[Spoilers S7] Here's what we know about the state of Earth before the bombs
Here's a compiled list of what Earth was like pre-apocalypse using details from the show. Jason Rothenberg has said if the prequel gets greenlit, he wants to implement a lot of flashbacks LOST style. These flashbacks may include references to the following:
In Monty's video message he said: "After sucking the Earth dry of oil, they [Eligius III] went looking for another planet to tap." [Episode 5x13]
This is presumably why Eligius I (unmanned), II (manned), and IV (prison labor) were sent to asteroids to mine for hythylodium, an incredibly efficient energy source. Hythylodium was used to power the Eligius III and IV missions. [Episode 5x03]
Other energy alternatives are used, such as solar energy (the field of solar panels Jaha and Murphy see in 2x14). And in 6x04, Ryker tells Raven the propellant they use for the motorcycles is "ethanol distilled from Earth corn."
During Josephine's flashback in Boston 2043, a man walks into a diner holding a mask, brushing dust off his shoulders. Josephine's friend also says "It's really dusty outside." You can see multiple people in the diner wearing masks around their neck. [Episode 6x07]
During Josephine's flashback, the guy that commits suicide mentions that she posted about going to a water-rationing protest. [Episode 6x07]
Gabriel says his mother's water was cut off in Colombia so the rich could water their lawns. [Episode 7x10]
On Callie's TV, a headline says "Yosemite National Park Burns". [Screenshot] Another headline says: "Deadly Heat Wave". [Screenshot] You can also hear the newscaster mention "above 110 degrees." [Episode 7x08]
On Callie's TV, a headline says "Russian Ankovirus Spreads". [Screenshot] The newscaster mentions the US has declared a public health alert. [Episode 7x08]
Becca says ALIE intends to kill 6.5 billion people to solve overpopulation. She's not trying to kill 100% of the population, so 6.5 billion is not the total population count. [Episode 3x16]
On Callie's TV, a headline says "World's 11 Billionth Child Born". [Screenshot][Episode 7x08]
This is abundant when we look at the technologies developed by just Becca and Eligius, such as large space ships, cryopods, sonic drills, brain chips, ALIE, nightblood, etc.
We also see hologram technology. In 2x16, Jaha first meets ALIE in hologram form. In 7x08, it's used as a telecommunication device when Callie speaks to her father and brother.
On Callie's TV, we see a headline "first human brain transplant successfully performed in Bangalore". [Screenshot] Another headline says "Dubai's Alpha Centauri Group debuts first orbital hotel". [Screenshot][Episode 7x08]
Becca Franko, The Tech Celebrity
She was born in 2025 and went to Harvard when she was 10 years old (2035). [Episode 7x08]
In 2043, she started making tech for Eligius at 18 years old. [Episode 6x01]
She owned her own company. We don't know the name of it but we do know it's corporate logo is an infinity sign and its motto is "Seek Higher Things". [Episode 3x07]
People idolized her. The newscaster on Callie's TV said she had "legions of devotees". In 6x07, Josephine had a magazine with Becca featured on the cover. In 7x08, Reese said "Don't mind my sister. She once dressed as you for Halloween."
She owned her own television network. The channel that Callie was watching on her TV has the infinity sign as its network logo. [Screenshot] The newscaster said "The reclusive billionaire and owner of this network made her last public appearance". [Episode 7x08]
On Callie's TV, a headline says "Stock Market Headed For A ..." and it's cut off. [Screenshot] There's most likely a recession going on and stock markets are crashing. You can also see bitcoin (BTC) is worth 4563.44 (half of what it is today). [Screenshot] Also, on top of the pandemic, huge advancements in AI and technology are most likely disrupting businesses and employment as well. [Episode 7x08]
On Callie's TV, we see a headline "Wyoming joins 32 other states in legalizing the recreational use of psilocybin mushrooms". Shrooms. [Screenshot][Episode 7x08]
Battles in U.S. Cities
The Battle of San Francisco was an armed conflict that Shaw recalls watching on TV as a child. During Diyoza's time in the military, she was one of the soldiers helping the evacuation of thousands of refugees. [Episode 5x07]
Resistance Groups & Terrorism
The United Liberation Army (ULA), was a terrorist group dedicated to fighting against the corrupt government that Diyoza became a part of after the military. The ULA was involved in many terror attacks, including an attack on the 4th of July, 2041 (which they took credit for) that killed 80 civilians in a plane bombing, and a suspected metro suicide bombing in Washington D.C., killing 19 civilians in 2042. [Screenshot][Episode 5x04]
Asteroid Mining Penal Colony
The Asteroid Mining Penal Colony was an off-world penitentiary on the asteroid Proxima 6 that used prison labor to mine for hythylodium. After her arrest in 2043 [Episode 6x07], Diyoza was transported to the colony on Eligius IV.
In 2047, she and the other prisoners learned they were to be abandoned on the asteroid due to getting sick from the hythylodium so they took over the ship, damaging one of it's engines and making the ship significantly slower. It would take 109 years to fly back to Earth. Had the engine not been damaged, it's possible Diyoza and the prisoners could've made it back to Earth before the bombs. [Episode 5x03]
This damaged engine can also explain why it took Eligius IV 75 years to travel to Sanctum, while Eligius III presumably got there in shorter time. [Episode 5x13]
Corrupt U.S. Government
Diyoza says to Clarke "When the fascist government tried to take my home, I wanted blood too." [Episode 5x03]
When Reese mentions Callie dropping out of MIT, she says "Refusing to take part in fascistic regimes is my thing." [Episode 7x08]
On Callie's TV, the newscaster says "... when riot police, on orders from the Wallace Administration, moved in to clear the extreme environmental group known as The Tree Crew." [Episode 7x08]
Callie: "Extreme? What a joke. We were there peacefully. They're the extreme ones."
Lucy: "Don't they know they're defending a system that hurts people like them?"
Callie: People want to believe their leaders are telling the truth, which is why we need to get back there and continue exposing their lies.
The US president at the time of the bombs was a Wallace. In Season 2, Dante says "I love you Cage, and there's been a Wallace in this office since the bombs but if I find out that you're lying there won't be one after me". So most likely the Wallace administration and their family were corrupt. They easily decided to do away with democracy in order to have complete control in Mount Weather. [Episode 2x06]
Russell says to Diyoza in 6x03 "Your face is in our history books next to Hitler and Bin Laden". Eligius took part in federal prison labor, so most likely they had close ties with the government. Fascist governments like to vilify their opponents through propaganda. Even though Diyoza was indeed causing violence, she was probably also used as a scapegoat by the government since she was against them. Even Gabriel said in 7x04, "She was a freedom fighter, not a terrorist".
On Callie's TV, the newscaster says "The 11 billionth baby was born in the Wayne County Internment Camp". Internment camps/concentration camps are "camps where persons are confined, usually without hearings and typically under harsh conditions, often as a result of their membership in a group which the government has identified as dangerous or undesirable." [Source]
On Callie's TV, a headline says "Congress's negotiations on economic relief funds at an impasse amidst violent riots ..." [Screenshot]
Cult Mentality & Conspiracy Theories
In 7x10, Gabriel says to Bill Cadogan "Earth was pretty terrible. But it's good for the cult business, am I right?"
According to this article, Bill grew up in poverty. And Jaha mentioned in 4x03 that Bill's father beat him frequently. Bill, a millennial, says in 7x10 that his first job was flipping burgers, dreaming of the day he'd escape. "There must be more to life than politics, the dying ecosystem, the memes." In times of economic hardship and social upheaval, it's easy for people to latch onto certain beliefs.
Callie says Bill's a vulture capitalist who "traded his precious credibility to become a prophet of doom". She also called him a cultural artifact thief. He found and stole the Anomaly stone from Machu Picchu and in 2042, he started studying it. [Episode 7x08]
It's unknown when Bill founded the Second Dawn, but we know a news article was written about them in 2042, saying that only those with lots of money could "unlock the twelve seals" since it required payments of over $10 million to the cult. [Episode 4x03]
That's what I got. If you spotted anything else from the show, feel free to share! :) Edit: Thanks everyone for the kind words and the awards! Also, thanks to clwrutgers for asking me to make this list.
Ultimate glossary of crypto currency terms, acronyms and abbreviations
Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!
If you know of a scam that is not covered here, write a comment and it will be added to the next edition.
Caller ID spoofing It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you. Email spoofing The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created. SMS spoofing SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.
The most common scams
The fake check scam (Credit to nimble2 for this part) The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
The scammer sends you a very real looking, but fake, check. Sometimes they'll call it a "cashier's check", a "certified check", or a "verified check".
