 08, 2017
Besides dumping some NSA's hacking tools back in August 2016, the Shadow Brokers also released an encrypted cache of files containing more NSA's hacking tools and exploits in an auction, asking for 1 Million Bitcoins (around $568 Million). However, after failed auction, the group put up those hacking tools and exploits for direct sale on an underground website, categorizing them into a type — like "exploits," "Trojans," and "implant" — each of which ranged from 1 to 100 Bitcoins (from $780 to $78,000). Now, the Shadow Brokers has finally released password for the encrypted cache of NSA's files, allowing anyone to unlock and download the auction data dump.

CrDj”(;Va.*[email protected])#>deB7mN

THE SHADOW BROKERS MESS IS WHAT HAPPENS WHEN THE NSA HOARDS ZERO-DAYS AUTHOR: ANDY GREENBERG 08.17.16. - 8:34 PM
Everything you need to know about the NSA hack - but were afraid to Google
Shadow Brokers leak systems hacked by NSA – mostly mail and uni servers in India, China
New leak suggests NSA penetrated Mideast banking networks By RAPHAEL SATTER

Sunday April 16, 2017 click here for archives
☰ Latest News
CoincidenceTheorist
-23-
submitted by J_Dillinger to WikiLeaks [link] [comments]

In case you missed it: Major Crypto and Blockchain News from the week ending 12/14/2018

Developments in Financial Services

Regulatory Environment

General News


submitted by QuantalyticsResearch to CryptoCurrency [link] [comments]

Transcript of George Webb Video Series Part 229 "Hillary's Leakers, Hackers, and Henchmen" [@Georgwebb / #HRCRatline]

