Daily analysis of cryptocurrencies 2019–11–18(Market index 38 — Fear state)
https://preview.redd.it/z988snbubgz31.jpg?width=658&format=pjpg&auto=webp&s=8ff1c77605423352395c4ca6bda5e5d7ac800813 Thailand Ministry Of Finance To Launch Blockchain-Based Visitor VAT Refund ServiceAccording to the Bangkok Post, the Thai Ministry of Finance plans to introduce a blockchain-based value-added tax (VAT) for foreign tourists from the end of November. Thai Financial Minister Uttama Savanayana said that blockchain-based technology will speed up the refund process for visitors because once the store enters information into the system, the purchase details will be shared with the tax department and customs department based on the blockchain. German And South African Regulators Issue Fraud Warnings On Karatbars InternationalIn Germany, according to a recent press release by BaFin, the Federal Financial Supervisory Authority of Germany, a cease and desist order has been issued against Karatbit. The order is to stop the company from its unauthorized electronic money business in Germany.As for South Africa, the Financial Sector Conduct Authority issued its own press release warning the public to not deal with Karatbars International, as it is not authorized in terms of the Financial Advisory and Intermediary Services Act, to render any financial advice and intermediary services. The press release continues that the authority was informed that the company has been offering investments to customers through WhatsApp, a messaging platform. China’s Army Considering A Blockchain Rewards System, ReportChina’s military could implement a blockchain rewards system to manage personnel data and incentivize its workforce, the Global Times reported on Nov. 18. Citing a People’s Liberation Army (PLA) Daily report, the Global Times underscores that the blockchain system would likely not involve financial incentives, but would be used as an innovation strategy for the military’s management. Yahoo And LINE Announce Basic Agreement On Business Integration; Both Of Them Have Crypto ExchangesYahoo parent company Z Holdings (ZHD) and LINE formally announced that they had a basic agreement on business integration. On Nov 13, it was reported that the companies were approaching integration in the media reports. If Yahoo, which has the cryptocurrency exchange TAOTAO, and LINE, which also operates the cryptocurrency exchange BITMAX, will be integrated, it will have a major impact on the cryptocurrency industry. https://preview.redd.it/ruwrql7cbgz31.png?width=504&format=png&auto=webp&s=0eba3291ecd7ffbbb06946afa8f1c6695c2a7e99 BTC — BTC fell briefly yesterday, rebounding after falling to $8368 at the lowest level and falling after hitting $8620 at the highest level.In terms of capital flow, the net inflow in 24 hours was 3 billion yuan, a significant increase over the previous day.On the 4-hour K-line, the slope of the downward trend rate is slowing down, the trading volume continues to shrink, and the volatility has also dropped to a new low in recent years.At this stage, the disk support and pressure are weak, only part of the energy is needed, and it is easy to pull up. It is not difficult to break through the pressure of 8600 and 8800 dollars, and 9000 dollars is the strong pressure level.But it doesn’t make much sense to pull it up. The market information hasn’t been restored.The overall trend is roughly between $8400 and $8600.In terms of operation, the spot continues to hold, while the futures are not recommended for operation. Review previous articles:https://firstname.lastname@example.org
Encrypted project calendar（November 18, 2019）
Maker (MKR):18 November 2019 MCD Launch “BIG changes to terminology are coming with the launch of MCD on Nov. 18th Say hello to Vaults, Dai, and Sai.”Vexanium (VEX):18 November 2019 Nodes Blockchain Summit Vexanium will collaborate with Nodes Community to hold a blockchain conference called the Nodes Blockchain Summit.OKB (OKB):18 November 2019 Utrecht Workshop “EVENT: We’re going back to basics with #101 workshops on #CryptoTrading in Utrecht & AmsterdamSantiment Network Token (SAN):18 November 2019 Reddit AMA “…@Santimentfeedwill be conducting its first Reddit AMA on the@EthfinanceRsubreddit on Monday, November 18, 2019 from 12pm to 3pm EST”.Decentralized Currency Assets (DCA):18 November 2019 Added to Echoestrader “Decentralize Currency Assets(DCA) support’s the first crypto algorithm exchange goes live on november 18th 2019.”Aeternity (AE):and 5 others 18 November 2019 [TWITTERPOST] Shift Money 2019 conference from Nov 18–19 in Croatia.Maker (MKR):18 November 2019 MCD Launch “BIG changes to terminology are coming with the launch of MCD on Nov. 18th Say hello to Vaults, Dai, and Sai.”Pundi X (NPXS):18 November 2019 Binance Italian AMA “On November 18 at 3:00 pm CET,@binanceItalian group will host AMA series with@peko0413!”Crypto.com Coin (CRO):18 November 2019 Exchange Closed Beta “Closed Beta starts the week of 18 Nov.”
Encrypted project calendar（November 19, 2019）
Lisk (LSK):19 November 2019 Lisk.js “We are excited to announce liskjs2019 will take place on November 19th. This all day blockchain event will include…”Aion (AION):19 November 2019 Hard Fork “Leading up to the hard fork on November 19th-20th, 2019 the Unity — Aion Kernel will be upgraded by node operators.”Enigma (ENG):19 November 2019 Open Community Call The first Enigma Open Community Call is Tuesday, Nov 19th, 11AM ET! important updates on our protocol, the Genesis Game, and our road ahead.Lisk (LSK):19 November 2019 Berlin Meetup “Ahead of LiskJS2019, our partners Berlin Valley are hosting a startup industry networking event, #DigitalTalents, tomorrow. “BitMax Token (BTMX):19 November 2019 BitMax Delisting BitMax removes BTMXP/BTC, ETH/USDC, ETH/PAX, BAT/ETH, ZEC/ETH, DASH/ETH, LAMB/ETH, ZIL/ETH, COVA/ETH, ETC/ETH, FET/ETH, LAMBS/ETH, XTZ/ETH.
Encrypted project calendar（November 20, 2019）
OKB (OKB):20 November 2019 OKEx Cryptour Odessa Ukr “Join us in Odessa as we journey through Ukraine for our OKEx Cryptour!DAPS Token (DAPS):20 November 2019 Partnership with SWFT “Everyone will have $DAPS mobile wallets, atomic swaps and much more starting on the 20th of November!”Aragon (ANT):20 November 2019 Draft Proposal Deadline “Draft proposals for Aragon Network Vote #5 are due in one week, on November 20 at 16:00 UTC…”IOTA (MIOTA):20 November 2019 Smart City Expo Wilfried Pimenta, our Director of Business Development, will be among the speakers at the AI & Blockchain Summit in the Smart City Expo Worl…Bitcoin Fast (BTCF):20 November 2019 BTCF Snapshot Snapshot taken of BTCF holders at 8:00 am (GMT-6).Credits (CS):20 November 2019 AMA AMA with Credits team at 15:00 UTC.
Encrypted project calendar（November 21, 2019）
Cardano (ADA):and 2 others 21 November 2019 Meetup Netherlands (AMS) “This meetup is all about how to decentralize a blockchain, the problems and differences between Proof-of-Work and Proof-of-Stake…”Cappasity (CAPP):21 November 2019 Virtuality Paris 2019 “Cappasity to demonstrate its solution for the interactive shopping experience at Virtuality Paris 2019.”Horizen (ZEN):21 November 2019 Weekly Insider Team updates at 3:30 PM UTC/ 11:30 AM EDT: Engineering, Node network, Product/UX, Helpdesk, Legal, BD, Marketing, CEO Closing thoughts, AMA.OKB (OKB):21 November 2019 OKEx Talks — Johannesburg “Join us the largest city of South Africa — Johannesburg where we will host our OKEx Talks on the 21st Nov.”IOST (IOST):22 November 2019 Singapore Workshop Join the Institute of Blockchain for their 2nd IOST technical workshop in Singapore on 22 Nov 2019. The workshop includes IOST’s key tech.OKB (OKB):22 November 2019 St. Petersberg Talks “Join us in St. Petersberg on 22 Nov as we answer your questions on Crypto Security. “NEM (XEM):21 November 2019 SME Thought Leadership “SME Thought Leadership Series Forum #2” in Selangor, Malaysia from 8:30 AM — 2:30 PM.Stellar (XLM):21 November 2019 NYC Meetup “Stellar Blockchain Meetup ft. FIC Network and Sam Conner’s Meridian Recap” in NYC from 6–8 PM.Waves (WAVES):21 November 2019 Edinburgh Workshop “Next Thursday, we’re running a practical workshop on building DeFi products & designing Smart Contracts in your city!”
Encrypted project calendar（November 22, 2019）
IOST (IOST):22 November 2019 Singapore Workshop Join the Institute of Blockchain for their 2nd IOST technical workshop in Singapore on 22 Nov 2019. The workshop includes IOST’s key techOKB (OKB):22 November 2019 St. Petersberg Talks “Join us in St. Petersberg on 22 Nov as we answer your questions on Crypto Security. “Zenon (ZNN):22 November 2019 Awareness Fund Payout “Distribution of the fund takes place every Friday until Pillars Lock-in Phase is completed.”
Encrypted project calendar（November 23, 2019）
Californium (CF)and 1 other: 23 November 2019 Greece Meetup “On November 23, the Greek #Cryptocurrency Community Meetup will take place in Greece!”
Encrypted project calendar（November 25, 2019）
0x (ZRX):25 November 2019 0x V3 Proposal Live “The 0x v3 proposal was approved and will go live on Ethereum mainnet starting November 25th!”Dynamic Trading Rights (DTR):25 November 2019 Chain Migration “On November 25 at 23:00 CET, TokensNet will make a migration of the $ELI token from Ethereum blockchain to Bitcoin Cash blockchain…”
Encrypted project calendar（November 27, 2019）
OKB (OKB):27 November 2019 OKEx Cryptour Vinnytsia “Join us in Vinnytsia as we journey through Ukraine for our OKEx Cryptour!”Fetch.ai (FET):27 November 2019 London Meetup “Join us on 27 November@primalbasehqto hear an exciting progress report as we prepare for the launch of our #mainnet”
Encrypted project calendar（November 28, 2019）
Horizen (ZEN):28 November 2019 Weekly Insider Team updates at 3:30 PM UTC/ 11:30 AM EDT: Engineering, Node network, Product/UX, Helpdesk, Legal, BD, Marketing, CEO Closing thoughts, AMA.
Encrypted project calendar（November 29, 2019）
Zenon (ZNN):29 November 2019 Awareness Fund Payout “Distribution of the fund takes place every Friday until Pillars Lock-in Phase is completed.”
Encrypted project calendar（November 30, 2019）
Ethos (ETHOS):30 November 2019 (or earlier) Rebranding “In November, we unveil the broker token, a dynamic utility token to power our commission-free crypto trading and broker platform, Voyager.”Digitex Futures (DGTX):30 November 2019 Public Testnet Launch “…We can expect to see the world’s first zero-commission futures trading platform live on the Ethereum public testnet from 30th November.”Monero (XMR):30 November 2019 Protocol Upgrade “Preliminary information thread regarding the scheduled protocol upgrade of November 30.”Chiliz (CHZ):30 November 2019 (or earlier) Fiat to CHZ Exchanges “We will add another two fiat to $CHZ exchanges in November…”Skrumble Network (SKM):30 November 2019 (or earlier) P2P & Group Calling “P2P & Group Video Calling,” during November 2019.Aergo (AERGO):30 November 2019 (or earlier) Mainnet 2.0 Upgrade Mainnet 2.0 Protocol update by end of November.Akropolis (AKRO):30 November 2019 (or earlier) Beta Release “All functionality has been deployed to mainnet.”Nash Exchange (NEX):30 November 2019 (or earlier) Mobile Strategy Phase 2 “Phase 2 of our mobile strategy will be live soon with our wallet and portfolio app hitting stores in November!”Akropolis (AKRO):30 November 2019 (or earlier) Beta Release “All functionality has been deployed to mainnet.”Pakcoin (PAK):30 November 2019 Staking Mobile App Android app for staklet is going to be launched on November 30th.
