Crypto.com - The Best Place to Buy, Sell and Pay with Crypto

Wife of Norwegian billionaire has been missing since Oct. 31st 2018. She is presumed kidnapped and/or killed. There was a ransom note left at the crime scene, demanding 9 million Euros in crypto currency. What happened to Anne-Elisabeth Hagen?

So.. I have been waiting for months for someone to write about this case here, and since no one has I suppose I’ll have to give it a shot. This is my first reddit post so mishaps are bound to happen, English is not my first language, apologies for any mistakes, etc… (is this a meme yet?) Edit: wow, holy crap! I didn't expect to be given gold! Thank you kind stranger!
Edit: I have added more to the bottom of this post to clear up some confusion or add more important information that I missed the first time.
Anne-Elisabeth Falkevik Hagen (68) is the wife of Norwegian billionaire Tom Hagen, an investor and co-founder of a company called Elkraft. They married young, only 19 years old, before Hagen made his fortune. Although Hagen is now one of Norway’s richest people, the 172nd richest according to financial magazine Kapital, he and his wife have seemingly led unassuming, quiet lives. From an outsiders perspective they seem like the kind of billionaires you could only hope to be if you ever found yourself in such financial luck, grounded and down to earth, living in the same house for almost 40 years, in a suburb of Oslo called Lørenskog. Tom drives a simple Citroën car. They are parents and grandparents. You would never look at them and think "ah, rich people!".
Their house looks like any suburban Norwegian home, there’s nothing flashy or noteworthy about it. No extra security surrounding the area either. There are no gated communities in Norway, but there are still security measures one can take, and probably should take if you’re that rich, and the fact that they hadn’t might have been one of the reasons Anne-Elisabeth was targeted.
This case reads more like a Hollywood movie than an actual crime case to me, because we don’t really have crime like this in Norway. The police kept the alleged kidnapping a secret until January 9th. Since then little pieces of information have come out or developments have happened in the case, but Anne-Elisabeth is still missing. The police now presumes she has been killed, perhaps even on the day she disappeared. Her family, who speaks to the media through their lawyer, still holds out hope that she might be alive.

I’ll try to keep everything precise and easy to follow:
November
Because of the threats in the letter, the police can’t go out with any information regarding Anne-Elisabeth’s disappearance. They have to work very carefully and quietly in their home to secure evidence from the crime scene. KRIPOS (The National Criminal Investigation Service) and ØKOKRIM (National Authority for Investigation and Prosecution of Economic and Environmental Crime in Norway) get involved.
The police finds traces of Anne-Elisabeths blood inside the house, as well as a shoe print. It is unclear whether or not the blood was from the day of the disappearance. The amount of blood found is reportedly “not unusual” because she lived there, which I take to mean it was very little.
Tom Hagen continues to go to work, people describe him as unsociable and desolate during this period. Neighbors are told Anne-Elisabeth is “away”, and family members are kept in the dark as well. At the end of November family members are starting to feel like something is going on. Finally they find out that Anne-Elisabeth is missing, and there are talks of a kidnapping. No one is allowed to say anything.
December
The investigation is still top secret.
January 9th
The police finally allow the media to talk about the case. Norwegian media have known about it for a long time but have been told not to say anything yet. The apparent kidnapping is announced in a press conference after 10 weeks of utmost secrecy.
A few days after the press conference, the police releases a video of the area around Tom Hagen's workplace. A man can be seen walking down the road next to Tom’s place of work at 7:36am on the morning of the crime. He then abruptly stops and turns around to walk back the same way from where he came.
24 minutes later, another man can be seen walking down the same way. He is passed by a cyclist, who has been identified. The two other men have never come forward. It has been theorised that these two men might have been a look-out of sorts.
January 16th
The family receives a new message from the person or people who claim to have Anne-Elisabeth. This message is recieved through crypto currency (bitcoin this time). I’m not quite sure how this works, but from what I’ve read it’s a difficult and insufficient way to communicate.
January 27th
The family again is in communication with the alleged kidnappers.
Some people find it curious at this point that these alleged kidnappers have been unwilling to communicate with the family during the ten weeks of secrecy, but now that the world knows, they are willing to talk. Who is behind this, exactly? Professional criminals who saw an opportunity after the article in Dagens Næringsliv was published and they realised the man in question lives completely unprotected? A family member? Enemies of Tom Hagen? Could it be Tom himself? Who would want to hurt this woman? Rumours are spreading.
February
The police advice the family not to pay the ransom unless they receive evidence of Anne-Elisabeth’s well-being. This is stressed in every press conference, both in Norwegian and English. The family is hopeful that proof will now be provided, seeing as the alleged kidnappers are now willing to talk, albeit very little. However, they receive nothing.
The police interviews a lot of people, including business partners of Tom’s.
April
After a long Norwegian winter, the police wants to search the lake right next to Tom and Anne-Elisabeth’s house. They employ a police dog specialized in search in water (the same dog who helped in the Kim Wall case). It’s unclear whether or not they actually find anything during this search. Certainly no body or anything like that.
May
The family decides to attempt contacting the alleged kidnappers themselves. They haven’t heard anything at all since January 27th. No evidence of Anne-Elisabeth’s well-being has been provided, and none is provided this time either.
June
The police officially changes their main hypothesis. They now believe Anne-Elisabeth was murdered, and not kidnapped for financial gain. They believe the ransom note as well as any evidence found in the house might have been staged to look like a kidnapping.
More surprisingly, the police officially cancels any further search of the two men seen in the surveillance video outside of Tom Hagen’s work the morning of Anne-Elisabeth’s disappearance. They still have not been identified and it is unknown why the police now believes them not to be involved.
July 8th
The family lawyer Svein Holden receives an e-mail from the dark web. It is written in Norwegian, and the writing style suggests that it may have been written by the same person who penned the ransom note. According to Svein Holden this e-mail contains information that only a perpetrator would know. The message of this e-mail is as follows: in order to receive evidence of Anne-Elisabeth being alive, the family has to pay.
It is again commented on by outsiders how odd it is that this message is received now, five months after the previous one, and right after the police changed their main hypothesis.
Tom Hagen decides to pay 1.3 million Euros in crypto currency. He receives nothing in return.
August
The shoe print found at the crime scene is sent for analysis to police all over Europe. German police finds out that the print belongs to a shoe by the brand Sprox, and is in European size 45. It is sold in Norway at Sparkjøp. The police now requests help from the public, and everyone who have purchased these shoes in cash is encouraged to come forward.
September
The cable tie left at the crime scene has been analysed and has been found to be produced in China and sold in Norway at Biltema.
Both Biltema and Sparkjøp are fairly common stores in Norway.
October
The police have now also analysed the paper the ransom note was written on and the envelope it came in. It was purchased at Clas Ohlson, another common store in Norway. All three stores tied to this case are located in Romerike, the district in which Tom and Anne-Elisabeth Hagen lives.
It’s closing in on a year since Anne-Elisabeth disappeared without a trace. The entire country is awaiting answers. The 25th of October would have been Tom and Anne-Elisabeth’s Golden wedding anniversary. On Thursday the 31st, 365 days have passed since this all happened. But it is not a Halloween tale, it is real life. What happened to her? Where is she? Could she still be alive after all this time?
Edited to add more information or clear up some confusing things:
I'll continue to update if I see common questions or there's anything else I remember!

Sources (unfortunately mostly in Norwegian):https://www.vg.no/spesial/2019/lorenskog-forsvinningen-ett-aa?maaned=sommer2018 https://www.vg.no/nyheteinnenriks/i/KvJ6lG/frigir-film-fra-forsvinningsdagen-frykter-ektemannen-ble-holdt-under-oppsikt https://www.dn.no/marked/tom-hagen/strom/eiendom/tom-hagen-tjente-174-millioner-pa-strom-og-eiendom-i-fjo2-1-387353 https://www.cbsnews.com/news/norway-billionaires-wife-anne-elisabeth-falkevik-hagen-being-held-for-ransom/
submitted by __moonflower to UnresolvedMysteries [link] [comments]

Anyone still under the illusion of Microsoft having been transformed into a kinder, more mutually beneficial partner, please read this patent.

WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Before reading the following excerpts, keep this sequence of events in mind:
Master Slave (and we're not referring to HDDs here)
Step one: patent technology
Step two: sell slave IoT devices to consumers who readily purchase them especially after being promised that they'll be rewarded in cryotocurrency for their data.
Step three: collect data via Azure on unsuspecting human subjects' fMRI, EEG, body temperatures, EKG, sleep data, digitized health care information, consumer purchasing habits, reading and viewing preferences, social media activity and correlate with activities performed (tasks).
Step four: Use data to refine AI to profile human behavior, predict behavior and refine mind reading capabilities.
This article is actually incorporated in the patent!
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
Step five: Institute centralized global cryptocurrency financial system with no other alternatives in which to transact legally.
https://www.reddit.com/Bitcoin/comments/4nag4b/1988_economist_cover_predicting_a_world_currency/
https://www.economist.com/finance-and-economics/1998/09/24/one-world-one-money
Step six: To understand step six, Read George Orwell's "1984" or review the concept of an individual's freedoms being based not on the concept of natural rights but on their social credit scores.
Thank you Microsoft, Google, Apple, Amazon, Facebook.
Now the patent excerpts:
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy. [0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems. For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process. [0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
decentralized cryptocurrency networks or databases.
[0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150. [0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks. [0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions). An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity). The material (http://news.berkely.edu/20l l/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Applicants * MICROSOFT TECHNOLOGY LICENSING, LLC[US/US]; One Microsoft Way Redmond, Washington 98052-6399, US
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy.
[0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems. For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process.
[0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
decentralized cryptocurrency networks or databases. [0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150.
[0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks.
[0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions).
An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity). The material (http://news.berkely.edu/20l l/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
submitted by snowboardnirvana to MVIS [link] [comments]