You deposit the check into your bank account, and within a couple of days your bank makes some or all of the funds available to you. This makes you think that the check is real and the funds have cleared. However, the money appearing in your account is not the same as the check actually clearing. The bank must make the funds available to you before they have cleared the check because that is the law.
For various and often complicated reasons, depending on the specific story line of the scam, the scammer will ask you to send someone some of the money, using services like MoneyGram, Western Union, and Walmart-2-Walmart. Sometimes the scammer will ask for you to purchase gift cards (iTunes, Amazon, Steam, etc) and give them the codes to redeem the gift cards. Some scammers may also give you instructions on how to buy and send them bitcoins.
Within a couple of weeks, though it can take as long as a month, your bank will realize that the check you deposited was fake, and your bank will remove the funds that you deposited into your account and charge you a bounced check fee. If you withdrew any of the money from the fake check, that money will be gone and you will owe that money to the bank. Some posters have even had their bank accounts closed and have been blocked from having another account for 5 years using ChexSystems.
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent. Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it. Bitcoin job scams Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins. Email flooding If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere. Cartel scam You will be threatened by scammers who claim to be affiliated with a cartel. They may send you gory pictures and threaten your life and the lives of your family. Usually the victim will have attempted to contact an escort prior to the scam, but sometimes the scammers target people randomly. If you are targeted by a cartel scam all you need to do is ignore the scammers as their threats are clearly empty. Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse. Employment certification scams You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist. Craigslist fake payment scams Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule. Craigslist Carfax/vehicle history scam You'll encounter a scammer on Craigslist who wants to buy the vehicle you have listed, but they will ask for a VIN report from a random site that they have created and they will expect you to pay for it. Double dip/recovery scammers This is a scam aimed at people who have already fallen for a scam previously. Scammers will reach out to the victim and claim to be able to help the victim recover funds they lost in the scam. General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter. Credit card debt scam Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement. The parcel mule scam A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods. The Skype sex scam You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious. What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account. The underage girl scam You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer. What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money. Phishing Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious. The blackmail email scam part 5: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/ PSA: you did not win a giftcard: https://old.reddit.com/Scams/comments/fffmle/psa_you_did_not_win_a_gift_card/ Sugar scams Sugar scammers operate all over the internet and usually come in two varieties: advance-fee scams where the scammer will ask for a payment from you before sending you lots of money, and fake check style scams where the scammer will either pull a classic fake check scam, or will do a "bill pay" style scam that involves them paying your bills, or them giving you banking information to pay your bills. If you encounter these scammers, report their accounts and move on. Google Hangouts Google Hangouts is a messaging platform used extensively by all kinds of scammers. If you are talking with someone online and they want you to switch to Hangouts, they are likely a scammer and you should proceed with caution. Publishers Clearing House scams PCH scams are often advance-fee scams, where you will be promised lots of money after you make an initial payment. You will never need to pay if you win money from the real PCH. Pet scams You are looking for a specific breed of puppy, bird, or other pet. You come across a nice-looking website that claims to be breeding them and has some available right now - they may even be on sale! The breeders are not local to your area (and may not even list a physical location) but they assure you they can safely ship the pet to you after a deposit or full payment. If you go through with the payment, you will likely be contacted by the "shipper" who will inform you about an unexpected shipping/customs/processing fee required to deliver your new pet. But there was never any pet, both the "breeder" and the "shipper" are scammers, typically operating out of Africa. These sites are rampant and account for a large percentage of online pet seller websites - they typically have a similar layout/template (screenshot - example) If you are considering buying a pet online, some easy things to check are: (1) The registration date of the domain (if it was created recently it is likely a scam website) (2) Reverse image search the pictures of available pets - you will usually find other scam websites using the same photos. (3) Copy a sentence/section of the text from the "about us" page and put it into google (in quotes) - these scammers often copy large parts of their website's text from other places. (4) Search for the domain name and look for entries on petscams.com or other scam-tracking sites. (5) Strongly consider buying/adopting your pet from a local shelter or breeder where you can see the animal in person before putting any money down. Thanks to djscsi for this entry. Fake shipping company scams These scams usually start when you try to buy something illegal online. You will be scammed for the initial payment, and then you will receive an email from the fake shipping company telling you that you need to pay them some sort of fee or bribe. If you pay this, they will keep trying to scam you with increasingly absurd stories until you stop paying, at which point they will blackmail you. If you are involved in this scam, all you can do is ignore the scammers and move on, and try to dispute your payments if possible. Chinese Upwork scam Someone will ask you to create an Upwork or other freelancer site account for them and will offer money in return. You will not be paid, and they want to use the accounts to scam people. Quickbooks invoice scam This is a fake check style scam that takes advantage of Quickbooks. The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam. The blackmail mail scam This is very similar to the blackmail email scam, but you will receive a letter in the mail. Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse. Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on. Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum. Man in the middle scams Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to. Digit wallet scam A variation of the fake check scam, the scammer sends you money through a digital wallet (i.e. Venmo, Apple Pay, Zelle, Cash App) along with a message claiming they've sent the money to the wrong person and a request to send the money back. Customer service for these digital wallets may even suggest that you send the money back. However, the money sent is from a stolen credit card and will be removed from your account after a few days. Your transfer is not reversed since it came from your own funds. Cam girl voting/viewer scam You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories. Amateur porn recruitment scam You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer. Hot girl SMS spam You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card. Identity verification scam You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to. This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website. Multi Level Marketing or Affiliate Marketing You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.
You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls. Tax Call You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world. Warrant Call Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards. [Legal Documents/Process Server Calls] Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number. Student Loan Forgiveness Scam Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program. Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam. Chinese government scam This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats. Chinese shipping scam This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators. Social security suspension scam You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information. Utilities cutoff You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin. Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same. Mexican family scam This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help. General family scams Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money. One ring scam Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.
Online shopping scams
THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is. Dropshipping An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer. Influencer scams A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products. Triangulation fraud Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer. Instagram influencer scams Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time. Cheap Items Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off. Cheap Amazon 3rd Party Items You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam. Scams on eBay There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month. Scams on Amazon There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items. Scams on Reddit Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online. Computer scams Virus scam A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.
Chinese Brushing / direct shipping If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings. Money flipping Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.
