Cyborg | Designer-Babies | Futurism | Futurist | Immortality | Longevity | Nanotechnology | Post-Human | Singularity | Transhuman



9 11 Bush NWO Illuminati Cabal Pentagon Missile Strike
This video is reportedly from a hotel security camera. Supposedly, it was confiscated by the FBI and later returned, after litigation. Immediately after 9 11 many agency field agents were…

By: DArtagnan2013

Read more here:
9 11 Bush NWO Illuminati Cabal Pentagon Missile Strike – Video

Embattled Comcast has another complaint about customer service to add to its growing list. The cable and Internet provider has been telling customers that their service will be terminated if they dont stop using the Tor web browser. According to a report by Deep.Dot.Web, multiple accounts of Comcast customer service crossing into monitoring customer activity online have been reported to them.

Comcast agents have reportedly contacted customers who use Tor, a web browser that is designed to protect the users privacy while online, and said their service can get terminated if they dont stop using Tor. According to Deep.Dot.Web, one of those calls included a Comcast customer service agent named Jeremy, who allegedly described Tor as an illegal service. The use of Tor was then described as against Comcast usage policy.

According to the Comcast customers account, the customer service agent repeatedly asked the customer what sites he was accessing on the Tor browser. During a follow-up call the next day, another Comcast customer service agent said again that Comcast doesnt want customers to use Tor.

An account by the customer of their conversation with the Comcast representative as told to Deep.Dot.Web, alleges that Comcast has a very specific bias against Tor:

Users who try to use anonymity, or cover themselves up on the Internet, are usually doing things that arent so-to-speak legal. We have the right to terminate, fine, or suspend your account at anytime due to you violating the rules.

A Comcast statement said they would never monitor a customers Internet usage without a proper warrant from a court. They used an opaque process recently, though, when they cooperated with the FBI to provide information on alleged Silk Road operator Ross Ulbrichts Internet use. He was arrested in San Francisco last October.

With the approach of Ulbrichts trial, questions over how his Icelandic data center server was located have been raised by the defense. The computer was hidden by the anonymous software of Tor. According to Wired, the FBI has said in a new filing on the case that they found the location of the server by playing around with the Silk Road login page to find its location.

The FBI has made a point of dismissing any privacy concerned raised by Ulbrichts defense. Among those concerns are a Fourth Amendment violation because of illegal searches and a warrantless search of the Silk Road server. Lawyers for Ulbricht have argued that privacy violations could undermine the governments case by rendering evidence inadmissible.

See the original post here:
Comcast Tells Customers to Stop Using Tor Browser

The U.S. Department of Justice is current prosecuting Ross Ulbricht for being the apparent mastermind of the illegal narcotics website Silk Road, which was run for years on a hidden website. In defending the prosecution, the U.S. Attorneys Office recently filed a very interesting brief explaining how investigators found the computer server that was hosting the Silk Road (SR) server. Although the brief is about the Fourth Amendment, it has very interesting implications for the Computer Fraud and Abuse Act, the federal computer hacking statute.

The brief explains how the FBI found the SR server:

The Internet protocol (IP) address of the SR Server (the Subject IP Address) was leaking from the site due to an apparent misconfiguration of the user login interface by the site administrator i.e., Ulbricht. FBI agents noticed the leak upon reviewing the data sent back by the Silk Road website when they logged on or attempted to log on as users of the site. A close examination of the headers in this data revealed a certain IP address not associated with the Tor network (the Subject IP Address as the source of some of the data). FBI personnel entered the Subject IP Address directly into an ordinary (non-Tor) web browser, and it brought up a screen associated with the Silk Road login interface, confirming that the IP address belonged to the SR Server.

The FBIs declaration explains that the investigating agent entered miscellaneous information into the login prompt of the Silk Road server and received an error message. A forensic analysis of the error message found that it contained an IP address not associated with Tor. That IP address was the address of the Silk Road server.

The DOJ brief argues that there was nothing unconstitutional or otherwise unlawful about obtaining the inadvertently leaked IP address from the Silk Road server:

There was nothing unconstitutional or otherwise unlawful in the FBIs detection of that leak. The Silk Road website, including its user login interface, was fully accessible to the public, and the FBI was entitled to access it as well. See United States v. Meregildo, 883 F. Supp. 2d 523, 525 (S.D.N.Y. 2012) (noting that web content accessible to the public is not protected by the Fourth Amendment and can be viewed by law enforcement agents without a warrant). The FBI was equally entitled to review the headers of the communications the Silk Road website sent back when the FBI interacted with the user login interface, which is how the Subject IP Address was found.