Encrypted project calendar（December 1, 2019）
Auxilium (AUX):01 December 2019 AUX Interest Distribution Monthly interest distribution by Auxilium Interest Distribution Platform for coinholders. Also supports charity.I/O Coin (IOC):01 December 2019 Pos Reward Halving IOC block reward halving is happening on December 1st 2019.
US Economic Warfare and Likely Foreign Defenses – by Michael Hudson • 23 July 2019
https://outline.com/VM2DEM • 5,400 Words • Today’s world is at war on many fronts. The rules of international law and order put in place toward the end of World War II are being broken by U.S. foreign policy escalating its confrontation with countries that refrain from giving its companies control of their economic surpluses. Countries that do not give the United States control of their oil and financial sectors or privatize their key sectors are being isolated by the United States imposing trade sanctions and unilateral tariffs giving special advantages to U.S. producers in violation of free trade agreements with European, Asian and other countries. This global fracture has an increasingly military cast. U.S. officials justify tariffs and import quotas illegal under WTO rules on “national security” grounds, claiming that the United States can do whatever it wants as the world’s “exceptional” nation. U.S. officials explain that this means that their nation is not obliged to adhere to international agreements or even to its own treaties and promises. This allegedly sovereign right to ignore on its international agreements was made explicit after Bill Clinton and his Secretary of State Madeline Albright broke the promise by President George Bush and Secretary of State James Baker that NATO would not expand eastward after 1991. (“You didn’t get it in writing,” was the U.S. response to the verbal agreements that were made.) Likewise, the Trump administration repudiated the multilateral Iranian nuclear agreement signed by the Obama administration, and is escalating warfare with its proxy armies in the Near East. U.S. politicians are waging a New Cold War against Russia, China, Iran, and oil-exporting countries that the United States is seeking to isolate if cannot control their governments, central bank and foreign diplomacy. The international framework that originally seemed equitable was pro-U.S. from the outset. In 1945 this was seen as a natural result of the fact that the U.S. economy was the least war-damaged and held by far most of the world’s monetary gold. Still, the postwar trade and financial framework was ostensibly set up on fair and equitable international principles. Other countries were expected to recover and grow, creating diplomatic, financial and trade parity with each other. But the past decade has seen U.S. diplomacy become one-sided in turning the International Monetary Fund (IMF), World Bank, SWIFT bank-clearing system and world trade into an asymmetrically exploitative system. This unilateral U.S.-centered array of institutions is coming to be widely seen not only as unfair, but as blocking the progress of other countries whose growth and prosperity is seen by U.S. foreign policy as a threat to unilateral U.S. hegemony. What began as an ostensibly international order to promote peaceful prosperity has turned increasingly into an extension of U.S. nationalism, predatory rent-extraction and a more dangerous military confrontation. Deterioration of international diplomacy into a more nakedly explicit pro-U.S. financial, trade and military aggression was implicit in the way in which economic diplomacy was shaped when the United Nations, IMF and World Bank were shaped mainly by U.S. economic strategists. Their economic belligerence is driving countries to withdraw from the global financial and trade order that has been turned into a New Cold War vehicle to impose unilateral U.S. hegemony. Nationalistic reactions are consolidating into new economic and political alliances from Europe to Asia. We are still mired in the Oil War that escalated in 2003 with the invasion of Iraq, which quickly spread to Libya and Syria. American foreign policy has long been based largely on control of oil. This has led the United States to oppose the Paris accords to stem global warming. Its aim is to give U.S. officials the power to impose energy sanctions forcing other countries to “freeze in the dark” if they do not follow U.S. leadership. To expand its oil monopoly, America is pressuring Europe to oppose the Nordstream II gas pipeline from Russia, claiming that this would make Germany and other countries dependent on Russia instead of on U.S. liquified natural gas (LNG). Likewise, American oil diplomacy has imposed unilateral sanctions against Iranian oil exports, until such time as a regime change opens up that country’s oil reserves to U.S., French, British and other allied oil majors. U.S. control of dollarized money and credit is critical to this hegemony. As Congressman Brad Sherman of Los Angeles told a House Financial Services Committee hearing on May 9, 2019: “An awful lot of our international power comes from the fact that the U.S. dollar is the standard unit of international finance and transactions. Clearing through the New York Fed is critical for major oil and other transactions. It is the announced purpose of the supporters of cryptocurrency to take that power away from us, to put us in a position where the most significant sanctions we have against Iran, for example, would become irrelevant.” The U.S. aim is to keep the dollar as the transactions currency for world trade, savings, central bank reserves and international lending. This monopoly status enables the U.S. Treasury and State Department to disrupt the financial payments system and trade for countries with which the United States is at economic or outright military war. Russian President Vladimir Putin quickly responded by describing how “the degeneration of the universalist globalization model [is] turning into a parody, a caricature of itself, where common international rules are replaced with the laws… of one country.” That is the trajectory on which this deterioration of formerly open international trade and finance is now moving. It has been building up for a decade. On June 5, 2009, then-Russian President Dmitry Medvedev cited this same disruptive U.S. dynamic at work in the wake of the U.S. junk mortgage and bank fraud crisis. Those whose job it was to forecast events … were not ready for the depth of the crisis and turned out to be too rigid, unwieldy and slow in their response. The international financial organisations – and I think we need to state this up front and not try to hide it – were not up to their responsibilities, as has been said quite unambiguously at a number of major international events such as the two recent G20 summits of the world’s largest economies. Furthermore, we have had confirmation that our pre-crisis analysis of global economic trends and the global economic system were correct. The artificially maintained uni-polar system and preservation of monopolies in key global economic sectors are root causes of the crisis. One big centre of consumption, financed by a growing deficit, and thus growing debts, one formerly strong reserve currency, and one dominant system of assessing assets and risks – these are all factors that led to an overall drop in the quality of regulation and the economic justification of assessments made, including assessments of macroeconomic policy. As a result, there was no avoiding a global crisis. That crisis is what is now causing today’s break in global trade and payments. Warfare on many fronts, with Dollarization being the main arena Dissolution of the Soviet Union 1991 did not bring the disarmament that was widely expected. U.S. leadership celebrated the Soviet demise as signaling the end of foreign opposition to U.S.-sponsored neoliberalism and even as the End of History. NATO expanded to encircle Russia and sponsored “color revolutions” from Georgia to Ukraine, while carving up former Yugoslavia into small statelets. American diplomacy created a foreign legion of Wahabi fundamentalists from Afghanistan to Iran, Iraq, Syria and Libya in support of Saudi Arabian extremism and Israeli expansionism. The United States is waging war for control of oil against Venezuela, where a military coup failed a few years ago, as did the 2018-19 stunt to recognize an unelected pro-American puppet regime. The Honduran coup under President Obama was more successful in overthrowing an elected president advocating land reform, continuing the tradition dating back to 1954 when the CIA overthrew Guatemala’s Arbenz regime. U.S. officials bear a special hatred for countries that they have injured, ranging from Guatemala in 1954 to Iran, whose regime it overthrew to install the Shah as military dictator. Claiming to promote “democracy,” U.S. diplomacy has redefined the word to mean pro-American, and opposing land reform, national ownership of raw materials and public subsidy of foreign agriculture or industry as an “undemocratic” attack on “free markets,” meaning markets controlled by U.S. financial interests and absentee owners of land, natural resources and banks. A major byproduct of warfare has always been refugees, and today’s wave fleeing ISIS, Al Qaeda and other U.S.-backed Near Eastern proxies is flooding Europe. A similar wave is fleeing the dictatorial regimes backed by the United States from Honduras, Ecuador, Colombia and neighboring countries. The refugee crisis has become a major factor leading to the resurgence of nationalist parties throughout Europe and for the white nationalism of Donald Trump in the United States. Dollarization as the vehicle for U.S. nationalism The Dollar Standard – U.S. Treasury debt to foreigners held by the world’s central banks – has replaced the gold-exchange standard for the world’s central bank reserves to settle payments imbalances among themselves. This has enabled the United States to uniquely run balance-of-payments deficits for nearly seventy years, despite the fact that these Treasury IOUs have little visible likelihood of being repaid except under arrangements where U.S. rent-seeking and outright financial tribute from other enables it to liquidate its official foreign debt. The United States is the only nation that can run sustained balance-of-payments deficits without having to sell off its assets or raise interest rates to borrow foreign money. No other national economy in the world can could afford foreign military expenditures on any major scale without losing its exchange value. Without the Treasury-bill standard, the United States would be in this same position along with other nations. That is why Russia, China and other powers that U.S. strategists deem to be strategic rivals and enemies are looking to restore gold’s role as the preferred asset to settle payments imbalances. The U.S. response is to impose regime change on countries that prefer gold or other foreign currencies to dollars for their exchange reserves. A case in point is the overthrow of Libya’s Omar Kaddafi after he sought to base his nation’s international reserves on gold. His liquidation stands as a military warning to other countries. Thanks to the fact that payments-surplus economies invest their dollar inflows in U.S. Treasury bonds, the U.S. balance-of-payments deficit finances its domestic budget deficit. This foreign central-bank recycling of U.S. overseas military spending into purchases of U.S. Treasury securities gives the United States a free ride, financing its budget – also mainly military in character – so that it can taxing its own citizens. Trump is forcing other countries to create an alternative to the Dollar Standard The fact that Donald Trump’s economic policies are proving ineffective in restoring American manufacturing is creating rising nationalist pressure to exploit foreigners by arbitrary tariffs without regard for international law, and to impose trade sanctions and diplomatic meddling to disrupt regimes that pursue policies that U.S. diplomats do not like. There is a parallel here with Rome in the late 1st century BC. It stripped its provinces to pay for its military deficit, the grain dole and land redistribution at the expense of Italian cities and Asia Minor. This created foreign opposition to drive Rome out. The U.S. economy is similar to Rome’s: extractive rather than productive, based mainly on land rents and money-interest. As the domestic market is impoverished, U.S. politicians are seeking to take from abroad what no longer is being produced at home. What is so ironic – and so self-defeating of America’s free global ride – is that Trump’s simplistic aim of lowering the dollar’s exchange rate to make U.S. exports more price-competitive. He imagines commodity trade to be the entire balance of payments, as if there were no military spending, not to mention lending and investment. To lower the dollar’s exchange rate, he is demanding that China’s central bank and those of other countries stop supporting the dollar by recycling the dollars they receive for their exports into holdings of U.S. Treasury securities. This tunnel vision leaves out of account the fact that the trade balance is not simply a matter of comparative international price levels. The United States has dissipated its supply of spare manufacturing capacity and local suppliers of parts and materials, while much of its industrial engineering and skilled manufacturing labor has retired. An immense shortfall must be filled by new capital investment, education and public infrastructure, whose charges are far above those of other economics. Trump’s infrastructure ideology is a Public-Private Partnership characterized by high-cost financialization demanding high monopoly rents to cover its interest charges, stock dividends and management fees. This neoliberal policy raises the cost of living for the U.S. labor force, making it uncompetitive. The United States is unable to produce more at any price right now, because its has spent the past half-century dismantling its infrastructure, closing down its part suppliers and outsourcing its industrial technology. The United States has privatized and financialized infrastructure and basic needs such as public health and medical care, education and transportation that other countries have kept in their public domain to make their economies more cost-efficient by providing essential services at subsidized prices or freely. The United States also has led the practice of debt pyramiding, from housing to corporate finance. This financial engineering and wealth creation by inflating debt-financed real estate and stock market bubbles has made the United States a high-cost economy that cannot compete successfully with well-managed mixed economies. Unable to recover dominance in manufacturing, the United States is concentrating on rent-extracting sectors that it hopes monopolize, headed by information technology and military production. On the industrial front, it threatens to disrupt China and other mixed economies by imposing trade and financial sanctions. The great gamble is whether these other countries will defend themselves by joining in alliances enabling them to bypass the U.S. economy. American strategists imagine their country to be the world’s essential economy, without whose market other countries must suffer depression. The Trump Administration thinks that There Is No Alternative (TINA) for other countries except for their own financial systems to rely on U.S. dollar credit. To protect themselves from U.S. sanctions, countries would have to avoid using the dollar, and hence U.S. banks. This would require creation of a non-dollarized financial system for use among