Meet Brock Pierce, the Presidential Candidate With Ties to Pedophiles Who Wants to End Human Trafficking
thedailybeast.com | Sep. 20, 2020. The “Mighty Ducks” actor is running for president. He clears the air (sort of) to Tarpley Hitt about his ties to Jeffrey Epstein and more. In the trailer for First Kid, the forgettable 1996 comedy about a Secret Service agent assigned to protect the president’s son, the title character, played by a teenage Brock Pierce, describes himself as “definitely the most powerful kid in the universe.” Now, the former child star is running to be the most powerful man in the world, as an Independent candidate for President of the United States. Before First Kid, the Minnesota-born actor secured roles in a series of PG-rated comedies, playing a young Emilio Estevez in The Mighty Ducks, before graduating to smaller parts in movies like Problem Child 3: Junior in Love. When his screen time shrunk, Pierce retired from acting for a real executive role: co-founding the video production start-up Digital Entertainment Network (DEN) alongside businessman Marc Collins-Rector. At age 17, Pierce served as its vice president, taking in a base salary of $250,000. DEN became “the poster child for dot-com excesses,” raising more than $60 million in seed investments and plotting a $75 million IPO. But it turned into a shorthand for something else when, in October of 1999, the three co-founders suddenly resigned. That month, a New Jersey man filed a lawsuit alleging Collins-Rector had molested him for three years beginning when he was 13 years old. The following summer, three teens filed a sexual-abuse lawsuit against Pierce, Collins-Rector, and their third co-founder, Chad Shackley. The plaintiffs later dropped their case against Pierce (he made a payment of $21,600 to one of their lawyers) and Shackley. But after a federal grand jury indicted Collins-Rector on criminal charges in 2000, the DEN founders left the country. When Interpol arrested them in 2002, they said they had confiscated “guns, machetes, and child pornography” from the trio’s beach villa in Spain. While abroad, Pierce had pivoted to a new venture: Internet Gaming Entertainment, which sold virtual accessories in multiplayer online role-playing games to those desperate to pay, as one Wired reporter put it, “as much as $1,800 for an eight-piece suit of Skyshatter chain mail” rather than earn it in the games themselves. In 2005, a 25-year-old Pierce hired then-Goldman Sachs banker Steve Bannon—just before he would co-found Breitbart News. Two years later, after a World of Warcraft player sued the company for “diminishing” the fun of the game, Steve Bannon replaced Pierce as CEO. Collins-Rector eventually pleaded guilty to eight charges of child enticement and registered as a sex offender. In the years that followed, Pierce waded into the gonzo economy of cryptocurrencies, where he overlapped more than once with Jeffrey Epstein, and counseled him on crypto. In that world, he founded Tether, a cryptocurrency that bills itself as a “stablecoin,” because its value is allegedly tied to the U.S. dollar, and the blockchain software company Block.one. Like his earlier businesses, Pierce’s crypto projects see-sawed between massive investments and curious deals. When Block.one announced a smart contract software called EOS.IO, the company raised $4 billion almost overnight, setting an all-time record before the product even launched. The Securities and Exchange Commission later fined the company $24 million for violating federal securities law. After John Oliver mocked the ordeal, calling Pierce a “sleepy, creepy cowboy,” Block.one fired him. Tether, meanwhile, is currently under investigation by the New York Attorney General for possible fraud. On July 4, Pierce announced his candidacy for president. His campaign surrogates include a former Cambridge Analytica director and the singer Akon, who recently doubled down on developing an anonymously funded, $6 billion “Wakanda-like” metropolis in Senegal called Akon City. Pierce claims to be bipartisan, and from the 11 paragraphs on the “Policy” section of his website it can be hard to determine where he falls on the political spectrum. He supports legalizing marijuana and abolishing private prisons, but avoids the phrase “climate change.” He wants to end “human trafficking.” His proposal to end police brutality: body cams. His political contributions tell a more one-sided story. Pierce’s sole Democratic contribution went to the short-lived congressional run of crypto candidate Brian Forde. The rest went to Republican campaigns like Marco Rubio, Rick Perry, John McCain, and the National Right to Life Political Action Committee. Last year alone, Pierce gave over $44,000 to the Republican National Committee and more than $55,000 to Trump’s re-election fund. Pierce spoke to The Daily Beast from his tour bus and again over email. Those conversations have been combined and edited for clarity. You’re announcing your presidential candidacy somewhat late, and historically, third-party candidates haven’t had the best luck with the executive office. If you don’t have a strong path to the White House, what do you want out of the race? I announced on July 4, which I think is quite an auspicious date for an Independent candidate, hoping to bring independence to this country. There’s a lot of things that I can do. One is: I’m 39 years old. I turn 40 in November. So I’ve got time on my side. Whatever happens in this election cycle, I’m laying the groundwork for the future. The overall mission is to create a third major party—not another third party—a third major party in this country. I think that is what America needs most. George Washington in his closing address warned us about the threat of political parties. John Adams and the other founding fathers—their fear for our future was two political parties becoming dominant. And look at where we are. We were warned. I believe, having studied systems, any time you have a system of two, what happens is those two things come together, like magnets. They come into collision, or they become polarized and become completely divided. I think we need to rise above partisan politics and find a path forward together. As Albert Einstein is quoted—I’m not sure the line came from him, but he’s quoted in many places—he said that the definition of insanity is making the same mistake or doing the same thing over and over and over again, expecting a different result. [Ed. note: Einstein never said this.] It feels like that’s what our election cycle is like. Half the country feels like they won, half the country feels like they lost, at least if they voted or participated. Obviously, there’s another late-comer to the presidential race, and that’s Kanye West. He’s received a lot of flak for his candidacy, as he’s openly admitted to trying to siphon votes away from Joe Biden to ensure a Trump victory. Is that something you’re hoping to avoid or is that what you’re going for as well? Oh no. This is a very serious campaign. Our campaign is very serious. You’ll notice I don’t say anything negative about either of the two major political candidates, because I think that’s one of the problems with our political system, instead of people getting on stage, talking about their visionary ideas, inspiring people, informing and educating, talking about problems, mentioning problems, talking about solutions, constructive criticism. That’s why I refuse to run a negative campaign. I am definitely not a spoiler. I’m into data, right? I’m a technologist. I’ve got digital DNA. So does most of our campaign team. We’ve got our finger on the pulse. Most of my major Democratic contacts are really happy to see that we’re running in a red state like Wyoming. Kanye West’s home state is Wyoming. He’s not on the ballot in Wyoming I could say, in part, because he didn’t have Akon on his team. But I could also say that he probably didn’t want to be on the ballot in Wyoming because it’s a red state. He doesn’t want to take additional points in a state where he’s only running against Trump. But we’re on the ballot in Wyoming, and since we’re on the ballot in Wyoming I think it’s safe—more than safe, I think it’s evident—that we are not here to run as a spoiler for the benefit of Donald Trump. In running for president, you’ve opened yourself up to be scrutinized from every angle going back to the beginning of your career. I wanted to ask you about your time at the Digital Entertainment Network. Can you tell me a little bit about how you started there? You became a vice president as a teenager. What were your qualifications and what was your job exactly? Well, I was the co-founder. A lot of it was my idea. I had an idea that people would use the internet to watch videos, and we create content for the internet. The idea was basically YouTube and Hulu and Netflix. Anyone that was around in the ‘90s and has been around digital media since then, they all credit us as the creators of basically those ideas. I was just getting a message from the creator of The Vandals, the punk rock band, right before you called. He’s like, “Brock, looks like we’re going to get the Guinness Book of World Records for having created the first streaming television show.” We did a lot of that stuff. We had 30 television shows. We had the top most prestigious institutions in the world as investors. The biggest names. High-net-worth investors like Terry Semel, who’s chairman and CEO of Warner Brothers, and became the CEO of Yahoo. I did all sorts of things. I helped sell $150,000 worth of advertising contracts to the CEOs of Pepsi and everything else. I was the face of the company, meeting all the major banks and everything else, selling the vision of what the future was. You moved in with Marc Collins-Rector and Chad Shackley at a mansion in Encino. Was that the headquarters of the business? All start-ups, they normally start out in your home. Because it’s just you. The company was first started out of Marc’s house, and it was probably there for the first two or three months, before the company got an office. That’s, like, how it is for all start-ups. were later a co-defendant in the L.A. County case filed against Marc Collins-Rector for plying minors with alcohol and drugs, in order to facilitate sexual abuse. You were dropped from the case, but you settled with one of the men for $21,600. Can you explain that? Okay, well, first of all, that’s not accurate. Two of the plaintiffs in that case asked me if I would be a plaintiff. Because I refused to be a part of the lawsuit, they chose to include me to discredit me, to make their case stronger. They also went and offered 50 percent of what they got to the house management—they went around and offered money to anyone to participate in this. They needed people to corroborate their story. Eventually, because I refused to participate in the lawsuit, they named me. Subsequently, all three of the plaintiffs apologized to me, in front of audiences, in front of many people, saying Brock never did anything. They dismissed their cases. Remember, this is a civil thing. I’ve never been charged with a crime in my life. And the last plaintiff to have his case dismissed, he contacted his lawyer and said, “Dismiss this case against Brock. Brock never did anything. I just apologized. Dismiss his case.” And the lawyer said, “No. I won’t dismiss this case, I have all these out-of-pocket expenses, I refuse to file the paperwork unless you give me my out-of-pocket expenses.” And so the lawyer, I guess, had $21,000 in bills. So I paid his lawyer $21,000—not him, it was not a settlement. That was a payment to his lawyer for his out-of-pocket expenses. Out-of-pocket expenses so that he would file the paperwork to dismiss the case. You’ve said the cases were unfounded, and the plaintiffs eventually apologized. But your boss, Marc Collins-Rector later pleaded guilty to eight charges of child enticement and registered as a sex offender. Were you aware of his behavior? How do you square the fact that later allegations proved to be true, but these ones were not? Well, remember: I was 16 and 17 years old at the time? So, no. I don’t think Marc is the man they made him out to be. But Marc is not a person I would associate with today, and someone I haven’t associated with in a very long time. I was 16 and 17. I chose the wrong business partner. You live and you learn. You’ve pointed out that you were underage when most of these allegations were said to take place. Did you ever feel like you were coerced or in over your head while working at DEN? I mean, I was working 18 hours a day, doing things I’d never done before. It was business school. But I definitely learned a lot in building that company. We raised $88 million. We filed our [form] S-1 to go public. We were the hottest start-up in Los Angeles. In 2000, you left the country with Marc Collins-Rector. Why did you leave? How did you spend those two years abroad? I moved to Spain in 1999 for personal reasons. I spent those two years in Europe working on developing my businesses. Interpol found you in 2002. The house where you were staying reportedly contained guns, machetes, and child pornography. Whose guns and child porn were those? Were you aware they were in the house, and how did those get there? My lawyers have addressed this in 32 pages of documentation showing a complete absence of wrongdoing. Please refer to my webpage for more information. [Ed. Note: The webpage does not mention guns, machetes, or child pornography. It does state:“It is true that when the local police arrested Collins-Rector in Spain in 2002 on an international warrant, Mr. Pierce was also taken into custody, but so was everyone at Collins-Rector’s house in Spain; and it is equally clear that Brock was promptly released, and no charges of any kind were ever filed against Brock concerning this matter.”] What do you make of the allegations against Bryan Singer?[Ed. Note: Bryan Singer, a close friend of Collins-Rector, invested at least $50,000 in DEN. In an Atlantic article outlining Singer’s history of alleged sexual assault and statutory rape, one source claimed that at age 15, Collins-Rector abused him and introduced him to Singer, who then assaulted him in the DEN headquarters.] I am aware of them and I support of all victims of sexual assault. I will let America’s justice system decide on Singer’s outcome.
