[OC] Which front offices and agents are the 3 major newsbreakers connected to? I went through 6000+ tweets to find out!
If this sounds somewhat familiar, that's because I did a 2019-2020 version and posted it back in March. In terms of changes from that post:
I've expanded the timeline to tweets from September 27, 2018. This is the first official day where each of Shams, Woj and Haynes were at their own respective companies. Shams moved to the Athletic from Yahoo in August, and Haynes moved from ESPN to Yahoo in September.
I've also expanded the criteria on when a tweet could possibly be linked to an agent
TL;DR Tracked tweetsof Woj, Shams and Haynes from 2018-2020 to see whether any of them report on a certain team or a certain agent's players more than their counterparts.Here is the main graphconcerning a reporter's percentage of tweets per team separated into three periods (2019 season, 2020 offseason, 2020 season). Here is aseparate graphwith the Lakers and Warriors, because Haynes's percentages would skew the first graph. During times like the NBA trade deadline or the lifting of the NBA free-agency moratorium, it’s not uncommon to see Twitter replies to (or Reddit comments about) star reporters reference their performance relative to others. Woj is the preeminent scoop hound, but he is also notorious for writing hit pieces on LeBron (sources say it’s been widely rumoured that the reason for these is that Woj has always been unable to place a reliable source in LeBron’s camp). On the other end of the spectrum, it has been revealed that in exchange for exclusive intel on league memos and Pistons dealings, Woj wrote puff pieces on then-GM Joe Dumars (see above Kevin Draper link). Last summer, Woj was accused of being a Clippers shill on this very discussion board for noticeably driving the Kawhi Leonard free agency conversation towards the team. This is the reason I undertook this project: to see whether some reporters have more sources in certain teams (and certain agencies) than other reporters. First I’ll explain the methodology, then present the data with some initial comments.
To make this manageable on myself, I limited myself to tracking the 3 major national reporters: Shams Charania of the Athletic, Chris Haynes of Yahoo Sports and the aforementioned Adrian Wojnarowski of ESPN.
I didn’t use beat reporters, as most (if not all) of their sources would be concentrated on their local team
Others that I considered but ultimately decided not to track:
Brian Windhorst of ESPN (double-dipping in ESPN)
Zach Lowe of ESPN (I consider him more of an analyst)
Marc Spears of ESPN (harder to sift through Twitter feeds, as he posts a lot more unrelated/non-news-breaking content)
Marc Stein of the New York Times (same as Spears)
Kevin O'Connor of The Ringer (same as Lowe)
The time period I initially tracked for was from January 1, 2020 to the end of the regular season March, but after finding a Twitter scraping tool on GitHub called Twint, I was able to easily retrieve all tweets since September 27, 2018. However, a month ago, Twitter closed their old API endpoints, and Twint ceased to work. I used vicinitas.io but the data loading became more time-consuming. Therefore, the tweets are up to the date of October 15 2020. How I determined information was by manually parsing text tweets by the reporter (no retweets):
This means I did not include images or multimedia appearances such as television, radio or podcasts. The rationale for this is that I simply don’t have the time to listen/watch and record all the instances of providing information through sources on these mediums.
Now, I didn’t take every single text tweet:
I didn’t include direct statements, be they from players or front office folks
I separated them, along with podcast guests in another tab
I didn’t include the summary tweet that Woj & Shams love to do: “Story filed to/Story on [employer]:..” because it doesn’t add anything apart from a link to a story (also, I personally don’t want to be called an ESPN/Yahoo/Athletic shill)
If the tweet added a reporter’s own analysis to someone else’s tweet, it was not included
If it was new information, the tweet was retained
Tweets that related solely to retired players were not included: mainly Haynes reporting Dwyane Wade joining CAA, as well as the unfortunate passing of Kobe Bryant on January 26
I grouped multiple tweets about the same subject delivered around the same time frame (such as trades) into one, as doing otherwise would arbitrarily inflate totals
There’s no hard and fast rule for whether or not to group tweets
For example, the big 4-team trade that created the Pocket Rockets was grouped in full
On the other hand, the Miami-Memphis trade was split up because the full details came like a day later
Sometimes, I used my judgment to determine whether a tweet’s underlying information would have come from a source, and therefore whether I should include that tweet or not
For example, consider the All-Star tweets: Haynes and Shams both posted the All-Star starters, but looking at the time signatures led me to believe that this was simply relaying the information from the TNT reveal
On the other hand, both Shams and Haynes posted tweets disclosing the All-Star Reserves before the TNT reveal
Next, I had to assign possible teams to each tweet:
Items such as changes to the league calendar, the naming of All-Star Reserves and salary cap projections were immediately attached to an NBA source
Injuries and trades were fairly straightforward, assigning these tweets to the participating teams
Items such as league mandated fines/suspensions, invitations to All-Star competitions and game protests were credited to both a general NBA source, as well as the related team(s)
Direct sources from agents or mentions of specific agents were attributed as a catch-all “Agent”
In the former, team was not included: examples include Matisse Thybulle’s agent on not being selected for the Rising Stars Game or Royce O’Neale’s agents confirming his contract extension with the Jazz
In the latter, team was included: examples include two Knicks switching their agent to Rich Paul
New addition: anything related to a player's status with a team were also attributed to agents (qualifying offers, extensions, option decisions, waivers, and contracts/deals)
I then found which agents correspond to which players (big shoutout to realgm.com and the Wayback Machine)
Rumours were slightly more difficult
As we know very well, league sources is an exceedingly vague term
Instead of attempting to pinpoint a rival executive with a motive to make a comment, I took the “Occam’s Razor” approach and assumed that the teams involved had someone talk to the reporter
When it was impossible to even determine a participant team, it was the general “NBA” source to the rescue
Chris Haynes has the highest percentage of tweets relating to the Detroit Pistons in all three periods. He also reports on far more Portland news than Shams or Woj.
Shams' Brooklyn edge is evident. The Athletic was also the outlet that Kevin Durant felt comfortable talking to about his positive coronavirus test. As well, Shams reported on Spencer Dinwiddie's quest to tokenize his contract (similar to bitcoin).
Adrian Wojnarowski has increased his percentage of tweets regarding the LA Clippers period-over-period, but so have the other two reporters.
It's surprising that Dallas's numbers are so low, considering they're a good team with an international superstar.
My hypothesis from my previous post is that Shams and Woj each have capable Mavericks deputies in the Tims (Cato and MacMahon, respectively) and decide to leave that market alone
Shams does have the highest percentage of Mavericks tweets in all three seasons however.
Now, you'll notice that there's two teams missing from the above graph: the Golden State Warriors and the Los Angeles Lakers. Here's the graphs for those two teams. As you can see, they would skew the previous graph far too much. During the 2019 NBA season, 27% of Chris Haynes's qualifying tweets could be possibly linked to the Warriors, and 14% of his qualifying tweets could be possibly linked to the Lakers.
Here's the top 10 agents in terms of number of potential tweets concerning their clients.
Woj has the most tweets directly connected to agents by far. It wasn't uncommon to see "Player X signs deal with Team Y, Agent Z of Agency F tells ESPN." The agents that go to Woj (and some of their top clients):
Mark Bartelstein of Priority Sports (Bradley Beal, Kyle Lowry, Gordon Hayward)
Jeff Schwartz and Sam Goldfeder of Excel Sports (Khris Middleton, Nikola Jokic, CJ McCollum and Kevin Love)
Steven Heumann and Austin Brown of Creative Artists Agency (Andrew Wiggins, Chris Paul, Donovan Mitchell and Zion Williamson)
One thing I found very intriguing: 15/16 of tweets concerning an Aaron Turner client were reported on by Shams. Turner is the head of Verus Basketball, whose clients include Terry Rozier, Victor Oladipo and Kevin Knox. Shams also reported more than 50% of news relating to clients of Sam Permut of Roc Nation. Permut is the current agent of Kyrie Irving, after Irving fired Jeff Wechsler near the beginning of the 2019 offseason. Permut also reps the Morris brothers and Trey Burke. As for Chris Haynes, he doesn't really do much agent news (at least not at the level of Woj and Shams). However, he reported more than 50% of news relating to clients of Aaron Goodwin of Goodwin Sports Management, who reps Damian Lillard and DeMar DeRozan. Here are the top 10 free agents from Forbes, along with their agent and who I predict will be the first/only one to break the news.