  • Day 59.12. Turns McCabe Knew Christopher Steele From EurAsia Days - YouTube
    • It's day 59 this is version 11
    • So Thomas Paine's out with another article today yeah--what it turns out that Christopher Steele--the first time he met Andrew McCabe, it wasn't last year
    • No no it wasn't
    • {{ GOWDYMODE Activated }} As a matter of fact, goes way back way back
    • Before Andy McCabe, before Andy McCabe--(I got to do the Gowdy) before Andy McCabe ever cayme to DC!
    • Before I knew Trey Gowdy!
    • Right and where it was is these guys all started in Boston
    • They're all in this Whitey Bulger thing
    • All the these corrupt agents they go back to Silk Road
    • They moved down to EDNY which is through the eastern district--that's the Brooklyn
    • It became part of that hit team homies hit team and then they moved over to SDNY to be when Comey moved over to the Southern District to New York down in Manhattan became part of that hit team
    • If you know the reputation of Southern District of New York, it's called the Southern District of Anywhere or Everywhere
    • That's when you can start going and going after FIFA guys you can you can take on people all over the world
    • You can go to Malaysia and go after people that are laundering money they're laundering money in Indonesia, put out the Panama papers to extort some more, you know, contributions for Hillary, right?
    • And then Andrew McCabe comes to DC
    • Now guess what? What did he do that before that?
    • He was the Russian organized crime--he was Russian organized crime
    • Where was?
    • (Huh? with it yeah yeah we're gonna get there with)
    • So EURASIA
    • {{ Gowdymode }} The YOUR (EUR) part of that is McCaybe!
    • The EU part that you're part of it is McCabe
    • The Asia part of it is OHR--you get it? YOU/OHR Asia EURASIA -- YOU(EU)-OHR(RO) Asia
    • It's your Asia its McCabe's Asia its McCabe and OHR, McCabe and OHR, McCabe and OHR
    • That's when he was working the Russian Eurasia organized crime, whatever the heck that thing is called
    • Eurasia organized crime whatever
    • And guess who his counterpart was?
    • {{ Gowdy }} A real spy guess who did the real work, you come heyre, yeah
    • So the real work was done by Christopher Stevens and all the Russian
    • TP: Christopher Steele
    • Chrisopher Steel sorry and all the real Russian spies he got out of Russia
    • PAPERCLIP 2
    • Whoever said Paperclip 2?
    • And that's how that happened
    • So that's what made Annie McCabe because he had a real spy and a real Intelligence officers, not really Christopher Steele
    • Christopher Steele is more like a like a concierge, "hey are you Russian guys happy? Can we get you any more about gay vodka? Can we get you any more Ukrainian girls?"
    • "I mean here we are at the Sun Hotel, I mean the piano bar. I mean I can get anything for you?"
    • That's Christopher Steel
    • He he doesn't--but the guys he got the Alperovitz guys, and I'm not talking about Dmitri, Mr. McAfee that I used to work with
    • I'm talking about the older Alperovitz mchao macaé
    • There's a spy that guy's a spy Mikhail is a spy
    • So I'm giving your dad some props here Dmitri or is it Dmitri Dmitri is the son that's right yeah Dmitri
    • Mikhail though was we I worked at McAfee with you Dimitri
    • This reminds me of that fail-safe movie
    • Now I know Moscow blew up Dimitri, don't yell at me to me, Dimitry remember that?
    • So yeah So I worked with him there
    • They wrote the viruses they wrote the viruses at McAfee at the end of the quarter and they'd sell a whole bunch
    • And people get there--so the CEOs could finish out their books
    • That's how they did it. It was virus-vaccine only with computers
    • This is old I've been that was I want to say 1999
    • They ran me out of there
    • Look at look at the record--they ran me out of there
    • They did the honey trap
    • Well anyway we'll get there later
    • But this is Boston Silk Road boyZ
    • Look at the Bitcoin, moving down to EDNY
    • That's your base, before you can jump over to SDNY
    • And then they came to DC after that
    • And they didn't do a damn thing
    • They didn't lift a finger
    • Christopher Steel and really it's Alperovich
    • So I'm gonna give some props here as John Henry who runs CrowdStrike: you made a good hire
    • You're like McCabe you're like--Adrian Hawkins, "hey you guys got hacked again--I'll call you back next month right"
    • Remember Adrian Hawkins?
    • DCCC oh yeah we saw the hack we just couldn't make it down that three blocks or four blocks to go over Capitol Hill and down to DNC and down trees DCCC
    • Hey you guys you got hacked again, I just wanted you to know
    • That's not law enforcement
    • Low-light cameras is not law enforcement
    • Entrapment's not law enforcement
    • Compromise is not law enforcement
    • If you want to learn about being a spy, talk to you Dimitry
    • Dimitri Alperovitz
    • Talk to Dmitri Alperovich
  • Day 59.12. If Seth Rich Really Was Helping Hillary With Resources For the Future, Draddle Dancing W - YouTube
    • Well here we are at Ocean City Maryland, and all I can say is coming into Ocean City and looking at Ocean City is like I said
    • This is Atlantic City: it's the same city--with the boardwalk and everything
    • But not only that just I said there's got to be a Trump Casino here somewhere?
    • Just I'm looking for the Trump Casino
    • {{ To someone }} Is there a Trump Casino here? Is there a Trump Casino here?
    • No no no Trump Casino here
    • So yeah I know I don't I'm just joking I'm just saying it looks
    • So much like Atlantic City that I'm looking for a Trump Casino
    • So yeah there you have it
    • Well we now know that this is not this is not New Jersey
    • This is this is Maryland
    • This is where Joe Capone on the fourth night that I had talked to him, at Lou's Bar and Grill, he said the night Seth Rich was killed, "I was in Ocean City that night"
    • (There's the there's the roller coaster the obligatory roller coaster.
    • Was Seth Rich involved in the drug business?
    • Oh GOD. Tell me that ain't true
    • Was Molly McCauley given the NOAA business--NOAA data, that she received from the Navy?
    • Was she giving that over to Imran?
    • Oh boy I hope not
    • Resources for the Future
    • Well if NOAA wasn't giving out TWICs, to bring people in to the country
    • If they weren't bringing in Ukrainian girls here by the hundreds, I might feel differently
    • But one thing I've learned through this whole thing is ratlines tend to fuse
    • They tend to fuse
    • And they tend to fuse over the whole world
    • And I'll use the CNN or PPN code word for world GPS, they tend to fuse over a GPS
  • Day 59.13. TWICs the Left Off Of Me, Coast Guard To the Right, Stuck ion the Middle With Andrew - YouTube
    • What a long day 13 today oh and we're not even done
    • So I didn't I was the last one I'm gonna label comedy, because it's satire
    • But I'm just saying if you were satiring that's how you would come about a
    • So sometimes there's satire mixed in
    • So you have to ask me when I'm meeting satire and I have intent and what I don't
    • But anyway here we are this is the inlet in this is the inlet in Ocean City and I don't know much about no Ocean City
    • But I do know that that's the inlet and I got my TWIC
    • I just got my TWIC from NOAA got my TWIC
    • So I don't need a visa I got my TWIC
    • So and it's its TWICie its TWICie but once you get you TWIC you don't need a visa
    • So I'm a fisherman I got my TWIC fisherman got my TWIC
    • Now I'm working, fishing with a string in Pakistan
    • Indonesia Philippines wherever and somebody says, "well, you know, if you hang around you bring some stuff in, other than fish, you're gonna be a citizen--we're gonna give you a visa. You get you EB-5. Get you a big boat like that Coast Guard Cutter"
    • Going by right there I should be over there I should be over there well let's go over there
    • Let's go see the Coast Guard Cutter it's kind of fun it's not the Coast Guard Cutter
    • Somebody said, "it's not the Coast Guard Cutter"
    • Well look at that that's US Coast Guard
    • That's US Coast Guard let's go find the Coast Guard Cutter
    • Let's go look at him
    • But if I have the Coast Guard go that way, and my fishing pier over here and then my TWICers not TWICer TWEATERS
    • I'm just saying TWICers if TWICers go this way
    • That's how I would do it if I was running a ratline
    • Now this is all speculative
    • And you never know what's satire what isn't
    • But there's our Coast Guard--that's just a little branch office
    • I think there's a main office here that's a little bit bigger by the bus station the guy told me
    • I think I can see it almost across the way but there's some communication facilities there
    • It looks like like kind of a satellite office
    • Nice sunset here
    • Beautiful evening here. For December it's awesome
    • And I'm guessing those look like Coast Guard boats, guessing those look like Coast Guard boats
    • So I think you have a layout here
    • Those are our guys
    • Now again, as I say in all these ratlines--and if you don't think they're Coast Guard somebody can correct me--but you don't
    • All the people involved 99.9% of the people involved are fantastic people that care very much about their coasts
    • And drug interdiction and human trafficking and all that stuff
    • If you just have a few people at the top, a few codes, if I can get a few codes to a few people, I can run my ratline
    • That's what I'm saying
    • Satellites, NOAA is going to be part of this--I can tell already just from metadata
    • And these TWICs they're coming from NOAA
    • These codes that are coming from the Coast Guard
    • Those are going to be two key pieces
  • Day 59.14. DeFeBo Pizza- You Made It To Heaven. - YouTube
    • It's day 59 and I'm here at DeFebo's it's almost sounds like a slang for when you get defibrillated
    • But I don't need to fibrillation but Defebos is a beautiful Italian restaurant here in Berlin
    • Berliner beautiful restaurant Italian restaurant the pizza here you see that woodfire pizza back there
    • Task Force amazing definitely do that
    • Now, I did have a chance to interview the folks across the street at the Masons Lodge
    • And I wanted to learn and one of the gentlemen there's a 32nd degree Mason
    • And just how it works
    • And those blue lodges are like the first three levels it's kind of like their feeder program to the Scottish rates[sic] {{ Rites }}
    • And I knew that they were associated with the Shriners Hospitals
    • There's a Shriner Hospital in Portland Oregon there's a burn center
    • I met a guy who was a head of the Burn Center in Houston I believe in Washington DC
    • And there's a burn center also in Philadelphia
    • What I didn't know is they pay all the expenses of the families if they're let's say this child is in a car accident, they commit to not only the transportation of the child and so forth but they also commit to supporting the family and all the expenses of the family
    • Which I thought hey man that's I mean I saw a lot of these kids
    • One of the guys I met who was the head of this and DC said if you ever have a problem with like you everything having a bad day I got a headache or something and you're feeling sorry for yourself, just take a little walk through the Burn Center and--it'll work you'll find your way you'll work it out
    • {{ 911: Yes, believe everything Masons tell you. Shriner hospitals aren't feeders for missing foster children ratlines }}
    • Now is it all the other things and and and
    • Now people say oh he's changing a story on the Masons
    • I'm just presenting new information and letting you decide
    • Now he did say that between 32 and 33 it's a huge jump
    • What's that he has a media he was 32 and something happens between 32 and 33
    • That I don't know he doesn't know either and but something happens between 32 and 33 yeah yeah there's a very select it sounds like the number of thirty twos going to the number 33
    • So I don't know if you have to be an undertaker or--whatever but something is there's something at 32 to 33 that's a big hurdle that he had not made yet
    • Here I'll leave you with all the beautiful Christmas lights here and beautiful barely and hb9 Berliner barrel
  • Day 59.15. Contempt of Congress. - YouTube
    • It's day 59 this is 15 and fairly late, but I'm fairly surprised that Bruce Ohr would not show at the Senate committee
    • No matter what you can go in and just take the fifth
    • It's a secret testimony, nobody's gonna know that you took the fifth
    • I mean it might leak that you took the fifth
    • So what that's your constitutional right but to not show
    • I think is a smoking gun it shows that there is something you're hiding
    • And all power granted by the Constitution comes with oversight
    • I mean there's no branch of the government that has no oversight
    • So by saying that there's an you're not answerable to anyone, I think this kind of started on a bad path with Pagliano, being in contempt of Congress, and there being no--
    • A private citizen in contempt of a subpoena from Congress
    • And there was no retribution no no reprisal no I mean no punishment for that
    • It's set off kind of this chain reaction, where we are the FBI in what are you gonna do about it?
    • We are the secret police we are all powerful
    • And we don't have to come to your stinking hearing
    • That's just I mean that's almost a coup
    • I mean that's if by saying there's no oversight: if Andrew McCabe doesn't show tomorrow--that's a coup
    • I mean that's it's not a overt hot war coup
    • But it's certainly a contempt of Congress, where you're saying you have no power over us we are the FBI
  • Day 60.1 - Operation Cassandra - Car Theft Ring in Va For Drugs and Weapons? - YouTube
    • It's Day 60 and a lot of people have probably seen this article already
    • It's in Politico and it's the back from story of how there's a used car network that sends used cars
    • This is out of Northern Virginia
    • To West Africa to ship arms in used cars then to send those used cars to Central America to pick up cocaine
    • Maybe it's paint cocaine who knows?
    • And then bring those back in to the United States in a guns for arms trade network
    • And it's going to be called Operation Cassandra
    • Now the objection I have here of this investigation with over thirty investigators and over eight years of investigation is they couch it and hide it behind Hezbollah
    • Americans don't really know what Hezbollah is
    • Objection I have to this
    • But here it is
    • This is a global threat--how Hezbollah turned trafficking cocaine and lauded money through used cars to finance its expansion
    • Now what they could have said was 'northern car Virginia car ring operates over eight years in Chantilly Virginia'
    • Or in wherever it operated out of
    • But here it is--we know Al Attar
    • We identified a lot our being a member of the CIA car dealership way back when when
    • This I think going back Allah tar is in the first 120 150 days
    • I'll go back and check it
    • But here it is Project Cassandra, launched in 2008, DEA amassed evidence, Middle Eastern political military organization
    • Now is this going to be Chagoury, the Lebanese finance man bagman for Hezbollah
    • I think it's going to be Chagroury