In 2011, you spoke at the Mindshift conference supported by Jeffrey Epstein. At that point, he had already been convicted of soliciting prostitution from a minor. Why did you agree to speak? I had never heard of Jeffrey Epstein. His name was not on the website. I was asked to speak at a conference alongside Nobel Prize winners. It was not a cryptocurrency conference, it was filled with Nobel Prize winners. I was asked to speak alongside Nobel Prize winners on the future of money. I speak at conferences historically, two to three times a week. I was like, “Nobel Prize winners? Sounds great. I’ll happily talk about the future of money with them.” I had no idea who Jeffrey Epstein was. His name was not listed anywhere on the website. Had I known what I know now? I clearly would have never spoken there. But I spoke at a conference that he cosponsored. What’s your connection to the Clinton Global Initiative? Did you hear about it through Jeffrey Epstein? I joined the Clinton Global Initiative as a philanthropist in 2006 and was a member for one year. My involvement with the Initiative had no connection to Jeffrey Epstein whatsoever.
You’ve launched your campaign in Minnesota, where George Floyd was killed by a police officer. How do you feel about the civil uprising against police brutality? I’m from Minnesota. Born and raised. We just had a press conference there, announcing that we’re on the ballot. Former U.S. Senator Dean Barkley was there. So that tells you, when former U.S. Senators are endorsing the candidate, right? [Ed. note: Barkley was never elected to the United States Senate. In November of 2002, he was appointed by then Minnesota Governor Jesse Venture to fill the seat after Sen. Paul Wellstone died in a plane crash. Barkley’s term ended on Jan. 3, 2003—two months later.] Yes, George Floyd was murdered in Minneapolis. My vice-presidential running mate Karla Ballard and I, on our last trip to Minnesota together, went to visit the George Floyd Memorial. I believe in law and order. I believe that law and order is foundational to any functioning society. But there is no doubt in my mind that we need reform. These types of events—this is not an isolated incident. This has happened many times before. It’s time for change. We have a lot of detail around policy on this issue that we will be publishing next week. Not just high-level what we think, not just a summary, but detailed policy. You said that you support “law and order.” What does that mean? “Law and order” means creating a fair and just legal system where our number one priority is protecting the inalienable rights of “Life, Liberty and the pursuit of Happiness” for all people. This means reforming how our police intervene in emergency situations, abolishing private prisons that incentivize mass incarceration, and creating new educational and economic opportunities for our most vulnerable communities. I am dedicated to preventing crime by eliminating the socioeconomic conditions that encourage it. I support accountability and transparency in government and law enforcement. Some of the key policies I support are requiring body-cams on all law enforcement officers who engage with the public, curtailing the 1033 program that provides local law enforcement agencies with access to military equipment, and abolishing private prisons. Rather than simply defund the police, my administration will take a holistic approach to heal and unite America by ending mass incarceration, police brutality, and racial injustice. Did you attend any Black Lives Matter protests? I support all movements aimed at ending racial injustice and inequality. I have not attended any Black Lives Matter protests. My running-mate, Karla Ballard, attended the March on Washington in support of racial justice and equality. Your platform doesn’t mention the words “climate change.” Is there a reason for that? I’m not sure what you mean. Our policy platform specifically references human-caused climate change and we have a plan to restabilize the climate, address environmental degradation, and ensure environmental sustainability. [Ed. Note: As of writing the Pierce campaign’s policy platform does not specifically reference human-caused climate change.] You’ve recently brought on Akon as a campaign surrogate. How did that happen? Tell me about that. Akon and I have been friends for quite some time. I was one of the guys that taught him about Bitcoin. I helped make some videogames for him, I think in 2012. We were talking about Bitcoin, teaching him the ropes, back in 2013. And in 2014, we were both speaking at the Milken Global Conference, and I encouraged him to talk about how Bitcoin, Africa, changed the world. He became the biggest celebrity in the world, talking about Bitcoin at the time. I’m an adviser to his Akoin project, very interested in the work that he’s doing to build a city in Africa. I think we need a government that’s of, for, and by the people. Akon has huge political aspirations. He obviously was a hugely successful artist. But he also discovered artists like Lady Gaga. So not only is he, himself, a great artist, but he’s also a great identifier and builder of other artists. And he’s been a great businessman, philanthropist. He’s pushing the limits of what can be done. We’re like-minded individuals in that regard. I think he’ll be running for political office one day, because he sees what I see: that we need real change, and we need a government that is of, for, and by the people. You mentioned that you’re an adviser on Akoin. Do you have any financial investments in Akoin or Akon City? I don’t believe so. I’d have to check. I have so much stuff. But I don’t believe that I have any economic interests in his stuff. I’d have to verify that. We’ll get back to you. I don’t believe that I have any economic interests. My interest is in helping him. He’s a visionary with big ideas that wants to help things in the world. If I can be of assistance in helping him make the world a better place, I’m all for it. I’m not motivated by money. I’m not running for office because I’m motivated by power. I’m running for office because I’m deeply, deeply concerned about our collective future. You’ve said you’re running on a pro-technology platform. One week into your campaign last month, a New York appeals court approved the state Attorney General’s attempt to investigate the stablecoin Tether for potentially fraudulent activity. Do you think this will impact your ability to sell people on your tech entrepreneurship? No, I think my role in Tether is as awesome as it gets. It was my idea. I put it together. But I’ve had no involvement in the company since 2015. I gave all of my equity to the other shareholders. I’ve had zero involvement in the company for almost six years. It was just my idea. I put the initial team together. But I think Tether is one of the most important innovations in the world, certainly. The idea is, I digitized the U.S. dollar. I used technology to digitize currency—existing currency. The U.S. dollar in particular. It’s doing $10 trillion a year. Ten trillion dollars a year of transactional volume. It’s probably the most important innovation in currency since the advent of fiat money. The people that took on the business and ran the business in years to come, they’ve done things I’m not proud of. I’m not sure they’ve done anything criminal. But they certainly did things differently than I would do. But it’s like, you have kids, they turn 18, they go out into the world, and sometimes you’re proud of the things they do, and sometimes you shake your head and go, “Ugh, why did you do that?” I have zero concerns as it relates to me personally. I wish they made better decisions. What do you think the investigation will find? I have no idea. The problem that was raised is that there was a $5 million loan between two entities and whether or not they had the right to do that, did they disclose it correctly. There’s been no accusations of, like, embezzlement or anything that bad. [Ed. Note: The Attorney General’s press release on the investigation reads: “Our investigation has determined that the operators of the ‘Bitfinex’ trading platform, who also control the ‘tether’ virtual currency, have engaged in a cover-up to hide the apparent loss of $850 million dollars of co-mingled client and corporate funds.”] But there’s been some disclosure things, that is the issue. No one is making any outrageous claims that these are people that have done a bunch of bad—well, on the internet, the media has said that the people behind the business may have been manipulating the price of Bitcoin, but I don’t think that has anything to do with the New York investigation. Again, I’m so not involved, and so not at risk, that I’m not even up to speed on the details. [Ed note: A representative of the New York State Attorney General told Forbes that he “cannot confirm or deny that the investigation” includes Pierce.] We’ve recently witnessed the rise of QAnon, the conspiracy theory that Hollywood is an evil cabal of Satanic pedophiles and Trump is the person waging war on them. You mentioned human trafficking, which has become a cause for them. What are your thoughts on that? I’ve watched some of the content. I think it’s an interesting phenomenon. I’m an internet person, so Anonymous is obviously an organization that has been doing interesting stuff. It’s interesting. I don’t have a big—conspiracy theory stuff is—I guess I have a question for you: What do you think of all of it, since you’re the expert? You know, I think it’s not true, but I’m not running for president. I do wonder what this politician [Georgia congressional candidate Marjorie Taylor Greene], who’s just won her primary, is going to do on day one, once she finds out there’s no satanic cabal room. Wait, someone was running for office and won on a QAnon platform, saying that Hollywood did—say what? You’re the expert here. She won a primary. But I want to push on if we only have a few minutes. In 2006, your gaming company IGE brought on Steve Bannon as an investor. Goldman later bought out most of your stock. Bannon eventually replaced you as CEO of Affinity. You’ve described him as your “right-hand man for, like, seven years.” How well did you know Bannon during that time? Yes, so this is in my mid-twenties. He wasn’t an investor. He worked for me. He was my banker. He worked for me for three years as my yield guide. And then he was my CEO running the company for another four years. So I haven’t worked with Steve for a decade or so. We worked in videogame stuff and banking. He was at Goldman Sachs. He was not in the political area at the time. But he was a pretty successful banker. He set up Goldman Sachs Los Angeles. So for me, I’d say he did a pretty good job. During your business relationship, Steve Bannon founded Breitbart News, which has pretty consistently published racist material. How do you feel about Breitbart? I had no involvement with Breitbart News. As for how I feel about such material, I’m not pleased by any form of hate-mongering. I strongly support the equality of all Americans. Did you have qualms about