themselves, including their own alternative to the SWIFT bank clearing system. Table 1 lists some possible related defenses against U.S. nationalistic diplomacy. As noted above, what also is ironic in President Trump’s accusation of China and other countries of artificially manipulating their exchange rate against the dollar (by recycling their trade and payments surpluses into Treasury securities to hold down their currency’s dollar valuation) involves dismantling the Treasury-bill standard. The main way that foreign economies have stabilized their exchange rate since 1971 has indeed been to recycle their dollar inflows into U.S. Treasury securities. Letting their currency’s value rise would threaten their export competitiveness against their rivals, although not necessarily benefit the United States. Ending this practice leaves countries with the main way to protect their currencies from rising against the dollar is to reduce dollar inflows by blocking U.S. lending to domestic borrowers. They may levy floating tariffs proportioned to the dollar’s declining value. The U.S. has a long history since the 1920s of raising its tariffs against currencies that are depreciating: the American Selling Price (ASP) system. Other countries can impose their own floating tariffs against U.S. goods. Trade dependency as an aim of the World Bank, IMF and US AID The world today faces a problem much like what it faced on the eve of World War II. Like Germany then, the United States now poses the main threat of war, and equally destructive neoliberal economic regimes imposing austerity, economic shrinkage and depopulation. U.S. diplomats are threatening to destroy regimes and entire economies that seek to remain independent of this system, by trade and financial sanctions backed by direct military force. Dedollarization will require creation of multilateral alternatives to U.S. “front” institutions such as the World Bank, IMF and other agencies in which the United States holds veto power to block any alternative policies deemed not to let it “win.” U.S. trade policy through the World Bank and U.S. foreign aid agencies aims at promoting dependency on U.S. food exports and other key commodities, while hiring U.S. engineering firms to build up export infrastructure to subsidize U.S. and other natural-resource investors. The financing is mainly in dollars, providing risk-free bonds to U.S. and other financial institutions. The resulting commercial and financial “interdependency” has led to a situation in which a sudden interruption of supply would disrupt foreign economies by causing a breakdown in their chain of payments and production. The effect is to lock client countries into dependency on the U.S. economy and its diplomacy, euphemized as “promoting growth and development.” U.S. neoliberal policy via the IMF imposes austerity and opposes debt writedowns. Its economic model pretends that debtor countries can pay any volume of dollar debt simply by reducing wages to squeeze more income out of the labor force to pay foreign creditors. This ignores the fact that solving the domestic “budget problem” by taxing local revenue still faces the “transfer problem” of converting it into dollars or other hard currencies in which most international debt is denominated. The result is that the IMF’s “stabilization” programs actually destabilize and impoverish countries forced into following its advice. IMF loans support pro-U.S. regimes such as Ukraine, and subsidize capital flight by supporting local currencies long enough to enable U.S. client oligarchies to flee their currencies at a pre-devaluation exchange rate for the dollar. When the local currency finally is allowed to collapse, debtor countries are advised to impose anti-labor austerity. This globalizes the class war of capital against labor while keeping debtor countries on a short U.S. financial leash. U.S. diplomacy is capped by trade sanctions to disrupt economies that break away from U.S. aims. Sanctions are a form of economic sabotage, as lethal as outright military warfare in establishing U.S. control over foreign economies. The threat is to impoverish civilian populations, in the belief that this will lead them to replace their governments with pro-American regimes promising to restore prosperity by selling off their domestic infrastructure to U.S. and other multinational investors. chart hudson There are alternatives, on many fronts Militarily, today’s leading alternative to NATO expansionism is the Shanghai Cooperation Organization (SCO), along with Europe following France’s example under Charles de Gaulle and withdrawing. After all, there is no real threat of military invasion today in Europe. No nation can occupy another without an enormous military draft and such heavy personnel losses that domestic protests would unseat the government waging such a war. The U.S. anti-war movement in the 1960s signaled the end of the military draft, not only in the United States but in nearly all democratic countries. (Israel, Switzerland, Brazil and North Korea are exceptions.) The enormous spending on armaments for a kind of war unlikely to be fought is not really military, but simply to provide profits to the military industrial complex. The arms are not really to be used. They are simply to be bought, and ultimately scrapped. The danger, of course, is that these not-for-use arms actually might be used, if only to create a need for new profitable production. Likewise, foreign holdings of dollars are not really to be spent on purchases of U.S. exports or investments. They are like fine-wine collectibles, for saving rather than for drinking. The alternative to such dollarized holdings is to create a mutual use of national currencies, and a domestic bank-clearing payments system as an alternative to SWIFT. Russia, China, Iran and Venezuela already are said to be developing a crypto-currency payments to circumvent U.S. sanctions and hence financial control. In the World Trade Organization, the United States has tried to claim that any industry receiving public infrastructure or credit subsidy deserves tariff retaliation in order to force privatization. In response to WTO rulings that U.S. tariffs are illegally imposed, the United States “has blocked all new appointments to the seven-member appellate body in protest, leaving it in danger of collapse because it may not have enough judges to allow it to hear new cases.” In the U.S. view, only privatized trade financed by private rather than public banks is “fair” trade. An alternative to the WTO (or removal of its veto privilege given to the U.S. bloc) is needed to cope with U.S. neoliberal ideology and, most recently, the U.S. travesty claiming “national security” exemption to free-trade treaties, impose tariffs on steel, aluminum, and on European countries that circumvent sanctions on Iran or threaten to buy oil from Russia via the Nordstream II pipeline instead of high-cost liquified “freedom gas” from the United States. In the realm of development lending, China’s bank along with its Belt and Road initiative is an incipient alternative to the World Bank, whose main role has been to promote foreign dependency on U.S. suppliers. The IMF for its part now functions as an extension of the U.S. Department of Defense to subsidize client regimes such as Ukraine while financially isolating countries not subservient to U.S. diplomacy. To save debt-strapped economies suffering Greek-style austerity, the world needs to replace neoliberal economic theory with an analytic logic for debt writedowns based on the ability to pay. The guiding principle of the needed development-oriented logic of international law should be that no nation should be obliged to pay foreign creditors by having to sell of the public domain and rent-extraction rights to foreign creditors. The defining character of nationhood should be the fiscal right to tax natural resource rents and financial returns, and to create its own monetary system. The United States refuses to join the International Criminal Court. To be effective, it needs enforcement power for its judgments and penalties, capped by the ability to bring charges of war crimes in the tradition of the Nuremberg tribunal. U.S. to such a court, combined with its military buildup now threatening World War III, suggests a new alignment of countries akin to the Non-Aligned Nations movement of the 1950s and 1960s. Non-aligned in this case means freedom from U.S. diplomatic control or threats. Such institutions require a more realistic economic theory and philosophy of operations to replace the neoliberal logic for anti-government privatization, anti-labor austerity, and opposition to domestic budget deficits and debt writedowns. Today’s neoliberal doctrine counts financial late fees and rising housing prices as adding to “real output” (GDP), but deems public investment as deadweight spending, not a contribution to output. The aim of such logic is to convince governments to pay their foreign creditors by selling off their public infrastructure and other assets in the public domain. Just as the “capacity to pay” principle was the foundation stone of the Bank for International Settlements in 1931, a similar basis is needed to measure today’s ability to pay debts and hence to write down bad loans that have been made without a corresponding ability of debtors to pay. Without such an institution and body of analysis, the IMF’s neoliberal principle of imposing economic depression and falling living standards to pay U.S. and other foreign creditors will impose global poverty. The above proposals provide an alternative to the U.S. “exceptionalist” refusal to join any international organization that has a say over its affairs. Other countries must be willing to turn the tables and isolate U.S. banks, U.S. exporters, and to avoid using U.S. dollars and routing payments via U.S. banks. To protect their ability to create a countervailing power requires an international court and its sponsoring organization. Summary The first existential objective is to avoid the current threat of war by winding down U.S. military interference in foreign countries and removing U.S. military bases as relics of neocolonialism. Their danger to world peace and prosperity threatens a reversion to the pre-World War II colonialism, ruling by client elites along lines similar to the 2014 Ukrainian coup by neo-Nazi groups sponsored by the U.S. State Department and National Endowment for Democracy. Such control recalls the dictators that U.S. diplomacy established throughout Latin America in the 1950s. Today’s ethnic terrorism by U.S.-sponsored Wahabi-Saudi Islam recalls the behavior of Nazi Germany in the 1940s. Global warming is the second major existentialist threat. Blocking attempts to reverse it is a bedrock of American foreign policy, because it is based on control of oil. So the military, refugee and global warming threats are interconnected. The U.S. military poses the greatest immediate danger. Today’s warfare is fundamentally changed from what it used to be. Prior to the 1970s, nations conquering others had to invade and occupy them with armies recruited by a military draft. But no democracy in today’s world can revive such a draft without triggering widespread refusal to fight, voting the government out of power. The only way the United States – or other countries – can fight other nations is to bomb them. And as noted above, economic sanctions have as destructive an effect on civilian populations in countries deemed to be U.S. adversaries as overt warfare. The United States can sponsor political coups (as in Honduras and Pinochet’s Chile), but cannot occupy. It is unwilling to rebuild, to say nothing of taking responsibility for the waves of refugees that our bombing and sanctions are causing from Latin America to the Near East. U.S. ideologues view their nation’s coercive military expansion and political subversion and neoliberal economic policy of privatization and financialization as an irreversible victory signaling the End of History. To the rest of the world it is a threat to human survival. The American promise is that the victory of neoliberalism is the End of History, offering prosperity to the entire world. But beneath the rhetoric of free choice and free markets is the reality of corruption, subversion, coercion, debt peonage and neofeudalism. The reality is the creation and subsidy of polarized economies bifurcated between a privileged rentier class and its clients, their debtors and renters. America is to be permitted to monopolize trade in oil and food grains, and high-technology rent-yielding monopolies, living off its dependent customers. Unlike medieval serfdom, people subject to this End of History scenario can choose to live wherever they want. But wherever they live, they must take on a lifetime of debt to obtain access to a home of their own, and rely on U.S.-sponsored control of their basic needs, money and credit by adhering to U.S. financial planning of their economies. This dystopian scenario confirms Rosa Luxemburg’s recognition that the ultimate choice facing nations in today’s world is between socialism and barbarism. Keynote Paper delivered at the 14th Forum of the World Association for Political Economy, July 21, 2019. Notes  Billy Bambrough, “Bitcoin Threatens To ‘Take Power’ From The U.S. Federal Reserve,” Forbes, May 15, 2019. https://www.forbes.com/sites/billybambrough/2019/05/15/a-u-s-congressman-is-so-scared-of-bitcoin-and-crypto-he-wants-it-banned/#36b2700b6405.  Vladimir Putin, keynote address to the Economic Forum, June 5-6 2019. Putin went on to warn of “a policy of completely unlimited economic egoism and a forced breakdown.” This fragmenting of the global economic space “is the road to endless conflict, trade wars and maybe not just trade wars. Figuratively, this is the road to the ultimate fight of all against all.”  Address to St Petersburg International Economic Forum’s Plenary Session, St Petersburg, Kremlin.ru, June 5, 2009, from Johnson’s Russia List, June 8, 2009, #8,  https://www.rt.com/business/464013-china-russia-cryptocurrency-dollar-dethrone/ . Already in the late 1950s the Forgash Plan proposed a World Bank for Economic Acceleration. Designed by Terence McCarthy and sponsored by Florida Senator Morris Forgash, the bank would have been a more truly development-oriented institution to guide foreign development to create balanced economies self-sufficient in food and other essentials. The proposal was opposed by U.S. interests on the ground that countries pursuing land reform tended to be anti-American. More to the point, they would have avoided trade and financial dependency on U.S. suppliers and banks, and hence on U.S. trade and financial sanctions to prevent them from following policies at odds with U.S. diplomatic demands.  Don Weinland, “WTO rules against US in tariff dispute with China,” Financial Times, July 17, 2019. https://xenagoguevicene.wordpress.com/2019/07/29/u-s-economic-warfare-and-likely-foreign-defenses-by-michael-hudson-%e2%80%a2-23-july-2019/
Among the more frequently mentioned G+ alternatives at the Google+ Mass Migration community, and others, is MeWe with over 250 mentions. The site bills itself as "The Next-Gen Social Network" and the "anti-Facebook": "No Ads, No Political Bias, No Spyware. NO BS. It is headed by professed Libertarian CEO Mark Weinstein. As the site reveals no public user-generated content to non-members, it's necessary to create an account in order to get a full impression. I thought I'd provide an overview based on recent explorations. This report leads of with background on the company, though readers may find the report and analysis of specific groups on the site of interest.