Mockingbird X.0

Imagine if there was one desk that all stories could cross so that, at 4am, a media plan could be decided upon and disseminated where all news outlets coordinated to set the goalposts of debate and hyper focused on specific issues to drive a narrative to control how you vote and how you spend money; where Internet shills were given marching orders in tandem to what was shown on television, printed in newspapers and spread throughout articles on the World Wide Web.
https://i.imgur.com/Elnci0M.png
In the past, we had Operation Mockingbird, where the program was supremely confident that it could control stories around the world, even in instructions to cover up any story about a possible “Yeti” sighting, should it turn out they were real.
https://i.imgur.com/121LXqy.png
If, in 1959, the government was confident in its ability to control a story about a Yeti, then what is their level of confidence in controlling stories, today?
https://i.imgur.com/jQFVYew.png
https://i.imgur.com/ZKMYGJj.png
In fact, we have a recent example of a situation similar to the Yeti. When Bill Clinton and Loretta Lynch met on the TARMAC to spike the Hillary email investigation, the FBI was so confident it wasn’t them, that their entire focus was finding the leaker, starting with searching within the local PD. We have documentation that demonstrates the state of mind of the confidence the upper levels of the FBI have when dealing with the media.
https://i.imgur.com/IbjDOkI.png
https://i.imgur.com/NH86ozU.png
The marriage between mainstream media and government is a literal one and this arrangement is perfectly legal.
https://i.imgur.com/OAd4vpf.png
But, this problem extends far beyond politics; the private sector, the scientific community, even advice forums are shilled heavily. People are paid to cause anxiety, recommend people break up and otherwise sow depression and nervousness. This is due to a correlating force that employs “systems psychodynamics”, focusing on “tension centered” strategies to create “organizational paradoxes” by targeting people’s basic assumptions about the world around them to create division and provide distraction.
https://i.imgur.com/6OEWYFN.png
https://i.imgur.com/iG4sdD4.png
https://i.imgur.com/e89Rx6B.png
https://i.imgur.com/uotm9Cg.png
https://i.imgur.com/74wt9tD.png
In this day and age, it is even easier to manage these concepts and push a controlled narrative from a central figure than it has ever been. Allen & Co is a “boutique investment firm” that managed the merger between Disney and Fox and operates as an overseeing force for nearly all media and Internet shill armies, while having it’s fingers in sports, social media, video games, health insurance, etc.
https://i.imgur.com/zlpBh3c.png
https://i.imgur.com/e5ZvFFJ.png
Former director of the CIA and Paul Brennan’s former superior George Tenet, holds the reigns of Allen & Co. The cast of characters involves a lot of the usual suspects.
https://i.imgur.com/3OlrX7G.png
In 1973, Allen & Company bought a stake in Columbia Pictures. When the business was sold in 1982 to Coca-Cola, it netted a significant profit. Since then, Herbert Allen, Jr. has had a place on Coca-Cola's board of directors.
Since its founding in 1982, the Allen & Company Sun Valley Conference has regularly drawn high-profile attendees such as Bill Gates, Warren Buffett, Rupert Murdoch, Barry Diller, Michael Eisner, Oprah Winfrey, Robert Johnson, Andy Grove, Richard Parsons, and Donald Keough.
Allen & Co. was one of ten underwriters for the Google initial public offering in 2004. In 2007, Allen was sole advisor to Activision in its $18 billion merger with Vivendi Games. In 2011, the New York Mets hired Allen & Co. to sell a minority stake of the team. That deal later fell apart. In November 2013, Allen & Co. was one of seven underwriters on the initial public offering of Twitter. Allen & Co. was the adviser of Facebook in its $19 billion acquisition of WhatsApp in February 2014.
In 2015, Allen & Co. was the advisor to Time Warner in its $80 billion 2015 merger with Charter Communications, AOL in its acquisition by Verizon, Centene Corporation in its $6.8 billion acquisition of Health Net, and eBay in its separation from PayPal.
In 2016, Allen & Co was the lead advisor to Time Warner in its $108 billion acquisition by AT&T, LinkedIn for its merger talks with Microsoft, Walmart in its $3.3 billion purchase of Jet.com, and Verizon in its $4.8 billion acquisition of Yahoo!. In 2017, Allen & Co. was the advisor to Chewy.com in PetSmart’s $3.35 billion purchase of the online retailer.
Allen & Co throws the Sun Valley Conference every year where you get a glimpse of who sows up. Harvey Weinstein, though a past visitor, was not invited last year.
https://en.wikipedia.org/wiki/Allen_%26_Company_Sun_Valley_Conference
Previous conference guests have included Bill and Melinda Gates, Warren and Susan Buffett, Tony Blair, Google founders Larry Page and Sergey Brin, Allen alumnus and former Philippine Senator Mar Roxas, Google Chairman Eric Schmidt, Quicken Loans Founder & Chairman Dan Gilbert, Yahoo! co-founder Jerry Yang, financier George Soros, Facebook founder Mark Zuckerberg, Media Mogul Rupert Murdoch, eBay CEO Meg Whitman, BET founder Robert Johnson, Time Warner Chairman Richard Parsons, Nike founder and chairman Phil Knight, Dell founder and CEO Michael Dell, NBA player LeBron James, Professor and Entrepreneur Sebastian Thrun, Governor Chris Christie, entertainer Dan Chandler, Katharine Graham of The Washington Post, Diane Sawyer, InterActiveCorp Chairman Barry Diller, Linkedin co-founder Reid Hoffman, entrepreneur Wences Casares, EXOR and FCA Chairman John Elkann, Sandro Salsano from Salsano Group, and Washington Post CEO Donald E. Graham, Ivanka Trump and Jared Kushner, and Oprah Winfrey.
https://i.imgur.com/VZ0OtFa.png
George Tenet, with the reigns of Allen & Co in his hands, is able to single-handedly steer the entire Mockingbird apparatus from cable television to video games to Internet shills from a singular location determining the spectrum of allowable debate. Not only are they able to target people’s conscious psychology, they can target people’s endocrine systems with food and pornography; where people are unaware, on a conscious level, of how their moods and behavior are being manipulated.
https://i.imgur.com/mA3MzTB.png
"The problem with George Tenet is that he doesn't seem to care to get his facts straight. He is not meticulous. He is willing to make up stories that suit his purposes and to suppress information that does not."
"Sadly but fittingly, 'At the Center of the Storm' is likely to remind us that sometimes what lies at the center of a storm is a deafening silence."
https://i.imgur.com/YHMJnnP.png
Tenet joined President-elect Bill Clinton's national security transition team in November 1992. Clinton appointed Tenet Senior Director for Intelligence Programs at the National Security Council, where he served from 1993 to 1995. Tenet was appointed Deputy Director of Central Intelligence in July 1995. Tenet held the position as the DCI from July 1997 to July 2004. Citing "personal reasons," Tenet submitted his resignation to President Bush on June 3, 2004. Tenet said his resignation "was a personal decision and had only one basis—in fact, the well-being of my wonderful family—nothing more and nothing less. In February 2008, he became a managing director at investment bank Allen & Company.
https://i.imgur.com/JnGHqOS.png
We have the documentation that demonstrates what these people could possibly be doing with all of these tools of manipulation at their fingertips.
The term for it is “covert political action” for which all media put before your eyes is used to serve as a veneer… a reality TV show facade of a darker modus operandum.
https://i.imgur.com/vZC4D29.png
https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol36no3/html/v36i3a05p_0001.htm
It is now clear that we are facing an implacable enemy whose avowed objective is world domination by whatever means and at whatever costs. There are no rules in such a game. Hitherto acceptable norms of human conduct do not apply. If the US is to survive, longstanding American concepts of "fair play" must be reconsidered. We must develop effective espionage and counterespionage services and must learn to subvert, sabotage and destroy our enemies by more clever, more sophisticated means than those used against us. It may become necessary that the American people be made acquainted with, understand and support this fundamentally repugnant philosophy.
http://www.nbcnews.com/id/3340677/t/cia-operatives-shadowy-war-force/
Intelligence historian Jeffrey T. Richelson says the S.A. has covered a variety of missions. The group, which recently was reorganized, has had about 200 officers, divided among several groups: the Special Operations Group; the Foreign Training Group, which trains foreign police and intelligence officers; the Propaganda and Political Action Group, which handles disinformation; the Computer Operations Group, which handles information warfare; and the Proprietary Management Staff, which manages whatever companies the CIA sets up as covers for the S.A.
Scientology as a CIA Political Action Group – “It is a continuing arrangement…”: https://mikemcclaughry.wordpress.com/2015/08/25/scientology-as-a-cia-political-action-group-it-is-a-continuing-arrangement/
…Those operations we inaugurated in the years 1955-7 are still secret, but, for present purposes, I can say all that’s worth saying about them in a few sentences – after, that is, I offer these few words of wisdom. The ‘perfect’ political action operation is, by definition, uneventful. Nothing ‘happens’ in it. It is a continuing arrangement, neither a process nor a series of actions proceeding at a starting point and ending with a conclusion.
CIA FBI NSA Personnel Active in Scientology: https://i.imgur.com/acu2Eti.png
When you consider the number of forces that can be contained within a single “political action group” in the form on a “boutique investment firm,” where all sides of political arguments are predetermined by a selected group of actors who have been planted, compromised or leveraged in some way in order to control the way they spin their message.
https://i.imgur.com/tU4MD4S.png
The evidence of this coordinated effort is overwhelming and the “consensus” that you see on TV, in sports, in Hollywood, in the news and on the Internet is fabricated.
Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.'
Thus the uninformed reader will most likely develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'