Bannon’s role in the 2016 election? Bannon’s role in the Trump campaign got me to pay closer attention to what he was doing but that’s about it. Whenever you find out that one of your former employees has taken on a role like that, you pay attention. Bannon served on the board of Cambridge Analytica. A staffer on your campaign, Brittany Kaiser, also served as a business director for them. What are your thoughts on their use of illicitly-obtained Facebook data for campaign promotional material? Yes, so this will be the last question I can answer because I’ve got to be off for this 5:00 pm. But Brittany Kaiser is a friend of mine. She was the whistleblower of Cambridge Analytica. She came to me and said, “What do I do?” And I said, “Tell the truth. The truth will set you free.” [Ed. Note: Investigations in Cambridge Analytica took place as early as Nov. 2017, when a U.K. reporter at Channel 4 News recorded their CEO boasting about using “beautiful Ukranian girls” and offers of bribes to discredit political officials. The first whistleblower was Christopher Wylie, who disclosed a cache of documents to The Guardian, published on Mar. 17, 2018. Kaiser’s confession ran five days later, after the scandal made national news. Her association with Cambridge Analytica is not mentioned anywhere on Pierce’s campaign website.] So I’m glad that people—I’m a supporter of whistleblowers, people that see injustice in the world and something not right happening, and who put themselves in harm’s way to stand up for what they believe in. So I stand up for Brittany Kaiser. Who do you think [anonymous inventor of Bitcoin] Satoshi Nakamoto is? We all are Satoshi Nakamoto. You got married at Burning Man. Have you been attending virtual Burning Man? I’m running a presidential campaign. So, while I was there in spirit, unfortunately my schedule did not permit me to attend. OP note: please refer to the original article for reference links within text (as I've not added them here!)
Summary: Everyone knows that when you give your assets to someone else, they always keep them safe. If this is true for individuals, it is certainly true for businesses. Custodians always tell the truth and manage funds properly. They won't have any interest in taking the assets as an exchange operator would. Auditors tell the truth and can't be misled. That's because organizations that are regulated are incapable of lying and don't make mistakes. First, some background. Here is a summary of how custodians make us more secure: Previously, we might give Alice our crypto assets to hold. There were risks:
Alice might take the assets and disappear.
Alice might spend the assets and pretend that she still has them (fractional model).
Alice might store the assets insecurely and they'll get stolen.
Alice might give the assets to someone else by mistake or by force.
Alice might lose access to the assets.
But "no worries", Alice has a custodian named Bob. Bob is dressed in a nice suit. He knows some politicians. And he drives a Porsche. "So you have nothing to worry about!". And look at all the benefits we get:
Alice can't take the assets and disappear (unless she asks Bob or never gives them to Bob).
Alice can't spend the assets and pretend that she still has them. (Unless she didn't give them to Bob or asks him for them.)
Alice can't store the assets insecurely so they get stolen. (After all - she doesn't have any control over the withdrawal process from any of Bob's systems, right?)
Alice can't give the assets to someone else by mistake or by force. (Bob will stop her, right Bob?)
Alice can't lose access to the funds. (She'll always be present, sane, and remember all secrets, right?)
See - all problems are solved! All we have to worry about now is:
Bob might take the assets and disappear.
Bob might spend the assets and pretend that he still has them (fractional model).
Bob might store the assets insecurely and they'll get stolen.
Bob might give the assets to someone else by mistake or by force.
Bob might lose access to the assets.
It's pretty simple. Before we had to trust Alice. Now we only have to trust Alice, Bob, and all the ways in which they communicate. Just think of how much more secure we are! "On top of that", Bob assures us, "we're using a special wallet structure". Bob shows Alice a diagram. "We've broken the balance up and store it in lots of smaller wallets. That way", he assures her, "a thief can't take it all at once". And he points to a historic case where a large sum was taken "because it was stored in a single wallet... how stupid". "Very early on, we used to have all the crypto in one wallet", he said, "and then one Christmas a hacker came and took it all. We call him the Grinch. Now we individually wrap each crypto and stick it under a binary search tree. The Grinch has never been back since." "As well", Bob continues, "even if someone were to get in, we've got insurance. It covers all thefts and even coercion, collusion, and misplaced keys - only subject to the policy terms and conditions." And with that, he pulls out a phone-book sized contract and slams it on the desk with a thud. "Yep", he continues, "we're paying top dollar for one of the best policies in the country!" "Can I read it?' Alice asks. "Sure," Bob says, "just as soon as our legal team is done with it. They're almost through the first chapter." He pauses, then continues. "And can you believe that sales guy Mike? He has the same year Porsche as me. I mean, what are the odds?" "Do you use multi-sig?", Alice asks. "Absolutely!" Bob replies. "All our engineers are fully trained in multi-sig. Whenever we want to set up a new wallet, we generate 2 separate keys in an air-gapped process and store them in this proprietary system here. Look, it even requires the biometric signature from one of our team members to initiate any withdrawal." He demonstrates by pressing his thumb into the display. "We use a third-party cloud validation API to match the thumbprint and authorize each withdrawal. The keys are also backed up daily to an off-site third-party." "Wow that's really impressive," Alice says, "but what if we need access for a withdrawal outside of office hours?" "Well that's no issue", Bob says, "just send us an email, call, or text message and we always have someone on staff to help out. Just another part of our strong commitment to all our customers!" "What about Proof of Reserve?", Alice asks. "Of course", Bob replies, "though rather than publish any blockchain addresses or signed transaction, for privacy we just do a SHA256 refactoring of the inverse hash modulus for each UTXO nonce and combine the smart contract coefficient consensus in our hyperledger lightning node. But it's really simple to use." He pushes a button and a large green checkmark appears on a screen. "See - the algorithm ran through and reserves are proven." "Wow", Alice says, "you really know your stuff! And that is easy to use! What about fiat balances?" "Yeah, we have an auditor too", Bob replies, "Been using him for a long time so we have quite a strong relationship going! We have special books we give him every year and he's very efficient! Checks the fiat, crypto, and everything all at once!" "We used to have a nice offline multi-sig setup we've been using without issue for the past 5 years, but I think we'll move all our funds over to your facility," Alice says. "Awesome", Bob replies, "Thanks so much! This is perfect timing too - my Porsche got a dent on it this morning. We have the paperwork right over here." "Great!", Alice replies. And with that, Alice gets out her pen and Bob gets the contract. "Don't worry", he says, "you can take your crypto-assets back anytime you like - just subject to our cancellation policy. Our annual management fees are also super low and we don't adjust them often". How many holes have to exist for your funds to get stolen? Just one. Why are we taking a powerful offline multi-sig setup, widely used globally in hundreds of different/lacking regulatory environments with 0 breaches to date, and circumventing it by a demonstrably weak third party layer? And paying a great expense to do so? If you go through the list of breaches in the past 2 years to highly credible organizations, you go through the list of major corporate frauds (only the ones we know about), you go through the list of all the times platforms have lost funds, you go through the list of times and ways that people have lost their crypto from identity theft, hot wallet exploits, extortion, etc... and then you go through this custodian with a fine-tooth comb and truly believe they have value to add far beyond what you could, sticking your funds in a wallet (or set of wallets) they control exclusively is the absolute worst possible way to take advantage of that security. The best way to add security for crypto-assets is to make a stronger multi-sig. With one custodian, what you are doing is giving them your cryptocurrency and hoping they're honest, competent, and flawlessly secure. It's no different than storing it on a really secure exchange. Maybe the insurance will cover you. Didn't work for Bitpay in 2015. Didn't work for Yapizon in 2017. Insurance has never paid a claim in the entire history of cryptocurrency. But maybe you'll get lucky. Maybe your exact scenario will buck the trend and be what they're willing to cover. After the large deductible and hopefully without a long and expensive court battle. And you want to advertise this increase in risk, the lapse of judgement, an accident waiting to happen, as though it's some kind of benefit to customers ("Free institutional-grade storage for your digital assets.")? And then some people are writing to the OSC that custodians should be mandatory for all funds on every exchange platform? That this somehow will make Canadians as a whole more secure or better protected compared with standard air-gapped multi-sig? On what planet? Most of the problems in Canada stemmed from one thing - a lack of transparency. If Canadians had known what a joke Quadriga was - it wouldn't have grown to lose $400m from hard-working Canadians from coast to coast to coast. And Gerald Cotten would be in jail, not wherever he is now (at best, rotting peacefully). EZ-BTC and mister Dave Smilie would have been a tiny little scam to his friends, not a multi-million dollar fraud. Einstein would have got their act together or been shut down BEFORE losing millions and millions more in people's funds generously donated to criminals. MapleChange wouldn't have even been a thing. And maybe we'd know a little more about CoinTradeNewNote - like how much was lost in there. Almost all of the major losses with cryptocurrency exchanges involve deception with unbacked funds. So it's great to see transparency reports from BitBuy and ShakePay where someone independently verified the backing. The only thing we don't have is:
ANY CERTAINTY BALANCES WEREN'T EXCLUDED. Quadriga's largest account was $70m. 80% of funds are in 20% of accounts (Pareto principle). All it takes is excluding a few really large accounts - and nobody's the wiser. A fractional platform can easily pass any audit this way.