Most Likely Reporter
Too close to call, leaning Shams
Too close to call, leaning Shams
Alexander Raskovic, Jason Ranne
Limited data, but part of Wasserman, whose players are predominantly reported on by Woj
Thanks for reading! As always with this type of work, human error is not completely eliminated. If you think a tweet was mistakenly removed, feel free to drop me a line and I’ll try to explain my thought process on that specific tweet! Hope y’all enjoyed the research!
Is it still worth it in 2020 to invest into a BITCOIN ATM?
I am looking to invest in my first BITCOIN ATM. I have some money saved up, but not sure if it's worth it. Don't know if the demand is high in my area or the earning potential for one. Any good resources for me to read up on? I am still doing my homework. Any suggestions on the machine itself. I have about $5k-6k to invest into a machine. What is an earn potential for a machine? I live in the Los Angeles Area.
I live in a rural area in northern California and visiting Los Angeles. what would be the most private and easy way for me to buy my first couple bitcoins? I have some friends/acquaintances but I don’t really trust anyone having the codes etc. that would access my bitcoin wallet. I guess essentially what I would like to do is have cash in hand go to some type of machine or Store where I can convert the cash in the bitcoin and have my wallet I guess..thanks
United States prosecutors announced the arrest of Virgil Griffith, who allegedly traveled to the Democratic People’s Republic of Korea (DPRK) to deliver a presentation on how to use cryptocurrencies and blockchain technology to circumvent sanctions. According to the November 29 announcement, the 36-year-old Griffith was arrested at the Los Angeles International Airport, and will be charged with conspiring to violate the International Emergency Economic Powers Act (IEEPA). The charges carry a maximum term of 20 years in prison. The IEEPA prohibits any U.S. citizens from exporting any goods, services, or technology to the DPRK without a license from the Department of the Treasury, Office of Foreign Assets Control. Griffith, a U.S. citizen living in Singapore, was previously denied permission to travel to the DPRK by the U.S. Department of State. Griffith went against the decision and presented at the DPRK Cryptocurrency Conference, violating the U.S. sanctions against the DPRK.
A data scientist at India’s prestigious Vellore Institute of Technology has outlined a method for how to purportedly predict crypto prices in real-time using a Long Short-Term Memory (LSTM) neural network. In a blog post published on Dec. 2, researcher Abinhav Sagar demonstrated a four-step process for how to use machine learning technology to forecast prices in a sector he purported is “relatively unpredictable” as compared with traditional markets. Sagar prefaced his demonstration by noting that while machine learning has achieved some success in predicting stock market prices, its application in the cryptocurrency field has been restricted. In support of this claim, he argued that cryptocurrency prices fluctuate in accordance with fast-paced technological developments, as well as economic, security and political factors. Sagar’s four-step proposed method involves 1) collecting real-time cryptocurrency data; 2) preparing the data for neural network training; 3) testing the prediction using the LSTM neural network; 4) visualizing the results of the prediction.
In a coordinated global law enforcement operation, Europol has taken down more than 30,500 websites for distributing counterfeit and pirated items over the Internet and arrested three suspects. Among other things, the seized domains reportedly offered various counterfeit goods and pirated products and services, including pirated movies, illegal television streaming, music, electronics, cracked software downloads, counterfeit pharmaceuticals, and other illicit products. However, it should be noted that the seized web domains do not include any major pirate websites on the Internet.
After Bitcoin (BTC) attempted another recovery on Wednesday to break above $7,500, the biggest cryptocurrency dipped below the $7,200 threshold again on Thursday. Among the few coins that report some green, Unus Sed Leo (LEO) is seeing the biggest growth, up 0.4%. In contrast, Algorand (ALGO), is seeing the biggest losses among the top 20, down more than 6%.
By 2030, the demand for alternative currencies will rise, with digital currencies eventually replacing cash, according to recent research from Deutsche Bank. In the “Imagine 2030” report, Deutsche Bank strategist Jim Reid raised awareness of the challenges the existing fiat system has encountered in recent years, specifically with the emergence of cryptocurrencies. Reid stipulated that people’s heightened demand for dematerialized means of payment and anonymity could drive more individuals to digital currencies.
Let us know what you think in the comments section down below!
Among the more frequently mentioned G+ alternatives at the Google+ Mass Migration community, and others, is MeWe with over 250 mentions. The site bills itself as "The Next-Gen Social Network" and the "anti-Facebook": "No Ads, No Political Bias, No Spyware. NO BS. It is headed by professed Libertarian CEO Mark Weinstein. As the site reveals no public user-generated content to non-members, it's necessary to create an account in order to get a full impression. I thought I'd provide an overview based on recent explorations. This report leads of with background on the company, though readers may find the report and analysis of specific groups on the site of interest.
Founder & CEO Mark Weinstein. Co-Founder & Chief Scientist, Jonathan Wolfe (no longer with company). Weinstein previously founded SuperFamily and SuperFriends, "at the turn of the millennium". Weinstein's MeWe biography lists articles published by The Mirror (UK), Huffington Post, USA Today, InfoSecurity Magazine, Dark Reading, and the Nation. His media appearances include MarketWatch, PBS, Fox News, and CNN. He's also the author of several personal-success books. His Crunchbase bio is a repeat of the MeWe content.
Sir Tim Berners-Lee: Inventor of the World Wide Web.
Jack Canfield: Legendary Founder, Chicken Soup For The Soul.
John Friedman: Founding Partner, Easton Capital.
Cullen Hoback: Director, Terms and Conditions May Apply.
Dianne Morrison: Partner, MorrisonMcNabb, LLC.
Colin Sebastian: Director, Equity Research/Internet, RW Baird.
Brett Shevack: CEO, Brand Initiatives; Former Vice Chair, BBDO.
Marci Shimoff: author, Happy for No Reason.
Sherry Turkle: Professor, MIT; author Alone Together.
Ownership & Investment
MeWe is the dba of Sgrouples, a private for-profit early-stage venture company based in Los Angeles, though with a Mountain View HQ and mailing address, 11-50 employees, with $10m in funding over five rounds, and a $20m valuation as of 2016. Sgrouples, Inc., dba MeWe Trust & Safety - Legal Policy c/o Fenwick West 801 California Street Mountain View, CA 94041 Crunchbase Profile. Founded: 2012 (source) Secured $1.2M in seed funding in 2014. 2016 valuation: $20m (source] Backers:
John Friedman, venture capitalist, founder & MD, Easton Capital, New York, NY.
Do you have friends still on Facebook? Share this link with them about Facebook wanting their banking information - tell them to move to MeWe now! No Ads. No Spyware. No Political Agenda. No Bias Algorithms. No Shadow Banning. No Facial Recognition.
MeWe provide several policy-related links on the site:
California Disclosures -- Do Not Track, 3rd-party cookies, and California Privacy Rights.
Your Identity: We protect it to the extent the law allows
Linking to Third-Party Sites: These are your decisions and responsibilities
Security: HTTPS and Encryption
Terms of Service
The ToS addresses:
Allowable Content and Acceptable Use
Who Our Services are For
User Content Ownership
Misuse of Usernames, Page names, Group names
Fake Accounts (pseudonyms allowed, misleading is not)
More on Spam
Our Commitment to Data Security
MeWe Content Data
MeWe Log Data
Your Data Portability
Deleting Your Account -- Right to Erasure
MeWe Secret Chat
MeWe Invitations and "Add Automatically"
Additional Policies for Pages, Groups, and Events Notifications of Requests for Account Information
Guidelines for Law Enforcement Seeking Customer Data (Worldwide)
Ownership In and To the Site and Services
Effective: November 6, 2018.
The FAQ addresses:
What is MeWe (emphasises privacy)
The Politics of MeWe ("absolutely no political agenda")
How can MeWe be free and make money? (additional services/freemium)
Which devices is MeWe available on? (Android, iOS)
What content can I share on MeWe (photos, videos, documents, voice messages, privacy mail, chats, gifs, memes, doodles)
What are some unique features of MeWe?
Who can see the posts I share?
Can I delete my MeWe account and is it easy to do this?
This emphasises that people are social cratures and private people by right. The service offers the power of self expression under an umbrella of safety. It notes that our innermost thoughts require privacy. Under "We aspire...":
MeWe is here to empower and enrich your world. We challenge the status quo by making privacy, respect, and safety the foundations of an innovatively designed, easy-to-use social experience.