When you find yourself feeling like common sense and common courtesy aren’t as common as they ought to be, it is because there is a massive psychological operation controlled from the top down to ensure that as many people as possible are caught in a “tension based” mental loop that is inflicted on them by people acting with purpose to achieve goals that are not in the interest of the general population, but a method of operating in secret and corrupt manner without consequences.
Notice that Jeffrey Katzenberg, of Disney, who is intertwined with Allen & Co funds the Young Turks. He is the perfect example of the relationship between media and politics.
Katzenberg has also been involved in politics. With his active support of Hillary Clinton and Barack Obama, he was called "one of Hollywood's premier political kingmakers and one of the Democratic Party's top national fundraisers."
With cash from Jeffrey Katzenberg, The Young Turks looks to grow paid subscribers:
https://digiday.com/media/with-cash-from-katzenberg-the-young-turks-look-to-grow-paid-subscribers/
Last week, former DreamWorks Animation CEO Jeffrey Katzenberg’s new mobile entertainment company WndrCo was part of a $20 million funding round in TYT Network, which oversees 30 news and commentary shows covering politics, pop culture, sports and more. This includes the flagship “The Young Turks” program that streams live on YouTube every day. Other investors in the round included venture capital firms Greycroft Partners, E.ventures and 3L Capital, which led the round. This brings total funding for Young Turks to $24 million.
How Hollywood's Political Donors Are Changing Strategies for the Trump Era:
https://www.hollywoodreporter.com/features/hollywood-political-donors-are-changing-strategy-post-trump-1150545
Hollywood activism long has been depicted as a club controlled by a handful of powerful white men: Katzenberg, Spielberg, Lear, David Geffen, Haim Saban and Bob Iger are the names most often mentioned. But a new generation of power brokers is ascendant, including J.J. Abrams and his wife, Katie McGrath, cited for their personal donations and bundling skills; Shonda Rhimes, who held a get-out-the-vote rally at USC's Galen Center on Sept. 28 that drew 10,000 people; CAA's Darnell Strom, who has hosted events for Nevada congresswoman Jacky Rosen and Arizona congresswoman Kyrsten Sinema; and former Spotify executive Troy Carter, who held three fundraisers for Maryland gubernatorial candidate Ben Jealous (Carter also was a fundraiser for President Obama).
Soros Group Buys Viacom's DreamWorks Film Library:
https://www.forbes.com/2006/03/17/soros-viacom-dreamworks-cx_gl_0317autofacescan11.html#541a895f1f22
Viacom, after splitting off from Les Moonves Les Moonves ' CBS , still holds Paramount Pictures, and that movie studio in December agreed to acquire DreamWorks SKG, the creative shop founded by the Hollywood triumvirate of Steven Spielberg, David Geffen and Jeffrey Katzenberg (a former exec at The Walt Disney Co.). DreamWorks Animation had been spun off into a separate company.
Now it's time for Freston to make back some money--and who better to do a little business with than George Soros? The billionaire financier leads a consortium of Soros Strategic Partners LP and Dune Entertainment II LLC, which together are buying the DreamWorks library--a collection of 59 flicks, including Saving Private Ryan, Gladiator, and American Beauty.
The money you spend on media and junk food and in taxes goes to these groups who then decide how best to market at you so that they decide how you vote by creating a fake consensus to trick into thinking that you want something other than what is best for you; but will inevitably result in more money being funneled to the top, creating further separation between the super rich and the average person. The goal will be to assert creeping authoritarianism by generating outrage against policies and issues they hate. Part of manipulating your basic assumptions is also to use schadenfreude (think canned laughter on TV) against characters who support the cause that might actually do you the most good (which reaffirms and strengthens your confirmation biased along predetermined political lines).
https://i.imgur.com/PW1cRtj.png
We have a population being taught to hate socialism and love capitalism when the truth is no country is practicing either. These terms are merely disguises for political oligarchies where the collection of wealth is less about getting themselves rich and more about keeping everyone else poor.
What can you guess about the world around you if it turned out that every consensus that was forced on you was fake?
How much money would it take to make it look like 51% of the Internet believed in completely idiotic ideas? Combine shill operations with automation and AI’s, and the cost becomes a good investment relative to the return when measured in political power.
Even the people who are well intentioned and very vocal do not have to consciously be aware that they are working for a political action group. A covert political group will always prefer an unwitting tool to help push their agenda, so that they can remain in the shadows.
FDA Admonishes Drug Maker Over Kim Kardashian Instagram Endorsement https://www.forbes.com/sites/davidkroll/2015/08/11/fda-spanks-drug-maker-over-kim-kardashian-instagram-endorsement/#25174a29587b
The OSS files offer details about other agents than famous chef, Julia Child; including Supreme Court Justice Arthur Goldberg, major league catcher Moe Berg, historian Arthur Schlesinger Jr., and actor Sterling Hayden. http://www.nbcnews.com/id/26186498/ns/us_news-security/t/julia-child-cooked-double-life-spy/
USA Today: Businesses and organizations may refer to it as a tool for competitive advantage and marketing; but make no mistake http://archive.is/37tK3
Shareblue accounts caught in /politics posting links to Shareblue without disclosing their affiliation http://archive.is/7HAkr
Psy Group developed elaborate information operations for commercial clients and political candidates around the world http://archive.is/BBblQ
Top mod of /Mechanical_Gifs tries to sell subreddit on ebay for 999.00 dollars. http://archive.is/kU1Ly
Shill posts picture of a dog in a hammock with the brand clearly visible without indicating that it's an ad in the title of the post http://archive.is/Mfdk9
Arstechnica: GCHQs menu of tools spreads disinformation across Internet- “Effects capabilities” allow analysts to twist truth subtly or spam relentlessly. http://arstechnica.com/security/2014/07/ghcqs-chinese-menu-of-tools-spread-disinformation-across-internet/
Samsung Electronics Fined for Fake Online Comments http://bits.blogs.nytimes.com/2013/10/24/samsung-electronics-fined-for-fake-online-comments/?_r=0
Discover Magazine: Researchers Uncover Twitter Bot Army That’s 350 http://blogs.discovermagazine.com/d-brief/2017/01/20/twitter-bot-army/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A%20DiscoverTechnology%20%28Discover%20Technology%29#.WIMl-oiLTnA
Times of Israel - The internet: Israel’s new PR battlefield http://blogs.timesofisrael.com/the-rise-of-digital-diplomacy-could-be-changing-israels-media-image/
Time: Social Media Manipulation? When “Indie” Bloggers and Businesses Get Cozy http://business.time.com/2013/04/22/social-media-manipulation-when-indie-bloggers-and-businesses-get-cozy/
Content-Driven Detection of Campaigns in Social Media [PDF] http://faculty.cs.tamu.edu/caverlee/pubs/lee11cikm.pdf
the law preventing them from using this in America was repealed http://foreignpolicy.com/2013/07/14/u-s-repeals-propaganda-ban-spreads-government-made-news-to-americans/
Redditor who works for a potato mailing company admits to being a shill. He shows off his 27 thousand dollars he made in /pics
http://i.imgur.com/CcTHwdS.png
Screenshot of post since it was removed. http://i.imgur.com/k9g0WF8.png
Just thought I'd contribute to this thread http://imgur.com/OpSos4u
CNN: A PR firm has revealed that it is behind two blogs that previously appeared to be created by independent supporters of Wal-Mart. The blogs Working Families for Wal-mart and subsidiary site Paid Critics are written by 3 employees of PR firm Edelman http://money.cnn.com/2006/10/20/news/companies/walmart_blogs/index.htm
Vice: Your Government Wants to Militarize Social Media to Influence Your Beliefs http://motherboard.vice.com/read/your-government-wants-to-militarize-social-media-to-influence-your-beliefs
BBC News: China's Internet spin doctors http://news.bbc.co.uk/2/hi/7783640.stm
BBC News: US plans to 'fight the net' revealed http://news.bbc.co.uk/2/hi/americas/4655196.stm
Wall Street Journal: Turkey's Government Forms 6 http://online.wsj.com/news/articles/SB10001424127887323527004579079151479634742?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424127887323527004579079151479634742.html
Fake product reviews may be pervasive http://phys.org/news/2013-07-fake-product-pervasive.html#nRlv
USA Today: The co-owner of a major Pentagon propaganda contractor publicly admitted that he was behind a series of websites used in an attempt to discredit two USA TODAY journalists who had reported on the contractor. http://usatoday30.usatoday.com/news/military/story/2012-05-24/Leonie-usa-today-propaganda-pentagon/55190450/1
ADWEEK: Marketing on Reddit Is Scary http://www.adweek.com/news/technology/marketing-reddit-scary-these-success-stories-show-big-potential-168278
BBC- How online chatbots are already tricking you- Intelligent machines that can pass for humans have long been dreamed of http://www.bbc.com/future/story/20140609-how-online-bots-are-tricking-you
BBC news: Amazon targets 1 http://www.bbc.com/news/technology-34565631
BBC: More than four times as many tweets were made by automated accounts in favour of Donald Trump around the first US presidential debate as by those backing Hillary Clinton http://www.bbc.com/news/technology-37684418
Fake five-star reviews being bought and sold online - Fake online reviews are being openly traded on the internet
http://www.bbc.com/news/technology-43907695
http://www.bbc.com/news/world-asia-20982985
http://www.bbc.com/news/world-asia-20982985
Bloomberg: How to Hack an Election [and influence voters with fake social media accounts] http://www.bloomberg.com/features/2016-how-to-hack-an-election/
"Internet Reputation Management http://www.bloomberg.com/news/articles/2008-04-30/do-reputation-management-services-work-businessweek-business-news-stock-market-and-financial-advice
Buzzfeed: Documents Show How Russia’s Troll Army Hit America http://www.buzzfeed.com/maxseddon/documents-show-how-russias-troll-army-hit-america#.ki8Mz97ly
The Rise of Social Bots http://www.cacm.acm.org/magazines/2016/7/204021-the-rise-of-social-bots/fulltext
CBC News- Canadian government monitors online forums http://www.cbc.ca/news/canada/bureaucrats-monitor-online-forums-1.906351