ANY VISIBILITY WHATSOEVER INTO THE CUSTODIANS. BitBuy put out their report before moving all the funds to their custodian and ShakePay apparently can't even tell us who the custodian is. That's pretty important considering that basically all of the funds are now stored there.
ANY IDEA ABOUT THE OTHER EXCHANGES. In order for this to be effective, it has to be the norm. It needs to be "unusual" not to know. If obscurity is the norm, then it's super easy for people like Gerald Cotten and Dave Smilie to blend right in.
It's not complicated to validate cryptocurrency assets. They need to exist, they need to be spendable, and they need to cover the total balances. There are plenty of credible people and firms across the country that have the capacity to reasonably perform this validation. Having more frequent checks by different, independent, parties who publish transparent reports is far more valuable than an annual check by a single "more credible/official" party who does the exact same basic checks and may or may not publish anything. Here's an example set of requirements that could be mandated:
First report within 1 month of launching, another within 3 months, and further reports at minimum every 6 months thereafter.
No auditor can be repeated within a 12 month period.
All reports must be public, identifying the auditor and the full methodology used.
All auditors must be independent of the firm being audited with no conflict of interest.
Reports must include the percentage of each asset backed, and how it's backed.
The auditor publishes a hash list, which lists a hash of each customer's information and balances that were included. Hash is one-way encryption so privacy is fully preserved. Every customer can use this to have 100% confidence they were included.
If we want more extensive requirements on audits, these should scale upward based on the total assets at risk on the platform, and whether the platform has loaned their assets out.
There are ways to structure audits such that neither crypto assets nor customer information are ever put at risk, and both can still be properly validated and publicly verifiable. There are also ways to structure audits such that they are completely reasonable for small platforms and don't inhibit innovation in any way. By making the process as reasonable as possible, we can completely eliminate any reason/excuse that an honest platform would have for not being audited. That is arguable far more important than any incremental improvement we might get from mandating "the best of the best" accountants. Right now we have nothing mandated and tons of Canadians using offshore exchanges with no oversight whatsoever. Transparency does not prove crypto assets are safe. CoinTradeNewNote, Flexcoin ($600k), and Canadian Bitcoins ($100k) are examples where crypto-assets were breached from platforms in Canada. All of them were online wallets and used no multi-sig as far as any records show. This is consistent with what we see globally - air-gapped multi-sig wallets have an impeccable record, while other schemes tend to suffer breach after breach. We don't actually know how much CoinTrader lost because there was no visibility. Rather than publishing details of what happened, the co-founder of CoinTrader silently moved on to found another platform - the "most trusted way to buy and sell crypto" - a site that has no information whatsoever (that I could find) on the storage practices and a FAQ advising that “[t]rading cryptocurrency is completely safe” and that having your own wallet is “entirely up to you! You can certainly keep cryptocurrency, or fiat, or both, on the app.” Doesn't sound like much was learned here, which is really sad to see. It's not that complicated or unreasonable to set up a proper hardware wallet. Multi-sig can be learned in a single course. Something the equivalent complexity of a driver's license test could prevent all the cold storage exploits we've seen to date - even globally. Platform operators have a key advantage in detecting and preventing fraud - they know their customers far better than any custodian ever would. The best job that custodians can do is to find high integrity individuals and train them to form even better wallet signatories. Rather than mandating that all platforms expose themselves to arbitrary third party risks, regulations should center around ensuring that all signatories are background-checked, properly trained, and using proper procedures. We also need to make sure that signatories are empowered with rights and responsibilities to reject and report fraud. They need to know that they can safely challenge and delay a transaction - even if it turns out they made a mistake. We need to have an environment where mistakes are brought to the surface and dealt with. Not one where firms and people feel the need to hide what happened. In addition to a knowledge-based test, an auditor can privately interview each signatory to make sure they're not in coercive situations, and we should make sure they can freely and anonymously report any issues without threat of retaliation. A proper multi-sig has each signature held by a separate person and is governed by policies and mutual decisions instead of a hierarchy. It includes at least one redundant signature. For best results, 3of4, 3of5, 3of6, 4of5, 4of6, 4of7, 5of6, or 5of7. History has demonstrated over and over again the risk of hot wallets even to highly credible organizations. Nonetheless, many platforms have hot wallets for convenience. While such losses are generally compensated by platforms without issue (for example Poloniex, Bitstamp, Bitfinex, Gatecoin, Coincheck, Bithumb, Zaif, CoinBene, Binance, Bitrue, Bitpoint, Upbit, VinDAX, and now KuCoin), the public tends to focus more on cases that didn't end well. Regardless of what systems are employed, there is always some level of risk. For that reason, most members of the public would prefer to see third party insurance. Rather than trying to convince third party profit-seekers to provide comprehensive insurance and then relying on an expensive and slow legal system to enforce against whatever legal loopholes they manage to find each and every time something goes wrong, insurance could be run through multiple exchange operators and regulators, with the shared interest of having a reputable industry, keeping costs down, and taking care of Canadians. For example, a 4 of 7 multi-sig insurance fund held between 5 independent exchange operators and 2 regulatory bodies. All Canadian exchanges could pay premiums at a set rate based on their needed coverage, with a higher price paid for hot wallet coverage (anything not an air-gapped multi-sig cold wallet). Such a model would be much cheaper to manage, offer better coverage, and be much more reliable to payout when needed. The kind of coverage you could have under this model is unheard of. You could even create something like the CDIC to protect Canadians who get their trading accounts hacked if they can sufficiently prove the loss is legitimate. In cases of fraud, gross negligence, or insolvency, the fund can be used to pay affected users directly (utilizing the last transparent balance report in the worst case), something which private insurance would never touch. While it's recommended to have official policies for coverage, a model where members vote would fully cover edge cases. (Could be similar to the Supreme Court where justices vote based on case law.) Such a model could fully protect all Canadians across all platforms. You can have a fiat coverage governed by legal agreements, and crypto-asset coverage governed by both multi-sig and legal agreements. It could be practical, affordable, and inclusive. Now, we are at a crossroads. We can happily give up our freedom, our innovation, and our money. We can pay hefty expenses to auditors, lawyers, and regulators year after year (and make no mistake - this cost will grow to many millions or even billions as the industry grows - and it will be borne by all Canadians on every platform because platforms are not going to eat up these costs at a loss). We can make it nearly impossible for any new platform to enter the marketplace, forcing Canadians to use the same stagnant platforms year after year. We can centralize and consolidate the entire industry into 2 or 3 big players and have everyone else fail (possibly to heavy losses of users of those platforms). And when a flawed security model doesn't work and gets breached, we can make it even more complicated with even more people in suits making big money doing the job that blockchain was supposed to do in the first place. We can build a system which is so intertwined and dependent on big government, traditional finance, and central bankers that it's future depends entirely on that of the fiat system, of fractional banking, and of government bail-outs. If we choose this path, as history has shown us over and over again, we can not go back, save for revolution. Our children and grandchildren will still be paying the consequences of what we decided today. Or, we can find solutions that work. We can maintain an open and innovative environment while making the adjustments we need to make to fully protect Canadian investors and cryptocurrency users, giving easy and affordable access to cryptocurrency for all Canadians on the platform of their choice, and creating an environment in which entrepreneurs and problem solvers can bring those solutions forward easily. None of the above precludes innovation in any way, or adds any unreasonable cost - and these three policies would demonstrably eliminate or resolve all 109 historic cases as studied here - that's every single case researched so far going back to 2011. It includes every loss that was studied so far not just in Canada but globally as well. Unfortunately, finding answers is the least challenging part. Far more challenging is to get platform operators and regulators to agree on anything. My last post got no response whatsoever, and while the OSC has told me they're happy for industry feedback, I believe my opinion alone is fairly meaningless. This takes the whole community working together to solve. So please let me know your thoughts. Please take the time to upvote and share this with people. Please - let's get this solved and not leave it up to other people to do. Facts/background/sources (skip if you like):
The inspiration for the paragraph about splitting wallets was an actual quote from a Canadian company providing custodial services in response to the OSC consultation paper: "We believe that it will be in the in best interests of investors to prohibit pooled crypto assets or ‘floats’. Most Platforms pool assets, citing reasons of practicality and expense. The recent hack of the world’s largest Platform – Binance – demonstrates the vulnerability of participants’ assets when such concessions are made. In this instance, the Platform’s entire hot wallet of Bitcoins, worth over $40 million, was stolen, facilitated in part by the pooling of client crypto assets." "the maintenance of participants (and Platform) crypto assets across multiple wallets distributes the related risk and responsibility of security - reducing the amount of insurance coverage required and making insurance coverage more readily obtainable". For the record, their reply also said nothing whatsoever about multi-sig or offline storage.