It does not matter that Ulbricht intended to conceal the IP address of the SR Server from public view. He failed to do so competently, and as a result the IP address was transmitted to another party which turned out to be the FBI who could lawfully take notice of it. See United States v. Borowy, 595 F.3d 1045, 1048 (9th Cir. 2010) (finding that defendant had no legitimate privacy interest in child pornography files posted on peer-sharing website, notwithstanding that defendant had made ineffectual effort to use site feature that would have prevented his files from being shared); United States v. Post , __ F. Supp. 2d __, 2014 WL 345992, at *2-*3 (S.D. Tex. Jan. 30, 2014) (finding that defendant had no legitimate privacy interest in metadata used to identify him that was embedded in file he had posted on Tor website, notwithstanding that he did not realize he was releasing that information and he intended to remain anonymous).

In short, the FBIs location of the SR Server was lawful, and nothing about the way it was accomplished taints any evidence subsequently recovered in the Governments investigation.

I wonder: Does DOJs position that there is nothing . . . unlawful about this procedure mean that DOJ concedes that it would not violate the Computer Fraud and Abuse Act, 18 U.S.C. 1030, the federal computer hacking statute?

The FBIs location of the SR server brings to mind the prosecution of my former client Andrew Auernheimer, aka weev, who readers may recall was criminally prosecuted for his role in visiting website addresses on an AT&T server that AT&T had thought and hoped would not be found by the public. Auernheimers co-conspirator found that AT&T had posted e-mail addresses on its server at IP addresses that the public was not expected to find.

Read this article:
Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA?

Summary: These so-called “trusted third-parties” may be the most important tech companies you’ve never heard of. ZDNet reveals how these companies work as middlemen or “brokers” of customer data between ISPs and phone companies, and the U.S. government.

NEW YORK Picture two federal agents knocking at your door, ready to serve you a top secret order from the U.S. government, demanding that you hand over every shred of data you own from usernames and passwords, phone records, emails, and social networking and credit card data.

You can’t tell anyone, and your only viable option is to comply.

For some U.S. Internet service providers (ISP) and phone companies, this scenario happens and often. Just one ISP hit by a broad-ranging warrant has the potential to affect the privacy of millions of Americans.

But when one Atlanta, Georgia-based Internet provider was served a top-secret data request, there wasn’t a suited-and-booted federal agent in sight.

Why? Because the order was served on a so-called “trusted third-party,” which handles the request, served fresh from the secretive Washington D.C.-based Foreign Intelligence Surveillance (FISA) Court. With permission from their ISP customers, these third-parties discreetly wiretap their networks at the behest of law enforcement agencies, like the Federal Bureau of Investigation (FBI), and even intelligence agencies like the National Security Agency (NSA).

By implementing these government data requests with precision and accuracy, trusted third-parties like Neustar, Subsentio, and Yaana can turn reasonable profits for their services.

Little is known about these types of companies, which act as outsourced data brokers between small and major U.S. ISPs and phone companies, and the federal government. Under the 1994 law, the Communications Assistance for Law Enforcement Act (CALEA), any company considered a “communications provider” has to allow government agencies access when a valid court order is served. No matter how big or small, even companies whose legal and financial resources are limited do not escape federal wiretapping laws.

On a typical day, these trusted third-parties can handle anything from subpoenas to search warrants and court orders, demanding the transfer of a person’s data to law enforcement. They are also cleared to work with classified and highly secretive FISA warrants. A single FISA order can be wide enough to force a company to turn over its entire store of customer data.

For Cbeyond, a Nasdaq stock exchange-listed ISP based in Atlanta, Georgia, data requests can be put almost entirely out of mind. The company generates more than $450 million in revenue each year and serves more than 50,000 business customers primarily small to medium-sized companies in more than a dozen U.S. states.

The rest is here:
Meet the shadowy tech brokers that deliver your data to the NSA

Sept. 2 (Bloomberg) — Gen. Keith Alexander (Ret.), former director of the NSA, comments on the escalating situation in Ukraine. He speaks with Trish Regan on “Street Smart.” (Source: Bloomberg)

Hackers who stole gigabytes of data from JPMorgan Chase & Co. may have been trying to send a message that U.S. financial institutions can be disrupted, the former director of the National Security Agency said.