Founder & CEO Mark Weinstein. Co-Founder & Chief Scientist, Jonathan Wolfe (no longer with company). Weinstein previously founded SuperFamily and SuperFriends, "at the turn of the millennium". Weinstein's MeWe biography lists articles published by The Mirror (UK), Huffington Post, USA Today, InfoSecurity Magazine, Dark Reading, and the Nation. His media appearances include MarketWatch, PBS, Fox News, and CNN. He's also the author of several personal-success books. His Crunchbase bio is a repeat of the MeWe content.
Sir Tim Berners-Lee: Inventor of the World Wide Web.
Jack Canfield: Legendary Founder, Chicken Soup For The Soul.
John Friedman: Founding Partner, Easton Capital.
Cullen Hoback: Director, Terms and Conditions May Apply.
Dianne Morrison: Partner, MorrisonMcNabb, LLC.
Colin Sebastian: Director, Equity Research/Internet, RW Baird.
Brett Shevack: CEO, Brand Initiatives; Former Vice Chair, BBDO.
Marci Shimoff: author, Happy for No Reason.
Sherry Turkle: Professor, MIT; author Alone Together.
Ownership & Investment
MeWe is the dba of Sgrouples, a private for-profit early-stage venture company based in Los Angeles, though with a Mountain View HQ and mailing address, 11-50 employees, with $10m in funding over five rounds, and a $20m valuation as of 2016. Sgrouples, Inc., dba MeWe Trust & Safety - Legal Policy c/o Fenwick West 801 California Street Mountain View, CA 94041 Crunchbase Profile. Founded: 2012 (source) Secured $1.2M in seed funding in 2014. 2016 valuation: $20m (source] Backers:
John Friedman, venture capitalist, founder & MD, Easton Capital, New York, NY.
Do you have friends still on Facebook? Share this link with them about Facebook wanting their banking information - tell them to move to MeWe now! No Ads. No Spyware. No Political Agenda. No Bias Algorithms. No Shadow Banning. No Facial Recognition.
MeWe provide several policy-related links on the site:
California Disclosures -- Do Not Track, 3rd-party cookies, and California Privacy Rights.
Your Identity: We protect it to the extent the law allows
Linking to Third-Party Sites: These are your decisions and responsibilities
Security: HTTPS and Encryption
Terms of Service
The ToS addresses:
Allowable Content and Acceptable Use
Who Our Services are For
User Content Ownership
Misuse of Usernames, Page names, Group names
Fake Accounts (pseudonyms allowed, misleading is not)
More on Spam
Our Commitment to Data Security
MeWe Content Data
MeWe Log Data
Your Data Portability
Deleting Your Account -- Right to Erasure
MeWe Secret Chat
MeWe Invitations and "Add Automatically"
Additional Policies for Pages, Groups, and Events Notifications of Requests for Account Information
Guidelines for Law Enforcement Seeking Customer Data (Worldwide)
Ownership In and To the Site and Services
Effective: November 6, 2018.
The FAQ addresses:
What is MeWe (emphasises privacy)
The Politics of MeWe ("absolutely no political agenda")
How can MeWe be free and make money? (additional services/freemium)
Which devices is MeWe available on? (Android, iOS)
What content can I share on MeWe (photos, videos, documents, voice messages, privacy mail, chats, gifs, memes, doodles)
What are some unique features of MeWe?
Who can see the posts I share?
Can I delete my MeWe account and is it easy to do this?
This emphasises that people are social cratures and private people by right. The service offers the power of self expression under an umbrella of safety. It notes that our innermost thoughts require privacy. Under "We aspire...":
MeWe is here to empower and enrich your world. We challenge the status quo by making privacy, respect, and safety the foundations of an innovatively designed, easy-to-use social experience.
Totalling 182 words.
Privacy Bill of Rights
A ten-item statement of principles (possibly inspired by another document, it might appear):
You own your personal information & content. It is explicitly not ours.
You will never receive a targeted advertisement or 3rd party content based on what you do or say online. We think that's creepy.
You see every post in timeline order from your friends, family & groups. We do not manipulate, filter, or change the order of your content or what you see.
Permissions & privacy are your rights. You control them.
You control who can access your content.
You control what, if anything, others can see in member searches.
Your privacy means we do not share your personal information with anyone.
Your emojis are for you and your friends. We do not monitor or mine your data.
Your face is your business. We do not use facial recognition technology.
You have the right to delete your account and take your content with you at any time.
There are a few mentions of MeWe in the press, some listed on the company's website, others via web search.
The following articles are linked directly from MeWe's Press page:
The page also lists a "Privacy Revolution Required Reading" list of 20 articles all addressing Facebook privacy gaffes in the mainstream press (Wired, TechCrunch, Fortune, Gizmodo, The Guardian, etc.). There are further self-reported mentions in several of the company's PR releases over the years.
Facebook Alternative MeWe Raises $5.2M, Los Angeles Business Journal (July 7, 2018) "The latest round, as well as MeWe’s total $10 million in fundraising, was predominantly backed by celebrity investors, such as author Marci Shimoff, Rachel Roy, and Lynda Weinman, founder of Lynda.com, which sold to Linkedin in 2015 for $1.5 billion. Jack Canfield, creator of the “Chicken Soup for the Soul” book series, also invested in MeWe."
Is building a Facebook alternative worth the effort? MeWe thinks soVentureBeat (July 5, 2018) "[T]here are still companies hoping to make their mark in the social networking realm with “Facebook alternatives.” One of those is MeWe, a “next-generation” social network that positions itself as the anti-Facebook: “Your private life is not for sale. No ads. No Spyware. No BS,” its website proclaims." Continues to mention "modest $5.2 million" funding round. Also a "sister product", MeWePRO, a Slack competitor.
Startup MeWe Launches Free, 'No Ads' Social NetworkeWeek (March 16, 2016) "MeWe, a new network engineered with its users' data privacy built in, is betting that a lot of people will say yes to both of those questions. The Mountain View, Calif.-based startup, whose parent company is Sgrouples.com, launched its freely available social network out of beta March 9 with more than 200,000 members already using it.... Sir Tim Berners-Lee, co-architect of the World Wide Web, found out about MeWe on his own and approached the company about getting involved."
Facebook Alternative MeWe closes $5.2M Series A Yahoo/PR Newswire (July 5, 2018). "The investment brings MeWe's total funding to $10 million, to support the engineering of MeWe and the enterprise version MeWePRO.... The company has relied on high net worth individuals for all of its funding including Lynda Weinman, founder of Lynda.com ...; Marci Shimoff, a #1 New York Times bestselling author ...; Rachel Roy...; and Jack Canfield."
Exactis Data Leak 2018: 340 Million Records ExposedInvestorPlace (June 29, 2018) "'Today's cookies can link your mobile phone to your laptop, to your home monitoring devices, and much, much more. Creepy? Scary? Orwellian? Yes, yes, yes,' Mark Weinstein, the privacy expert and founder of social media company MeWe, told MarketWatch. 'So imagine that Exactis, like Facebook, knows everything about you — really.'"
MeWe Raises $3M in FundingFinSMEs (March 9, 2016) "Sgrouples, Inc., the Mountain View, CA-based developer of MeWe, a social network with neither ads nor tracking, raised $3m in funding."
This section is a basic rundown of the user-visible site technology.
The site is not natively accessible from a mobile Web browser as it is overlayed with a promotion for the mobile application instead. Selecting "Desktop View" in most mobile browsers should allow browser-based access.
There are both Android and iOS apps for MeWe. I've used neither of these, though the App store entries note:
MeWe Android 4.4 rating (13.1k ratings). Permissions: Contacts (read), Location (approximate/precise), SMS (receive), Phone (read status & identity), Photos/Media/Files (read, modify, & delete contents), Storage (read, modify, or delete), Camera (take pictures/videos), Microphone (record audio), Device ID & Call Info (read status & identity), and numerous elements under Other.
Crunchbase cites 209,220 mobile downloads over the past 30 days (via Apptopia), an 80.78% monthly growth rate, from Google Play.
Either selecting "View Desktop" or navigating with a Desktop browser to https://www.mewe.com your are presented with a registration screen, with the "About", "Privacy Bill of Rights", "MeWe Challenge", and a language selector across the top of the page. Information requested are first and last name, phone or email, and a password. Pseudonymous identities are permitted, though this isn't noted on the login screen. Returning members can use the "Member Log In" button. The uMatrix Firefox extension reveals no third-party content: all page elements are served from mewe.com, img.mewe.com, cdn.mewe.com, or ws.mewe.com. (In subsequent browsing, you may find third-party plugins from, for example, YouTube, for videos, or Giphy, for animated GIFs.) The web front-end is nginx. The site uses SSL v3, issued by DigiCert Inc. to Sgrouples, Inc.
The onboarding experience is stark. There is no default content presented. A set of unidentified icons spans the top of the screen, these turn out to be Home, Chats, Groups, Pages, and Events. New users have to, somehow, find groups or people to connect with, and there's little guidance as to how to do this.
Generally there is a three panel view, with left- and right-hand sidebars of largely navigational or status information, and a central panel with main content. There are also pop-up elements for chats, an omnipresent feature of the site. Controls display labels on some devices and/or resolutions. Controls do not provide tooltips for navigational aid.
My Cloud - Seamlessly organize all your content in My Cloud; it's your personal cloud. My Cloud offers an interactive dashboard for you to control everything you’ve posted or shared - making it simple to delete or reshare.
Unique profiles - Be yourself, free from any tracking and spying. Customize your profile for every group you create or join.
Voice integration (on any or all content) - Post pictures, videos, or documents and include a voice message. Respond to a shared post or just chat. MeWe’s voice integration works for you and your contacts throughout the entire platform.
Universal tagging - This is a new, convenient way to sort and organize all the content you receive and share, making it easy to find everything, anytime.
Enhanced permission control (patent issued) - Manage permissions on a granular level and decide exactly who sees what. You can also remove yourself from the search directory, make yourself invisible to other members online, and much more.
Much More – join MeWe today and take a look inside! MeWe is the next-gen social networking experience designed for you to have fun, stay in touch, collaborate, organize, and simplify.
A key aspect of any social network is its community. Some of the available or ascertained information on this follows.