In addition to the fact that the $40m hack represented only one "hot wallet" of Binance, and they actually had the vast majority of assets in other wallets (including mostly cold wallets), multiple real cases have clearly demonstrated that risk is still present with multiple wallets. Bitfinex, VinDAX, Bithumb, Altsbit, BitPoint, Cryptopia, and just recently KuCoin all had multiple wallets breached all at the same time, and may represent a significantly larger impact on customers than the Binance breach which was fully covered by Binance. To represent that simply having multiple separate wallets under the same security scheme is a comprehensive way to reduce risk is just not true.
Private insurance has historically never covered a single loss in the cryptocurrency space (at least, not one that I was able to find), and there are notable cases where massive losses were not covered by insurance. Bitpay in 2015 and Yapizon in 2017 both had insurance policies that didn't pay out during the breach, even after a lengthly court process. The same insurance that ShakePay is presently using (and announced to much fanfare) was describe by their CEO himself as covering “physical theft of the media where the private keys are held,” which is something that has never historically happened. As was said with regard to the same policy in 2018 - “I don’t find it surprising that Lloyd’s is in this space,” said Johnson, adding that to his mind the challenge for everybody is figuring out how to structure these policies so that they are actually protective. “You can create an insurance policy that protects no one – you know there are so many caveats to the policy that it’s not super protective.”
The most profitable policy for a private insurance company is one with the most expensive premiums that they never have to pay a claim on. They have no inherent incentive to take care of people who lost funds. It's "cheaper" to take the reputational hit and fight the claim in court. The more money at stake, the more the insurance provider is incentivized to avoid payout. They're not going to insure the assets unless they have reasonable certainty to make a profit by doing so, and they're not going to pay out a massive sum unless it's legally forced. Private insurance is always structured to be maximally profitable to the insurance provider.
The circumvention of multi-sig was a key factor in the massive Bitfinex hack of over $60m of bitcoin, which today still sits being slowly used and is worth over $3b. While Bitfinex used a qualified custodian Bitgo, which was and still is active and one of the industry leaders of custodians, and they set up 2 of 3 multi-sig wallets, the entire system was routed through Bitfinex, such that Bitfinex customers could initiate the withdrawals in a "hot" fashion. This feature was also a hit with the hacker. The multi-sig was fully circumvented.
Bitpay in 2015 was another example of a breach that stole 5,000 bitcoins. This happened not through the exploit of any system in Bitpay, but because the CEO of a company they worked with got their computer hacked and the hackers were able to request multiple bitcoin purchases, which Bitpay honoured because they came from the customer's computer legitimately. Impersonation is a very common tactic used by fraudsters, and methods get more extreme all the time.
A notable case in Canada was the Canadian Bitcoins exploit. Funds were stored on a server in a Rogers Data Center, and the attendee was successfully convinced to reboot the server "in safe mode" with a simple phone call, thus bypassing the extensive security and enabling the theft.
The very nature of custodians circumvents multi-sig. This is because custodians are not just having to secure the assets against some sort of physical breach but against any form of social engineering, modification of orders, fraudulent withdrawal attempts, etc... If the security practices of signatories in a multi-sig arrangement are such that the breach risk of one signatory is 1 in 100, the requirement of 3 independent signatures makes the risk of theft 1 in 1,000,000. Since hackers tend to exploit the weakest link, a comparable custodian has to make the entry and exit points of their platform 10,000 times more secure than one of those signatories to provide equivalent protection. And if the signatories beef up their security by only 10x, the risk is now 1 in 1,000,000,000. The custodian has to be 1,000,000 times more secure. The larger and more complex a system is, the more potential vulnerabilities exist in it, and the fewer people can understand how the system works when performing upgrades. Even if a system is completely secure today, one has to also consider how that system might evolve over time or work with different members.
By contrast, offline multi-signature solutions have an extremely solid record, and in the entire history of cryptocurrency exchange incidents which I've studied (listed here), there has only been one incident (796 exchange in 2015) involving an offline multi-signature wallet. It happened because the customer's bitcoin address was modified by hackers, and the amount that was stolen ($230k) was immediately covered by the exchange operators. Basically, the platform operators were tricked into sending a legitimate withdrawal request to the wrong address because hackers exploited their platform to change that address. Such an issue would not be prevented in any way by the use of a custodian, as that custodian has no oversight whatsoever to the exchange platform. It's practical for all exchange operators to test large withdrawal transactions as a general policy, regardless of what model is used, and general best practice is to diagnose and fix such an exploit as soon as it occurs.
False promises on the backing of funds played a huge role in the downfall of Quadriga, and it's been exposed over and over again (MyCoin, PlusToken, Bitsane, Bitmarket, EZBTC, IDAX). Even today, customers have extremely limited certainty on whether their funds in exchanges are actually being backed or how they're being backed. While this issue is not unique to cryptocurrency exchanges, the complexity of the technology and the lack of any regulation or standards makes problems more widespread, and there is no "central bank" to come to the rescue as in the 2008 financial crisis or during the great depression when "9,000 banks failed".
In addition to fraudulent operations, the industry is full of cases where operators have suffered breaches and not reported them. Most recently, Einstein was the largest case in Canada, where ongoing breaches and fraud were perpetrated against the platform for multiple years and nobody found out until the platform collapsed completely. While fraud and breaches suck to deal with, they suck even more when not dealt with. Lack of visibility played a role in the largest downfalls of Mt. Gox, Cryptsy, and Bitgrail. In some cases, platforms are alleged to have suffered a hack and keep operating without admitting it at all, such as CoinBene.
It surprises some to learn that a cryptographic solution has already existed since 2013, and gained widespread support in 2014 after Mt. Gox. Proof of Reserves is a full cryptographic proof that allows any customer using an exchange to have complete certainty that their crypto-assets are fully backed by the platform in real-time. This is accomplished by proving that assets exist on the blockchain, are spendable, and fully cover customer deposits. It does not prove safety of assets or backing of fiat assets.
If we didn't care about privacy at all, a platform could publish their wallet addresses, sign a partial transaction, and put the full list of customer information and balances out publicly. Customers can each check that they are on the list, that the balances are accurate, that the total adds up, and that it's backed and spendable on the blockchain. Platforms who exclude any customer take a risk because that customer can easily check and see they were excluded. So together with all customers checking, this forms a full proof of backing of all crypto assets.