Totalling 182 words.
Privacy Bill of Rights
A ten-item statement of principles (possibly inspired by another document, it might appear):
You own your personal information & content. It is explicitly not ours.
You will never receive a targeted advertisement or 3rd party content based on what you do or say online. We think that's creepy.
You see every post in timeline order from your friends, family & groups. We do not manipulate, filter, or change the order of your content or what you see.
Permissions & privacy are your rights. You control them.
You control who can access your content.
You control what, if anything, others can see in member searches.
Your privacy means we do not share your personal information with anyone.
Your emojis are for you and your friends. We do not monitor or mine your data.
Your face is your business. We do not use facial recognition technology.
You have the right to delete your account and take your content with you at any time.
There are a few mentions of MeWe in the press, some listed on the company's website, others via web search.
The following articles are linked directly from MeWe's Press page:
The page also lists a "Privacy Revolution Required Reading" list of 20 articles all addressing Facebook privacy gaffes in the mainstream press (Wired, TechCrunch, Fortune, Gizmodo, The Guardian, etc.). There are further self-reported mentions in several of the company's PR releases over the years.
Facebook Alternative MeWe Raises $5.2M, Los Angeles Business Journal (July 7, 2018) "The latest round, as well as MeWe’s total $10 million in fundraising, was predominantly backed by celebrity investors, such as author Marci Shimoff, Rachel Roy, and Lynda Weinman, founder of Lynda.com, which sold to Linkedin in 2015 for $1.5 billion. Jack Canfield, creator of the “Chicken Soup for the Soul” book series, also invested in MeWe."
Is building a Facebook alternative worth the effort? MeWe thinks soVentureBeat (July 5, 2018) "[T]here are still companies hoping to make their mark in the social networking realm with “Facebook alternatives.” One of those is MeWe, a “next-generation” social network that positions itself as the anti-Facebook: “Your private life is not for sale. No ads. No Spyware. No BS,” its website proclaims." Continues to mention "modest $5.2 million" funding round. Also a "sister product", MeWePRO, a Slack competitor.
Startup MeWe Launches Free, 'No Ads' Social NetworkeWeek (March 16, 2016) "MeWe, a new network engineered with its users' data privacy built in, is betting that a lot of people will say yes to both of those questions. The Mountain View, Calif.-based startup, whose parent company is Sgrouples.com, launched its freely available social network out of beta March 9 with more than 200,000 members already using it.... Sir Tim Berners-Lee, co-architect of the World Wide Web, found out about MeWe on his own and approached the company about getting involved."
Facebook Alternative MeWe closes $5.2M Series A Yahoo/PR Newswire (July 5, 2018). "The investment brings MeWe's total funding to $10 million, to support the engineering of MeWe and the enterprise version MeWePRO.... The company has relied on high net worth individuals for all of its funding including Lynda Weinman, founder of Lynda.com ...; Marci Shimoff, a #1 New York Times bestselling author ...; Rachel Roy...; and Jack Canfield."
Exactis Data Leak 2018: 340 Million Records ExposedInvestorPlace (June 29, 2018) "'Today's cookies can link your mobile phone to your laptop, to your home monitoring devices, and much, much more. Creepy? Scary? Orwellian? Yes, yes, yes,' Mark Weinstein, the privacy expert and founder of social media company MeWe, told MarketWatch. 'So imagine that Exactis, like Facebook, knows everything about you — really.'"
MeWe Raises $3M in FundingFinSMEs (March 9, 2016) "Sgrouples, Inc., the Mountain View, CA-based developer of MeWe, a social network with neither ads nor tracking, raised $3m in funding."
This section is a basic rundown of the user-visible site technology.
The site is not natively accessible from a mobile Web browser as it is overlayed with a promotion for the mobile application instead. Selecting "Desktop View" in most mobile browsers should allow browser-based access.
There are both Android and iOS apps for MeWe. I've used neither of these, though the App store entries note:
MeWe Android 4.4 rating (13.1k ratings). Permissions: Contacts (read), Location (approximate/precise), SMS (receive), Phone (read status & identity), Photos/Media/Files (read, modify, & delete contents), Storage (read, modify, or delete), Camera (take pictures/videos), Microphone (record audio), Device ID & Call Info (read status & identity), and numerous elements under Other.
Crunchbase cites 209,220 mobile downloads over the past 30 days (via Apptopia), an 80.78% monthly growth rate, from Google Play.
Either selecting "View Desktop" or navigating with a Desktop browser to https://www.mewe.com your are presented with a registration screen, with the "About", "Privacy Bill of Rights", "MeWe Challenge", and a language selector across the top of the page. Information requested are first and last name, phone or email, and a password. Pseudonymous identities are permitted, though this isn't noted on the login screen. Returning members can use the "Member Log In" button. The uMatrix Firefox extension reveals no third-party content: all page elements are served from mewe.com, img.mewe.com, cdn.mewe.com, or ws.mewe.com. (In subsequent browsing, you may find third-party plugins from, for example, YouTube, for videos, or Giphy, for animated GIFs.) The web front-end is nginx. The site uses SSL v3, issued by DigiCert Inc. to Sgrouples, Inc.
The onboarding experience is stark. There is no default content presented. A set of unidentified icons spans the top of the screen, these turn out to be Home, Chats, Groups, Pages, and Events. New users have to, somehow, find groups or people to connect with, and there's little guidance as to how to do this.
Generally there is a three panel view, with left- and right-hand sidebars of largely navigational or status information, and a central panel with main content. There are also pop-up elements for chats, an omnipresent feature of the site. Controls display labels on some devices and/or resolutions. Controls do not provide tooltips for navigational aid.
My Cloud - Seamlessly organize all your content in My Cloud; it's your personal cloud. My Cloud offers an interactive dashboard for you to control everything you’ve posted or shared - making it simple to delete or reshare.
Unique profiles - Be yourself, free from any tracking and spying. Customize your profile for every group you create or join.
Voice integration (on any or all content) - Post pictures, videos, or documents and include a voice message. Respond to a shared post or just chat. MeWe’s voice integration works for you and your contacts throughout the entire platform.
Universal tagging - This is a new, convenient way to sort and organize all the content you receive and share, making it easy to find everything, anytime.
Enhanced permission control (patent issued) - Manage permissions on a granular level and decide exactly who sees what. You can also remove yourself from the search directory, make yourself invisible to other members online, and much more.
Much More – join MeWe today and take a look inside! MeWe is the next-gen social networking experience designed for you to have fun, stay in touch, collaborate, organize, and simplify.
A key aspect of any social network is its community. Some of the available or ascertained information on this follows.
Weinstein claims a "million+ following inside MeWe.com" on Twitter. The largest visible groups appear to have a maximum of around 15,000 members , for "Awesome gifs". "Clean Comedy" rates 13,350, and the largest open political groups, 11,000+ members. This compares to Google+ which has a staggering, though Android-registrations-inflated 3.3 billion profiles, and 7.9 million communities, though the largest of these come in at under 10 million members. It's likely that MeWe's membership is on the whole more more active than Google+'s, where generally-visible posting activity was limited to just over 9% of all profiles, and the active user base was well under 1% of the total nominal population.
MeWe do not publish active users (e.g., MUA / monthly active users) statistics.
MeWe is principally a group-oriented discussion site -- interactions take place either between individuals or within group contexts. Virtually all discovery is group-oriented. The selection and dynamics of groups on the site will likely strongly affect user experience, so exploring the available groups and their characteristics is of interest. "MeWe has over 60,000 open groups" according to its FAQ. The Open groups -- visible to any registered MeWe user, though not to the general public Web -- are browsable, though sections and topics must be expanded to view the contents: an overview isn't immediately accessible. We provide a taste here. A selection of ten featured topics spans the top of the browser. As I view these, they are:
Health & Fitness
Cars & Motorcycles
Fashion and Beauty
Specific groups may appear in multiple categories. The top Groups within these topics have, variously, 15,482, 7,738, 15,482 (dupe), 7,745, 8,223, 8,220, 1,713, 9,527, 2,716, and 1,516 members. Listings scroll at length -- the Music topic has 234 Groups, ranging in size from 5 to 5,738 members, with a median of 59, mean of 311.4, and a 90%ile of 743.5. Below this is a grid of topics, 122 in all, ranging from Activism to Wellness, and including among them. A selected sample of these topics, with top groups listed members in (parens), follows:
Activism: QAnon+++ (2,572), PATRIOT PREPPERS USA (2,430), Deplorables Republic (2,48), The War Drummer (1,898), Patriots for a United America. (1894), Anonymous (1,700).