    • Here's the DEA facility it's located in Chantilly Virginia they use wiretaps undercover operations and informants to map out this illicit network
    • We know the ax wants have an affinity before Iran
    • We know that they have Al Attar is a key person that has supported them
    • We followed cocaine shipments right from Latin America West Africa
    • Has anybody ever heard of pain cocaine and Jaquaya? Has anybody ever heard of that?
    • So this, again, the problem here is fuzzy reporting
    • It's like well we're gonna describe everything in general, but we're not gonna actually say who the people are involved in the conspiracy on the ground okay
    • So here they say oh yeah we tracked all the the cash moving back and forth we tracked all the--cars going back and forth
    • But we're not gonna say dates times and places
    • We're just gonna just fog up the journalism, so that it just makes you afraid of 'terrorism', but doesn't actually get down to the facts of actually what happened
    • There's no timeline of events here, for instance
    • Very fuzzy
    • Talking about leaders very far away and and very difficult to pin down
    • Here's a Lebanese Bank why not name the Lebanese bank
    • If it laundered billions of dollars of drug profits why not name the Lebanese bank here right?
    • And then they talk about these kind of shadowy organizations inside the paramilitary organizations inside Iran
    • But again, why not be specific and
    • Again, this is Preet Bharara which is color of law
    • Well oh yeah we had an eight year investigation, but we wanted to do the Iran nuclear deal, so we we backed off on this deal
    • Why not be specific?
    • Why not say rather than Lebanese financial institution, why not say exactly what the institution is, and who the financier is?
    • Again, use cars to Africa not me--this is Preet Bharara saying this
    • and I think we talked about that before
    • Now there are people that are out there in Florida, which will say, "no theirs were never used--for guns in one direction and drugs into another one." These experts that say the trains are never used to move these cars around
    • Well: fine. Well I think you need to talk to DEA you guys need to get on the phone DEA right now, and get your facts straight
    • Because this is now an eight year process, which basically got shelved or or pushed under by Jack Lew and the people in the Justice Department with Eric Holder etc
    • Again, I know it's so give this a read and Politico it goes into some of the people
    • Now Trump is on the case here
    • Trump has kind of named a person in Iran as a drug kingpin--the number two guy in Iran, but you need to drill down to the people that are here in Virginia
    • That's the key!
    • So that's reporting
    • This is fuzzy "be afraid of Iran reporting"
    • You need to get down to actually who bought what cars, what day, and a timeline, have been disputable events
  • Day 60.2 - Response to Motion To Dismiss For Haseeb Rana - YouTube
    • This is Day 60 part 2 and we have Haseeb Rana's response back
    • He's obviously gonna motion for dismissal that's kind of the first check of the swords and the in the parry here
    • And this of course also happened in the Beck case, that our case is derivative of
    • And they claim of "worldwide conspiracy": no actually I don't
    • I talk about a conspiracy of about a mile square actually it's within walking distance a quarter mile of Capitol Hill
    • So and and basically the summary of the argument by the defense is: there's two things 1 standing and 2 cause
    • So we'll just take those one at a time
    • Now remember this is derivative of the case of DNC
    • This is Wilding versus DNC
    • Jared back this is one of the plaintiffs here in Wilding
    • Remember: that the judge here found in his final opinion, article 62, that there was standing,
    • Even in this case the DNC, where they didn't know anything about the Awans, they didn't know anything about Fusion GPS, they didn't know anything about the Podesta group, they didn't know anything about ARMZ, they didn't know anything they knew a little tiny bit about uranium one
    • But really didn't have a concept of ActBlue(s) or phishing attacks or the agreement with Hillary for America with the JCA agreement
    • None of that. None of that was known
    • And even at that here's the judges final opinion after it's all said and done
    • Again, they the defense quotes a flurry of--just a litany of lawsuits that are not related to the actual case
    • Which the actual case is gonna be a case that's tried already on this on similar grounds, that's derivative of this
    • They quote all this case law that just has nothing to do whatsoever with the case
    • When you when you go before a judge, you cannot waste their time, and their legal staffs' time
    • You have to go immediately to the most relevant facts and this has already been adjudicated
    • Now the basis of the standing has already been adjudicated by a judge
    • And he said, "yes there standing"
    • Now he said basically there was "weak standing"
    • So that's why the case was dismissed, but it moved forward
    • I'll just read judge Locke's opinion here "but the plaintiffs in this case do not allege a causal link between their donations and DNC statements."
    • Well I sure do, because Bernie went from town to town saying "hey--give me money, work the phones for me, knock on doors"
    • There's a whole bunch of people that did a whole bunch of statements here thinking they were sending their money to Bernie
    • Now with that JCA agreement, we know that it was swept
    • It was just swept directly to Brooklyn--swept directly to Brooklyn
    • They did not make this case. Jared did not make this case
    • I will
    • I don't I don't have that standing problem
    • So they lacked standing to assert that claim because they didn't make that connection
    • I certainly am going to make that connection
    • They talked about of fiduciary breach, which is not enough to--buffered by too many layers of speculation--I'm not buffering anything
    • I'm saying it's the Awans,
    • It's the Becerra server
    • It's the hack that occurred
    • It's Nancy Pelosi's cover up--get Imran in here
    • Here's the days that Imran was at DNC
    • Here's the inspector general's report
    • Here's the credit union report
    • Here's the night of the inauguration burglary report
    • Here's the John Wilkes phone booth report
    • Here is all the different police reports in Fairfax County of beatings...
    • And here's all the the problems with all these different companies--
    • So there's no lack of proof here, with the Awans
    • And remember the chairman of the DNC her right-hand man was Imran Awan
    • He was running around her laptop her life had her phones and her passwords
    • So the link is is is iron
    • There is a almost a meld between Imran Awan and Debbie Wasserman-Schultz
    • Now we come to the idea of of Haseeb Rana, being hand-selected and selected surrogate
    • Now here I'm in a motion for oral argument, because my motion to compel discovery of those documents I just talked about, has not even been entered in by DC district
    • That's over seven days ago now--eight days ago
    • Now equally the production of documents is not there
    • And also production of discovery is not there
    • The judge has never seen this
    • He has no idea that there is a very strong case against Imran Awan
    • Just in documents that that could inform the court and
    • Again, we want to move towards judicial economy
    • We don't want to waste the Court's time we don't want to waste the staff of a court
    • So moving on I'm gonna quote where not my testimony not my testimony
    • I'm gonna quote the people that are actually the father of the defendant, saying "hey this is the situation"
    • So I'm gonna quote that article that Luke said, and I'm gonna just go down here
    • And this is my motion to oppose a motion to dismiss
    • We're gonna clean that up a little bit
    • But basically I go here and I say look with allegedly no-show employees connected to Imran, being added to numerous House offices, someone had to do the work
    • Imran enlisted an old high school friend Haseeb Rana for this purpose
    • Haseeb Rana did not respond in the comments but his father did
    • Tanwir Rana and he said, "hey they made him do all the work"
    • Here his father is saying, "Haseeb are the hands of Imran Awan and Rao Abbas"
    • "He is the hands the brain is Imran, the brain may be also a Rao Abbas, maybe that's the wheels, but but Haseeb is the hands"
    • So this conspiracy is one thing it's one body it's one corpus okay
    • So there's his father testifying, not something I'm asserting from a third party
    • So of course what it's not evidence yet, but I mean this leads you to believe that there's reasonable suspicion
    • And then you've got [Tanwir] saying, Imran manipulated his high school buddy Haseeb Rana into doing his work
    • Well if those were crimes if those were felonies you if did--that those were felonies that's the key question
    • There's clear evidence with all those documents that felonies were committed
    • My son is quiet
    • Imran's the opposite always relishing power and displays of influence
    • well that's fine I believe all that to be true I believe his father knows him pretty well here and then here here
    • Again, a direct linkage an iron linkage between Imran and Haseeb
    • Haseeb believed Imran hired him directly, although men were not part of the same company and were hired as different W2 employees of Congress
    • So here he signed an individual agreement--an employment agreement
    • He signed the Terms of Use Agreement
    • He signed to W2 in terms of filing his taxes
    • He had to understand that he worked directly for the Congress and had responsibilities
    • If you're taking orders from Imran and breaking your Terms of Use Agreement, your confidentiality agreement, your other agreements with equipment going to Pakistan, for instance, or money going to Pakistan, you're on the hook
    • There's no getting out of this you're on the hook
    • So again, a timeline of events
    • We're going to present this to the judge--a timeline of events
    • Imran basically Rayo hires Imran here after 2003
    • Imran gets bankruptcy in 2002
    • He starts this company the bankruptcy heads in May of 2002
    • And then he brings Rao in November, after they win the election
    • And he starts another mortgage company
    • Imran starts another mortgage company
    • And then Haseeb Rana comes in and Haseeb Rana is is employed in the Congress for two years and one month
    • And he works for six or seven different Congressmen
    • I'm sorry but you have to realize if you're a W2 employee and it says the US Congress on your check, your loyalty is to the US Congress while he's there
    • Well the CDW and some of the other things happen after he leaves, but you're still on the hook for stuff that happens while you're an employee in the United States Congress
    • There's a couple of good resources I wanted to point people to
    • This guy here which he's the litigation kind of guy
    • And I like him--I like watching him if people want to watch him at Steve V O N D R A N
    • And he's a good one and then there's other resources out here to wikiHow
    • Talks about responding to different motions...for people who are doing their own
    • For people are doing their own lawsuits
    • There's another interesting thing here with Haseeb
    • He's involved in this company a surgical company -
    • I think one's a surgical glove company and the other one looks like they do something for dentistry
    • Maybe it's the same company one's called triumph Surgical
    • And the other was Accu-surgident
    • So we don't know exactly what that is but there's the DUNS number for people who want to look up for it
    • My first question was do they do business with the Army or the Navy?
    • Do they do business with Fort Belvoir?
    • Is that Duns number in any contracts in any Federal contracts?
    • There's another company called S A M A W E E and I don't have a Duns number just yet for that
    • But I'm interested to see if they do any business in Fort Belvoir
    • But there you go
    • There's this period of hire Q1 of the 2013
    • Q1 of 2015 and then--1 2 3 4 5 6 7 has worked for seven different representatives in the house
    • Your loyalty's have to be to these representatives and the Congress and the rules of the Congress
    • The sergeant of arms it's not to Imran Awan
    • You may be from the same little village in Pakistan, but you still have to abide by your agreements
    • When you take the money when you take the money in your employment agreement, you have to go by the rules of your employer, not by somebody who you think got your the job
    • That's what it book kind of boils down to here
  • Day 60.3. Cops, Drugs, and JTTF. Symbiosis. - YouTube
    • This is Day 60 a little bit of a lockdown situation I think to just keep it everybody away for the vote this tax vote I think it's going to go until the middle of the night
    • So we'll see what happens
    • I think the vice president's coming up
    • So I think it's gonna be a close one you never know
    • So anyway yeah the Capitol Police are out
    • Now if they wanted to give me the Imran Awan police reports, while they're up here that would be awfully nice
    • So I saw that DNC also asked to dismiss motion to dismiss, which is really funny
    • It's like there's no basis here
    • Whoa what has happened since August of last August of this year, since the DNC case
    • The Awans, the break-ins on there was no connection to the DNC when Jared Beck had his case dismissed
    • Now we know the Awans did the DCCC, they did the DNC, Fusion GPS, McCAbe's paying Fusion GPS for the dossiers, bringing in spies, probably in Maryland
    • I mean so many things, going after the president
    • So this is the part that I really didn't want to say
    • I've always kind of been pushing this off in the background
    • But there is gonna be this drugs--I'm not saying that the FBI is in on it with for the drug piece, but there is sort of a symbiotic relationship a cops-and-robbers relationship
    • Where you go ahead and do your thing, and we'll look over this way, color a law, then every once in a while make a deposit, and we'll bust a couple of people and bring them in
    • It's kind of the old Chicago way
    • So then and I am going to be involved in try to break that up on the I-5 corridor
    • And I'll just let everybody know right now Fresno is the spot
    • And that's where the Hells Angels are based
    • And Jeanine and Linda Muller and the sex first and then the drugs
    • I never did any of the drugs
    • But I have been outspoken about JTTF ratline there
    • Again, I'm not saying they run the ratline, I'm just saying it's symbiotic
    • I'm just saying it's symbiotic
    • So there's your Capitol report
    • Andy McCabe actually is testifying just under my feet here, not too far from me
    • So hopefully he'll have good things to say
    • And he'll just fess up, own up
    • I filed my motion to oppose
    • Obviously, I opposed the motion for Haseeb Rana and you can read that now
    • Hopefully it'll get scanned
    • They'll scan in some of my stuff I'm still waiting for stuff eight days ago that hasn't been scanned
    • So hopefully they'll scan my stuff
    • And I'll be able to respond
    • And they won't just give me a default judgment, because they're not scanning my stuff