The FBI is investigating the cyberattack on JPMorgan and whether other banks were penetrated in retaliation for U.S.- backed sanctions on Russia, according to people familiar with the investigation who asked not to be identified because the probe is still underway.

Graphic: Data Breaches in the U.S.

Keith Alexander, the NSA director from 2005 until last March, said he had no direct knowledge of the attack though it could have been backed by the Russian government in response to sanctions imposed by the U.S. and EU over the crisis in Ukraine.

Securing the Net

How would you shake the United States back? Attack a bank in cyberspace, said Alexander, a retired U.S. Army general who has started his own cybersecurity company to sell services to U.S. banks. If it was them, they just sent a real message: Youre vulnerable.

As NSA chief and head of the U.S. Cyber Command, Alexander tracked and tried to thwart international hackers, giving him knowledge of their tactics. He was head of the NSA in 2008 when the country of Georgia was invaded by Russia and experienced a series of disruptive cyberattacks believed to be the work of Russian hackers.

Keith Alexander, former director of the National Security Agency and former commander of U.S. Cyber Command, speaks during a Bloomberg Television interview in Washington, on June 3, 2014. Close

Keith Alexander, former director of the National Security Agency and former commander… Read More

See more here:
Former NSA Chief Says JPMorgan Hack May Be a Warning

A panel of federal judges voiced significant concerns Tuesday about the privacy implications of NSA surveillance tactics during a wide-ranging hearing on a legal challenge brought by the ACLU.

In an oral argument that was set for less than 30 minutes and lasted nearly two hours, three judges on a panel hearing the case at the Second U.S. Circuit Court of Appeals in Manhattan probed claims by the ACLU that the federal government’s collection of data relating to “every phone call made or received by residents of the United States” is illegal and unconstitutional.

The ACLU appeal challenged a lower courts decision to uphold the NSA’s mass bulk data collection of phone records.

Judges Gerard Lynch and Vernon Broderick were appointed by President Obama. Judge Robert Sack was appointed by President Clinton. At some point, each expressed significant concern about the privacy implications of allowing the federal government broad access to a wide range of information without any specific suspicion of wrongdoing.

Assistant Attorney General Stuart Delery first argued that federal courts do not have jurisdiction to review disputes regarding the NSA program. In addition, Delery argued the program is constitutional and has been repeatedly renewed by Congress.

Lynch asked how well briefed members of Congress were before voting, and questioned how much they understood about the program. At one point, Sack chimed in, “We don’t know what we don’t know”about NSA operations.

Lynch and Broderick both questioned why the government’s justification for the bulk phone data collection program would not also extend to bank records, credit card transactions and other personal data. Lynch asked if the government’s argument would not also entitle it to access “every American’s everything.”

Both sides acknowledged that President Obama has publicly stated that there are other ways to get the relevant intelligence, short of the sweeping NSA bulk data collection program that now exists.

That prompted Lynch to ask, if that was the case, why government attorneys were there to argue otherwise.

The panel also discussed the need for federal agencies such as the FBI and NSA to be able to move quickly when connecting dots on the intelligence landscape, acknowledging that having bulk data already at its disposal would speed the process.

See the rest here:
Judges raise privacy concerns about NSA tactics

As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images.

But DeFoggiconvicted today in Nebraska on three child porn charges including conspiracy to solicit and distribute child pornmust have believed his use of the Tor anonymizing network shielded him from federal investigators.

Hes the sixth suspect to make this mistake in Operation Torpedo, an FBI operation that targeted three Tor-based child porn sites and that used controversial methods to unmask anonymized users.

But DeFoggis conviction is perhaps more surprising than others owing to the fact that he worked at one time as the acting cybersecurity director of the U.S. Department of Health and Human Services. DeFoggi worked for the department from 2008 until January this year. A department official told Business Insider that DeFoggi worked in the office of the assistant secretary for administration as lead IT specialist but a government budget document for the department from this year (.pdf) identifies a Tim DeFoggi as head of OS IT security operations, reporting to the departments chief information security officer.

The porn sites hes accused of usingincluding one called PedoBookwere hosted on servers in Nebraska and run by Aaron McGrath, who has already been convicted for his role in the sites. The sites operated as Tor hidden servicessites that have special .onion URLs and that cannot normally be traced to the physical location where they are hosted.