Chicago Tribune: Nutrition for sale: How Kellogg worked with 'independent experts' to tout cereal http://www.chicagotribune.com/business/ct-kellogg-independent-experts-cereal-20161121-story.html
DailyKos: HBGary: Automated social media management http://www.dailykos.com/story/2011/02/16/945768/-UPDATED-The-HB-Gary-Email-That-Should-Concern-Us-All
Meme Warfare Center http://www.dtic.mil/dtic/tfulltext/u2/a507172.pdf
Shilling on Reddit is openly admitted to in this Forbes article http://www.forbes.com/sites/julesschroede2016/03/10/the-magic-formula-behind-going-viral-on-reddit/#1d2485b05271
Forbes: From Tinder Bots To 'Cuban Twitter' http://www.forbes.com/sites/kashmirhill/2014/04/17/from-tinder-bots-to-covert-social-networks-welcome-to-cognitive-hacking/#4b78e2d92a7d
Hivemind http://www.hivemind.cc/rank/shills
Huffington Post- Exposing Cyber Shills and Social Media's Underworld http://www.huffingtonpost.com/sam-fiorella/cyber-shills_b_2803801.html
The Independent: Massive British PR firm caught on video: "We've got all sorts of dark arts...The ambition is to drown that negative content and make sure that you have positive content online." They discuss techniques for managing reputations online and creating/maintaining 3rd-party blogs that seem independent. http://www.independent.co.uk/news/uk/politics/caught-on-camera-top-lobbyists-boasting-how-they-influence-the-pm-6272760.html
New York Times: Lifestyle Lift http://www.nytimes.com/2009/07/15/technology/internet/15lift.html?_r=1&emc=eta1
New York Times: Give Yourself 5 Stars? Online http://www.nytimes.com/2013/09/23/technology/give-yourself-4-stars-online-it-might-cost-you.html?src=me&ref=general
NY Times- From a nondescript office building in St. Petersburg http://www.nytimes.com/2015/06/07/magazine/the-agency.html?_r=1
NY Times: Effort to Expose Russia’s ‘Troll Army’ Draws Vicious Retaliation http://www.nytimes.com/2016/05/31/world/europe/russia-finland-nato-trolls.html?_r=1
PBS Frontline Documentary - Generation Like http://www.pbs.org/wgbh/frontline/film/generation-like/
Gamers promote gaming-gambling site on youtube by pretending to hit jackpot without disclosing that they own the site. They tried to retroactively write a disclosure covering their tracks http://www.pcgamer.com/csgo-lotto-investigation-uncovers-colossal-conflict-of-interest/
Raw Story: CENTCOM engages bloggers http://www.rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016.html
Raw Story: Air Force ordered software to manage army of fake virtual people http://www.rawstory.com/rs/2011/02/18/revealed-air-force-ordered-software-to-manage-army-of-fake-virtual-people/
Redective http://www.redective.com/?r=e&a=search&s=subreddit&t=redective&q=shills
Salon: Why Reddit moderators are censoring Glenn Greenwald’s latest news story on shills http://www.salon.com/2014/02/28/why_reddit_moderators_are_censoring_glenn_greenwalds_latest_bombshell_partne
The Atlantic: Kim Kardashian was paid to post a selfie on Instagram and Twitter advertising a pharmaceutical product. Sent to 42 million followers on Instagram and 32 million on Twitter http://www.theatlantic.com/health/archive/2015/09/fda-drug-promotion-social-media/404563/
WAR.COM: THE INTERNET AND PSYCHOLOGICAL OPERATIONS http://www.theblackvault.com/documents/ADA389269.pdf
The Guardian: Internet Astroturfing http://www.theguardian.com/commentisfree/libertycentral/2010/dec/13/astroturf-libertarians-internet-democracy
The Guardian: Israel ups the stakes in the propaganda war http://www.theguardian.com/media/2006/nov/20/mondaymediasection.israel
Operation Earnest Voice http://www.theguardian.com/technology/2011/ma17/us-spy-operation-social-networks
The Guardian: British army creates team of Facebook warriors http://www.theguardian.com/uk-news/2015/jan/31/british-army-facebook-warriors-77th-brigade
The Guardian: US military studied how to influence Twitter [and Reddit] users in Darpa-funded research [2014] http://www.theguardian.com/world/2014/jul/08/darpa-social-networks-research-twitter-influence-studies
The Guardian: Chinese officials flood the Chinese internet with positive social media posts to distract their population http://www.theguardian.com/world/2016/may/20/chinese-officials-create-488m-social-media-posts-a-year-study-finds
Times of Israel: Israeli government paying bilingual students to spread propaganda online primarily to international communities without having to identify themselves as working for the government. "The [student] union will operate computer rooms for the project...it was decided to establish a permanent structure of activity on the Internet through the students at academic institutions in the country." http://www.timesofisrael.com/pmo-stealthily-recruiting-students-for-online-advocacy/
USA Today: Lord & Taylor settles FTC charges over paid Instagram posts http://www.usatoday.com/story/money/2016/03/15/lord--taylor-settles-ftc-charges-over-paid-instagram-posts/81801972/
Researcher's algorithm weeds out people using multiple online accounts to spread propaganda - Based on word choice http://www.utsa.edu/today/2016/10/astroturfing.html
http://www.webinknow.com/2008/12/the-us-air-force-armed-with-social-media.html
Wired: Powered by rapid advances in artificial intelligence http://www.wired.co.uk/magazine/archive/2015/06/wired-world-2015/robot-propaganda
Wired: Clinton Staff and Volunteers Busted for Astroturfing [in 2007] http://www.wired.com/2007/12/clinton-staff-a/
Wired: Pro-Government Twitter Bots Try to Hush Mexican Activists http://www.wired.com/2015/08/pro-government-twitter-bots-try-hush-mexican-activists/
Wired: Microsoft http://www.wired.com/2015/09/ftc-machinima-microsoft-youtube/
Wired: Military Report: Secretly ‘Recruit or Hire Bloggers’ http://www.wired.com/dangerroom/2008/03/report-recruit/
Wired: Air Force Releases ‘Counter-Blog’ Marching Orders http://www.wired.com/dangerroom/2009/01/usaf-blog-respo/
Reddit Secrets https://archive.fo/NAwBx
Reddit Secrets https://archive.fo/SCWN7
Boostupvotes.com https://archive.fo/WdbYQ
"Once we isolate key people https://archive.is/PoUMo
GCHQ has their own internet shilling program https://en.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Group
Russia https://en.wikipedia.org/wiki/State-sponsored_Internet_sockpuppetry
US also operates in conjunction with the UK to collect and share intelligence data https://en.wikipedia.org/wiki/UKUSA_Agreement
Glenn Greenwald: How Covert Agents Infiltrate the Internet to Manipulate https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
Glenn Greenwald: Hacking Online Polls and Other Ways British Spies Seek to Control the Internet https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/
Here is a direct link to your image for the benefit of mobile users https://imgur.com/OpSos4u.jpg
Reddit for iPhone https://itunes.apple.com/us/app/reddit-the-official-app/id1064216828?mt=8
Why Satoshi Nakamoto Has Gone https://medium.com/@ducktatosatoshi-nakamoto-has-gone-4cef923d7acd
What I learned selling my Reddit accounts https://medium.com/@Rob79/what-i-learned-selling-my-reddit-accounts-c5e9f6348005#.u5zt0mti3
Artificial intelligence chatbots will overwhelm human speech online; the rise of MADCOMs https://medium.com/artificial-intelligence-policy-laws-and-ethics/artificial-intelligence-chatbots-will-overwhelm-human-speech-online-the-rise-of-madcoms-e007818f31a1
How Reddit Got Huge: Tons of Fake Accounts - According to Reddit cofounder Steve Huffman https://motherboard.vice.com/en_us/article/how-reddit-got-huge-tons-of-fake-accounts--2
Whistleblower and subsequent investigation: Paid trolls on /Bitcoin https://np.reddit.com/Bitcoin/comments/34m7yn/professional_bitcoin_trolls_exist/cqwjdlw
Confession of Hillary Shill from /SandersForPresident https://np.reddit.com/conspiracy/comments/3rncq9/confession_of_hillary_shill_from/
Why do I exist? https://np.reddit.com/DirectImageLinkerBot/wiki/index
Already a direct link? https://np.reddit.com/DirectImageLinkerBot/wiki/res_links
Here's the thread. https://np.reddit.com/HailCorporate/comments/3gl8zi/that_potato_mailing_company_is_at_it_again/
/netsec talks about gaming reddit via sockpuppets and how online discourse is (easily) manipulated. https://np.reddit.com/netsec/comments/38wl43/we_used_sock_puppets_in_rnetsec_last_year_and_are
Redditor comes clean about being paid to chat on Reddit. They work to promote a politician https://np.reddit.com/offmychest/comments/3gk56y/i_get_paid_to_chat_on_reddit/
Shill whistleblower https://np.reddit.com/politics/comments/rtr6b/a_very_interesting_insight_into_how_certain/
Russian bots were active on Reddit last year https://np.reddit.com/RussiaLago/comments/76cq4d/exclusive_we_can_now_definitively_state_that/?st=j8s7535j&sh=36805d5d
The Bush and Gore campaigns of 2000 used methods similar to the Chinese government for conducting “guided discussions” in chatrooms designed to influence citizens https://np.reddit.com/shills/comments/3xhoq8/til_the_advent_of_social_media_offers_new_routes/?st=j0o5xr9c&sh=3662f0dc
source paper. https://np.reddit.com/shills/comments/4d3l3s/government_agents_and_their_allies_might_ente
or Click Here. https://np.reddit.com/shills/comments/4kdq7n/astroturfing_information_megathread_revision_8/?st=iwlbcoon&sh=9e44591e Alleged paid shill leaks details of organization and actions.
https://np.reddit.com/shills/comments/4wl19alleged_paid_shill_leaks_details_of_organization/?st=irktcssh&sh=8713f4be
Shill Confessions and Additional Information https://np.reddit.com/shills/comments/5pzcnx/shill_confessions_and_additional_information/?st=izz0ga8r&sh=43621acd
Corporate and governmental manipulation of Wikipedia articles https://np.reddit.com/shills/comments/5sb7pi/new_york_times_corporate_editing_of_wikipedia/?st=iyteny9b&sh=b488263f
Ex -MMA fighter and ex-police officer exposes corrupt police practices https://np.reddit.com/shills/comments/6jn27s/ex_mma_fighter_and_expolice_officer_exposes/
User pushes InfoWars links on Reddit https://np.reddit.com/shills/comments/6uau99/chemicals_in_reddit_are_turning_memes_gay_take/?st=j6r0g2om&sh=96f3dbf4
Some websites use shill accounts to spam their competitor's articles https://np.reddit.com/TheoryOfReddit/comments/1ja4nf/lets_talk_about_those_playing_reddit_with/?st=iunay35w&sh=d841095d
User posts video using GoPro https://np.reddit.com/videos/comments/2ejpbb/yes_it_is_true_i_boiled_my_gopro_to_get_you_this/ck0btnb/?context=3&st=j0qt0xnf&sh=ef13ba81
Fracking shill whistleblower spills the beans on Fracking Internet PR https://np.reddit.com/worldnews/comments/31wo57/the_chevron_tapes_video_shows_oil_giant_allegedly/cq5uhse?context=3
https://i.imgur.com/Q3gjFg9.jpg
https://i.imgur.com/q2uFIV0.jpg
TOP SECRET SPECIAL HANDLING NOFORN
CENTRAL INTELLIGENCE AGENCY
Directorate of Operations
October 16, 1964
MEMORANDUM FOR THE DIRECTOR OF THE CIA
Subject: After action report of
Operation CUCKOO (TS)
INTRODUCTION