  • Day 61.1 Journalism BEGINS When You Get a Preet Christmas Present - YouTube
  • It's day 61 and this is part one
  • And this big Project Cassandra dropped yesterday in Politico
  • This part 1, part 2, part 3, very long article
  • I believe it was dropped by Preet Bharara and Andrew McCabe for their network here in Northern Virginia
  • And also Maryland,
  • Because this didn't come about
  • You don't interview 35 people and the whole thing perfectly fits together Day 1 unless you're trying to give it to somebody who's gonna bury the story
  • Take all the names out of it take all the who, what, when, where, just do the and why out of it and just say when things occurred
  • And a very light treatment on what actually happened
  • But if you haven't read the article it's very good
  • But now what's happening is the metadata is emerging
  • So people are coming in who are involved in this project because there were
  • So many people and this is going to show that the Awans are involved in this directly with Hezbollah
  • And I'll show you how
  • But for those who don't remember here's kind of the Mark Levin show yesterday where a guy was an investigator actually calls in
  • And he's talking about where they laundered the money through, what mosque they laundered the money through,
  • "It was 2009-2010 I'd have to go back and look at the reports, but it was around 2009, 2010. Mm-hmm go ahead I'm sorry I interrupted you--no no it's fine we also discovered they were the golden dawn dome mosque, we knew the exact mosque we knew where they were living. We knew who"
  • So that mosque if you remember that's the DAR all Harwich Dar al-Hirah mosque and what's important about this and where it's located is it's in unincorporated Fairfax County
  • So if you had a friend who is the intake officer at Fairfax County, you could make friends with them as far as who worked here and who came and went out of this mosque
  • And would provide protective cover for those people
  • For cover such people as murderers such as Arshad Mahmood
  • So if you go back to my first day in Washington DC, the brain of the operation is gonna be right here at the CIA car dealership at 724 South Washington Street
  • I can't remember how many videos I did there: lots
  • and then there Dar Al-Hirah was right next to it just outside a Falls Church
  • Arshad Mahmood's down here in Woodbridge
  • He's the enforcer for all these different ratlines
  • This is just gonna be one of a finger of the hand
  • There's give me five of these ratlines, mainly centered around the community colleges
  • And then this guy last night was calling in from Fredericksburg
  • And this is that Smuggler's Cove that I was talking about, where kind of Potomac bends at a 90-degree angle here by Mount Vernon
  • So what I'll do is I will just go quickly to my first day in Washington
  • And we can see what I said that that time
  • "IT's still there we don't know I just met Taggart at that moment-- we don't know but he did say this is kind of Herman United States Marine he did say unequivocally that Imran had left Blackberries which is interesting. If he is the beta expert for Debbie Wasserman-Schultz and Hillary and with black bears left in the home, that would be an interesting find"
  • So I think the important thing there is that even back at day 170, which is this is over two hundred and thirty days ago
  • Now, there was first day in Washington, if you look at it I had Light Bridge Communication, which still hasn't been reported on as far as the Imran working at light bridge
  • I had the satellite piece of this with kind of a NOAA piece, which still hasn't been reported on
  • I had DISA which is the Annapolis piece that where I went this weekend okay
  • So all these things in the first weekend and I had of course obviously Hawkshead to get the hard drive story
  • So this is a part that still hasn't been done on this story, with the Hezbollah, and it's and it's a spin
  • Now the press kids here in Washington DC are going to accept this as fact
  • But this is actually, I hate to say it, this is how it's done
  • You actually go to the neighborhood and you actually go to sorters or and the down involved in a murder a car dealer in near Richmond hired two MS-13 Gang Members
  • So I doubt he's still here but let's see if he aces and the this is also true for investigators--as far as not just journalists, but investigators--you need to go to the the front door
  • Just to show that I had said that this money-laundering was happening at the mosque and the Awans were the stolen cars
  • Still this is not come out yet and the NADRA bank connection to Firtash still has not come out yet
  • So we're seeing this, but here's EZ Car Buying and all the other metadata that just fits perfectly with this story about Hezbollah
  • Now remember they're in business with the top Hezbollah guy
  • Of course here's the favorite famous jeans video me asking people different questions at the different doors, more than eight years ago at one location and then here I'll stop that could it be more went to California
  • And that I think Suriyah Begum does end up going to California
  • But pretty quickly in one day I was able to go to most of the locations
  • And then of course there is me at the mosque that night
  • And here we go I'll just play a little short clip
  • I met the very famous star Dar Al Hijrah Mosque in Falls Church Virginia okay
  • So that's all I'll say for right now, but there's a lot more reporting to be done in the story
  • And what I like to do is take a great story like the one we have
  • Now if Cassandra and then pick up where that left off and move forward from that
submitted by 911bodysnatchers322 to TruthLeaks [link] [comments]