However, obviously customers care about their private information being published. Therefore, a hash of the information can be provided instead. Hash is one-way encryption. The hash allows the customer to validate inclusion (by hashing their own known information), while anyone looking at the list of hashes cannot determine the private information of any other user. All other parts of the scheme remain fully intact. A model like this is in use on the exchange CoinFloor in the UK.
A Merkle tree can provide even greater privacy. Instead of a list of balances, the balances are arranged into a binary tree. A customer starts from their node, and works their way to the top of the tree. For example, they know they have 5 BTC, they plus 1 other customer hold 7 BTC, they plus 2-3 other customers hold 17 BTC, etc... until they reach the root where all the BTC are represented. Thus, there is no way to find the balances of other individual customers aside from one unidentified customer in this case.
Proposals such as this had the backing of leaders in the community including Nic Carter, Greg Maxwell, and Zak Wilcox. Substantial and significant effort started back in 2013, with massive popularity in 2014. But what became of that effort? Very little. Exchange operators continue to refuse to give visibility. Despite the fact this information can often be obtained through trivial blockchain analysis, no Canadian platform has ever provided any wallet addresses publicly. As described by the CEO of Newton "For us to implement some kind of realtime Proof of Reserves solution, which I'm not opposed to, it would have to ... Preserve our users' privacy, as well as our own. Some kind of zero-knowledge proof". Kraken describes here in more detail why they haven't implemented such a scheme. According to professor Eli Ben-Sasson, when he spoke with exchanges, none were interested in implementing Proof of Reserves.
And yet, Kraken's places their reasoning on a page called "Proof of Reserves". More recently, both BitBuy and ShakePay have released reports titled "Proof of Reserves and Security Audit". Both reports contain disclaimers against being audits. Both reports trust the customer list provided by the platform, leaving the open possibility that multiple large accounts could have been excluded from the process. Proof of Reserves is a blockchain validation where customers see the wallets on the blockchain. The report from Kraken is 5 years old, but they leave it described as though it was just done a few weeks ago. And look at what they expect customers to do for validation. When firms represent something being "Proof of Reserve" when it's not, this is like a farmer growing fruit with pesticides and selling it in a farmers market as organic produce - except that these are people's hard-earned life savings at risk here. Platforms are misrepresenting the level of visibility in place and deceiving the public by their misuse of this term. They haven't proven anything.
Fraud isn't a problem that is unique to cryptocurrency. Fraud happens all the time. Enron, WorldCom, Nortel, Bear Stearns, Wells Fargo, Moser Baer, Wirecard, Bre-X, and Nicola are just some of the cases where frauds became large enough to become a big deal (and there are so many countless others). These all happened on 100% reversible assets despite regulations being in place. In many of these cases, the problems happened due to the over-complexity of the financial instruments. For example, Enron had "complex financial statements [which] were confusing to shareholders and analysts", creating "off-balance-sheet vehicles, complex financing structures, and deals so bewildering that few people could understand them". In cryptocurrency, we are often combining complex financial products with complex technologies and verification processes. We are naïve if we think problems like this won't happen. It is awkward and uncomfortable for many people to admit that they don't know how something works. If we want "money of the people" to work, the solutions have to be simple enough that "the people" can understand them, not so confusing that financial professionals and technology experts struggle to use or understand them.
For those who question the extent to which an organization can fool their way into a security consultancy role, HB Gary should be a great example to look at. Prior to trying to out anonymous, HB Gary was being actively hired by multiple US government agencies and others in the private sector (with glowing testimonials). The published articles and hosted professional security conferences. One should also look at this list of data breaches from the past 2 years. Many of them are large corporations, government entities, and technology companies. These are the ones we know about. Undoubtedly, there are many more that we do not know about. If HB Gary hadn't been "outted" by anonymous, would we have known they were insecure? If the same breach had happened outside of the public spotlight, would it even have been reported? Or would HB Gary have just deleted the Twitter posts, brought their site back up, done a couple patches, and kept on operating as though nothing had happened?
In the case of Quadriga, the facts are clear. Despite past experience with platforms such as MapleChange in Canada and others around the world, no guidance or even the most basic of a framework was put in place by regulators. By not clarifying any sort of legal framework, regulators enabled a situation where a platform could be run by former criminal Mike Dhanini/Omar Patryn, and where funds could be held fully unchecked by one person. At the same time, the lack of regulation deterred legitimate entities from running competing platforms and Quadriga was granted a money services business license for multiple years of operation, which gave the firm the appearance of legitimacy. Regulators did little to protect Canadians despite Quadriga failing to file taxes from 2016 onward. The entire administrative team had resigned and this was public knowledge. Many people had suspicions of what was going on, including Ryan Mueller, who forwarded complaints to the authorities. These were ignored, giving Gerald Cotten the opportunity to escape without justice.
There are multiple issues with the SOC II model including the prohibitive cost (you have to find a third party accounting firm and the prices are not even listed publicly on any sites), the requirement of operating for a year (impossible for new platforms), and lack of any public visibility (SOC II are private reports that aren't shared outside the people in suits).
Securities frameworks are expensive. Sarbanes-Oxley is estimated to cost $5.1 million USD/yr for the average Fortune 500 company in the United States. Since "Fortune 500" represents the top 500 companies, that means well over $2.55 billion USD (~$3.4 billion CAD) is going to people in suits. Isn't the problem of trust and verification the exact problem that the blockchain is supposed to solve?
To use Quadriga as justification for why custodians or SOC II or other advanced schemes are needed for platforms is rather silly, when any framework or visibility at all, or even the most basic of storage policies, would have prevented the whole thing. It's just an embarrassment.
We are now seeing regulators take strong action. CoinSquare in Canada with multi-million dollar fines. BitMex from the US, criminal charges and arrests. OkEx, with full disregard of withdrawals and no communication. Who's next?
We have a unique window today where we can solve these problems, and not permanently destroy innovation with unreasonable expectations, but we need to act quickly. This is a unique historic time that will never come again.
Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.
Flatten the Curve. Part 48. Source Here It's getting crazier day by day now, so are you following the Boy Scout motto? On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.” Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island. But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply. Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it. But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right? Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court. 'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act. Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies. The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you. Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more. Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered. PACOM? Why isn't that command group responsible for the South China Sea? Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India. Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here Nah. I'm just fear mongering and Doomscrolling again. Heads up and eyes open. Talk soon.
if I understand your code allows me to get the full history of bitcoin price on a scale of 1 minute ? – Mayeul sgc Mar 27 '17 at 6:27. Yes that is right – f1lt3r Mar 28 '17 at 7:01. add a comment Highly active question. Earn 10 reputation in order to answer this question. The reputation requirement helps protect this question from spam and non-answer activity. Not the answer you're ... For this reason, additional collateral failed to reach most of the users’ accounts on BitMEX, triggering a chain reaction of liquidation on their order book. At one point, BitMEX had $200m of ... Binance cryptocurrency exchange - We operate the worlds biggest bitcoin exchange and altcoin crypto exchange in the world by volume The Satoshi Revolution explores crypto’s core principles, such as spontaneous order, as well as its crucial role in the evolution of private money within society. In 2009, Bitcoin flashed across ... DOWNLOADABLE TRADE HISTORY MARKET DATA FOR THE GLOBAL BITCOIN ECOSYSTEM. Coinigy provides historical market data on bitcoin and hundreds of alternative cryptocurrencies. Data is available in both RAW (Every Trade) and OHLCV (Open, High, Low, Close, Volume) format as a tab-delimited CSV file. Choose your exchange, market, and data type, and we'll have a custom order in your inbox in less than ...
The History Of Cryptocurrency In 10 Minutes: From Nothing To Something
There's tremendous buzz about Bitcoin, but most people don't really know what Bitcoin is or what the future use of it actually will be. People are just excit... 🔔 Did you enjoy this video? SUBSCRIBE for more: https://www.youtube.com/c/nuggetsnews?sub_confirmation=1 📹 For more Resources & Content: https://nuggetsnews.... Easy To Understand Books: 1.The Bitcoin Standard: The Only Book You Need To Understand Bitcoin and The History of Money https://amzn.to/2NRkZFn (this is an affiliate link) 2. Bitcoin Money: A Tale ... This video is unavailable. Watch Queue Queue. Watch Queue Queue Brian Eha, Author of "How Money Got Free: Bitcoin and the Fight for the Future of Finance, joins the program to discuss the history of Bitcoin: A tale of corruption, intrigue, money, and power ...