Although anyone could use the sites, registered users like DeFoggiwho was known online under the user names fuckchrist and PTasseatercould set up profile pages with an avatar, often child porn images, and personal information and upload files. The site archived more than 100 videos and more than 17,000 child porn and child erotica images, many of them depicting infants and toddlers being sexually abused by adults.

The FBI seized the sites in late 2012, after McGrath failed to secure his administrative account with a password. Agents were able to log in and uncover the IP address of the Nebraska server where he was hosting two of them. McGrath worked at the server farm, and hosted the third site from his home. The FBI monitored him for a year and after arresting him in November 2012 continued to operate his child porn sites secretly from a federal facility in Omaha for several weeks before shutting them down. During this time, they monitored the private communications of DeFoggi and others and engaged in various investigative techniquesto defeat the anonymous browsing technology afford by the Tor network and identify the real IP addresses of users.

These techniques successfully revealed the true IP addresses of approximately 25 domestic users who accessed the sites (a small handful of domestic suspects were identified through other means, and numerous foreign-based suspect IPs were also identified), prosecutors wrote in a court document. In March 2013, twenty suspects were indicted in Nebraska; followed by two others who were indicted the following August.

One of these techniques involved drive-by downloads that infected the computers of anyone who visited McGraths web sites. The FBI has been using malicious downloads in this way since 2002, but focused on targeting users of Tor-based sites only in the last two years.

Tor is free software that lets users surf the web anonymously. Using the Tor browser, the traffic of users is encrypted and bounced through a network of computers hosted by volunteers around the world before it arrives at its destination, thus masking the IP address from which the visitor originates.

Follow this link:
Federal Cybersecurity Director Found Guilty on Child Porn Charges

The Senate report is called National Security Agency Surveillance Affecting Americans, and describes the results of its investigation into NSAs electronic surveillance practices and capabilities, especially involving American citizens, groups, and organizations.

Among its findings are:

Project MINARET, in which the NSA intercepted and disseminated international communications of U.S. citizens and groups whose names were supplied by other agencies and put on a watch list. Those listed were supposed to be linked to concerns about narcotics, domestic violence and antiwar activities.

It was part of an attempt to discover if there was a foreign influence on them, according to the Senate report. NSA personnel were instructed to keep the agencys name off any distributed reports in order to restrict the knowledge that NSA was collecting such information, the report said.

Operation SHAMROCK involved the collection of millions of international telegrams sent to, from or transiting the United States provided to NSA by the three major international telegraph companies. In some years NSA analysts reviewed 150,000 telegrams a month, according to the committee. What began at the end of World War II as an Army Signals Security Agency project to get access to foreign government messaging morphed into collecting calls from a watch list of Americans whose names were supplied by the Bureau of Narcotics and Dangerous Drugs.

The CIA, the FBI and others joined in. Over one four-year period when the list had 1,200 names the committee said NSA distributed approximately 2,000 reports [the texts or summaries of intercepted messages] to the various requesting agencies as the result of inclusion of American names on the watch lists.

Any of this sound familiar?

This was the 1976 report, one of 14 from the Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, chaired by then-Sen. Frank Church (D-Idaho). One direct result of the Church committees activities, which began as a probe into domestic CIA activities in the 1960s and 1970s, was the Foreign Intelligence Surveillance Act (FISA). President Jimmy Carter signed the bill into law in 1978.

That law, amended several times, has provided a legal foundation for NSAs operations. It also added judicial and congressional oversight of NSA with the establishment of the Foreign Intelligence Surveillance Court and the House and Senate intelligence committees. At the same time, it continued secrecy for operations necessary to carry out electronic surveillance to protect national security. It allowed intercepts abroad of foreign entities and individuals without a warrant when collecting foreign intelligence. When the target became a U.S. citizen or someone known to be in the United States, a warrant was required within 72 hours.

History does at times seem to repeat itself.

The rest is here:

This NSA history has a familiar ring to it

As a teenager growing up in Chicago in the 1970s, Rogers recalls watching news broadcasts with his family and being horrified by how the CIA, FBI and NSA had illegally spied on hundreds of thousands of Americans. Four decades later, and six weeks into his new job as director of the NSA, the agency is facing similar accusations: that it has used its vast and intrusive surveillance powers to …

See the original post here:

Post-Snowden, the NSA's future rests on Admiral Rogers' shoulders

Microsofts cooperation with the NSA and FBI on the controversial Prism program has been laid bare in a new book written by an American journalist who brought it to public attention in the first place.