Weinstein claims a "million+ following inside MeWe.com" on Twitter. The largest visible groups appear to have a maximum of around 15,000 members , for "Awesome gifs". "Clean Comedy" rates 13,350, and the largest open political groups, 11,000+ members. This compares to Google+ which has a staggering, though Android-registrations-inflated 3.3 billion profiles, and 7.9 million communities, though the largest of these come in at under 10 million members. It's likely that MeWe's membership is on the whole more more active than Google+'s, where generally-visible posting activity was limited to just over 9% of all profiles, and the active user base was well under 1% of the total nominal population.
MeWe do not publish active users (e.g., MUA / monthly active users) statistics.
MeWe is principally a group-oriented discussion site -- interactions take place either between individuals or within group contexts. Virtually all discovery is group-oriented. The selection and dynamics of groups on the site will likely strongly affect user experience, so exploring the available groups and their characteristics is of interest. "MeWe has over 60,000 open groups" according to its FAQ. The Open groups -- visible to any registered MeWe user, though not to the general public Web -- are browsable, though sections and topics must be expanded to view the contents: an overview isn't immediately accessible. We provide a taste here. A selection of ten featured topics spans the top of the browser. As I view these, they are:
Health & Fitness
Cars & Motorcycles
Fashion and Beauty
Specific groups may appear in multiple categories. The top Groups within these topics have, variously, 15,482, 7,738, 15,482 (dupe), 7,745, 8,223, 8,220, 1,713, 9,527, 2,716, and 1,516 members. Listings scroll at length -- the Music topic has 234 Groups, ranging in size from 5 to 5,738 members, with a median of 59, mean of 311.4, and a 90%ile of 743.5. Below this is a grid of topics, 122 in all, ranging from Activism to Wellness, and including among them. A selected sample of these topics, with top groups listed members in (parens), follows:
Activism: QAnon+++ (2,572), PATRIOT PREPPERS USA (2,430), Deplorables Republic (2,48), The War Drummer (1,898), Patriots for a United America. (1894), Anonymous (1,700).
Alternative Energy: Reiki, Crystals, and alternative healing (2,114), 💜Starseeds & Empaths💜 (345), Living in Colour (365).
Alternative Lifestyle: Natural Healing and Home Remedies (3,045), Backyard Farming of All Things (2,696), WeTheSheeple (2,251).
Alumni Connections: Google Plus Refugees (271), Google+ Refugees (186), Frog Pond (156), Carlsbad NM High School alumni (57).
Animals: I Love My Dog (4,421), Pussy Shots (4,619).
Astronomy: Spherical Earth Truth, Flat Earth is Wrong (278), Nibiru, Nemesis, Hercolobus, The Destroyer (187).
Biology: Trees (344), Field of Birds (104), Patriots of Australia (51).
Personal Improvement: For Introverts. (1,214), Anarchy, Philosophy, Psychology, and Spirituality (679), Positive Affirmations (447).
Philosophy: In5d Esoteric Metaphysical and Spiritual Database (1,764), Thought Bouncing (1,137), Obtectivists - Galts Gulch - Ayn Rand fans (561).
Poetry: Dead Poest (1,407), Palacio de Poetry (451), Poets Corner (412).
Politics: Donald J. Trump 2016 - Present (11,486), The Conservative's Hangout (8,345), Qanon Follow The White Rabbit (5,600), Drain The Swamp (4,978), Libertarians (4,528), United We Stand Trump2020 (4,216).
Pop Culture: The Loftus Party (116), The Walking Dead: The Stalking Dead (100), Tyler, Texas (71).
Privacy: Join the Open/Privacy Movement (3974), Kingsport tn gun trader (1,157), Safer Computing (555).
To be clear: whilst I've not included every topic, I've sampled a majority of them above, and listed not an arbitrary selection, but the top few Groups under each topic.
Google Plus expats (1,862)
Google+ Refugees (186)
G+ Refugees (101)
my Google+ expatriates
The Google Plus expats group seems the most active of these by far.
It's curious that MeWe make a specific point in their FAQ that:
At MeWe we have absolutely no political agenda and we have a very straightforward Terms of Service. MeWe is for all law-abiding people everywhere in the world, regardless of political, ethnic, religious, sexual, and other preferences.
There are 403 political groups on MeWe. I won't list them all here, but the first 100 or so give a pretty clear idea of flavour. Again, membership is in (parentheses). Note that half the total political Groups memberships are in the first 21 groups listed here, the first 6 are 25% of the total.
Donald J. Trump 2016 - Present (11486)
The Conservative's Hangout (8345)
Qanon Follow The White Rabbit (5600)
Drain The Swamp (4978)
United We Stand Trump2020 (4216)
The Right To Self Defense (3757)
Alternative Media (3711)
Hardcore Conservative Patriots for Trump (3192)
Bastket Of Deplorables4Trump! (3032)
Return of the Republic (2509)
Infowars Chat Room Unofficial (2159)
Donald Trump Our President 2017-2025 (2033)
Berners for Progress (1963)
Sean Hannity Fans (1901)
The American Conservative (1839)
I Am The NRA (1704)
Tucker Carlson Fox News (1645)
We Love Donald Trump (1611)
MAGA - Make America Great Again (1512)
news from the front (1337)
Basket of Deplorables (1317)
Payton's Park Bench (1283)
Convention of States (1282)
Britons For Brexit (1186)
MoJo 5.0 Radio (1180)
MeWe Free Press (1119)
The Constitutionally Elite (1110)
WOMEN FOR PRESIDENT TRUMP (1032)
AMERICANS AGAINST ISIS and OTHER ENEMIES (943)
#WalkAway Campaign (894)
ALEX JONES (877)
The Lion Is Awake ! (854)
We Support Donald Trump! (810)
The Stratosphere Lounge (789)
TRUMP-USA-HANDS OFF OUR PRESIDENT (767)
Official Tea Party USA (749)
Mojo50 Jackholes (739)
Yes Scotland (697)
"WE THE DEPLORABLE" - MOVE ON SNOWFLAKE! (688)
Judge Jeanine Pirro Fans (671)
Ted Cruz for President (650)
No Lapdog Media (647)
Q Chatter (647)
Daily Brexit (636)
Tucker Carlson Fox News (601)
The Trumps Storm Group (600)
QAnon-Patriots WWG1WGA (598)
100% American (569)
Ladies For Donald Trump (566)
Deep State (560)
In the Name of Liberty (557)
Material Planet (555)
Trump NRA Free Speech Patriots on MeWe Gab.ai etc (546)
Magna Carta Group (520)
Constitutional Conservatives (506)
Question Everything (503)
Conspiracy Research (500)
Bill O'Reilly Fans (481)
Conservative Misfit's (479)
Canadian politics (478)
HARDCORE DEPLORABLES (454)
Tampa Bay Trump Club (445)
UK Politics (430)
Bongino Fan Page (429)
Radical Conservatives (429)
RESIST THE RESISTANCE (419)
The Deplorables (409)
America's Freedom Fighters (401)
Politically Incorrect & Proud (399)
CONSERVATIVES FOR AMERICA ! (385)
Political satire (383)
RISE OF THE RIGHT (371)
UK Sovereignty,Independence,Democracy -Everlasting (366)
The Patriots Voting Coalition (359)
End The Insanity (349)
Coming American Civil War! (345)
Constitutional Conservatives (343)
United Nations Watch (342)
A Revival Of The Critical Thinking Union (337)
The New Libertarian (335)
Libertarian Party (official ) (333)
DDS United (Duterte Die-hard Supporters) (332)
American Conservative Veterans (331)
America Needs Donald Trump (326)
The UKIP Debating Society (321)
Coalition For Trump (310)
FRIENDS THAT LIKE JILL STEIN AND THE GREEN PARTY (292)
2nd Amendment (287)
Never Forget #SethRich (286)
Green Party Supporters 2020 (283)
It seems there is relatively little representation from the left wing, or even the centre, of the political spectrum. A case-insensitive match for "liberal" turns up:
104: Conservatives Against Liberal Beliefs C.A.L.I.B (273)
184: Progressive and Liberal Politics (119)
301: Liberalism is a Mental Disorder (33)
302: Resistance Against Liberal Socialism (33)
358: NOT For Liberals (17)
367: Drinking Liberally Houston (14)
400: Stephanie Miller's Sexy Liberal Army (6)
Mainstream political parties are little represented, though again, the balance seems skewed searching on "(democrat|republic|gop)":
391: Saving The Republic: Video News & Opinion (8)
The terms "left" and "right" provide a few matches, not all strictly political-axis aligned:
7: The Right To Self Defense (3757)
80: RISE OF THE RIGHT (371)
150: POLITICS ON THE LEFT (156)
157: 1st Amendment Rights Protected By The 2nd Amendmen (141)
209: On The Left With Jeremy Corbyn (84)
262: Eyes-Left Labour & PP - Social Media (49)
300: Gather Left (33)
385: Defend Washington State Gun Rights (9)
390: Left Coast Conservatives (8)
Socialism and Communism also warrant a few mentions:
121: Revolutionary Socialists United (204)
216: Socialist Thought (79)
220: Stories Of Communism (76)
262: Eyes-Left Labour & PP - Social Media (49)
288: Snuggly Wuggly Socialists (38)
302: Resistance Against Liberal Socialism (33)
And there are some references to green, laboulabor parties:
97: FRIENDS THAT LIKE JILL STEIN AND THE GREEN PARTY (292)
100: Green Party Supporters 2020 (283)
262: Eyes-Left Labour & PP - Social Media (49)
320: Green Party of Ohio Issues & Discussion Group (29)
Whilst there may not be a political agenda, there does appear to be at least a slight political bias to the site. And a distinctive skew on many other topical subjects. Those seeking new homes online may wish to take this into account.
Various typos and tagging corrections. 2018-11-29 - 30
Added G+MM references count for MeWe to lede paragraph. 2018-12-2
/u/ultra-royalist on What are your thoughts on left-wing ideologies that advocate for small, localized/decentralized governments such as anarcho-socialism, anarcho-syndicalism, agorism, mutualism, etc?
Revolutionary Catalonia (July 21, 1936 – 1939) was the part of Catalonia (a region in northeast Spain) controlled by the anarchist and socialist trade unions, parties, and militias during the Spanish Civil War. https://infogalactic.com/info/Revolutionary_Catalonia Controlled by trade unions? Not an anarchist venture. It seemed to collapse of its own mismanagement. The Free Territory (Ukrainian: Вільна територія vilna terytoriya; Russian: свободная территория svobodnaya territoriya) or Makhnovia (Махновщина Makhnovshchyna) resulted from an attempt to form a stateless anarchist society during the Ukrainian Revolution of 1917 to 1921. It existed from 1918 to 1921, during which time "free soviets" and libertarian communes operated under the protection of Nestor Makhno's Revolutionary Insurrectionary Army. https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Free_Territory_(Ukraine).html.html) Again, we have strong state presence. From 1929 to 1931, two million Korean migrants ran an autonomous, Anarchist zone in Shinmin, a rural province in Manchuria (in China) across the border from Korea. Residents made decisions at village assemblies, which confederated into district councils and area councils. The confederation, known as the Korean People’s Association in Manchuria (KPAM), had administrative departments that assisted with agriculture, education, finance, military affairs, and health. Staff in these departments received no more than the province's average wage. The KPAM described itself as "an independent self-governing cooperative system of the Korean people who assembled their full power to save our nation by struggling against Japan". https://anarchyinaction.org/index.php?title=Shinmin_Prefecture Another de facto socialist microstate. All had stability problems, and we have no good example of them functioning because they lasted such a short while. Currencies like bitcoin aren't managed by the government in any way whatsoever. Yes, we know. Talking down to your audience helps no one. You missed the point: if currency is distributed, it requires a central authority. from ultra-royalist on What are your thoughts on left-wing ideologies that advocate for small, localized/decentralized governments such as anarcho-socialism, anarcho-syndicalism, agorism, mutualism, etc?