Alternative Energy: Reiki, Crystals, and alternative healing (2,114), 💜Starseeds & Empaths💜 (345), Living in Colour (365).
Alternative Lifestyle: Natural Healing and Home Remedies (3,045), Backyard Farming of All Things (2,696), WeTheSheeple (2,251).
Alumni Connections: Google Plus Refugees (271), Google+ Refugees (186), Frog Pond (156), Carlsbad NM High School alumni (57).
Animals: I Love My Dog (4,421), Pussy Shots (4,619).
Astronomy: Spherical Earth Truth, Flat Earth is Wrong (278), Nibiru, Nemesis, Hercolobus, The Destroyer (187).
Biology: Trees (344), Field of Birds (104), Patriots of Australia (51).
Personal Improvement: For Introverts. (1,214), Anarchy, Philosophy, Psychology, and Spirituality (679), Positive Affirmations (447).
Philosophy: In5d Esoteric Metaphysical and Spiritual Database (1,764), Thought Bouncing (1,137), Obtectivists - Galts Gulch - Ayn Rand fans (561).
Poetry: Dead Poest (1,407), Palacio de Poetry (451), Poets Corner (412).
Politics: Donald J. Trump 2016 - Present (11,486), The Conservative's Hangout (8,345), Qanon Follow The White Rabbit (5,600), Drain The Swamp (4,978), Libertarians (4,528), United We Stand Trump2020 (4,216).
Pop Culture: The Loftus Party (116), The Walking Dead: The Stalking Dead (100), Tyler, Texas (71).
Privacy: Join the Open/Privacy Movement (3974), Kingsport tn gun trader (1,157), Safer Computing (555).
To be clear: whilst I've not included every topic, I've sampled a majority of them above, and listed not an arbitrary selection, but the top few Groups under each topic.
Google Plus expats (1,862)
Google+ Refugees (186)
G+ Refugees (101)
my Google+ expatriates
The Google Plus expats group seems the most active of these by far.
It's curious that MeWe make a specific point in their FAQ that:
At MeWe we have absolutely no political agenda and we have a very straightforward Terms of Service. MeWe is for all law-abiding people everywhere in the world, regardless of political, ethnic, religious, sexual, and other preferences.
There are 403 political groups on MeWe. I won't list them all here, but the first 100 or so give a pretty clear idea of flavour. Again, membership is in (parentheses). Note that half the total political Groups memberships are in the first 21 groups listed here, the first 6 are 25% of the total.
Donald J. Trump 2016 - Present (11486)
The Conservative's Hangout (8345)
Qanon Follow The White Rabbit (5600)
Drain The Swamp (4978)
United We Stand Trump2020 (4216)
The Right To Self Defense (3757)
Alternative Media (3711)
Hardcore Conservative Patriots for Trump (3192)
Bastket Of Deplorables4Trump! (3032)
Return of the Republic (2509)
Infowars Chat Room Unofficial (2159)
Donald Trump Our President 2017-2025 (2033)
Berners for Progress (1963)
Sean Hannity Fans (1901)
The American Conservative (1839)
I Am The NRA (1704)
Tucker Carlson Fox News (1645)
We Love Donald Trump (1611)
MAGA - Make America Great Again (1512)
news from the front (1337)
Basket of Deplorables (1317)
Payton's Park Bench (1283)
Convention of States (1282)
Britons For Brexit (1186)
MoJo 5.0 Radio (1180)
MeWe Free Press (1119)
The Constitutionally Elite (1110)
WOMEN FOR PRESIDENT TRUMP (1032)
AMERICANS AGAINST ISIS and OTHER ENEMIES (943)
#WalkAway Campaign (894)
ALEX JONES (877)
The Lion Is Awake ! (854)
We Support Donald Trump! (810)
The Stratosphere Lounge (789)
TRUMP-USA-HANDS OFF OUR PRESIDENT (767)
Official Tea Party USA (749)
Mojo50 Jackholes (739)
Yes Scotland (697)
"WE THE DEPLORABLE" - MOVE ON SNOWFLAKE! (688)
Judge Jeanine Pirro Fans (671)
Ted Cruz for President (650)
No Lapdog Media (647)
Q Chatter (647)
Daily Brexit (636)
Tucker Carlson Fox News (601)
The Trumps Storm Group (600)
QAnon-Patriots WWG1WGA (598)
100% American (569)
Ladies For Donald Trump (566)
Deep State (560)
In the Name of Liberty (557)
Material Planet (555)
Trump NRA Free Speech Patriots on MeWe Gab.ai etc (546)
Magna Carta Group (520)
Constitutional Conservatives (506)
Question Everything (503)
Conspiracy Research (500)
Bill O'Reilly Fans (481)
Conservative Misfit's (479)
Canadian politics (478)
HARDCORE DEPLORABLES (454)
Tampa Bay Trump Club (445)
UK Politics (430)
Bongino Fan Page (429)
Radical Conservatives (429)
RESIST THE RESISTANCE (419)
The Deplorables (409)
America's Freedom Fighters (401)
Politically Incorrect & Proud (399)
CONSERVATIVES FOR AMERICA ! (385)
Political satire (383)
RISE OF THE RIGHT (371)
UK Sovereignty,Independence,Democracy -Everlasting (366)
The Patriots Voting Coalition (359)
End The Insanity (349)
Coming American Civil War! (345)
Constitutional Conservatives (343)
United Nations Watch (342)
A Revival Of The Critical Thinking Union (337)
The New Libertarian (335)
Libertarian Party (official ) (333)
DDS United (Duterte Die-hard Supporters) (332)
American Conservative Veterans (331)
America Needs Donald Trump (326)
The UKIP Debating Society (321)
Coalition For Trump (310)
FRIENDS THAT LIKE JILL STEIN AND THE GREEN PARTY (292)
2nd Amendment (287)
Never Forget #SethRich (286)
Green Party Supporters 2020 (283)
It seems there is relatively little representation from the left wing, or even the centre, of the political spectrum. A case-insensitive match for "liberal" turns up:
104: Conservatives Against Liberal Beliefs C.A.L.I.B (273)
184: Progressive and Liberal Politics (119)
301: Liberalism is a Mental Disorder (33)
302: Resistance Against Liberal Socialism (33)
358: NOT For Liberals (17)
367: Drinking Liberally Houston (14)
400: Stephanie Miller's Sexy Liberal Army (6)
Mainstream political parties are little represented, though again, the balance seems skewed searching on "(democrat|republic|gop)":
391: Saving The Republic: Video News & Opinion (8)
The terms "left" and "right" provide a few matches, not all strictly political-axis aligned:
7: The Right To Self Defense (3757)
80: RISE OF THE RIGHT (371)
150: POLITICS ON THE LEFT (156)
157: 1st Amendment Rights Protected By The 2nd Amendmen (141)
209: On The Left With Jeremy Corbyn (84)
262: Eyes-Left Labour & PP - Social Media (49)
300: Gather Left (33)
385: Defend Washington State Gun Rights (9)
390: Left Coast Conservatives (8)
Socialism and Communism also warrant a few mentions:
121: Revolutionary Socialists United (204)
216: Socialist Thought (79)
220: Stories Of Communism (76)
262: Eyes-Left Labour & PP - Social Media (49)
288: Snuggly Wuggly Socialists (38)
302: Resistance Against Liberal Socialism (33)
And there are some references to green, laboulabor parties:
97: FRIENDS THAT LIKE JILL STEIN AND THE GREEN PARTY (292)
100: Green Party Supporters 2020 (283)
262: Eyes-Left Labour & PP - Social Media (49)
320: Green Party of Ohio Issues & Discussion Group (29)
Whilst there may not be a political agenda, there does appear to be at least a slight political bias to the site. And a distinctive skew on many other topical subjects. Those seeking new homes online may wish to take this into account.