Glenn Greenwald, the American journalist who worked extensively with Edward Snowden, wrote in a new book that Microsofts cloud services allowed the National Security Agency [NSA] to collect data from a range of its different cloud options.

“Beginning on 7 March 2013, Prism now collects Microsoft SkyDrive data as part of Prism’s standard Store Communications collection package for a tasked FISA Amendments Act Section 702 [FAA702] selector, stated a slide released by Greenwald, according to Cloud Pro.

It is detailed in Greenwalds new book, No Place to Hide: Edward Snowden, the NSA and the Surveillance State, and goes on to hint that Microsoft was implicit in the NSA data collecting process.

“This success is the result of the FBI working for many months with Microsoft to get this tasking and collection solution established,” the document stated.

Part of the reason that it was able to do this was down to the FISA Amendment Act of 2008 that legalized NSA Internet surveillance and allowed warrantless wiretapping by the NSA and related agencies.

“This means that analysts will no longer have to make a special request to SSO for this. This new capability will result in a much more complete and timely collection response from SSO for our enterprise customers,” the documents added.

Other sabotage methods employed by the NSA and outlined in Greenwalds book include the supply-chain interdiction, which meant intercepting various communications products in order to carry out covert surveillance. This included routers and servers made by Cisco and involved implanting beacons before the products were repackaged and shipped out to customers across the world.

“While American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organizations would have been well advised to beware of American-made ones,” Greenwald said.

Read more:

Microsoft openly offered cloud data to the NSA



Glenn Greenwald on the NSA and Hoover's FBI — political blackmail
Glenn Greenwald, at his Washington, DC presentation at Sixth and I on his new book No Place to Hide, responds to a question from former Congressman Neil Gallagher asked by Jason Ross, on the…

By: Jason Ross

Here is the original post:

Glenn Greenwald on the NSA and Hoover’s FBI — political blackmail – Video



Statue of Liberty: The Lost Symbol
DOWNLOAD:::::FREE GAME:::::http://depositfiles.com/files/b7xt36nv0*****You'll play the FBI special agent Susan Pierce. She's been sent to Liberty Island to clear up the unbelievable disappearance…

By: MusicDanGames

Read the original here:
Statue of Liberty: The Lost Symbol – Video



Statue of Liberty The Lost Symbol Micoids
http://losjuegosdelcaldero.creaforo.net Eres la agente especial del FBI Susan Pierce. Has sido enviado a la Isla Libertad para aclarar la increble desaparicin de la llama de la Estatua…

By: LosjuegosdelCaldero

See the article here:
Statue of Liberty The Lost Symbol Micoids – Video



Statue of Liberty — The Lost Symbol – Gameplay – PC/HD
(2014) Statue of Liberty — The Lost Symbol – Gameplay – PC/HD —- You'll play the FBI special agent Susan Pierce. She's been sent to Liberty Island to clear up the unbelievable disappearance…

By: FenixSANI

Go here to see the original:
Statue of Liberty — The Lost Symbol – Gameplay – PC/HD – Video



FBI Agents Harass Photographer: First Amendment Test
TUCSON, Ariz. (EMSN) – DESCRIPTION COMING SOON.

By: EMSNews Arizona

Originally posted here:
FBI Agents Harass Photographer: First Amendment Test – Video

WASHINGTON, May 7 (UPI) — The high-profile cases of Edward Snowden and Chelsea Manning have turned a microscope onto the U.S. intelligence community, launching a serious discussion on the balance of civil liberties in a post-9/11 world.

Secondary to Snowden and Manning’s revelations, but perhaps no less important, was the treatment of the whistleblowers themselves: Snowden lives exiled, and without a passport, in Russia, while Manning faces 35 years in federal prison. Both saw grievous abuses within the U.S. government that they felt must be revealed, and both paid for their consciences with their freedom.

Thomas Drake, a former NSA executive, was more fortunate. Drake witnessed what he said were privacy and Fourth Amendment violations, as well as a massive waste of funding on the Trailblazer project, which collected intelligence data off the Internet. He initially took his concerns to internal authorities, including the NSA Inspector General and the Defense Department Inspector General, then to the staff of the House Intelligence and Oversight Committees. He also passed his concerns on to a reporter at the Baltimore Sun, carefully avoiding divulging classified information.