1) Operation CUCKOO was part of the overall operation CLEANSWEEP, aimed at eliminating domestic opposition to activities undertaken by the Central Intelligence Agency's special activities division, in main regard to operation GUILLOTINE.

2) Operation CUCKOO was approved by the Joint Chiefs of Staff, Department of Defense and the office of The President of the United States as a covert domestic action to be under taken within the limits of Washington D.C as outlined by Secret Executive Order 37.

3) Following the publishing of the Warren Commission, former special agent Mary Pinchot Meyer (Operation MOCKINGBIRD, Operation SIREN) also was married to Cord Meyer (Operation MOCKINGBIRD, Operation GUILLOTINE) threatened to disclose the details of several Special Activities Divisions' operations, including but not limited to, Operation SIREN and GUILLOTENE.
​1
TOP SECRET SPECIAL HANDLING NOFORN
4) It was deemed necessary by senior Directorate of Operations members to initiate Operation CUCKOO as an extension of Operation CLEANSWEEP on November 30th. After Mary Pinchot Meyer threatened to report her knowledge of Operation GUILLOTENE and the details of her work in Operation SIREN from her affair with the former President.

5) Special Activities Division was given the green light after briefing president Johnson on the situation. The situation report was forwarded to the Department of Defense and the Joint Chiefs of staff, who both approved of the parameters of the operation, as outlined under article C of secret executive order 37 (see attached copy of article).
​PLANNING STAGES
6) 8 members of the special activities division handpicked by operation lead William King Harvey began planning for the operation on October 3rd, with planned execution before October 16th.

7) The (?) of the operation was set as the neighborhood of Georgetown along the Potomac river, where the operators would observe, take note on routines, and eventually carry the operation.

8) After nothing Meyer's routines, Edward "Eddy" Reid was picked as the operation point man who would intersect Meyer on her walk on October 12th, with lead William King Harvey providing long range support if necessary from across the Chesapeake and Ohio canal (see illustration A for detailed map).

9) Edward Reid was planned to be dressed in the manner of a homeless black man, due to his resemblances to local trash collector (later found out to be Raymond Crump) who inhabits the AO and the path that Reid was planned to intersect Meyer.
2
TOP SECRET SPECIAL HANDLING NOFORN
submitted by The_Web_Of_Slime to Intelligence [link] [comments]

Microsoft patents scheme to usher in technocratic fascism via data from IoT sensor devices and centralized cryptocurrency system

WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Before reading the following excerpts, keep this sequence of events in mind:
Master Slave (and we're not referring to HDDs here)
Step one: patent technology
Step two: sell slave IoT devices to consumers who readily purchase them especially after being promised that they'll be rewarded in cryotocurrency for their data.
Step three: collect data via Microsoft Azure on unsuspecting human subjects' fMRI, EEG, body temperatures, EKG, sleep data, digitized health care information, consumer purchasing habits, reading and viewing preferences, social media activity and correlate with activities performed (tasks).
Step four: Use data to refine AI to profile human behavior, predict behavior and refine mind reading capabilities.
This article is actually incorporated in the patent!
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
Step five: Institute centralized global cryptocurrency financial system with no other alternatives in which to transact legally.
https://www.reddit.com/Bitcoin/comments/4nag4b/1988_economist_cover_predicting_a_world_currency/
https://www.economist.com/finance-and-economics/1998/09/24/one-world-one-money
Step six: To understand step six, read George Orwell's "1984" or review the concept of an individual's freedoms being based not on the concept of natural rights but on their social credit scores.
Thank you Microsoft, Google, Apple, Amazon, Facebook.
Now the patent excerpts:
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy.
[0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems.
For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process.
[0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. decentralized cryptocurrency networks or databases.
[0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150.
[0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks. [0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions). An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity).
The material (http://news.berkely.edu/20ll/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
submitted by snowboardnirvana to conspiracy [link] [comments]

Weekly Update: $WIB, $VID, $CHZ on ParJar, Pynk crushes Web Summit, XIO swap bridge, Sentivate reorg... – 1 Nov - 7 Nov'19

Weekly Update: $WIB, $VID, $CHZ on ParJar, Pynk crushes Web Summit, XIO swap bridge, Sentivate reorg... – 1 Nov - 7 Nov'19
Hi folks! We are catching up real quick. Here’s your week at Parachute + partners (1 Nov - 7 Nov'19):

Three new projects and their awesome communities joined the Parachute fam this week: Wibson, VideoCoin and Chiliz. Welcome! And if you missed, we also added Shuffle Monster, Harmony and CyberFM last week. #cryptoforeveryone is getting bigger by the day. Woot woot! In this week’s TTR trivias, we had Richi’s movie quiz qith a 25k $PAR pot. Charlotte's Rebus trivia in TTR on Tuesday had 25k $PAR in prizes for 10 Qs. Noice! Jason’s creative contest for this week was #artdeadmin: “draw/paint/sketch/whatever you imagine a group of the parachute admins doing together”. Click here to check out some of the entries of the TTR Halloween photo contest from last week. Doc Victor (from Cuba) hosted a Champions League wager round in tip room. And congrats to Victor (Anox) for passing his final Medical exams. We have 2 Doc Vics now. One from Cuba and the other from *redacted*.
Some of the top #artdeadmin submissions. Insane talent!
Jason’s running medal collection. Say what!
Andy shared the latest standings in the Parachute Fantasy Football League (#PFFL). Clinton (7-2) is on top followed by Chris (7-2) in second place and Hang (7-2) in third place. So close! As we rolled into November, Parachute crew signed up for Movember. So now we have 3 teams from the Parachute fold, doing a no-shave November for men’s health issues: Parachute (Tony, Cap, Alexis, Cuban Doc Vic, Richi), TTR (Vali, Ashok, Tavo, Alejandro, Marcos, PeaceLove) and TTR-Ladies (Mery, Martha, AngellyC, Liem, Durby, LeidyElena, Charlotte). Show them some support peeps! This is all for charity. Show them some support folks! This week’s #wholesomewed was about “your most precious possession and give us the story of why it is so precious to you”. A whole lot of $PAR was given out for some real wholesome life stories. Best. Community. Eva! Two-for-Tuesday theme for this week: colors! As always, a melodic Tuesday thanks to Gian! And thank you Borna for writing about Parachute and ParJar on the Blockchain Andy blog.
<- This is where Jose creates his magic. Respect / Cuban Doc Vic’s doggo, Symba, could easily be a TTR mascot. Good boi! ->