Various typos and tagging corrections. 2018-11-29 - 30
Added G+MM references count for MeWe to lede paragraph. 2018-12-2
1943 Uprising at Treblinka Concentration Camp (crematorium destroyed)
1944 Jewish survivors of Kovono Ghetto emerge from their bunker
1944 Turkey breaks diplomatic relationship with nazi-Germany
1945 After 3½ days suffering exhaustion, lack of water and shark attacks in the Philippine Sea, the surviving crew of USS Indianapolis are spotted by Wilbur “Chuck” Gwinn, a PV-1 Ventura pilot on a routine sector search. 316 had survived.
1945 Potsdam Conference between Joseph Stalin, Harry Truman and Winston Churchill ends
1948 Fanny Blankers-Koen of the Netherlands wins the 100m in 11.9 at the London Olympics; 1st of unprecedented 3 individual track & field gold medals
1948 Danish swimmer Greta Anderson (1:06.3) touches out American Ann Curtis by 0.2 in the women's 100m freestyle at the London Olympics
1948 Italians Adolfo Consolini and Giuseppe Tosi go 1-2 in the men's discus final at the London Olympics
1952 17 year-old future world champion Floyd Patterson wins the gold medal in the middleweight division at the Helsinki Olympic Games with a 1st round KO of Romanian Vasile Tita
1953 Betty Jack Davis, singer (w/Skeeter Davis), killed in car crash
1953 KCPQ TV channel 13 in Tacoma-Seattle, WA (IND) begins broadcasting
1967 The second Blackwall Tunnel opens in Greenwich, London
1967 "In the Heat of the Night" directed by Norman Jewison, based on John Ball's novel of the same name, starring Sidney Poitier and Rod Steiger premieres in New York (Academy Awards Best Picture 1968)
1968 35th Chicago College All-Star Game: Green Bay 34, All-Stars 17, 69,917 at Soldier Field
1968 Ron Hansen (Washington) & Tim Cullen (Chicago WS) become the first MLB players to be traded for each other twice in the same season, they had been traded in February in opposite directions
1969Bob Dylan makes surprise appearance at Hibbing HS Minn 10th reunion
US citizen convicted of laundering $ 25 million through BTC
https://preview.redd.it/2g9do47u0yi31.png?width=900&format=png&auto=webp&s=5594ecfe8cb5cb78c2ce2b12d8e9e52b392cffcd Los Angeles resident Kunal Kalra pleaded guilty to the sale of methamphetamine and the organization of a scheme for money laundering through bitcoin. According to the local edition of U.S. News, Kalra pleaded guilty to laundering $25 million through BTC and distributing methamphetamines. Now he faces life imprisonment, and is also charged with money laundering in Texas. It is reported that between 2015 and 2017, Kalra engaged in the exchange of BTC and dollars, managed a crypto machine and made deals with drug dealers. He sold two pounds of methamphetamine to an undercover law enforcement agent. Recall that recently another US citizen received a prison term for selling drugs for cryptocurrencies. In addition, in July, a drug dealer with Silk Road was charged with laundering millions of dollars through BTC. #News #USA #MoneyLaundering #Crime #Bitcoin
Georgia Tombstones (Part 2) by Jayge 8^J "Project Blue Beam is a conspiracy theory that claims that NASA is attempting to implement a New Age religion with the Antichrist at its head and start a New World Order, via a technologically-simulated Second Coming. The allegations were presented in 1994 by Quebecois journalist and conspiracy theorist Serge Monast, and later published in his book Project Blue Beam (NASA). Proponents of the theory allege that Monast and another unnamed journalist, who both died of heart attacks in 1996, were in fact assassinated, and that the Canadian government kidnapped Monast's daughter in an effort to dissuade him from investigating Project Blue Beam. The project was apparently supposed to be implemented in 1983, but it didn't happen. It was then set for implementation in 1995 and then 1996. Monast thought Project Blue Beam would be brought to fruition by the year 2000, really, definitely, for sure. The theory is widely popular (for a conspiracy theory) on the Internet, with many web pages dedicated to the subject, and countless YouTube videos explaining it. The actual source material, however, is very thin indeed. Monast lectured on the theory in the mid-1990s (a transcript of one such lecture is widely available), before writing and publishing his book, which has not been reissued by his current publisher and is all but unobtainable. The currently available pages and videos all appear to trace back to four documents: A transcript of the 1994 lecture by Monast, translated into English. A GeoCities page written by David Openheimer and which appears to draw on the original book. A page on educate-yourself.org, compiled in 2005, which appears to include a translation of the book from the French. Monast's page in French Wikipedia. The French Wikipedia article is largely sourced from two books on conspiracy theories and extremism by Pierre-André Taguieff, a mainstream academic expert on racist and extremist groups. From these few texts have come a flood of green ink, in text and video form, in several languages. Even the French language material typically does not cite the original book but the English language pages on educate-yourself.org. However, conspiracy theorists seem to use quantity as a measure of substance (much as alternative medicine uses appeal to tradition) and never mind the extremely few sources it all traces back to. Proponents of the theory have extrapolated it to embrace HAARP, 9/11, the Norwegian Spiral, chemtrails, FEMA concentration camps and Tupac Shakur. Everything is part of Project Blue Beam. It's well on its way to becoming the Unified Conspiracy Theory. Behold A Pale Horse, William Cooper's 1991 green ink magnum opus, has lately been considered a prior claim of, hence supporting evidence for, Blue Beam by advocates. The book is where a vast quantity of now-common conspiracy memes actually came from, so retrospectively claiming it as prior evidence is somewhere between cherrypicking and the Texas sharpshooter fallacy. However, the following quotes, from pages 180-181, intersect slightly with the specific themes of Blue Beam: It is true that without the population or the bomb problem the elect would use some other excuse to bring about the New World Order. They have plans to bring about things like earthquakes, war, the Messiah, an extra-terrestrial landing, and economic collapse. They might bring about all of these things just to make damn sure that it does work. They will do whatever is necessary to succeed. The Illuminati has all the bases covered and you are going to have to be on your toes to make it through the coming years. Can you imagine what will happen if Los Angeles is hit with a 9.0 quake, New York City is destroyed by a terrorist-planted atomic bomb, World War III breaks out in the Middle East, the banks and the stock markets collapse, Extraterrestrials land on the White House lawn, food disappears from the markets, some people disappear, the Messiah presents himself to the world, and all in a very short period of time? Can you imagine? The world power structure can, and will if necessary, make some or all of those things happen to bring about the New World Order. “Without a universal belief in the new age religion, the success of the new world order will be impossible!” The alleged purpose of Project Blue Beam is to bring about a global New Age religion, which is seen as a core requirement for the New World Order's dictatorship to be realised. There's nothing new in thinking of religion as a form of control, but the existence of multiple religions, spin-off cults, competing sects and atheists suggest that controlling the population entirely through a single religion isn't particularly easy. Past attempts have required mechanisms of totalitarianism such as the Inquisition. Monast's theory, however, suggests using sufficiently advanced technology to trick people into believing. Of course, the plan would have to assume that people could never fathom the trick at all — something contested by anyone sane enough not to swallow this particular conspiracy. The primary claimed perpetrator of Project Blue Beam is NASA, presented as a large and mostly faceless organization that can readily absorb such frankly odd accusations, aided by the United Nations, another old-time boogeyman of conspiracy theorists. According to Monast, the project has four steps: Step One requires the breakdown of all archaeological knowledge. This will apparently be accomplished by faking earthquakes at precise locations around the planet. Fake "new discoveries" at these locations "will finally explain to all people the error of all fundamental religious doctrines", specifically Christian and Muslim doctrines. This makes some degree of sense — if you want to usurp a current way of thinking you need to completely destroy it before putting forward your own. However, religious belief is notoriously resilient to things like facts. The Shroud of Turin is a famous example that is still believed by many to be a genuine shroud of Jesus as opposed to the medieval forgery that it has been conclusively shown to be. Prayer studies, too, show how difficult it is to shift religious conviction with mere observational fact — indeed, many theologians avoid making falsifiable claims or place belief somewhere specifically beyond observation to aid this. So what finds could possibly fundamentally destroy both Christianity and Islam, almost overnight, and universally all over the globe? Probably nothing. Yet, this is only step one of an increasingly ludicrous set of events that Project Blue Beam predicts will occur. Step Two involves a gigantic "space show" wherein three-dimensional holographic laser projections will be beamed all over the planet — and this is where Blue Beam really takes off. The projections will take the shape of whatever deity is most predominant, and will speak in all languages. At the end of this light show, the gods will all merge into one god, the Antichrist. This is a rather baffling plan as it seems to assume people will think this is actually their god, rather than the more natural twenty-first century assumption that it is a particularly opaque Coca Cola advertisement. Evidence commonly advanced for this is a supposed plan to project the face of Allah, despite its contradiction with Muslim belief of God's uniqueness, over Baghdad