Transnistria is for all intents and purposes, a forgotten backwater of Europe that's major economic activity is steel production and bitcoin mining. For the last 30-odd years, Russia has deployed forces ostensibly to protect large quantities of ammunition and other war-stocks from the 14th Army. As of the current day, some 1,500 troops are still deployed to Transnistria protecting some 20,000 tons of equipment that still remain. The pullout of the equipment has been complicated by Ukrainian refusal to allow it to pass through their territory, and so our troops remain. A UN resolution back in 2018 called for Russia to withdraw its forces from the region, and we fully intend to comply to that decision, but it appears that neither side wants for this to happen, atleast for now. The Moldovan President at the time supported our Peace-Keeping Resolution, and of course so did the Transnistria. Under the OSCE, we also agreed not to remove our troops until certain bi-lateral agreements, as those talks seem to have stalled, we cannot comply with both agreements. Unlike Putin, we do not wish to keep Russian Troops in the region. We seek to peacefully resolve this conflict in a way that is amicable to Moldova, the EU, and to the Trasnistrians. Summary of issues:
Transnistrian representation in Moldova
Perhaps a 3 part federation in with the states of Moldova, Gagauzia and Transnistria?
Regulation of customs between Transnistria and Moldova
Ensuring the rights of Russian minorities (some 30% of the population) and Businesses in the region
Status of the remaining 20,000 tons of military equipment
requires Ukrainian approval, as the arms must travel by train through Ukraine back to russia
Removal/Replacement of Russian Peacekeepers with another Party
The Christchurch mosque shootings might be part of Russian "grey-terror" black ops in anticipation of a new Ukrainian war.
It's pretty rare that multiple racist assholes would coordinate together and a lone gunman who's more of an average Joe before else has the ability to get across country borders and shoot up two mosques with military-grade weapons in otherwise-peaceful places like New Zealand so it got me thinking about Vladimir Suvorov's book "Spetsnaz: The Inside Story of the Soviet Special Forces" which talked about "grey terror" that is of one which is carried out not in their name, but that of others. An excerpt from the Chapter 15 of his book: All these operations — because of course none of these events is an accident — and others like them are known officially in the GRU as the ‘preparatory period’, and unofficially as the ‘overture’. The overture is a series of large and small operations the purpose of which is, before actual military operations begin, to weaken the enemy’s morale, create an atmosphere of general suspicion, fear and uncertainty, and divert the attention of the enemy’s armies and police forces to a huge number of different targets, each of which may be the object of the next attack. The overture is carried by agents of the secret services of the Soviet satellite countries and by mercenaries recruited by intermediaries. The principal method employed at this stage is ‘grey terror’, that is, a kind of terror which is not conducted in the name of the Soviet Union. The Soviet secret services do not at this stage leave their visiting cards, or leave other people’s cards. The terror is carried out in the name of already existing extremist groups not connected in any way with the Soviet Union, or in the name of fictitious organisations. So my theory (two-cents of worth at the moment, but who knows how it'll transpire?) goes that Putin has groomed those terrorists him via intermediaries long ago and now Crimea's water is gonna dry up therefore taking more Ukrainian territories to make a strategic land bridge to the Rodina is his only solution to the water crisis ATM. Obviously if he wants to get away with it he have to distract the international community first so active measures like "grey terror" are one of the methods for it to happen while he will be smuggling chemical canisters into occupied Ukrainian region under our noses. However since US is embroiled in its own politics while Europe is distracted by Brexit, the controversial copyright reform and the upcoming elections the difficulty of the distraction works required is trivial. In fact as a prelude his foreign ministry has, for the best part of a month, promulgated the idea that Ukraine was planning to use chemical weapons against fighters in Russia-occupied east Ukraine. When the time comes he will pull a chemical Mainila and use it as a pretext to invade Ukraine and thereby making the aforementioned Russia-Crimea landbridge and NATO + the rest of us will be caught pants down by it. One of the few ways to prove or disprove this are snap USAF unmanned drone overflights, although there's a decent chance that it can't outmatch Russian deception tactics after all. Another red flag to look for especially in western countries is "retaliatory attacks by extremist Muslims against non-Muslim facilities". To sum it up stick to the old rule of thumb: "see something, say something". If you notice anything suspicious which may lead to next attack report it to the cops as soon as you can; countless lives will be saved from that.
Edit: With the recent Netherlands shooting by an apparent Islamic extremist it's safe to assume that a red flag condition that was outlined here has been met. I've brought forward this to Twitter by mentioning Malcolm Nance and the Bellingcat founder in hopes that relevant agencies will be alerted soon and actions taken accordingly.
Edit 2: Revised the first part of this in wake of revelation that only one shooter is involved, although the whole thing still looks fishy.
Edit 3: I think I have to agree on this comment by gnovos, thank you.
He could barely pass high school and had no job, but somehow made lots of money off some variant of bitcoin, enough to buy tons of weapons and ammo, and was capable enough academically to write an expert propaganda manifesto. He’s either the J.K. Toole of domestic terrorism or he had professional help.
Although per Ockham's razor it's more likely that he "had professional help".
Our Best and Final Offer to the Separatists November 1st, 2031 With the liberation of Crimea, the complete withdrawal of all Russian troops and support, and the military build-up occurring on their doorstep, we are reaching out to the separatists through the peace hotline to notify them that Kyiv is making one last attempt at securing an end to the war without any more violence. We will present our final peace offer with our best possible terms (in light of the current situation), and this offer is being presented on a "take it or leave it" basis. If no deal is reached here to end the war and reintegrate the separatist pseudo-state, then Kyiv sees no alternative than to end the war through military means. A war that the separatists have absolutely no hope of winning, and a war that no one will shield them from or fight on their behalf. Kyiv's terms are the following:
There will be an immediate and full ceasefire between government and separatist forces. Observers from the Organization for Security and Co-operation in Europe will monitor this ceasefire as they have done in the past.
"The Workers' and Peasants' Armed Forces", the "People's Commissariat of Internal Affairs", and any other paramilitaries, mercenaries, policing forces, or armed groups will surrender in their entirety to the Armed Forces of Ukraine and will relinquish all of their weapons, munitions, vehicles, and other means of waging war in a process of complete disarmament.
Safe and effective delivery of humanitarian aid to separatist-controlled territory will be allowed for, and will not be interfered with under pain of criminal prosecution.
The executive branch of the government of the "United People's Soviet Republic" and the following persons in particular will be taken into custody by the Armed Forces of Ukraine. These persons are: Vadim Zaibert, Vladislav Surkov, Alexander Borodai, and Vladimir Kononov.
All records and files in all formats belonging to the separatist government (including the executive and the legislature), the courts, the Communist Party of Donbass, "The Workers' and Peasants' Armed Forces", and the "People's Commissariat of Internal Affairs" will be turned over to the Armed Forces of Ukraine, completely intact.
The Communist Party of Donbass will be dissolved, banned from re-forming, and the executive body of the party will be taken into custody by the Armed Forces of Ukraine.
The "United People's Soviet Republic" and all of its institutions will be dissolved. The territory formerly under its control in the Donetsk and Luhansk oblasts will be fully reintegrated with Ukraine proper and placed back under the control of the legitimate central and regional governments. New elections to fill the empty seats on the oblast councils which represent said territory will be held within 60 days of this reintegration occurring.
All persons held by the "United People's Soviet Republic" as prisoners and hostages will be turned over to the Armed Forces of Ukraine. All judgements rendered and sentences handed down by the separatists' courts shall be declared null and void, with the exception being persons legitimately accused of serious crimes such as homicide and sexual assault. Their cases will be investigated and if necessary re-tried in a legitimate Ukrainian court.
All known war criminals and those suspected of committing war crimes will be taken into custody by the Armed Forces of Ukraine and brought before a legitimate Ukrainian court. This will also apply to all officially wanted persons who may be residing in separatist-controlled territory.
All persons involved in the shoot-down of Malaysia Airlines Flight 17 on 17 July 2014, and its subsequent cover-up, and all evidence of every kind pertaining to these events will be turned over to the Armed Forces of Ukraine.
The radio stations "United People's Radio" and "Donetsk Radio" will be shut down, and transmission of all state propaganda will cease.
The "Novorussian Bitcoin Exchange" will be shut down, as well as other illegitimate financial institutions. The assets contained within them and all other financial assets/capital of the "United People's Soviet Republic" and the individuals exempt from the general amnesty underlined in Article 16 will be seized by the Ukrainian government.
All foreign military advisors and trainers, such as those from North Korea, will be taken into custody, declared persona non grata, and will be deported from Ukraine.
All illegitimate foreign embassies will be closed. All foreign diplomatic staff at these embassies will be taken into custody, declared persona non grata, and will be deported from Ukraine. This includes the embassies of Vietnam, Nicaragua, Venezuela, North Korea, Russia, "South Ossetia", "Abkhazia", Paraguay, Laos, and Cambodia.
Once all the other articles have been met/fulfilled, Ukraine will pursue constitutional reform along the lines of decentralization and devolution of powers to regional governments, which will take into account the over-centralization of the state and the differing needs, cultures, and political interests of Ukraine's various regions. The possibility of granting autonomy to the Donetsk and Luhansk oblasts, with the Autonomous Republic of Crimea as a model, will be subject to parliamentary debate and a feasibility study. Input from local residents on the future of their regions will be sought after.
Once Articles 1 through 14 have been met/fulfilled, a general amnesty will be granted with some exceptions. This offer of amnesty will be extended to foreign nationals who are eligible, with one exception: while they will not be prosecuted, they will be deported from Ukraine and possibly subjected to a lifetime ban on re-entering the country. The exceptions for the general amnesty are:
Vadim Zaibert, Vladislav Surkov, Alexander Borodai, Vladimir Kononov
The executive branch of the separatist government.
The executive body of the Communist Party of Donbass
Persons listed as wanted by the state
All persons involved in the shoot-down of Malaysia Airlines Flight 17 on 17 July 2014, and its subsequent cover-up
Persons legitimately accused of serious crimes such as homicide and sexual assault
The leadership of the "The Workers' and Peasants' Armed Forces" and the "People's Commissariat of Internal Affairs"
[M] Edited Article 12 because I forgot one very important part regarding the seizure of financial assets and capital.
My theory: There was collusion, but Trump ripped off Russia in the deal and has us in a more serious situation than we think. A timeline.