This week at aXpire there were two separate $AXPR burns: 20k of last week and 200k of this week. Last week’s news recap can be seen here. Congratulations to the team for being conferred the honour of being handed a key to Miami-Dade County by Mayor Carlos A. Gimenez at the 2019 Miami-Dade Beacon Council Annual Meeting & Key Ceremony. aXpire's disruptive solutions like Resolvr (expense allocation), Bilr (invoice management) and DigitalShares (deal marketplace) help hedge funds and PE firms scale through better profit margins. How? Read here. Did you know that the 2gether Ambassador Zone lets you customise referral messages with a #PicOfTheDay while you earn some sweet 2GT rewards? Super cool! There was an upgrade to the platform this week that might have led to a temporary deactivation in withdrawals while the update was being deployed. CEO Ramón Ferraz’s interview by BeInCrypto was released. Founder Salvador Algarra travelled to an ABANCA event for a keynote speech on Fintech innovation. Next week he will be at Rankia's Blockchain and Crypto Tech gathering to speak on "Blockchain, from predicting the future to building it". CardRates’ feature article on 2gether came out this week. The BOMBX:XIO token swap bridge went live. The swap will be open till 15th December. Plus, $XIO is now listed on DDEX and Switcheo. There were some disruptions in the bridge from time to time because of heavy traffic. Hence, the team also set up a manual swap page as an alternative solution. And please be wary of scammers posing as admins to help with the swap instructions. For any doubts, always reach out to accounts with admin tags on the official Telegram channel. The first set of incubated startups will be revealed on the 22nd of November. Ever wanted to find out about the people who frequent the BOMB token chat? Well, the BOMB Board is running a "Humans of Bomb" series to feature some of the most active members. This week, say Hello to Gustavo.
Key to Miami-Dade County awarded to aXpire. Cool!
WednesdayCoin’s founder Mike floated the idea of making WednesdayClub open on all days. The nature of the $WED token will not change on chain. Just that it will be usable inside the DApp everyday. What do you think? Let him know in the Reddit thread. Birdchain’s $BIRD token was listed on Mercatox this week. A new monthly referral contest was launched as well. 50k BIRD tokens to be won. Nice! Want the SMS feature to be released in your country? Start promoting! A featured article on Chainleak capped off the week perfectly for Birdchain. $ETHOS, $AXPR (aXpire), $HYDRO, $BNTY (Bounty0x) and $HST (Horizon State) were added to the eToro Wallet. The airdrops for Switch’s various token holders were distributed this week. As mentioned earlier as well, $ESH and $SDEX are revenue sharing tokens. Winners of the John McAfee contest and trading competition were announced. Congratulations! Tron blockchain support will be added to the Switch-based McAfeeDex next week. The news was covered by Beincrypto, U Today, Crypto Crunch, Altcoin Buzz and Tron’s Justin Sun as well. The Dex was featured in a Forbes article about John McAfee’s views on Libra. The latest community contest at Fantom involves writing educational articles on the platform. If you have been following Fantom developments, then this would be a breeze. Also, USD 100 in FTM tokens to be won. Sweet! Check out the cool $FTM merch on display at Odd Gems fashion. Even though these are not official gear, they have the blessings from the project. CMO Michael Chen sat down for an interview with Crypto Intelligence India to talk about the upcoming mainnet launch. The crew also appeared for an AMA with Atomic Wallet community. The latest technical update covers "Golang implementation of Lachesis consensus" or Go-Lachesis in short. Check out its demo with 7 nodes here.
Parachute presentation (WIP). That’s right. 500k transactions and counting. Wow!
While the Uptrennd Halloween contest got over last week, AltcoinBuzz made a friggin amazing graphic! Don’t forget to follow the Ann channel to stay up to date with the latest from Uptrennd. Founder Jeff Kirdeikis also announced that he will be working closely with PrefLogic on Security Tokens. Jeff’s interview with MakerDAO Biz Dev Gustav Arentoft came out. After some upgrades on Uptrennd, withdrawals are live again. Instead of the weekly meme contest, there was a flyer contest this week. 5k $1UP prize pool for winners. Wicked! The latest community picked TA report was on ETH. And the crew reached Malta for the AIBC Summit. More pics next week! Did you know that you can get Opacity Gift Codes for various plans at ShopOpacity.com? If not, make sure to read up on the Opacity October update. Catch up on the latest at District0x from the District weekly. The District Registry was live demo’ed. Looks cool! Hydro crew travelled to the Web Summit in Lisbon to spread word on the project. They were also represented at the Chicago fintech science fair this week. For a summary of the last few weeks gone by at Hydrogen, you can read the Project update and Hydro Labs update. We have covered most of these in previous posts. For the latest scoop on Hydro Labs, there’s always the Ann channel. Silent Notary’s Ubikiri wallet is undergoing upgrades. One of which is, wallets will be auto-named after creation. A ton more upgrades to be released. Sentivate announced a reorganisation in the company in order to devote full focus on Sentivate. The parent company will close and all resources will move to Sentivate. Here’s another use-case story to emphasise the potential of Universal Web. In the latest community vote on Blockfolio, folks voted overwhelmingly Yes on whether they would like to see more explainer articles on web tech. Also, the epic shoutout from Scott Melker (The Wolf Of All Streets) has to be the best thing ever!
Updated Sentivate roadmap for next 3 months
Pynk travelled to the Web Summit in Lisbon (wonder if they crossed paths with Hydro and SelfKey teams) as an official delegate of the Mayor's International Business Programme and were featured by KPMG. How to catch people’s eyes in a Summit where everyone is trying to grab your attention? With LED back packs. Genius! Such a lit idea, that even Web Summit tweeted it. Woohoo! And then they rocked a series of pitches to get to the big stage. Wins in Round 1 and quarter finals ensured an entry into the semi finals on the main stage. Click here to watch their presentation. Great job guys! Business Insider Poland included Pynk in their list of 12 Fintech companies worth following. The latest Pynk Tank episode delves into deep fakes in political advertising. One of the upcoming features on the platform will be the addition of gold to the daily price prediction tool. Pynk has "absolutely no interest in Bitcoin fanatics, ‘bagholders’ or ANYONE who mentions moons or Lamborghini’s. It’s tacky". This vibes perfectly with Parachute. Read more on Pynk's guide to becoming a super-predictor here. Horizon State announced that it will be resuming business under a new management. Welcome back! The original $HST token will not be supported anymore. The team will be looking into how the token holders are included in the new system. DENGfans, don’t forget to check the mini-projects posted by Mathew in the Telegram channel. Look up #getDENG in the channel. If you’re proficient in excel and VB, get in touch. Shuffle Monster’s $SHUF token is now listed on Dex.ag which acts as a decentralised price aggregator. CyberFM distributed the $CYFM payouts for October this week. Total payout as of 1st Nov is USD 266k+ in crypto. Say what!
Pynk’s LED back packs are a stroke of genius
OST’s Pepo was the 19th most popular dApp on State of the DApps last week. This week it climbed to the 16th position. Upcoming features on Pepo include video replies, threads and debates. Stay tuned! OST crew was at the Web3 UX Unconference in Toronto to talk all things UX. Next week they will be at ETHWaterloo to present and judge the UX award there. SelfKey’s $KEY token got listed on Hong Kong’s Lukki exchange. Like Hydro, the SelfKey team also attended the Web Summit in Lisbon for networking. If you were there, hope you said Hi. Ever wondered how Distributed Identity keeps your information private and safe when blockchains are supposed to be public? Click here to find out how SelfKey does this. More insight was shared into the Chainlink partnership this week by Constellation CEO Ben Jorgensen. The team attended the Air Force Space Pitch Day where it was selected to pitch the platform to attendees. Go get’em! How and why does Constellation do things? Check out the Constellation Principles. The October update for Yazom covers news such as alpha build of the app nearing completion, ongoing deal negotiation with clients etc.