in 1991 to tell the Iraqis to overthrow Saddam Hussein. Someone, somewhere, must have thought those primitive, ignorant non-Western savages wouldn't have had television or advertising, and would never guess it was being done with mirrors. In general, pretty much anything that either a) involves light or b) has been seen in the sky has been put forward as evidence that Project Blue Beam is real, and such things are "tests" of the technology — namely unidentified flying objects. Existing display technology such as 3D projection mapping and holograms are put forward as foreshadowing the great light show in the sky. This stage will apparently be accomplished with the aid of a Soviet computer that will be fed "with the minute physio-psychological particulars based on their studies of the anatomy and electro-mechanical composition of the human body, and the studies of the electrical, chemical and biological properties of the human brain", and every human has been allocated a unique radio wavelength. The computers are also capable of inducing suicidal thoughts. The Soviets are (not "were") the "New World Order" people. Why NASA would use a Soviet computer when the USSR had to import or copy much of its computer technology from the West is not detailed. The second part of Step Two happens when the holograms result in the dissolution of social and religious order, "setting loose millions of programmed religious fanatics through demonic possession on a scale never witnessed before." The United Nations plans to use Beethoven's "Ode to Joy" as the anthem for the introduction of the new age one world religion. There is relatively little to debunk in this, the most widely remembered section of the Project Blue Beam conspiracy, as the idea is so infeasible. Citing actual existing communication technology is odd if the point is for the end product to appear magical, rather than just as cheap laser projections onto clouds. This hasn't stopped some very strange conspiracy theories about such things popping up. Indeed, the notion of gods being projected into the sky was floated in 1991 by conspiracy theorist Betty J. Mills. And US general (and CIA shyster extraordinaire), Edward Lansdale, actually floated a plan to fake a Second Coming over Cuba to get rid of Castro. Step Three is "Telepathic Electronic Two-Way Communication." It involves making people think their god is speaking to them through telepathy, projected into the head of each person individually using extreme low frequency radio waves. (Atheists will presumably hear an absence of Richard Dawkins.) The book goes to some lengths to describe how this would be feasible, including a claim that ELF thought projection caused the depressive illness of Michael Dukakis' wife Kitty. Step Four has three parts: Making humanity think an alien invasion is about to occur at every major city; Making the Christians think the Rapture is about to happen; A mixture of electronic and supernatural forces, allowing the supernatural forces to travel through fiber optics, coax, power and telephone lines to penetrate all electronic equipment and appliances, that will by then all have a special microchip installed. Then chaos will break out, and people will finally be willing — perhaps even desperate — to accept the New World Order. "The techniques used in the fourth step is exactly the same used in the past in the USSR to force the people to accept Communism." A device has apparently already been perfected that will lift enormous numbers of people, as in a Rapture. UFO abductions are tests of this device. Project Blue Beam proponents believe psychological preparations have already been made, Monast having claimed that 2001: A Space Odyssey, Star Wars and the Star Trek series all involve an invasion from space and all nations coming together (the first two don't, the third is peaceful contact) and that Jurassic Park propagandises evolution in order to make people think God's words are lies. The book detailed the theory. In the 1994 lecture, Monast detailed what would happen afterwards. All people will be required to take an oath to Lucifer with a ritual initiation to enter the New World Order. Resisters will be categorised as follows: Christian children will be kept for human sacrifice or sexual slaves. Prisoners to be used in medical experiments. Prisoners to be used as living organ banks. Healthy workers in slave labour camps. Uncertain prisoners in the international re-education center, thence to repent on television and learn to glorify the New World Order. The international execution centre. An as yet unknown seventh classification. Joel Engel's book Gene Roddenberry: The Myth and the Man Behind Star Trek was released in 1994, shortly before Monast's lecture on Project Blue Beam: “In May 1975, Gene Roddenberry accepted an offer from Paramount to develop Star Trek into a feature film, and moved back into his old office on the Paramount lot. His proposed story told of a flying saucer, hovering above Earth, that was programmed to send down people who looked like prophets, including Jesus Christ.” All the steps of the conspiracy theory were in the unmade mid-'70s Star Trek film script by Roddenberry, which were recycled for the Star Trek: The Next Generation episode Devil's Due, broadcast in 1991. There is no evidence of deliberate fraud on Monast's part; given his head was quite thoroughly full of squirrels and confetti by this time, it's entirely plausible that he thought this was the revelation of secret information in a guise safe for propagation. However, the actual source was so obvious that even other conspiracy theorists noticed. They confidently state it was obvious that Monast had been fed deceptive information by the CIA. Of course!" -- rationalwiki.org "Serge Monast was a Québécois investigative journalist, poet, essayist and conspiracy theorist. He is known to English-speaking readers mainly for Project Blue Beam and associated conspiracy tropes. His works on Masonic conspiracy theories and the New World Order also remain popular with French-speaking conspiracy theorists and enthusiasts." -- Wikipedia "A human microchip implant is typically an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being. This type of subdermal implant usually contains a unique ID number that can be linked to information contained in an external database, such as personal identification, law enforcement, medical history, medications, allergies, and contact information. The first experiments with an RFID implant were carried out in 1998 by the British scientist Kevin Warwick. His implant was used to open doors, switch on lights, and cause verbal output within a building. After nine days the implant was removed and has since been held in the Science Museum (London). On 16 March 2009 British scientist Mark Gasson had an advanced glass capsule RFID device surgically implanted into his left hand. In April 2010 Gasson's team demonstrated how a computer virus could wirelessly infect his implant and then be transmitted on to other systems. Gasson reasoned that with implanted technology the separation between man and machine can become theoretical because the technology can be perceived by the human as being a part of their body. Because of this development in our understanding of what constitutes our body and its boundaries he became credited as being the first human infected by a computer virus. He has no plans to remove his implant. Several hobbyists have placed RFID microchip implants into their hands or had them inserted by others. Amal Graafstra, author of the book RFID Toys, asked doctors to place implants in his hands in March 2005. A cosmetic surgeon used a scalpel to place a microchip in his left hand, and his family doctor injected a chip into his right hand using a veterinary Avid injector kit. Graafstra uses the implants to access his home, open car doors, and to log on to his computer. With public interest growing, in 2013 he launched biohacking company Dangerous Things and crowdfunded the world's first implantable NFC transponder in 2014. He has also spoken at various events and promotional gigs including TEDx, and built a smartgun that only fires after reading his implant. Alejandro Hernandez CEO of Futura is known to be the first in Central America to have Dangerous Things' transponder installed in his left hand by Federico Cortes in November 2017. Mikey Sklar had a chip implanted into his left hand and filmed the procedure. Jonathan Oxer self-implanted an RFID chip in his arm using a veterinary implantation tool. Martijn Wismeijer, Dutch marketing manager for Bitcoin ATM manufacturer General Bytes, placed RFID chips in both of his hands to store his Bitcoin private keys and business card. Patric Lanhed sent a “bio-payment” of one euro worth of Bitcoin using a chip embedded in his hand. Marcel Varallo had an NXP chip coated in Bioglass 8625 inserted into his hand between his forefinger and thumb allowing him to open secure elevators and doors at work, print from secure printers, unlock his mobile phone and home, and store his digital business card for transfer to mobile phones enabled for NFC. Biohacker Hannes Sjöblad has been experimenting with NFC (Near Field Communication) chip implants since 2015. During his talk at Echappée Voléé 2016 in Paris, Sjöblad disclosed that he has also implanted himself between his forefinger and thumb and uses it to unlock doors, make payments, and unlock his phone (essentially replacing anything you can put in your pockets). Additionally, Sjöblad has hosted several "implant parties," where interested individuals can also be implanted with the chip. Researchers have examined microchip implants in humans in the medical field and they indicate that there are potential benefits and risks to incorporating the device in the medical field. For example, it could be beneficial for noncompliant patients but still poses great risks for potential misuse of the device. Destron Fearing, a subsidiary of Digital Angel, initially developed the technology for the VeriChip. In 2004, the VeriChip implanted device and reader were classified as Class II: General controls with special controls by the FDA; that year the FDA also published a draft guidance describing the special controls required to market such devices. About the size of a grain of rice, the device was typically implanted