Shadow Brokers release NSA hacking tools, but were the tools used in a series of bank robberies involving the SWIFT transfer system?

Shadow Brokers Leak Reveals The NSA's Deep Access Into SWIFT Banking Network

In August of 2016, a group calling itself the Shadow Brokers emerged with a treasure trove of purported NSA hacking tools. The group released only a small portion of its take and eventually tried unsuccessfully to auction the good stuff. When no one offered to pay, Shadow Brokers decided to give it away for free.
In an enterprise setting, however, disabling the Windows Firewall and allowing remote desktop connections is quite common. That's where these exploits were designed to work, and the Shadow Brokers data appears to reveal that the NSA used these tools against at least one eyebrow-raising target: a SWIFT bureau in the Middle East.
Following The Money
As part of the Bush administration's War on Terrorism the Terrorist Finance Tracking program was set up. Under TFTP, the U.S. gained the ability to monitor transactions carried out via SWIFT. Why target SWIFT specifically? There are upwards of 11,000 banks in 200 countries that use it, and they exchange around 15 million messages a day. If you need to keep an eye on large amounts of money moving internationally, SWIFT is the key.
•••
A leaked PowerPoint slide appears to confirm that the NSA had successfully set up backdoor monitoring on 9 banks running SWIFT Alliance Access (SAA) servers. At least three others at another SWIFT Bureau were targeted, but they had not been compromised at the time of creation of the PowerPoint presentation in 2013.
A Rundown of the Biggest Cybersecurity Incidents of 2016

Most expensive attacks: Leoni and Bangladesh Bank

Large multinational companies are the prime targets of Business Email Compromise (BEC), which is a type of online scam that usually begins with an attacker compromising a legitimate email account and tricking the company’s financial officer to wire funds to their accounts. Typically the companies that fall victim to these scams deal with foreign suppliers and habitually use wire transfer payments. Victims of BEC scams have increased 270% since the start of 2015, and this year saw one of the largest amounts lost by an enterprise. Read more

Biggest attack vector in finance: SWIFT

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a global transaction messaging network used by banks and other financial entities such as foreign exchanges and investment firms. Unfortunately, this year saw attackers targeting SWIFT clients, compromising and manipulating organizations into sending fraudulent money transfer requests. It’s unclear how many of these attacks were actually successful, but in June, SWIFT sent its clients a letter warning them about the possible dangers. The organization also urged clients to update their software and tighten their cyber defenses.
Shadow Brokers Dump Alleged Windows Exploits and NSA Presentations on Targeting Banks
The post includes a link to a selection of files and folders. One sub-folder called "exploits" includes executable files with apparent codenames such as "Eternalsynergy," "Erraticgopher," and "Emeraldthread."
•••
"This is phenomenal data, it has all the hallmarks of slickly produced internal attack tools," Hacker Fantastic continued. "I am certain that analysis on this data will turn up another 0day [zero day]."
Security architect Kevin Beaumont told Motherboard in a Twitter direct message, "All of the Windows implants are new to VirusTotal [an online file scanning tool], which suggests they've not been seen before."
Targets of NSA hacking operations may also be able to determine whether they were compromised thanks to these new files. Cybersecurity company Symantec recently did something similar but with details of alleged CIA hacking tools released by Wikileaks.
Another section of the [dump]( (https://gist.github.com/misterch0c/08829bc65b208609d455a9f4aeaa2a6c) includes several alleged presentations marked "TOP SECRET" concerning "[JEEPFLEA_MARKET](
)." According to a previous analysis by Electrospaces.net, which searches through previously released government documents including the Snowden files for additional clues, Jeepflea is a hacking project from Tailored Access Operations (TAO), the NSA's elite hacking unit.
NSA's powerful Windows hacking tools leaked online
Shadow Brokers leak NSA documents that may reveal operation aimed at Middle Eastern banks
So here are the dots not being connected...
In 2016 Shadow Brokers placed a trove of NSA hacking tools up for sale last year. On 08.17.16 wired reported that that stolen NSA exploit tools were being held hostage for a Bit Coin pay out. When no one came up with the ransom the Shadow Brokers began selling the apps individually for prices that range from 1 to 1000 Bit Coins.
This is only half the story because prior to the release of the information in August 2016 maybe as far back as several years a series of attacks and robberies through the SWIFT system occurred.
Swift Hack Probe Expands to Up to a Dozen Banks Beyond Bangladesh
That Insane, $81M Bangladesh Bank Heist? Here’s What We Know 05.17.16 - 7:00 am
Once Again, Thieves Enter Swift Financial Network and Steal
New details about a second attack involving Swift — the messaging system used by thousands of banks and companies to move money around the world — are emerging as investigators are still trying to solve the $81 million heist from the central bank of Bangladesh in February. In that theft, the attackers were able to compel the Federal Reserve Bank of New York to move money to accounts in the Philippines.
The second attack involves a commercial bank, which Swift declined to identify. But in a letter Swift plans to share with its users on Friday, the messaging network warned that the two attacks bore numerous similarities and were very likely part of a “wider and highly adaptive campaign targeting banks.”
FOURTH bank hit by SWIFT hackers
Evidence is emerging that the SWIFT (Society for Worldwide Interbank Financial Telecom) attacks began as far back as October 2015 when the Philippines bank was first hit, two months prior to the discovery of the failed attack on Tien Phong Bank in Vietnam.
There are many more articles beyond these, but what it looks like is the Shadow Brokers or some associated individuals pulled off a series of bank heists prior to releasing the applications to the open market. That also open the question of what the NSA was doing with the applications? They could have have been tracking "suspects" but it seems they could have also been moving money for any reason they chose without records being left in the banking system. The possible exploits were only exposed after a series of bank robberies exposed the power of the tools the NSA had developed.
It seems once again crimes have exposed the government's illicit powers concealed by the intelligence community (IC). It is entirely possible that the tools were used legally and only to expose private records of terrorists and spies under FISA warrants, but who knows. The only thing that exposed these exploits was the theft. Kinda makes ya wonder, huh?
The evidence and the different styles of hacking listed in the articles about the bank heists suggests that an initial group stole some NSA hacking tools and pulled off the Bangladesh heist. They may or may not have done Ecuador or the Philippines but it seems that at some point the exploits were sold on the open market, but that does not exclude some clandestine deals with other groups that also have employed the exploits. Once the initial 81 million was stolen they distributed the exploits to other groups who may have also attacked the SWIFT system and other targets to make forensics on nation state level zero day attacks that much more difficult. Several groups attempting independent attacks increased the attack vectors making identification even more difficult. It also appears that the hackers may have targeted banks that had the Trojans installed initially. So why would they go for relatively small scores when they essentially owned the SWIFT system. Could the hackers be attacking networks already infected with the Trojan.
It really makes sense when you think about the banks they hit. The NSA installs the Trojans to "observe" suspected transactions. The hackers obtain the exploits, found the Trojans phoning home and used them to own the infected systems, modified the attack vectors to transfer money. Why not skip the phishing attack when there was already infected banks. Take the path of least resistance that leads back to someone the American government would never admit lead away from the hackers.
Of course that means anyone including the IC could have manipulated transactions, but hey that wouldn't have been a robbery would it. Really the tools could have been used to track transactions, but they could have facilitated the IC surreptitious movement of money to fund operations.
In all reality it was very clever, make a score, don't get greedy, prevent the creation of a M.O. to narrow investigations and identify the perpetrators. But identifying clever when they managed to steal exploits from the NSA and could use the exploits to attack the banking system. Just the fact that they can't be identified means they are pretty slick and the exploits are not for the novice user. There were some skills at work here.
What else was done with the exploits and who are they?
Shadow Brokers Group Releases More Stolen NSA Hacking Tools & Exploits Saturday, April 08, 2017
Besides dumping some NSA's hacking tools back in August 2016, the Shadow Brokers also released an encrypted cache of files containing more NSA's hacking tools and exploits in an auction, asking for 1 Million Bitcoins (around $568 Million). However, after failed auction, the group put up those hacking tools and exploits for direct sale on an underground website, categorizing them into a type — like "exploits," "Trojans," and "implant" — each of which ranged from 1 to 100 Bitcoins (from $780 to $78,000). Now, the Shadow Brokers has finally released password for the encrypted cache of NSA's files, allowing anyone to unlock and download the auction data dump.