In 2007, Drake’s home was raided by the FBI, in 2010, he was indicted by a grand jury and charged with illegally holding sensitive information, obstruction of justice and making a false statement. All along, he refused to plead guilty or help the government prosecute fellow whistleblowers.

The 10 charges filed against him under the Espionage Act were ultimately dropped, in exchange for a guilty plea on a misdemeanor count of misusing the NSA’s computer system.

Drake has since worked as a privacy activist, speaking out against the surveillance state. In an interview with UPI this week, he talked about what it takes to blow the whistle on the U.S. government and just how difficult it is to do.

(This interview has been edited and condensed for clarity.)

UPI: What would you have done differently?

Drake: I would not have spoken with the FBI at all. I was speaking to them to report high crimes and misdemeanors; I was expecting them to come to my house for quite some time. I would have hired an attorney sooner.

Even though I made a conscious choice [to go through the proper channels], I didn’t have to. Under the NSA portion [of the Intelligence Community Whistleblower Protection Act], I could go directly to the Department of Defense or directly to Congress and not inform the NSA. That was the statute that you would exercise if you had a responsible belief as a whistleblower. Now there’s huge cutout: Any national security position is not covered by that act.

See the rest here:

Exclusive Interview: NSA whistleblower on what he'd do differently now

May 042014



NSA proof phone Case
Subscribe for more videos: http://bit.ly/Yv1gYP twitter: http://bit.ly/188Ylf0 Do you need a NSA, CIA, FBI track phone case! If so then this one is for you. BTS: https://www.youtube.com/watch?v=f_…

By: Randomtvusa

Read more from the original source:

NSA proof phone Case – Video

Friday was the deadline for submissions to a counterterrorism program seeking vendors to help the military understand state-of-the-art technologies that may pose threats to national security, and bitcoin and virtual currencies are listed among them.

The program is being conducted by the Combating Terrorism Technical Support Office, a division of the Department of Defense that identifies and develops counterterrorism abilities and investigates irregular warfare and evolving threats.

An unclassified memo from January unearthed by Bitcoin Magazine detailed solicitations for CTTSO projects. The memo states that one of the mission requirements is for innovative…solutions to develop and/or enhance new concepts and constructs for understanding the role of virtual currencies in financing threats against the United States.

The memo said the blurring of national lines is facilitating the transfer of virtual currencies: The introduction of virtual currency will likely shape threat finance by increasing the opaqueness, transactional velocity, and overall efficiencies of terrorist attacks, it stated.

At the heart of the concern is the anonymity built into the bitcoin architecture. While every bitcoin transaction is public, the parties involved are kept anonymous. With bitcoins, illegal operations can be made with the speed and ease of the Internet and with the secrecy of cash.

Several recent high-profile cases have put bitcoin under greater scrutiny.

In October, the FBI closed down the Silk Road, a digital black market that allowed users to buy drugs, guns and even professional assassins. Silk Road accepted only bitcoin for payments, and the man arrested for running Silk Road was charged with narcotics trafficking and money

laundering, among other charges.

Charlie Shrem, chairman of the Bitcoin Foundation and the head of BitInstant, a defunct bitcoin exchange, was arrested in January on charges of money laundering with bitcoins.

In February, Mt. Gox, one of the largest bitcoin exchanges, filed for bankruptcy protection after hundreds of millions of dollars worth of bitcoins were stolen. No criminal charges have been filed yet, but many former Mt. Gox customers suspect that it was a scam.

Continue reading here:

Bitcoin A Terrorist Threat? Counterterrorism Program Names Virtual Currencies As Area Of Interest



first amendment test filming Tucson FBI Headquarters.
no violations, private security pass, FBI pass. good job Uncle Sam Proud of you! Let ol glory fly!

By: Anthony Potter

Read more:
first amendment test filming Tucson FBI Headquarters. – Video

May 022014

The Bitcoin Revolution Hits Africa

The virtual currency straight up: computer money created by an anonymous hacker in 2009 has captured hard-core geeks hearts. Its appeal? It enables bank-free (aka middleman-free) anonymous purchasing and, crucially, its a global currency thats not tied to any central bank and not much different than a dollar or a euro. The key characteristics of this digital cash also happen to make it a great fit for people who arent so down with advanced digital technology: the 326 million Africans who lack access to basic banking services. This isnt such a crazy idea. Mobile payments that work on standard-feature phones have already made strong inroads in Africa, with 16 percent of Africans using the services. The largest provider of such payments, M-Pesa, already operates in Kenya, Tanzania and South Africa, as well as India and Afghanistan. READ THE FULL STORY