between the shoulder and elbow area of an individual’s right arm. Once scanned at the proper frequency, the chip responded with a unique 16-digit number which could be then linked with information about the user held on a database for identity verification, medical records access and other uses. The insertion procedure was performed under local anesthetic in a physician's office. Privacy advocates raised concerns regarding potential abuse of the chip, with some warning that adoption by governments as a compulsory identification program could lead to erosion of civil liberties, as well as identity theft if the device should be hacked. Another ethical dilemma posed by the technology, is that people with dementia could possibly benefit the most from an implanted device that contained their medical records, but issues of informed consent are the most difficult in precisely such people. In June 2007, the American Medical Association declared that "implantable radio frequency identification (RFID) devices may help to identify patients, thereby improving the safety and efficiency of patient care, and may be used to enable secure access to patient clinical information", but in the same year, news reports linking similar devices to cancer caused in laboratory animals had a devastating impact on the company's stock price and sales. In 2010, the company, by then called "PositiveID", withdrew the product from the market due to poor sales. In January 2012, PositiveID sold the chip assets to a company called VeriTeQ that was owned by Scott Silverman, the former CEO of Positive ID. In 2016, JAMM Technologies acquired the chip assets from VeriTeQ; JAMM's business plan was to partner with companies selling implanted medical devices and use the RFID tags to monitor and identify the devices. JAMM Technologies is co-located in the same Plymouth, Minnesota building as Geissler Corporation with Randolph K. Geissler and Donald R. Brattain listed as its principals. The website also claims that Geissler was CEO of PositiveID Corporation, Destron Fearing Corporation, and Digital Angel Corporation. In 2018, A Danish firm called BiChip released a new generation of microchip implant that is intended to be readable from distance and connected to Internet. The company released an update for its microchip implant to associate it with the Ripple cryptocurrency to allow payments to be made using the implanted microchip. In February 2006, CityWatcher, Inc. of Cincinnati, OH became the first company in the world to implant microchips into their employees as part of their building access control and security system. The workers needed the implants to access the company's secure video tape room, as documented in USA Today. The project was initiated and implemented by Six Sigma Security, Inc. The VeriChip Corporation had originally marketed the implant as a way to restrict access to secure facilities such as power plants. A major drawback for such systems is the relative ease with which the 16-digit ID number contained in a chip implant can be obtained and cloned using a hand-held device, a problem that has been demonstrated publicly by security researcher Jonathan Westhues and documented in the May 2006 issue of Wired magazine, among other places. The Baja Beach Club, a nightclub in Rotterdam, the Netherlands, once used VeriChip implants for identifying VIP guests. The Epicenter in Stockholm, Sweden is using RFID implants for employees to operate security doors, copiers, and pay for lunch. In 2017 Mike Miller, chief executive of the World Olympians Association, was widely reported as suggesting the use of such implants in athletes in an attempt to reduce problems in sport due to drug taking. Theoretically, a GPS-enabled chip could one day make it possible for individuals to be physically located by latitude, longitude, altitude, speed, and direction of movement. Such implantable GPS devices are not technically feasible at this time. However, if widely deployed at some future point, implantable GPS devices could conceivably allow authorities to locate missing persons and/or fugitives and those who fled from a crime scene. Critics contend, however, that the technology could lead to political repression as governments could use implants to track and persecute human rights activists, labor activists, civil dissidents, and political opponents; criminals and domestic abusers could use them to stalk and harass their victims; and child abusers could use them to locate and abduct children. Another suggested application for a tracking implant, discussed in 2008 by the legislature of Indonesia's Irian Jaya would be to monitor the activities of persons infected with HIV, aimed at reducing their chances of infecting other people. The microchipping section was not, however, included into the final version of the provincial HIV/AIDS Handling bylaw passed by the legislature in December 2008. With current technology, this would not be workable anyway, since there is no implantable device on the market with GPS tracking capability. Since modern payment methods rely upon RFID/NFC, it is thought that implantable microchips, if they were to ever become popular in use, would form a part of the cashless society. Verichip implants have already been used in nightclubs such as the Baja club for such a purpose, allowing patrons to purchase drinks with their implantable microchip. In a self-published report anti-RFID advocate Katherine Albrecht, who refers to RFID devices as "spy chips", cites veterinary and toxicological studies carried out from 1996 to 2006 which found lab rodents injected with microchips as an incidental part of unrelated experiments and dogs implanted with identification microchips sometimes developed cancerous tumors at the injection site (subcutaneous sarcomas) as evidence of a human implantation risk. However, the link between foreign-body tumorigenesis in lab animals and implantation in humans has been publicly refuted as erroneous and misleading and the report's author has been criticized over the use of "provocative" language "not based in scientific fact". Notably, none of the studies cited specifically set out to investigate the cancer risk of implanted microchips and so none of the studies had a control group of animals that did not get implanted. While the issue is considered worthy of further investigation, one of the studies cited cautioned "Blind leaps from the detection of tumors to the prediction of human health risk should be avoided". The Council on Ethical and Judicial Affairs (CEJA) of the American Medical Association published a report in 2007 alleging that RFID implanted chips may compromise privacy because there is no assurance that the information contained in the chip can be properly protected. Following Wisconsin and North Dakota, California issued Senate Bill 362 in 2007, which makes it illegal to force a person to have a microchip implanted, and provide for an assessment of civil penalties against violators of the bill. In 2008, Oklahoma passed 63 OK Stat § 63-1-1430 (2008 S.B. 47), that bans involuntary microchip implants in humans. On April 5, 2010, the Georgia Senate passed Senate Bill 235 that prohibits forced microchip implants in humans and that would make it a misdemeanor for anyone to require them, including employers. The bill would allow voluntary microchip implants, as long as they are performed by a physician and regulated by the Georgia Composite Medical Board. The state's House of Representatives did not take up the measure. On February 10, 2010, Virginia's House of Delegates also passed a bill that forbids companies from forcing their employees to be implanted with tracking devices. Washington State House Bill 1142-2009-10 orders a study using implanted radio frequency identification or other similar technology to electronically monitor sex offenders and other felons. The general public are most familiar with microchips in the context of tracking their pets. In the U.S., some Christian activists, including conspiracy theorist Mark Dice, the author of a book titled The Resistance Manifesto, make a link between the PositiveID and the Biblical Mark of the Beast, prophesied to be a future requirement for buying and selling, and a key element of the Book of Revelation. Gary Wohlscheid, president of These Last Days Ministries, has argued that "Out of all the technologies with potential to be the mark of the beast, VeriChip has got the best possibility right now"." -- Wikipedia "In this latest book Joseph P Farrell examines the subject of mind control, but from a very unusual perspective, showing that its basic underlying philosophy, and goal, is not only cosmological in nature, but that the cosmology in view is very ancient, and that mind control of any sort, from the arts to hypnosis, remote electromagnetic technologies and “electroencephalographic dictionaries” has cosmological implications." -- Microcosm and Medium: The Cosmic Implications and Agenda of Mind Control Technologies publisher's description
Harmony builds an open marketplace at Google-scale for the decentralized economy. This project aims to provide a consensus protocol over the open Internet at 10 million transactions per second with 100-millisecond latency and at most 0.1% fee. Harmony’s goal is to be 1,000+ times faster and cheaper than Bitcoin and Ethereum. They are rebuilding the decentralized economy with 10x innovations in all components: transport network (Google’s UDP, Bloom tables, 5G mobile), consensus protocol (Byzantine committees, acyclic graphs, monopolist fees), and system tooling (unikernels, multi-core in Rust, zero-copy streaming). As the infrastructure for the world’s data firehose, their bandwidth must scale to 10M tx/sec to support data from supply chain IoT devices or energy grids. Yet, all of the above must settle agreements within 100 milliseconds to support instant reactions for autonomous robots or on-chain quotes in exchanges. They employ technical innovations that are already proven in research and implementation. For example, Google’s UDP currently powers 35% of its traffic (or 7% of the Internet) with 50% latency improvement, OmniLedger Byzantine protocol benchmarks to 13,000 tx/sec and 1.5 sec latency with 1,800 hosts, while unikernels in Rust archives 10M concurrent connections on a standard 96-core machine on Amazon Cloud.