CrDj”(;Va.*[email protected])#>deB7mN

THE SHADOW BROKERS MESS IS WHAT HAPPENS WHEN THE NSA HOARDS ZERO-DAYS AUTHOR: ANDY GREENBERG 08.17.16. - 8:34 PM
Everything you need to know about the NSA hack - but were afraid to Google
Shadow Brokers leak systems hacked by NSA – mostly mail and uni servers in India, China
New leak suggests NSA penetrated Mideast banking networks By RAPHAEL SATTER

Sunday April 16, 2017 click here for archives
☰ Latest News
CoincidenceTheorist
-23-
submitted by J_Dillinger to The_Redacted [link] [comments]

Shadow Brokers release NSA hacking tools, but were the tools used in a series of bank robberies involving the SWIFT transfer system?

Shadow Brokers Leak Reveals The NSA's Deep Access Into SWIFT Banking Network

In August of 2016, a group calling itself the Shadow Brokers emerged with a treasure trove of purported NSA hacking tools. The group released only a small portion of its take and eventually tried unsuccessfully to auction the good stuff. When no one offered to pay, Shadow Brokers decided to give it away for free.
In an enterprise setting, however, disabling the Windows Firewall and allowing remote desktop connections is quite common. That's where these exploits were designed to work, and the Shadow Brokers data appears to reveal that the NSA used these tools against at least one eyebrow-raising target: a SWIFT bureau in the Middle East.
Following The Money
As part of the Bush administration's War on Terrorism the Terrorist Finance Tracking program was set up. Under TFTP, the U.S. gained the ability to monitor transactions carried out via SWIFT. Why target SWIFT specifically? There are upwards of 11,000 banks in 200 countries that use it, and they exchange around 15 million messages a day. If you need to keep an eye on large amounts of money moving internationally, SWIFT is the key.
•••
A leaked PowerPoint slide appears to confirm that the NSA had successfully set up backdoor monitoring on 9 banks running SWIFT Alliance Access (SAA) servers. At least three others at another SWIFT Bureau were targeted, but they had not been compromised at the time of creation of the PowerPoint presentation in 2013.
A Rundown of the Biggest Cybersecurity Incidents of 2016

Most expensive attacks: Leoni and Bangladesh Bank

Large multinational companies are the prime targets of Business Email Compromise (BEC), which is a type of online scam that usually begins with an attacker compromising a legitimate email account and tricking the company’s financial officer to wire funds to their accounts. Typically the companies that fall victim to these scams deal with foreign suppliers and habitually use wire transfer payments. Victims of BEC scams have increased 270% since the start of 2015, and this year saw one of the largest amounts lost by an enterprise. Read more