The Silk Road, for all its clever uses of security protections like Tor and Bitcoin to protect the sites lucrative drug trade, still offered its enemies a single point of failure. When the FBI seized the server that hosted the market in October and arrested its alleged owner Ross Ulbricht, the billion-dollar drug bazaar came crashing down. If one group of Bitcoin black market enthusiasts has their way, the next online free-trade zone could be a much more elusive target. READ THE FULL STORY

Bitcoin may be the future of digital money, but it has a big problem here in the United States: why use it to buy anything when millions of merchants already accept debit and credit cards? Today, if you want to buy a bottle of lemonade with bitcoins, you need to scan a QR code with your phone or email a long bitcoin address to the seller. For most people, buying with bitcoins just isnt as easy as Visa or MasterCard. READ THE FULL STORY

ByPatrick Howell ONeillonApril 19, 2014 Never has there been a more confident, carefree group of drug users than those buying and selling on theSilk Roadin the weeks leading up to April 20, 2012. Hot off the infamous black markets first birthday celebrations, those hazy-eyed optimists were busy getting ready for what seemed would be the greatest4/20sale of all time. A feeling of invincibility permeated the Road and all who walked it. If the cops hadnt shut her down yetafter all the media attention the black market had receivedthen they might never come. This party didnt have to end. READ THE FULL STORY

Reuters | Updated: Apr 19 2014, 16:53 IST Mark Karpeles, the chief executive of Mt. Gox, said he would not come to the United States to answer questions about the Japanese bitcoin exchanges U.S. bankruptcy case, Mt. Gox lawyers told a federal judge on Monday. In the court filing, Mt. Gox lawyers cited a subpoena from the U.S. Department of Treasurys Financial Crimes Enforcement Network, which has closely monitored virtual currencies like bitcoin. READ THE FULL STORY

Cryptocurrencies will create a fifth protocol layer powering the next generation of the Internet,saysNaval Ravikant. Our 2014 fund will be built during the blockchain cycle,concursFred Wilson. And Andreessen Horowitz have very visiblydoubled downon Bitcoin. Even if you dont believe in Bitcoin as a currency, and Ill grant theres plenty to be skeptical about, you should be thinking:huh, a lot of extremely smart and successful people think that its underlying technology is a pretty big deal. But as I wrote myselfjust a few weeks ago, theres a big difference between blockchain technology and Bitcoin itself, right? READ THE FULL STORY

BYKIM ZETTER The dark web just got a little less dark with the launch of a new search engine that lets you easily find illicit drugs and other contraband online. Grams, which launched last week and is patterned after Google, is accessible only through the Tor anonymizing browser (the address for Grams is: grams7enufi7jmdl.onion) but fills a niche for anyone seeking quick access to sites selling drugs, guns, stolen credit card numbers, counterfeit cash and fake IDs sites that previously only could be found by users who knew the exact URL for the site. READ THE FULL STORY

The Monday night meetings at New York Citys Bitcoin Center hardly seem the stuff of a revolution. Wielding smartphones and computers, the mostly male, mostly under-30 revolutionaries stand in the middle of a cavernous space in the shadow of the New York Stock Exchange. Their mission is to spread the gospel of bitcoin, which they believe has the power to upend the global financial system. READ THE FULL STORY

PostedyesterdaybyCatherine Shu BTC China, one of the worlds largest bitcoin exchanges by trading volume, released a new mobile-friendly Web app called thePicasso ATMtoday. The Picasso ATM allows users around the world to exchange the digital currency for cash without having to find a physical ATM. To use Picasso ATM, bitcoin owners first load the currency into BTC Chinas Picasso Wallet and then sell it through the Web app. Buyers can then immediately confirm transactions on their smartphones. The app is targeted at casual bitcoin users as well as businesses and store owners, who can set their own profit margins on the currency like owners of physical ATM machines. READ THE FULL STORY

Original post:

Cryptocurrency



FireFox! Start Your Own Web Hosting Company
Web Hosting Advertise Here $10 a Month Affordable web-hosting
Pierre Teilhard De Chardin




Designer Children | Prometheism | Euvolution | Transhumanism

Sign up below for the Prometheism / Designer Children Discussion Forum

Subscribe to prometheism-pgroup

Powered by us.groups.yahoo.com