And with that, we close for this week in Parachuteverse. See you again soon. Ciao!
submitted by abhijoysarkar to ParachuteToken [link] [comments]

04-03 12:33 - 'Paul Le Roux' (self.Bitcoin) by /u/financeoptimum removed from /r/Bitcoin within 191-201min

'''
Paul Le Roux is a fascinating character, whose story entails drugs, gold, arms dealing, North Koreans, Iranians, elite-level encryption, Somali pirates, women...and more women.
Let's get into it...
Part 1/5 - The Early Years
Paul Le Roux was born on Christmas Eve, 1972, in Bulawayo, the second-largest city in what was then called—by the white minority that governed it, at least— Rhodesia.
In 1980, Robert Mugabe became prime minister of what would now be called Zimbabwe, ending minority white rule in the country.
Four years later, when Le Roux was 12, the family relocated to South Africa.
Not long after the move, in exchange for washing his father’s car, Le Roux was given his first computer. After that, a relation of Le Roux states that he became "completely anti-social.”
When Le Roux was 15 or 16, in the late 1980s, the local police raided the family home and arrested Paul for selling pornography. After that, Le Roux turned even more inward.
Although he was an excellent student, he despised the idea of learning Afrikaans, which was compulsory in South African schools, describing it as "a dead language" that he "didn't want to learn."
At 16, he dropped out of high school and decided to follow his interest in computers, taking a local programming course.
Family lore has it that after he spent one class explaining some technical fact to the teacher, he got a letter saying he no longer needed to attend. He then completed a year’s worth of material in eight weeks!
Accounts of Le Roux do indicate that he was exceptionally gifted, and people who worked with him described him as a genius.
After returning from a family holiday to Disneyland in the US, 17-year-old Le Roux decided to leave South Africa, and departed for the UK eight months later to work as a programmer.
He then moved from the UK to the US, where he lived in Virginia Beach.
After six months in the US, he followed his then-girlfriend Michelle to Australia in 1995. The couple married and Le Roux acquired Australian citizenship.
Le Roux frequented message boards and enjoyed trolling Australians. A typical post read:
"All of Australia could disappear into the Pacific and the only difference it would make to the World is the Americans would have one less pussy country to protect."
His posts caused outrage on the board - someone even changed their handle to fuck @ you.paul
Le Roux would later declare that his correspondents had fallen for his ploy:
"Australians are east to provoke and your postings (including 2 death threats, numerous flames, and one guy who swears he has my address & phone number) have provided me with hours of amusement."
Of course, Le Roux did more than just troll Australian message boards in this period...
Le Roux had started building E4M - Encryption for the Masses - in 1997, releasing it at the end of 1998.
Part 2/5 - The Turning Point
E4M allowed users to encrypt entire hard drives, and to conceal the existence of encrypted files (such that prying eyes wouldn't even know they were there).
According to Le Roux, the software was written from scratch, with thousands of hours going into its development and testing.
As well as this, in the [Politics section of the E4M website]1 , Le Roux published a sort of Manifesto, describing how "governments are increasingly relying on electronic data gathering" and how "Strong Encryption is the mechanism with which to combat these intrusions, preserve your rights, and guarantee your freedoms into the information age and beyond."
In the spirit of the open-source software movement in the late 90s, Le Roux released E4M for free and made the code available for other people to improve.
Therefore, with no income from his two years of labor, he was struggling financially. His marriage fell apart violently and the couple got divorced in 1999.
Le Roux first relocated to Hong Kong, then to Rotterdam in the Netherlands. He married a Dutch citizen named Lilian, and they had a child shortly after.
In 2000, in order to monetize E4M, Le Roux launched [SW Professionals]2 in 2000.
Based in South Africa, the company offered offshore programming, including E4M customization.
One of Le Roux's clients was an Italian telecoms engineer called Wilfried Hafner, who had corresponded with Le Roux for several years about E4M.
Hafner had founded a company to create a commercial encryption product that would combine some of the elements of E4M with another piece of software, Scramdisk. The new company would be called SecurStar, and its product would be called DriveCrypt.
Hafner hired Le Roux to build DriveCrypt's underlying engine.
At the time, Le Roux was desperate for money - he drove a beat up car and worked out of a Rotterdam apartment small enough that, on the phone, Hafner could often hear a baby crying in the background.
Hafner on the other hand was living in the South of France, and Le Roux openly coveted the kind of success that he imagined led to such a home. He told Hafner: "I am ambitious, I want to have all this."
However, in the middle of the development work for DriveCrypt, Hafner discovered that Le Roux was still working on E4M and had incorporated some of his work for SecurStar into his personal project. As a result, Hafner terminated Le Roux's contract.
By October 2002, SW Professionals was now defunct and Le Roux was openly soliciting for work on the alt.security.scramdisk forum.
It was around this time that Le Roux received some news that "shattered his whole world."
In 2002, he travelled to Zimbabwe to retrieve a copy of his birth certificate.
On the trip, his aunt and uncle pulled him aside to tell him the truth, and it was then that Le Roux found out he was adopted.
Although many family members had known for years, Le Roux’s parents had elected to keep him in the dark about it.
It was the "unknown" part that hurt him the most.
Shortly after, Le Roux appeared on an another set of message boards - he seemed to be launching some kind of moneymaking scheme that required opening a company based in the U.S.
In 2004, a group of anonymous developers did exactly what Hafner had feared: they released a new and powerful, free file-encryption program, called TrueCrypt, built on the code for E4M.
TrueCrypt combined security and convenience, giving users the ability to strongly encrypt files or entire disk drives while continuing to work with those files as they would a regular file on their computer.
Hafner and his SecurStar colleagues suspected that Le Roux was part of the TrueCrypt collective but couldn't prove it.
As we'll explore in Part 5, TrueCrypt is an interesting part of this story...
Part 3/5 - Money and Power
After Le Roux's departure from the encryption world, at least under his own name, he entered the Internet-pharmacy business.
What Le Roux did next was combine two of America's favourite past times, popping pills and online shopping, and the results were sensational. He turned over around $300MM in 4 years.
In 2007, Le Roux moved his family to Manila, where he would base his operations. He also had call centres in Israel. This was a brilliant move by Le Roux, as the authorities were not looking at Tel Aviv and Jerusalem as hot-spots for a large-scale organised crime operation...
Le Roux was moving serious volume during this time - his operation was once one of FedEx's largest customers.
A relative of Le Roux pointed to 2008 or 2009 as the point at which Le Roux snapped.
"I think the money got to him. I personally saw $100 million in his office in Makati. Cash, bud. It was fucking ridiculous. It was in wicker baskets lined up on the side of the wall in his office."
Le Roux's appetite only grew, and not just in the literal sense (he was known as the "Fat Man" in the Philippines): he wanted to be a different kind of businessman, a lord of the real underworld, not just the virtual one.
An Israeli associate of Le Roux tells how "Le Roux wanted to make more money, fast. Le Roux wanted to diversify, to be bigger. The only way to do that was illegal. He was living inside a movie, you could almost say."
As well as this, Le Roux was notorious for his sexual exploits - he once wrote to his cousin, "15-20 a week, sometimes 3 per night."
A former call centre employee tells how Le Roux approached him with an assignment, which at first he thought was collecting women for Le Roux to open a bar. However, that was not the reason, as Le Roux explained:
"I'm going to impregnate them, and build an army of kids."
Le Roux asked him to make a spreadsheet to track the women: their names, dress size, age, medical checkups. The operation was given top priority by Le Roux, who even sent his emissary to China to try to find women there.
It is rumoured that Le Roux has at least 11 children to 7 different women!
Le Roux's businesses expanded into logging, precious metals mining, gold smuggling, land deals, cocaine shipping, and arms dealing. These activities were spread across dozens of shell companies registered all over the world.
Of course, he needed to launder the money. Le Roux used paid muscle in Hong Kong to swap cash for gold bars, and then proceeded to stash the gold in warehouses in Hong Kong (this totalled around $50MM).
Speaking of paid muscle, Le Roux had plenty: ex-soldiers and mercenaries made sure any problems were dealt with force if necessary.
Le Roux was closest to ex-British soldier Dave Smith, who would act as the leader of the mercenaries and allow Le Roux to insulate himself and not have to deal with people. In fact, Le Roux once told Smith "I live vicariously through you."
However, things took a turn for the worse, at least from Dave Smith's perspective, as Smith stole $5MM worth of Gold from Le Roux.
Le Roux was furious. He then summoned Smith to his place in the country, and asked him to dig a hole as they needed to stash some gold. However, when he arrived, he was greeted by a South African hit-man. After the hit-man had finished shooting Smith, Le Roux then grabbed the gun and fired into Smith's corpse.
Le Roux then set about building an arms base in Somalia.
To achieve this, Le Roux called upon an ex-soldier from Europe, code-named 'Jack' to work for him on the ground in Somalia.
At sea, Jack had to bribe Somali pirates.
It was actually this activity in Somalia that landed Le Roux on the radar of the DEA, as he popped up in a UN Report on security in Somalia.
The DEA were now on his tail. Of course, his encryption skills came in handy - Le Roux's thick layers of encryption meant that the DEA needed someone on the inside...
Part 4/5 - "Well played gentlemen, well played"
Le Roux was getting more and more paranoid about people in his organisation stealing from him. Without justification, he suspected that his self proclaimed 'Golden Boy' Jack was stealing from him - so he ordered a hit on Jack.
This was a huge mistake on Le Roux's part, as Jack then called a CIA hotline and went on the run. It was 18 months later that a DEA investigating Le Roux found Jack's message to the CIA. The DEA agent then called Jack. Scared for his life, Jack agreed to turn informant.
In the meantime, Le Roux then had a change of heart and apologised to Jack for ordering the hit on him. The DEA then asked Le Roux to go back to work for Le Roux - they now had someone on the inside.
To tempt Le Roux, the DEA devised a sting operation. They knew that Le Roux wanted novelty and excitement. So they fabricated the scenario that Jack had made contact with a high profile Colombian trafficker, and the Colombians wanted to bypass the Mexicans for their meth supply in the US.
Le Roux was hooked. However, the DEA needed to lure Le Roux out of Manila, as his network of corrupt officials would ensure he will never be arrested.
Jack needed to get Le Roux to Liberia (where the DEA had a trusted ally in Fombah Sirleaf, Head of Liberia's National Security Agency).
Jack achieved this by saying that they needed to meet a cartel representative to finalise the deal.
It worked, and Le Roux was arrested. Initially, Le Roux went into passive resistance - he was a big unit (hence the nickname "Fat Man") - and it took around 10 agents to get him on the plane to fly back to the US.
Well he settled on the plane, the first thing Le Roux said to the DEA agents was: "Well played gentlemen, well played."
He then said: "If you're looking at me, then clearly you're looking at bigger things..."
The DEA agents were intrigued: "No Paul, you're the prize - what could possibly be bigger than you?"
Le Roux responded: "Nation states gentlemen, nation states."
He then started to spew out extremely valuable information on North Korea and Iran.
Of course, this wasn't the only leverage Le Roux had...
The enforcers who were once on Le Roux's payroll needed to be held accountable for their numerous murders, and the DEA were desperate to get them behind bars. Le Roux was key in their eventual capture. But that's not all: a crucial piece to this story is Part 5...
Part 5/5 - TrueCrypt
As we discussed previously, Le Roux was rumoured to be a member of the TrueCrypt collective.
In November 2012, a man with the online handle Cincinnatus decided to throw a party in Hawaii. The idea arose out of an email exchange with Runa Sandvik, a developer and expert on the online software Tor, which allows its users to mask the physical location of their computers on the Internet.
After she gave a Tor tutorial on Reddit, Cincinnatus sent Sandvik an encrypted message. Cincinnatus told Sandvik that he lived in Hawaii. Sandvik mentioned that she would be there on vacation the following month and could give a talk on Tor.
Cincinnatus suggested they host a “cryptoparty,” a phenomenon that had arisen around that time among technology- and privacy-conscious activists. The date was set for December 11.
Unbeknownst to Sandvik, her fellow party planner was hatching a much more elaborate education scheme. Four days after he contacted Sandvik, Cincinnatus sent an email to the journalist Glenn Greenwald. “The security of people’s communications is very important to me,” he wrote. In a series of emails, he suggested that Greenwald set up an encrypted means by which sources could contact him.
Cincinnatus organized the cryptoparty at a hacker space called HiCapacity, located in the back of a furniture store in Honolulu.
When Sandvik arrived around 6 p.m., Cincinnatus introduced himself as Ed and told her that he worked at the computer-hardware company Dell.
Ed kicked off the evening by welcoming the attendees, then invited Sandvik to give her presentation on Tor. When she was finished, Ed pulled out his laptop, plugged it into the projector, and began his own instructional talk about TrueCrypt. In Ed’s presentation, Sandvik later wrote, he “pointed out that while the only known name associated with TrueCrypt is someone in the Czech Republic, TrueCrypt is one of the best open-source solutions available.”
Six months later, in June 2013, Greenwald and filmmaker Laura Poitras published the first of a series of articles that grew out of their contact with Cincinnatus.
In time they revealed that his full name was Edward Snowden, that he had worked in various capacities at the National Security Agency, and that he had downloaded and handed over a trove of documents from the NSA in an effort to blow the whistle on what he believed were egregious privacy encroachments by the U.S. government.
Among them was a document revealing that TrueCrypt was one of a small number of encryption programs that had withstood the NSA’s efforts to crack it.
What Snowden and the rest of the world wouldn’t know for another two years was that Paul Le Roux, the man whose code formed the foundation of True Crypt, was at that very moment in the custody of the U.S. government. Le Roux was in a bind, facing the full force of a U.S. federal prosecution for any number of his extraordinary array of crimes. The only way out was to spill his secrets...
[[link]4
'''
Paul Le Roux
Go1dfish undelete link
unreddit undelete link
Author: financeoptimum
1: e4m.net/**l*ht*l 2: e4m*net* 3: www.yout*be.co*/watc**v=z**aMoJ**k* 4: www.youtube.com/watc*?v*z*Za*o***kc**^*
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

Fatum, vol. 1 [Chapters 6 - 8]