Biggest attack vector in finance: SWIFT

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a global transaction messaging network used by banks and other financial entities such as foreign exchanges and investment firms. Unfortunately, this year saw attackers targeting SWIFT clients, compromising and manipulating organizations into sending fraudulent money transfer requests. It’s unclear how many of these attacks were actually successful, but in June, SWIFT sent its clients a letter warning them about the possible dangers. The organization also urged clients to update their software and tighten their cyber defenses.
Shadow Brokers Dump Alleged Windows Exploits and NSA Presentations on Targeting Banks
The post includes a link to a selection of files and folders. One sub-folder called "exploits" includes executable files with apparent codenames such as "Eternalsynergy," "Erraticgopher," and "Emeraldthread."
•••
"This is phenomenal data, it has all the hallmarks of slickly produced internal attack tools," Hacker Fantastic continued. "I am certain that analysis on this data will turn up another 0day [zero day]."
Security architect Kevin Beaumont told Motherboard in a Twitter direct message, "All of the Windows implants are new to VirusTotal [an online file scanning tool], which suggests they've not been seen before."
Targets of NSA hacking operations may also be able to determine whether they were compromised thanks to these new files. Cybersecurity company Symantec recently did something similar but with details of alleged CIA hacking tools released by Wikileaks.
Another section of the [dump]( (https://gist.github.com/misterch0c/08829bc65b208609d455a9f4aeaa2a6c) includes several alleged presentations marked "TOP SECRET" concerning "[JEEPFLEA_MARKET](
)." According to a previous analysis by Electrospaces.net, which searches through previously released government documents including the Snowden files for additional clues, Jeepflea is a hacking project from Tailored Access Operations (TAO), the NSA's elite hacking unit.
NSA's powerful Windows hacking tools leaked online
Shadow Brokers leak NSA documents that may reveal operation aimed at Middle Eastern banks
So here are the dots not being connected...
In 2016 Shadow Brokers placed a trove of NSA hacking tools up for sale last year. On 08.17.16 wired reported that that stolen NSA exploit tools were being held hostage for a Bit Coin pay out. When no one came up with the ransom the Shadow Brokers began selling the apps individually for prices that range from 1 to 1000 Bit Coins.
This is only half the story because prior to the release of the information in August 2016 maybe as far back as several years a series of attacks and robberies through the SWIFT system occurred.
Swift Hack Probe Expands to Up to a Dozen Banks Beyond Bangladesh
That Insane, $81M Bangladesh Bank Heist? Here’s What We Know 05.17.16 - 7:00 am
Once Again, Thieves Enter Swift Financial Network and Steal
New details about a second attack involving Swift — the messaging system used by thousands of banks and companies to move money around the world — are emerging as investigators are still trying to solve the $81 million heist from the central bank of Bangladesh in February. In that theft, the attackers were able to compel the Federal Reserve Bank of New York to move money to accounts in the Philippines.
The second attack involves a commercial bank, which Swift declined to identify. But in a letter Swift plans to share with its users on Friday, the messaging network warned that the two attacks bore numerous similarities and were very likely part of a “wider and highly adaptive campaign targeting banks.”
FOURTH bank hit by SWIFT hackers
Evidence is emerging that the SWIFT (Society for Worldwide Interbank Financial Telecom) attacks began as far back as October 2015 when the Philippines bank was first hit, two months prior to the discovery of the failed attack on Tien Phong Bank in Vietnam.
There are many more articles beyond these, but what it looks like is the Shadow Brokers or some associated individuals pulled off a series of bank heists prior to releasing the applications to the open market. That also open the question of what the NSA was doing with the applications? They could have have been tracking "suspects" but it seems they could have also been moving money for any reason they chose without records being left in the banking system. The possible exploits were only exposed after a series of bank robberies exposed the power of the tools the NSA had developed.
It seems once again crimes have exposed the government's illicit powers concealed by the intelligence community (IC). It is entirely possible that the tools were used legally and only to expose private records of terrorists and spies under FISA warrants, but who knows. The only thing that exposed these exploits was the theft. Kinda makes ya wonder, huh?
The evidence and the different styles of hacking listed in the articles about the bank heists suggests that an initial group stole some NSA hacking tools and pulled off the Bangladesh heist. They may or may not have done Ecuador or the Philippines but it seems that at some point the exploits were sold on the open market, but that does not exclude some clandestine deals with other groups that also have employed the exploits. Once the initial 81 million was stolen they distributed the exploits to other groups who may have also attacked the SWIFT system and other targets to make forensics on nation state level zero day attacks that much more difficult. Several groups attempting independent attacks increased the attack vectors making identification even more difficult. It also appears that the hackers may have targeted banks that had the Trojans installed initially. So why would they go for relatively small scores when they essentially owned the SWIFT system. Could the hackers be attacking networks already infected with the Trojan.
It really makes sense when you think about the banks they hit. The NSA installs the Trojans to "observe" suspected transactions. The hackers obtain the exploits, found the Trojans phoning home and used them to own the infected systems, modified the attack vectors to transfer money. Why not skip the phishing attack when there was already infected banks. Take the path of least resistance that leads back to someone the American government would never admit lead away from the hackers.
Of course that means anyone including the IC could have manipulated transactions, but hey that wouldn't have been a robbery would it. Really the tools could have been used to track transactions, but they could have facilitated the IC surreptitious movement of money to fund operations.
In all reality it was very clever, make a score, don't get greedy, prevent the creation of a M.O. to narrow investigations and identify the perpetrators. But identifying clever when they managed to steal exploits from the NSA and could use the exploits to attack the banking system. Just the fact that they can't be identified means they are pretty slick and the exploits are not for the novice user. There were some skills at work here.
What else was done with the exploits and who are they?
Shadow Brokers Group Releases More Stolen NSA Hacking Tools & Exploits Saturday, April 08, 2017
Besides dumping some NSA's hacking tools back in August 2016, the Shadow Brokers also released an encrypted cache of files containing more NSA's hacking tools and exploits in an auction, asking for 1 Million Bitcoins (around $568 Million). However, after failed auction, the group put up those hacking tools and exploits for direct sale on an underground website, categorizing them into a type — like "exploits," "Trojans," and "implant" — each of which ranged from 1 to 100 Bitcoins (from $780 to $78,000). Now, the Shadow Brokers has finally released password for the encrypted cache of NSA's files, allowing anyone to unlock and download the auction data dump.

CrDj”(;Va.*[email protected])#>deB7mN

THE SHADOW BROKERS MESS IS WHAT HAPPENS WHEN THE NSA HOARDS ZERO-DAYS AUTHOR: ANDY GREENBERG 08.17.16. - 8:34 PM
Everything you need to know about the NSA hack - but were afraid to Google
Shadow Brokers leak systems hacked by NSA – mostly mail and uni servers in India, China
New leak suggests NSA penetrated Mideast banking networks By RAPHAEL SATTER

Sunday April 16, 2017 click here for archives
☰ Latest News
CoincidenceTheorist
-23-
submitted by J_Dillinger to TruthLeaks [link] [comments]

Shadow Brokers release NSA hacking tools, but were the tools used in a series of bank robberies involving the SWIFT transfer system?

Shadow Brokers Leak Reveals The NSA's Deep Access Into SWIFT Banking Network

In August of 2016, a group calling itself the Shadow Brokers emerged with a treasure trove of purported NSA hacking tools. The group released only a small portion of its take and eventually tried unsuccessfully to auction the good stuff. When no one offered to pay, Shadow Brokers decided to give it away for free.
In an enterprise setting, however, disabling the Windows Firewall and allowing remote desktop connections is quite common. That's where these exploits were designed to work, and the Shadow Brokers data appears to reveal that the NSA used these tools against at least one eyebrow-raising target: a SWIFT bureau in the Middle East.
Following The Money
As part of the Bush administration's War on Terrorism the Terrorist Finance Tracking program was set up. Under TFTP, the U.S. gained the ability to monitor transactions carried out via SWIFT. Why target SWIFT specifically? There are upwards of 11,000 banks in 200 countries that use it, and they exchange around 15 million messages a day. If you need to keep an eye on large amounts of money moving internationally, SWIFT is the key.
•••
A leaked PowerPoint slide appears to confirm that the NSA had successfully set up backdoor monitoring on 9 banks running SWIFT Alliance Access (SAA) servers. At least three others at another SWIFT Bureau were targeted, but they had not been compromised at the time of creation of the PowerPoint presentation in 2013.
A Rundown of the Biggest Cybersecurity Incidents of 2016

Most expensive attacks: Leoni and Bangladesh Bank

Large multinational companies are the prime targets of Business Email Compromise (BEC), which is a type of online scam that usually begins with an attacker compromising a legitimate email account and tricking the company’s financial officer to wire funds to their accounts. Typically the companies that fall victim to these scams deal with foreign suppliers and habitually use wire transfer payments. Victims of BEC scams have increased 270% since the start of 2015, and this year saw one of the largest amounts lost by an enterprise. Read more