I’m not usually a conspiracy theorist, but it all fit together too well to ignore. Feel free to poke holes in this, I’d like to be proven wrong. The cold war never ended, it just moved online. 1991 - The cold war is declared over and the internet rises at a lightning pace. Much like the space program had before it. A cyberspace race. By nature of being the bulk of its inventors, the US is untouchable in cyber espionage. The NSA stockpiles all of the malicious code and secret vulnerabilities they can gather and rather than alert the world to them and help create fixes, they leave them active and turn them into tools for their agents to use against foreign powers. Eventually they also turn their attention inward and start using that software against their own people in a surveillance and manipulation program that dwarfs what the KGB had just been destroyed for doing. 2009 - Edward Snowden discovers the NSA running these programs and is outraged by the violation of rights and hypocrisy. He begins complaining in an attempt to get the system shut down and have our dirty little secret ended without national embarrassment. “I had raised these complaints not just officially in writing through email, but to my supervisors, to my colleagues, in more than one office. I did it in Fort Meade. I did it in Hawaii. And many, many of these individuals were shocked by these programs. They had never seen them themselves. And the ones who had, went, "You know, you're right. ... But if you say something about this, they're going to destroy you". March 2011 – It’s discovered that the US military is developing software to create, spread and control social media sock puppet armies. They promise it’s to use against foreign enemies, we’re told that it’s illegal for them to use against US citizens. https://www.theguardian.com/technology/2011/ma17/us-spy-operation-social-networks March 2013 - James Clapper blatantly lies to congress and denies the existence of the domestic surveillance program entirely. Snowden says this moment is when he realizes his hope is futile and May 2013 he begins releasing evidence of the collected data to expose the program and force it to stop, then waits out the storm in Hong Kong. I believe Snowden had an insurance policy. Along with the surveillance data that he had planned to release, he stole an NSA toolkit that would not be released. A drive full of the nastiest bugs and backdoors the NSA could invent that would be released to the public in the event of his death. The US government wouldn’t dare risk it. July 2013 – The public outrage over what’s been exposed should be astounding…but it’s not. It seems like no one cares. And at this point the NSA knows the toolkit has been stolen, it could destroy us. Desperate times call for desperate measures. The anti-propaganda law is repealed, freeing the US government to use propaganda against its own people. Those sock puppet armies are turned against us and it’s made to look like the majority of the US public doesn’t care about surveillance. Even South Park runs an episode in September mocking people’s indifference to the NSA. https://en.wikipedia.org/wiki/National_Defense_Authorization_Act_for_Fiscal_Year_2013#Smith-Mundt_Modernization_Act_of_2012 https://www.techdirt.com/articles/20130715/11210223804/anti-propaganda-ban-repealed-freeing-state-dept-to-direct-its-broadcasting-arm-american-citizens.shtml http://foreignpolicy.com/2013/07/14/u-s-repeals-propaganda-ban-spreads-government-made-news-to-americans/ A massive domestic spy program is uncovered and they get away with it. Snowden isn’t a national hero, no one cares and in mid June 2013 the US files charges against him. He took a shot at the king and missed. The US rescinds his passport and demands Hong Kong extradite him. He’ll use his stolen toolkit to avoid a death penalty. Russia would have suspected Snowden had this insurance policy. They tell him to spite America, they’ll arrange a flight for him from Hong Kong to Ecuador despite his lack of passport, with just a short layover in Russia. The layover becomes permanent when they refuse to finish the flight due to that lack of passport. Russia tells him he now has a choice, hand over the toolkit or you’ll be killed here and your country won’t care. Russia doesn’t care if his death triggers the release, it’s their intention to do that anyway. He holds out for 39 days in the airport but on August 1st 2013 he caves, is given asylum in Russia and Russia is discretely given the master keys to the internet. The NSA is in an impossible position. They should alert the world that their monster has escaped its cage and help us secure our systems from it. But to do that would be to admit an indefensible extent of surveillance and now manipulation they themselves had carried out for years. The people would overthrow them immediately. In addition, every vulnerability they fix removes it from Russia’s arsenal but also from their own. I suspect they were using some of those vulnerabilities to sabotage the North Korean missile and Iranian nuclear programs. To fix them now would be to let those programs progress unhindered. I suspect this sort of catch-22 is how the Obama administration originally justified the surveillance to itself. And so the US does nothing. Russia now has almost unfettered access on the internet, a backdoor on every computer manufactured before that date. I believe their Kompromat program became limitless. I believe they gathered every secret that existed to be found, on every member of our government and corporate world and what couldn’t be found could be planted. I’ll reference this again on *April 8 2016. * February 2014 - Emboldened by our silence Russia moves to take Crimea 6 months later. We do not stay silent. March 2014 - Obama uses Crimea as a cover to impose crippling sanctions on Russia. It cuts their currency and GDP in half. November 2014 - Sony suffers a massive hack. Supposedly, by North Korea in retaliation over a Seth Rogan movie. It’s embarrassing but mostly inconsequential. North Korea denies involvement, no one believes them. I believe it’s a message from Russia. “We have the weapon and we know how to use it.” February 2015 – Kaspersky Labs, a Russian company, exposes to the world how deeply the NSA’s infiltration has gone. All hard drives have been shipped with an NSA backdoor preinstalled. http://www.businessinsider.com/r-russian-researchers-expose-breakthrough-us-spying-program-2015-2 Through 2015 Microsoft makes an oddly strong push to get us all to update to Windows 10. Even bootleggers can get a free upgrade. A disguised evacuation from the badly compromised XP, 7 and 8? Or pushing a new OS into the world to give the NSA a new playing field to regain an advantage on? I suspect Putin now reaches out to Robert Mercer, financier of data mining company Cambridge Analytica. He offers to make Mercer an American oligarch. Putin will provide the most advanced data gathering tools the NSA could create, Mercer will use them to collect data that lets his candidates target voters with uncanny accuracy and win elections. Kushner later raves about the complexity of their marketing system. https://www.forbes.com/sites/stevenbertoni/2017/05/26/jared-kushner-in-his-own-words-on-the-trump-data-operation-the-fbi-is-reportedly-probing/#619dd401a90f At the same time, Mercer will share that data with Putin who then uses botnets and other illegitimate means to influence the same voters, in the same direction, but without being visibly connected to the candidate. Later there will be controversy over a server in Trump Tower communicating with a Russian bank. I believe this is that sharing. http://www.cnn.com/2017/03/09/politics/fbi-investigation-continues-into-odd-computer-link-between-russian-bank-and-trump-organization/index.html In 2015 Cambridge Analytica first backs Ted Cruz. The most hated man in DC and a proven track record of bringing the system to a grinding halt. The obvious choice. But Trumps bombastic personality and Cruz’s lack of one threatens the plan. In December 2015 when a Quinnipiac poll shows Cruz in second place behind Trump, Cambridge Analytica promptly dumps Cruz and picks up Trump. Sometime later Trump paranoidly projects that the only way Hillary can win is by rigging the election. July 2016 - Trump wins the Republican nomination. August 2016 - A hacker group called The Shadow Brokers makes the news. I believe this is Putin finally flaunting to the world what he’s done. They tell us they’ve stolen a toolkit from The Equation Group, who have been suspected to be the NSA. The files in the toolkit are NSA but only as recent as 2013, a few months after Snowden’s departure. I suspect the file dates were altered just enough to give Snowden deniability. They release half of them to the public as proof. It’s bad, we’re warned that a lot of horrible malware will come from this for years to come. And now that the code is public, those attacks could plausibly come from anyone. The other half is kept encrypted, promised to be worse, and they comically struggle and fail to sell it on the black market. No one seems willing to touch it. November 2016 - Our election is hit by an unprecedented number of attacks. 5 per second 24 hours a day in Illinois. 150,000 total in South Carolina. 39 states altogether. Everyone who was anyone took Putin’s free gift and hit us with it. https://www.engadget.com/2017/07/17/south-carolina-150-000-election-day-hacking-attempts/ Trump wins the election. His first, maybe only job, is to lift the sanctions. Russia needs it done yesterday. Instead, Trump immediately gets into a fight with the media over the size of his inauguration crowd and makes a wild claim of 3 million illegal votes. I believe Cambridge Analytica using NSA tools, had the ability to analyze every American voter’s online habits and predict their vote. I believe they promised Trump a win over Hillary and gave him a very specific vote count. When Hillary wins the popular vote with 3 million more votes, Trump is paranoid that she must have added her own fake votes which threw his prophesized number. And maybe she did. But with no evidence that he can admit to the rest of us, Trump blames it on illegal immigrants and starts demanding voter information so that he can compare the numbers. This eats Trumps fragile ego alive. For eternity his legitimacy will be questioned in history books. Trumps attitude toward Russia sours. “You promised me a win and cost me the popular vote, our deal is void.” Trump does what he’s done to so many of the people he’s worked with before and decides he’s not going to pay his end of the deal. He busies himself putting Gorsuch on the SCOTUS, the beginnings of his wall and an immigration ban, ignoring Russia publicly and privately. The cold war warms up. January 23 – Trump appoints Ajit Pai to head the FCC. He is hell bent on reversing net neutrality laws, making it legal to throttle or block websites to citizens. Later, congress claims this was a direct order from Trump. Along with being able to predict how people will vote based on their browsing habits, they’ll now be able to directly influence those browsing habits. https://techcrunch.com/2017/08/06/10-members-of-congress-rake-fcc-over-the-coals-in-official-net-neutrality-comment/ February 9 – Jeff Sessions is made Attorney General to defend Trump from both an angry Russia and angry Congress. He’ll later recuse himself and Trump will state that if he had known that he wouldn’t have hired him in the first place. February 10 – Russia considers giving Snowden to US as a gift. https://www.cnbc.com/2017/02/10/russia-eyes-sending-snowden-to-us-as-gift-to-trump-official-tells-nbc-news.html February 13 – Trump seemingly is not interested. Michael Flynn’s Russian connections are “discovered” by the White House and he resigns. February 14 – Russia violates a cold war arms treaty and shows that it has been developing cruise missiles. “I can reach you.” It says to Trump. https://www.nytimes.com/2017/02/14/world/europe/russia-cruise-missile-arms-control-treaty.html February 14 – Congress starts to question their too-good-to-be-true win and a republican senator calls for an investigation into ties between Trump and Russia. Most squabble over healthcare. http://www.cnn.com/2017/02/14/politics/kfile-roy-blunt-flynn-investigation/index.html February 27 – Trump makes major cuts to agencies and dumps all $54 billion of it into defense spending. They’re going to need it. https://www.washingtonpost.com/powerpost/trump-to-propose-10-percent-spike-in-defense-spending-massive-cuts-to-other-agencies/2017/02/27/867f9690-fcf2-11e6-99b4-9e613afeb09f_story.html?utm_term=.ed55293971c8 February 28 – Amazon has a major failure and the East coast US suffers an internet outage. http://bgr.com/2017/02/28/internet-outage-amazon-web-services/ March 7 – North Korea finally gets its missiles to survive launch and sends 4 towards a US base in Japan. I suspect Russia has made them aware of the vulnerabilities that had been plaguing their program. The US deploys its own missiles in South Korea. https://www.nytimes.com/2017/03/07/world/asia/thaad-missile-defense-us-south-korea-china.html March 16 – Dan Coats, an anti-Russia senator is appointed by Trump as Director of National Intelligence, James Clappers old position. Kind of poetic really. A concept stolen from Russia, turned into a monster by Clapper, stolen back by Russia and used to remove Clapper, whose successor is now sent to kill it. March 23 – Senate Republicans vote to allow the sale of citizen’s private browser history. Making the kind of data collection and manipulation I suspect Cambridge Analytica of doing, now legal for future use. https://www.buzzfeed.com/hamzashaban/the-republican-controlled-senate-votes-to-strip-internet?utm_term=.duwxxZYeY5#.sygwwvZkZj March 30 – Michael Flynn offers to testify on Russia. April 4 – 4 days after Tillerson had told Assad he could stay in power, Assad appears to drop chemical weapons on his own people. Assad denies it. The receiving hospital is also hit with conventional weapons in an effort to kill surviving witnesses. I believe it was Russia embarrassing the US. April 7 – In response Trump hits a nearly empty airfield with 59 Tomahawk missiles. We’re told that it was retaliation against Syria and that Russia was warned beforehand and evacuated. I don’t believe they were. I believe Trump picked the most empty airfield shared by both Syria and Russia where damage would be minimal and bombed it without warning to either of them in an attempt to scare Russia. Russia condemns the strike and suspends air cooperation with the US. The airfield returns to operations the same day. April 8 - The Shadow Brokers post an open letter to Trump that begins *“Respectfully, what the fuck are you doing?” * and telling him to remember his base, remember who got him elected. Again, I believe this is Putin speaking directly to Trump. He hints at the dirt he either has or can plant on McCain and Lindsay Graham, if only Trump will ask. The things he hints at are extreme. It is at this point that I now suspect Putin has gained this kind of information on a vast majority of our government and business world. Even if the blackmail victims are willing to face the shame to alert us to what’s happening, they’re warned that if the operations is exposed, everyone’s secrets will be released. The country would suddenly need a special election for half of its government and half of its corporations would crumble. It would be chaos. Mutually assured destruction. All anyone caught by Putin can do, is furrow their brow and be deeply disturbed. In this same letter the Shadow Brokers ask Trump why he hasn’t yet filed charges against all powerful entities in the US. “Doing so, you could be seizing all their IT systems, freeze their financial