Chapter 0, Chapter 1, Chapters 2,3, Chapter 4 - 5.4
Chapter 6
One of the main reasons suicide is so upsetting for people is because of finances. Dying is really quite expensive from burials to funerals, to receptions; then there are the accessories that come with death: having your corpse beautified, the nice wooden bed they make to lower your body into the ground, and the cute stone head that has your date of birth, date of death, and name on it. And someone has to get paid decently for these things, as dealing with dead bodies can be troublesome for a lot of people. So these expenses add up, and when you kill yourself you tack on a slew of unexpected debts that someone will have to pay for, it just won’t be you. He chose to treat his death a little differently.
At her workstation, Bell has a distinct coldness in her voice. She swivels around in her chair absent-mindedly, half- heartedly hoping that somehow an Earthly force would relieve her of these arbitrary responsibilities. She begins to space out, as So Many Details by Toro Y Moi blasts off of her Alexa. Revisiting her past life before meeting Him, she remembers always being curious about exploring the world and getting to learn more about how the human mind worked in a collective form. Their first meeting was one where she found herself unable to reign in her curiosity. Even during His prepubescent years, He was clearly the master of His own universe, figuratively, and she picked up on this immediately. They spent the entire night, until their bedtimes at least, getting to know one another. Finding and appreciating both similarities and differences right off the bat probably had a lot to do with the relationship they shared.
But Bell’s existence was also necessary. Although she is blissfully unaware, her companionship with Him is what sparked His deep dive into answers for reasons of existence. She holds herself morally and emotionally liable for His suicide, consistently flashing back to the last words she said to him while he was alive:
““You never loved me, if you do this, you could have never loved me.””
Thinking aloud, startled by the sound of emotion in her own voice,
“So stupid. I’m so stupid. He tells me this is His last day on Earth and I immediately tried to emotionally blackmail him. He really prepared all of us for His departure, but I was never ready to let Him go. I still am not ready, but I know He loved me and I loved Him so I will follow His final instructions. Alexa, activate Protocol Stardust.”
“Searching... Protocol Stardust located. My condolences, Bell.”
“Thanks Alexa but He recommended I turn down condolences. He never wanted people to be sad over His death...”
“Protocol Stardust... 10% Loaded.”
“I just really can’t believe it’s actually happening. I would make a bad habit of indulging with Him in His laughter when we talked about it.”
“Protocol Stardust... 30% Loaded.”
“I mean, who thinks like that? Who even jokes like that? To have your body cremated is one thing, but then to have your ashes spread out into space?”
“Protocol Stardust... 50% Loaded.”
“And then the Bastard went and accommodated Himself. Every time someone would mention the implausibility of His plan He was so calmly confident He would be able to achieve it before His last day.”
“Protocol Stardust... 70% Loaded.”
“Of course He succeeded. All of our fates were sealed when He talked his mom into getting him his first Raspberry Pi. He cashed out in cryptocurrency and had been living on His own time ever since, like some character out of a movie.”
“Protocol Stardust... 99% Loaded.”
“I miss you so much.”
“Protocol Stardust Ready to Execute. Please Provide Final Voice Confirmation.”
The glass finish on her iPhone X felt impossibly smooth in her palm. She chuckled to herself slightly, thinking back to when the iPhone X was first announced and how He had lost His cool that Apple stole the aesthetic from his niche YouTube channel to market the new phone. She knew no one would believe Him, but she genuinely did. She was right to, because maybe they did, but now it seemed like an even greater injustice against His reality that she didn’t fight harder. It wouldn’t have been what He wanted anyway. She positions her phone's camera to catch enough of her facial profile to utilize Face ID. Gently tapping the screen with her thumb, as if to nudge the device awake, the screen glows bright yellow with the custom parallax wallpaper He had designed for her. The text was placed perfect center, reading out ‘“DEATH IS ARTIFICIAL”, with a 1 px fill line striking through the circle of letters, highlighting a hidden message: ‘”DEATH IS ART’”.
Chapter 7
“I can’t believe this shit.”
“Honey, relax. You know He’ll make you whole.”
“Please don’t refer to Him and holes in the same sentence.”
“You're being immature. I know it’s still touchy.”
“I really didn’t think it would bother me as much as it does. I love Him but He takes it too far.”
Blood recirculating into his wrists, Ohsa rubs them gently with his index and middle fingers to soothe himself, because of both the grueling discomfort he had just endured and because of his own doubts if his Friend would be okay.
“Thank goodness you reminded me we were out of pesto sauce. Who knows what would’ve happened if He saw me.”
“What’s that supposed to mean?”
“It means he could’ve tied both of us up and left us here.”
“Oh.”
“This is the last time I go through this: I was down with the orgy but as soon as He got close to me my senses were completely overwhelmed. His words felt like silk flowing into my ears, and the way He smelled – my God His smell,”
“...You said you had felt like you had become a different person.”
Catching herself she resumes, “Yes but no. Now that I think about it, it wasn’t that I was a different person. I was still me, completely me, rolling me, but He was just purely irresistible in that moment. Whoever slept with Him, though, was not the woman that loves you.”
“How do I know you’re not lying?”
“Because I’m trying to communicate with you about it, as opposed to shifting blame. Listen honey, He fucked the shit out of me in the middle of an orgy of people. I can’t stand here and pretend like it didn’t happen or I didn’t enjoy it or I had been so drugged up I didn’t know what I was doing. But when it happened it did, and I was there.”
“What the fuck. I can’t think about this right now. What the hell happened out there? I felt two separate explosions while I was tied up.”
“He destroyed the elevator shaft and the entire left side of the hallway, including part of the door to the stairway. My Twitter Moments feed is saying at least 4 SWAT officers are reported to be in critical condition.”
“What is He thinking?! How is killing cops supposed to help His cool down??”
“Don’t you think He’s been acting a little too wild lately?”
“I’ve seen Him comeback from worse, honestly.”
“Worse than a killing spree?”
“No, I meant drug-wise.”
“Was He high when you saw him?”
“He was definitely on the comedown. I don’t think He was actively stoned but he wasn’t entirely sober, either.”
“Well, regardless he was clear-headed enough to stay ahead of the cops.”
“Cops are fucking idiots.”
Chapter 8
We never know what the future is until we get there. We like to imagine it as augmented reality everywhere, digital on top of reality, seamlessly intertwined together, persisting without being invasive. The truth is, the future is now. All time, past, present, and future, all exist tangentially and concurrently to each other. The 2008 American Recession hit Bell’s parents where it mattered the most: Their bank accounts. It hit at the least opportune time, right as they were preparing to make a class transition from poverty-level to lower middle class. Not only was their savings obliterated, but their morale too. Maybe this spiritual blow was exactly what she needed, maybe it was another unnecessary inconvenience that came with simply trying to exist as a human, but earlier that year she had her first meeting with Him.
Even as children, Him and Bell always had a special connection. Everyone around them could see as clear as day, that these two were in love, even before they knew it for themselves. Almost a year ago to the day, He had made a discovery. Bitcoin was going to crash, and it was going to crash hard. It was clearly being inflated by whales who were egging on spectators but He correctly assumed that the dramatic rise had gotten way too out of hand for anyone to control. Come end of November under the guise of Christmas spirit he traded all of his leftover Team Fortress 2 hats, convincing other players to complete trades in crypto, tricking those who were ignorant to the true value of BTC. He had already amassed a sizeable enough wallet during His early mining days but that extra week of trading is what took him from safety to comfort.
In literally the exact moment the BTC exchange rate was estimated at $20,500 for one coin, he cashed in his entire wallet of 14,634.14163414 Bitcoin, becoming a multi-millionaire overnight, having earned a net worth just shy of $300 Million USD. He excitedly made his first phone call of the night reaching out to Bell.
“Hey Siri, call Bell.”
“Calling Bell – Mobile”
“Hey, what’s up?”
“Not too much. What’s up with you?”
“Oh nothing, just getting ready for bed. I have work early in the afternoon tomorrow but I want to try to get to the gym in the morning. The only way I won’t be exhausted is if I go to sleep now.”
“Yeah, that's cool. Hypothetically, yeah, if your time wasn’t filled up with working a menial job, what would you do?”
“Honestly I’d love to finish getting my Graduate’s degree, maybe go back to China. I loved my time in Undergrad but it was so tough that I really needed a break. It’s just been so jarring to me how difficult it’s been to get back into academia now that I’m in the real world, you know?”
“OK.”
“What’s up with you? Got some exciting plans for the night? You always have crazy shenanigans under your belt.”
“I swear it just happens to me by accident, but yeah. I’m planning on blowing someone’s mind tonight.”
“Ooh lucky them! What’re you gonna do? A surprise visit? Or buy them a gift? Or is it a secret?”
“It won’t be a secret much longer, I just wanted you to know first.”
“Know what first?”
“I’m filthy rich Bell.”
“What?”
“I’m sitting on a few hundred million dollars.”
“WHAT?”
“What country are you from?”
“What?”
Getting comfortable with his Samuel L. Jackson impersonation, he raises his tone: “’What’ ain’t no country I ever heard of! They speak English in ‘What’?!”
Familiar with the reference but still reeling from the news, Bell plays right into his prank.
“...What?”
“English motherfucker! Do you speak it?!”
“Yes!”
“Then you know what I’m saying?”
“Yes!”
Getting as far as he needed to with the joke, he lets out a boisterous hearty laugh and continues the conversation, back to his usual austere speaking voice.
“Relax, love. Quit your job. Enroll in any school you want. Find a new apartment. Order a mani-pedi to a five star hotel, and then stand up your appointment to go to the casino. Your old life is over.”
Thumb to screen, end call. Before the Phone app can finish spelling out “call ended”, he quickly double taps the home button, finding his Messages app open right behind Notes and Voice Memos. A single text to Bell goes out; to let her know that this is the difference, this is what separates the wheat from the chaff, to let her know that she is now wheat and no longer chaff:
“Painted ultrapure white walls triple coated, a high ceiling, in-wall light fixtures, foliage incorporated into the architecture, soft-close furnishings, and lastly location, location, location.”
Bell takes a moment to read the text. Her mind still, but her heart beating faster, the news truly settling in for the first time. She begins to sob uncontrollably.
submitted by viliscane to libraryofshadows [link] [comments]

Instructions Not Included (2013) - Featurette - YouTube Instructions Not Included Official Trailer - Foreign Film ... Instructions Not Included (2013) Full Movie - YouTube Instructions Not Included (2013) - Different Families ... Instructions Not Included (2013) - You're the Father Scene ...

Do NOT copy and paste it from here. Follow the instructions to send us files or messages. You will get a unique code name when you first use the site. This is your login for SecureDrop. Memorize this code name or save it in a secure place. Do not share this code name with others. You can then submit information and send us messages. Use your ... limit my search to r/Bitcoin. use the following search parameters to narrow your results: subreddit:subreddit find submissions in "subreddit" author:username find submissions by "username" site:example.com find submissions from "example.com" url:text search for "text" in url selftext:text search for "text" in self post contents self:yes (or self:no) include (or exclude) self posts nsfw:yes (or ... If you do not care to learn anymore, then do not buy bitcoin – not until you are ready to be responsible for it. When you downloaded a Bitcoin wallet, selected ‘create a new wallet’, and received your mnemonic phrase, you did not just create a new account for your bitcoin like you would at your local bank for your dollars. In fact, the name “wallet” is misleading because it doesn’t ... There's not a precise time when the transaction will disappear from the network, it could be days or up to a week. This is why it's always recommended to set a transaction fee. The wallet that you sent it to cannot spend it because it's not confirmed. So you have to wait until it disappears from the network and send an entirely new transaction. Crypto.com is the pioneering payment and cryptocurrency platform. Through Crypto.com, you can buy crypto at true cost and buy 55+ cryptocurrency such as bitcoin (BTC), ethereum (ETH), Ripple (XRP) and Litecoin (LTC) with credit card through our mobile app. The MCO VISA Card allows you to spend anywhere at perfect interbank exchange rates with crypto cashback.

[index] [38700] [47396] [25951] [46567] [39388] [51258] [7041] [29683] [42465] [27845]

Instructions Not Included (2013) - Featurette - YouTube

a scene from the 2013 movie Instructions not Included (No se acceptan devoluciones) SUBSCRIBE: http://bit.ly/18mkpmJ About FandangoMovies: Fandango is your #1 destination to buy movie tickets in advance, find movie times, read reviews and mo... This is a hilarious reaction to the ending of the movie instructions not included! It will make your day so much better! Hahaha Instructions Not Included movie clips: http://j.mp/2lNloLM BUY THE MOVIE: http://bit.ly/2mKEdgu Don't miss the HOTTEST NEW TRAILERS: http://bit.ly/1u2y6pr CL... Subscribe Movie Clips Channel to watch more Clips: http://bit.ly/19FJ0Wt

#