Biggest attack vector in finance: SWIFT

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a global transaction messaging network used by banks and other financial entities such as foreign exchanges and investment firms. Unfortunately, this year saw attackers targeting SWIFT clients, compromising and manipulating organizations into sending fraudulent money transfer requests. It’s unclear how many of these attacks were actually successful, but in June, SWIFT sent its clients a letter warning them about the possible dangers. The organization also urged clients to update their software and tighten their cyber defenses.
Shadow Brokers Dump Alleged Windows Exploits and NSA Presentations on Targeting Banks
The post includes a link to a selection of files and folders. One sub-folder called "exploits" includes executable files with apparent codenames such as "Eternalsynergy," "Erraticgopher," and "Emeraldthread."
•••
"This is phenomenal data, it has all the hallmarks of slickly produced internal attack tools," Hacker Fantastic continued. "I am certain that analysis on this data will turn up another 0day [zero day]."
Security architect Kevin Beaumont told Motherboard in a Twitter direct message, "All of the Windows implants are new to VirusTotal [an online file scanning tool], which suggests they've not been seen before."
Targets of NSA hacking operations may also be able to determine whether they were compromised thanks to these new files. Cybersecurity company Symantec recently did something similar but with details of alleged CIA hacking tools released by Wikileaks.
Another section of the [dump]( (https://gist.github.com/misterch0c/08829bc65b208609d455a9f4aeaa2a6c) includes several alleged presentations marked "TOP SECRET" concerning "[JEEPFLEA_MARKET](
)." According to a previous analysis by Electrospaces.net, which searches through previously released government documents including the Snowden files for additional clues, Jeepflea is a hacking project from Tailored Access Operations (TAO), the NSA's elite hacking unit.
NSA's powerful Windows hacking tools leaked online
Shadow Brokers leak NSA documents that may reveal operation aimed at Middle Eastern banks
So here are the dots not being connected...
In 2016 Shadow Brokers placed a trove of NSA hacking tools up for sale last year. On 08.17.16 wired reported that that stolen NSA exploit tools were being held hostage for a Bit Coin pay out. When no one came up with the ransom the Shadow Brokers began selling the apps individually for prices that range from 1 to 1000 Bit Coins.
This is only half the story because prior to the release of the information in August 2016 maybe as far back as several years a series of attacks and robberies through the SWIFT system occurred.
Swift Hack Probe Expands to Up to a Dozen Banks Beyond Bangladesh
That Insane, $81M Bangladesh Bank Heist? Here’s What We Know 05.17.16 - 7:00 am
Once Again, Thieves Enter Swift Financial Network and Steal
New details about a second attack involving Swift — the messaging system used by thousands of banks and companies to move money around the world — are emerging as investigators are still trying to solve the $81 million heist from the central bank of Bangladesh in February. In that theft, the attackers were able to compel the Federal Reserve Bank of New York to move money to accounts in the Philippines.
The second attack involves a commercial bank, which Swift declined to identify. But in a letter Swift plans to share with its users on Friday, the messaging network warned that the two attacks bore numerous similarities and were very likely part of a “wider and highly adaptive campaign targeting banks.”
FOURTH bank hit by SWIFT hackers
Evidence is emerging that the SWIFT (Society for Worldwide Interbank Financial Telecom) attacks began as far back as October 2015 when the Philippines bank was first hit, two months prior to the discovery of the failed attack on Tien Phong Bank in Vietnam.
There are many more articles beyond these, but what it looks like is the Shadow Brokers or some associated individuals pulled off a series of bank heists prior to releasing the applications to the open market. That also open the question of what the NSA was doing with the applications? They could have have been tracking "suspects" but it seems they could have also been moving money for any reason they chose without records being left in the banking system. The possible exploits were only exposed after a series of bank robberies exposed the power of the tools the NSA had developed.
It seems once again crimes have exposed the government's illicit powers concealed by the intelligence community (IC). It is entirely possible that the tools were used legally and only to expose private records of terrorists and spies under FISA warrants, but who knows. The only thing that exposed these exploits was the theft. Kinda makes ya wonder, huh?
The evidence and the different styles of hacking listed in the articles about the bank heists suggests that an initial group stole some NSA hacking tools and pulled off the Bangladesh heist. They may or may not have done Ecuador or the Philippines but it seems that at some point the exploits were sold on the open market, but that does not exclude some clandestine deals with other groups that also have employed the exploits. Once the initial 81 million was stolen they distributed the exploits to other groups who may have also attacked the SWIFT system and other targets to make forensics on nation state level zero day attacks that much more difficult. Several groups attempting independent attacks increased the attack vectors making identification even more difficult. It also appears that the hackers may have targeted banks that had the Trojans installed initially. So why would they go for relatively small scores when they essentially owned the SWIFT system. Could the hackers be attacking networks already infected with the Trojan.
It really makes sense when you think about the banks they hit. The NSA installs the Trojans to "observe" suspected transactions. The hackers obtain the exploits, found the Trojans phoning home and used them to own the infected systems, modified the attack vectors to transfer money. Why not skip the phishing attack when there was already infected banks. Take the path of least resistance that leads back to someone the American government would never admit lead away from the hackers.
Of course that means anyone including the IC could have manipulated transactions, but hey that wouldn't have been a robbery would it. Really the tools could have been used to track transactions, but they could have facilitated the IC surreptitious movement of money to fund operations.
In all reality it was very clever, make a score, don't get greedy, prevent the creation of a M.O. to narrow investigations and identify the perpetrators. But identifying clever when they managed to steal exploits from the NSA and could use the exploits to attack the banking system. Just the fact that they can't be identified means they are pretty slick and the exploits are not for the novice user. There were some skills at work here.
What else was done with the exploits and who are they?
Shadow Brokers Group Releases More Stolen NSA Hacking Tools & Exploits Saturday, April 08, 2017
Besides dumping some NSA's hacking tools back in August 2016, the Shadow Brokers also released an encrypted cache of files containing more NSA's hacking tools and exploits in an auction, asking for 1 Million Bitcoins (around $568 Million). However, after failed auction, the group put up those hacking tools and exploits for direct sale on an underground website, categorizing them into a type — like "exploits," "Trojans," and "implant" — each of which ranged from 1 to 100 Bitcoins (from $780 to $78,000). Now, the Shadow Brokers has finally released password for the encrypted cache of NSA's files, allowing anyone to unlock and download the auction data dump.

CrDj”(;Va.*[email protected])#>deB7mN

THE SHADOW BROKERS MESS IS WHAT HAPPENS WHEN THE NSA HOARDS ZERO-DAYS AUTHOR: ANDY GREENBERG 08.17.16. - 8:34 PM
Everything you need to know about the NSA hack - but were afraid to Google
Shadow Brokers leak systems hacked by NSA – mostly mail and uni servers in India, China
New leak suggests NSA penetrated Mideast banking networks By RAPHAEL SATTER

Sunday April 16, 2017 click here for archives
☰ Latest News
CoincidenceTheorist
-23-
submitted by J_Dillinger to conspiracy [link] [comments]

Coins.PH Trading Tips Sa Bitcoin XRP Coins Pro How To Cash ... The Philippines New Mecca For Terrorism BITCOINS IN THE PHILIPPINES How to send and receive bitcoins on Coins.ph? How to Withdraw Your Money from Skrill to Philippines (Old Interface)

This week the price of Bitcoin (BTC) started the week around the $11,800 mark, and after briefly surpassing $12,000 it The post U.S. authorities seize Bitcoin linked to terrorist groups as billion ... The BSP (Central Bank of the Philippines) has released official guidelines for the regulation of virtual currency exchanges. The statements emphasize the potential benefits of remittances, threats posed by money laundering, and the desire for the Philippine government to foster development in bitcoin businesses. Also Read: Bitcoin Regulatory Guidelines Are Coming to the PhilippinesSponsored ... The chief of the Philippines central bank has warned over the risks of growing cryptocurrency use in the country. ... especially given the tech’s potential use in the funding of terrorism. The central bank’s deputy governor, Diwa Guinigundo, also spoke of cryptocurrency’s limitations as a substitute for fiat money, as a medium of exchange and actual value. And, while cryptos and ... The group were using Facebook and Telegram to campaign for bitcoin funding. That month, a donation of BTC0.075 ($685 at the time) was sent by an unknown individual to the organization's advertised ... Philippines unveils plans for new bitcoin exchange regulations. by CryptoNinjas.net 02/10/2017 It was announced this week by the central bank of the Philippines known as Bangko Sentral ng Pilipinas (BSP) the country will begin to regulate cryptocurrency exchanges. When the regulations get into place, they will be the first such regulations in Asia. The goal of regulation is built to block ...

[index] [24249] [11185] [39432] [42268] [8275] [13101] [15228] [17675] [41684] [10550]

Coins.PH Trading Tips Sa Bitcoin XRP Coins Pro How To Cash ...

How to set up COIN.ph WALLET in Philippines and learn the privileges and function - Duration: 13:29. Bitcoin Tom 61,386 views CLICK THIS LINK: https://freelancertofreedom.co... Sign up for COINS.PH using my referral link to get PHP50.00 pesos signup bonus when your account is verified. Mindanao: Crucible of Terror, 2005 - Philippines - Marginalisation of Muslims could have been the genesis of Islam militants, but what is now the driving for... Welcome to my channel where I give information about bitcoin trading and cryptocurrency news in the Philippines. In this video I will show you how to cash in... In this video, we share the use of Bitcoins In The Philippines. “Right now Bitcoin feels like the Internet before the browser.” - Wences Casares, Founder of Banco Lemon,

#