Stephen Tse – a researcher at Microsoft Research, a senior infrastructure engineer at Google, and a principal engineer on search ranking at Apple. He founded the mobile search Spotsetter with institutional venture capital; Apple later acquired the startup. Nicolas Burtey – founded a VR video startup in 2012 that grew to 40 people and raised $10m. Nicolas has a bachelor degree in mathematics and computer science, and a master degree in computational photography. Alok Kothari – has worked on deep learning models for natural language understanding at Apple Siri. He has conducted research in word sense disambiguation, machine translation, and social media retrieval. Alok has published at top conference venues including SIGIR, ICWSM and EMNLP. Rongjian Lan – a search infrastructure engineer for Play Store at Google. Rongjian is the co-chair of ABC Blockchain Foundation with 100+ engineers from Google, Facebook, Linkedin as members. Hakwan Lau – a full professor at University of California, Los Angeles. He specializes in neuroscience and machine learning. Hakwan studied at Oxford on the prestigious Rhodes Scholarship, was an associate professor at Columbia University, and published 90+ papers in peer-reviewed journals. Trausti Kristjansson (Part time) – has worked at the industry’s most respected research labs (Microsoft Research, IBM Research, Google Research), founded full-stack startups and led PhD engineers at the top of their field as an engineering Director. Georgios Fainekos (Academic Consult) – is a tenured professor at Arizona State University. He specializes in formal methods of cyber-physical systems, swarm robotics, and machine learning for real-time planning. Georgios did his doctoral studies at the General Robotics, Automation, Sensing & Perception Labs (GRASP Labs) of the University of Pennsylvania. Bruce Huang (Part time) – was an engineer lead at Microsoft for 7 years, a director at Alibaba Cloud and at Credit Ease. Later, he was the CEO of Madailicai, a top peer lending company in China. Bruce is a certified snowboard instructor. He obtained his master’s degree in computer science at the Simon Fraser University. Zi Wang – worked at Google from 2006-2015 on Chrome, Google [X], Android and Nexus. He was the first Global Creative Director for the Google hardware division and co-founded a Google research lab with a $20M budget. Isaac Zhang – started designing civil engineering systems at age 11. He cofounded a smart city and indoor mapping startup, Locision, that raised $20M. Aaron Li – started programming since the age of 7 and started mining Bitcoin since 2011. He won the prestigious ACM SIGKDD best paper award on language topic modeling while completing his master’s degree at the Carnegie Mellon University. Navneet Singh – led mobile engineering at Google for 6 years. He has also been the Senior Vice President at the largest payment processor WorldPay and the Head of Data Science at the mobile payment provider Ezetap. Michael Young – co-founded and led 3 venture-backed companies to acquisitions, including one to a key supplier of Apple. Bringing expertise in computer vision, he has closed deals with Fortune 500 companies, the US Department of Defense, and strategic partners across China and Japan. Kushagra Shrivastava – runs the Xoogler investment syndicate. He worked at Google from 2006-2014, leading marketing and strategy for Google Play and Android Apps. Graduated from the INSEAD Executive Program for marketing, Kushagra was the chief executive for products at an advertising startup acquired by Pinterest. https://harmony.one/#harmonyprotocol#deepsharding#blockchain#BUIDL#BTC#ETH
Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks
It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source. The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network. Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked. The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence. Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing. Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says. For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão. ... Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy." The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!" an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion. Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC." Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' " ... Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author. Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress. ... Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure. We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that. There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use. Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1). Figure 1. Example of accoounts-google . com used in a phishing URL. Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account. Figure 2. Fake Google Account login page. Encoded target details Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address. Figure 3. Spearphishing URL. Table 1. Decoded Base64 values from the phishing URL used by TG-4127. Use of the Bitly URL-shortening service A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4). Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL. Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts. Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL. Target analysis CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent. Focus on Russia and former Soviet states Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia. Other targets worldwide Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
Authors, journalists, NGOs, and political activists (36%)
Government personnel, military personnel, government supply chain, and aerospace researchers (64%)
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government. Figure 6. TG-4127 targeting outside of Russia and former Soviet states. Authors and journalists More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse. Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127. Government supply chain CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information. Figure 8. Categories of supply chain targets. Government / military personnel TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9). Figure 9. Nation or organization of government/military targets. TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations. Success of the phishing campaign CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful. Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Spearphishing details The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access. Hillary for America TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account. Figure 1. Example of a TG-4127 fake Google Account login page. CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity. The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
National political director
Director of strategic communications
Director of scheduling
Director of travel
Traveling press secretary
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times. Democratic National Committee CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network. Personal email accounts CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once. Related activity and implications Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign Read these two articles for more context: How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts How Russia Pulled Off the Biggest Election Hack in U.S. History Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election? Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one. Why would they lie about being separate groups? Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme: DCLeaks Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force. Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it.. FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman Check restricted documents of George Soros’ Open Society Foundation Check restricted documents leaked from Hillary Clinton's presidential campaign staff Emails show Obama saw US involvement in Russia talks as a 'threat' 'Gen. plotted against Obama on Russia' Check George Soros's OSF plans to counter Russian policy and traditional values Check Soros internal files A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Together we’ll be able to throw off the political elite, the rich clans that exploit the world! Fuck the lies and conspirators like DNC!!! Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now. Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points. Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof? don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians. As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce. Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear. Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit. I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him! Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce. As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you? It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds. I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them. I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies. As I’ve already said, their software is of poor quality, with many holes and vulnerabilities. I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly. I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media. He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party? Source: https://twitter.com/GUCCIFER_2 The Shadow Brokers Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions. Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence? Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments? USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran? Ok peoples theshadowbrokers is promising you a trick or treating, here it is https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQhttps://yadi.sk/d/NCEyJQsBxrQxz Password = payus This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important? How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Most of the Bitcoin ATMs in Los Angeles support multiple currencies like Bitcoin Cash, Litecoin and Ether. 1. 76 Gas Station. Located at 2035 Sunset Blvd, the 76 Gas Station Bitcoin ATM offers Bitcoin, Bitcoin Cash, Ether and Litecoin. The commission fee for the purchase of these currencies is unknown. The ATM is open 24/7. Users can purchase up to $750 worth of any currency with only a valid ... Bitcoin ATMs in Los Angeles, United States Total number of Bitcoin ATMs / Tellers in and around Los Angeles: 760. Coins: Bitcoin (BTC) Lightning BTC (LBTC) Bitcoin Cash (BCH) Ether (ETH) Dash (DASH) Litecoin (LTC) Zcash (ZEC) Monero (XMR) Dogecoin (DOGE) Tether (USDT) Ripple (XRP) Operations: Buy Sell. Location type: ATM Teller Other "Other" services are visible with larger zoom. Zoom in ... The first step of Los Angeles Bitcoin ATM is to scan user identification and then validates. Then the user feeds cash and generates QR code from his/her wallet. The user then sends digital currency to the mentioned address. There are different Bitcoin ATMs around the world; some machines generate offline wallet or paper wallet based on the device. Useful things about Bitcoin ATMs. Bitcoin ATMs ... Buy Los Angeles Bitcoin Near Me. Our Bitcoin Depot ATMs are designed to provide you with an easy-to-use platform to buy Bitcoin and other types of cryptocurrency in only a few simple steps. Our mission is to provide the residents of California with the most secure and fastest Bitcoin transactions so the entire process will be easy and stress-free. Buying Bitcoin shouldn’t be a challenge. At ... Don't wait 3-5 days to receive your Bitcoin. Visit a nearby National Bitcoin ATM to buy Bitcoin in person with cash and receive it instantly!
A Los Angeles-based bitcoin enthusiast visits a friend in the Bay Area, thinking that she will be able to use magic internet money anywhere and everywhere. Surprises ensue. Want to learn more ... Dedicated Server Los Angeles 👇👇👇 Rent now 👇👇👇 https://truxgoservers.com/dedicated/losangeles/ Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube. MY ALL-ENCOMPASSING GUIDE TO GETTING STARTED WITH BITCOIN: https://www.btcsessions.ca/post/how-to-buy-sell-and-use-bitcoin-in-canada Today I check out anothe... NCIS Los Angeles 9x19 - BitCoin Densi Lover. Loading... Unsubscribe from Densi Lover? ... NCIS Los Angeles 9x20 - You heard the man - Duration: 3:00. Densi Lover 14,091 views. 3:00 . NCIS Los ...