assets, arrest key leadership.” This was a key step in Putin’s rise to power. I believe that even if Trump and Putin are having a couples squabble, Putin still needs Trump to remember this step. They release more of the NSA code as punishment. https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1 The emergency siren system in Dallas is set off. https://www.usatoday.com/story/news/2017/04/08/hacker-triggers-all-156-emergency-sirens-dallas/100212412/ April 12 – Tillerson is sent to Moscow to meet with Putin to discuss tensions “over the Syria strike”. They are unable to come to agreements. April 13 –Trump drops the Mother of All Bombs on Afghanistan for Russia to see. April 14 - The Shadow Brokers dump more NSA exploits. Included in this batch is EternalBlue, one of the most destructive exploits that’s been seen in years. April 14 – North Korea, whose missiles can now fly in a more or less straight line, threatens a preemptive strike on the US. The US threatens a strike back. Trump gets out of town and heads to Mar-a-Lago just in case. http://thehill.com/policy/international/328796-north-korean-official-warns-of-preemptive-strike-of-its-own http://www.nbcnews.com/news/world/u-s-may-launch-strike-if-north-korea-reaches-nuclear-n746366 http://www.cnn.com/2017/04/14/politics/donald-trump-north-korea-mar-a-lago/ April 15 – North Korea unveils an ICBM that can theoretically hit all of the United States. I believe that in exchange for stopping America’s sabotage of their nuclear program, NK is acting as Russia’s nuclear attack dog. He’s long wanted to be the one to do it. Now he’ll have Russian defense if he does. April 21 - The power grids in New York, LA and San Francisco fail, it’s blamed on mechanical failure. https://www.inverse.com/article/30635-everything-we-know-la-nyc-sf-power-outages May 9 – Comey is fired by Trump as he works on the Russian investigation. Trump justifies it by quoting and mocking Chuck Schumer with a tweet… *“Cryin' Chuck Schumer stated recently, "I do not have confidence in him (James Comey) any longer." Then acts so indignant.” * May 12 – The Wanna Cry ransomware scares the world. Built from the previously released EternalBlue exploit, it begins in Russia and races across the globe, locking computers and demanding a bitcoin ransom. It looks to be a catastrophic infection. Our hospitals are particularly crippled by it. The name mocks Trumps own words days before. May 13 – By dumb luck a kill switch is left in the Wanna Cry code and British security researcher Marcus Hutchins disables it by registering a $10 website domain. What should have been a ransom in the billions of dollars tops out at $130,000. https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html After the attack, Kaspersky Labs will identify North Korea as being the attacker. North Korea will deny it. Later, Kaspersky will be cut out of the defense budget and banned from US government computers. Later still, Kaspersky will file an antitrust lawsuit against Microsoft, claiming that Windows 10 removes Kaspersky software from users computers when they upgrade. https://www.cyberscoop.com/kaspersky-banned-us-dod-ndaa-russian-influence/ https://www.theverge.com/2017/6/6/15745164/kaspersky-antitrust-complaint-microsoft-european-commission May 27 – British airways has a massive system failure which they blame on outsource employee ineptitude. I suspect this is a warning to Theresa May in response to England preventing Wanna Cry. “Stay out of this.” http://www.mirror.co.uk/news/uk-news/british-airways-caused-bank-holiday-10520182 June 7 – Amazon goes down. https://www.theverge.com/2017/6/7/15759046/amazon-product-pages-down-outage-offline-503 June 19 – A cyber analyst finds an unsecured Amazon server owned by GOP voter targeting firm Deep Root Analytics with almost all American voters records and analytics that predict who they will vote for and why. This confirms my suspicions that Cambridge Analytica used the same method to influence the presidential election. I believe that since the March 23 legalization of the selling of citizens browser histories, the GOP has been building its own voter prediction software in order to win the 2018 elections without help from Russia’s stolen data. http://www.zdnet.com/article/security-lapse-exposes-198-million-united-states-voter-records/ June 19 – All major cellular carriers go down. http://www.cbsnews.com/news/cell-phone-internet-outages-reported-across-the-u-s/ June 19 – Microsoft Skype goes down. https://techcrunch.com/2017/06/20/skype-outage-causing-connectivity-issues-company-says-its-a-global-incident/ June 27 – The Petya ransomware, built on EternalBlue, the second iteration of Wanna Cry, hits the world but seems targeted at Ukraine. Paying the ransom in this case does not unlock the data, Petya is tailored for maximum damage. https://en.wikipedia.org/wiki/2017_cyberattacks_on_Ukraine June 30 – Microsoft Office 365 goes down. https://www.exoprise.com/2016/07/01/office-365-email-outage-june-2016/ July 3 – Chase bank goes down. https://www.washingtonpost.com/news/business/wp/2017/07/03/chase-bank-website-down-ahead-of-independence-day/?utm_term=.2135e79c6c8b July 3 – NASDAQ suffers an attack. http://www.wired.co.uk/article/nasdaq-hack-july July 4 – USS Hornet and much of Alameda California are hit by a power failure, 4th of July events are canceled. http://www.eastbaytimes.com/2017/07/04/alameda-power-outage-knocks-out-july-4-celebration-at-uss-hornet/ July 27 – HBO suffers the largest Hollywood hack in history. https://www.cnbc.com/2017/08/02/largest-hollywood-hack-in-history-may-have-compromised-hbo.html July 30 – East coast power grid goes down. https://www.nytimes.com/2017/07/30/us/outer-banks-evacuation-power.html Putin is livid. August 3 - Marcus Hutchins, the man who saved us from Wanna Cry, is arrested by Trumps new CIA director on unrelated charges while he is in the US for a conference. He now faces 40 years in prison. https://www.theguardian.com/technology/2017/aug/03/researcher-who-stopped-wannacry-ransomware-detained-in-us August 3 – Trump is finally forced to sign the Russian sanctions bill, making his position official. Putin will not be paid for services rendered. August 5 – Trump schedules a vacation to be out of Washington DC for much of the next month. http://www.cnn.com/2017/08/04/politics/donald-trump-vacation-obama/index.html I am nervous about August.
Thoughts on my culminating analysis of Russia's involvement in the U.S elections?
It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source. The proof is that the hackers used Bitly to mask the malicious URL and trick people into thinking the URL was legitimate. They made two mistakes, however. First, they accidentally left two of their Bitly accounts public, rather than setting them to private. This allowed security researchers to view some general account information, like what URLs were shortened and what they were changed to. Second, they used Gmail's official numeric ID for each person inside of their maliciously crafted URLs. This allowed cybersecurity researchers to find out exactly who had been targeted. The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network. Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked. The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence. Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing. For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão. ... Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy." The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!" an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion. Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC." Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' " ... Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author. Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress. ... Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure. We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that. There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use. Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1). Figure 1. Example of accoounts-google . com used in a phishing URL. Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account. Figure 2. Fake Google Account login page. Encoded target details Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address. Figure 3. Spearphishing URL. Table 1. Decoded Base64 values from the phishing URL used by TG-4127. Use of the Bitly URL-shortening service A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4). Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL. Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts. Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL. Target analysis CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent. Focus on Russia and former Soviet states Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia. Other targets worldwide Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
Authors, journalists, NGOs, and political activists (36%)
Government personnel, military personnel, government supply chain, and aerospace researchers (64%)
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government. Figure 6. TG-4127 targeting outside of Russia and former Soviet states. Authors and journalists More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse. Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127. Government supply chain CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information. Figure 8. Categories of supply chain targets. Government / military personnel TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9). Figure 9. Nation or organization of government/military targets. TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations. Success of the phishing campaign CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful. Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Spearphishing details The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access. Hillary for America TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account. Figure 1. Example of a TG-4127 fake Google Account login page. CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity. The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
National political director
Director of strategic communications
Director of scheduling
Director of travel
Traveling press secretary
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times. Democratic National Committee CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network. Personal email accounts CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once. Related activity and implications Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign Read these two articles for more context: How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts How Russia Pulled Off the Biggest Election Hack in U.S. History Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election? Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one. Why would they lie about being separate groups? Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme: DCLeaks Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force. Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it.. FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman Check restricted documents of George Soros’ Open Society Foundation Check restricted documents leaked from Hillary Clinton's presidential campaign staff Emails show Obama saw US involvement in Russia talks as a 'threat' 'Gen. plotted against Obama on Russia' Check George Soros's OSF plans to counter Russian policy and traditional values Check Soros internal files A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Together we’ll be able to throw off the political elite, the rich clans that exploit the world! Fuck the lies and conspirators like DNC!!! Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now. Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points. Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof? don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians. As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce. Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear. Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit. I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him! Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce. As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you? It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds. I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them. I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies. As I’ve already said, their software is of poor quality, with many holes and vulnerabilities. I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly. I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com Here and here he claims that he's the source of WikiLeaks' DNC documents. He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party? Source: https://twitter.com/GUCCIFER_2 The Shadow Brokers Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions. Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence? Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments? USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran? Ok peoples theshadowbrokers is promising you a trick or treating, here it is https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQhttps://yadi.sk/d/NCEyJQsBxrQxz Password = payus This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important? How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
The Ukrainian security authorities have detained cryptocurrency miners at a nuclear energy plant. The Security Service of Ukraine (SBU), the law-enforcement agency and primary government security body in the fields of counterintelligence operation and fighting terrorism, arrested many people for illicitly mining Bitcoin and other digital assets at the country’s nuclear power plant (NPP). Ukraine’s distracted and paranoid government is dragging its feet passing the relevant legislation. “Currency that is officially banned in Ukraine has been used to buy military equipment, weapons and ammunition for the illegal armed groups,” Ukraine’s Deputy Prosecutor General Anatoliy Matios said. Good and bad News about Bitcoin Menu Skip to content. Home; Bitcoin Ankauf-Verkauf = Buying-Selling; Bitcoin.name for Sale! Contact us ; We hire talents; Category Archives: blockchain military. Auto Added by WPeMatico. Weaponizing Blockchain Is Happening Under the Wraps. Leave a reply. While blockchain technology and cryptocurrencies are often touted as the saviours of the world of tomorrow ... Nach dem international nicht anerkannten Anschluss der Krim an Russland zieht die Ukraine ihr Militär komplett von der Schwarzmeerhalbinsel ab. 24.03.2014 Further, the SBU also found and seized additional equipment[1, 2] that looked like mining rigs in the building used as barracks by a military unit of the National Guard of Ukraine, tasked with ...
Best Sniper Competition – Scharfschützen der Bundeswehr Im ...
Der Scharfschütze braucht ein gutes Auge. In diesem Wettkampf wird aber mehr gefordert: Kraft, Ausdauer, Reaktionsschnelligkeit, Teamfähigkeit, Stressresiste... Army Lt. Col. Alexander Vindman said Tuesday during a public impeachment hearing that a Ukrainian official offered him the position of defense minister three times. He said he dismissed the offers ... Seit Jahren drücken die Notenbanken dieser Welt die Zinsen, um verschuldete Staaten zu stabilisieren, Banken zu retten und Wachstum anzukurbeln. Eine noch ni... George Friedman, the founder of Geopolitical Futures, and Stratfor, explains how population disparity and the loss of a critical buffer comprised of European... The whole world is taking precautions, keeping people safely inside, practicing social distancing, right? Well no...In Belarus they do things differently. Ba...