Monthly Archives: July 2015

Tape over any web or phone cameras you have. Chinese hackers are watching you undress right now.

Tape over any web or phone cameras you have. Chinese hackers are watching you undress right now.

 

If you see a little round circle on your cell phone, tablet, TV, computer, dashboard or..anywhere; put some black electrical tape over it.

It is a camera!

Chinese hackers can now surf the internet and look through that camera, right back at you.

There are billions of bored people who are wondering what you look like in the shower, during sex, in your meetings, on your dates, in an argument…in any situation you would not want broadcast to the whole world. Yep, smile! You are now on Chinese hacker candid camera.

The software to do this only costs between $30.00 bucks and “free”, and any 14 year old can download it online.

They scan all of the cameras in your neighborhood and see who is naked, talking or doing something. The various versions of the software make the phone, or other device, appear to either be turned off, or doing something else. You will never know that you were being spied on. Once they know what time you take your shower, or have sex, they set it to automatically record you each day at that time.

It is insidious.

They can listen to everything you are doing, with or without the camera, and set their software to listen for certain keywords.

They sell the videos on the darknet or trade them on illicit sites like 4chan and through stealthed up Ebay and Craigslist ads referring to “Warez” or other code words.

While you may, at first, think “you have nothing to hide”, on second thought, most people realize that their showers, sex acts, marital fights, affairs, flirts, company secrets, gossip, family issues and substance abuse challenges really are not things they want posted across the entire internet.

So how do you defeat these “Voyackers”?

 

  • 1.       Put black electrical tape over any cameras that are in your proximity.
  • 2.       Keep the battery pulled out of your device or, at least, always keep it in “Airplane” mode so the hackers can’t easily get in.
  • 3.       Keep your device in a metallic mesh “Faraday Cage” blocking bag, so that the signals can’t be acquired externally.
  • 4.       Assume that anything you do with an electronic device in the room just went out to the whole world.
  • 5.       Don’t “check in” or post anything about your activities, or intentions, On social networks.
  • 7.       Don’t post pictures of yourself, or let others post pictures of you, on the internet.

There has been a recent glut of beauty pageant queens, female news anchors and actresses getting Voyacked. The, now famous, “Fappening” hack was only the smallest tip of the iceberg.

If you are a parent, you should be very, very concerned about your child’s cell phone.

If you were on tv or in a blog, and pitched as “hot”, then you are already targeted. The Voyackers are looking for you with photo comparison software that scans every dating site, Google site, Linkedin site, Facebook site and Twitter photo and tracks you right back to your daily schedule, job, home and relationships. They have a whole file on you, and your routine, before you have even had breakfast, the next day after you become “hot” in the media.

Now you are a target, a commodity, an asset, to be stalked, Voyacked and harvested like a crop. They sell your naked and personal data to the highest bidder.

Europeans are particularly careful with their digital privacy but much of Europe sees American’s as oblivious to the threats. The Continental perception of America is that of a nation of gun-toting, slack-jawed, numb-eyed sheep.

American’s tend to disagree. American’s may be violent, but they are violent about anything they see as limiting their human rights. This whole Voyacking thing actually really grinds on them.

Not only is their right to privacy being taken away, but the people taking it away are too far away for them to shoot at. It really “chaps their hides”, as they say in Texas.

So the big cut-off is under-way. American’s are finally realizing that life actually did exist before there was an internet. The use of the internet is dropping, among many. Marketeers still attempt to “get ‘em while they’re young” as McDonald’s and the cigarette companies decreed, but even the kids are now appointing net addiction as “un-cool”. Every city now has an internet de-addiction group or children’s “un-plugging” camp. The world is going through the process of refining their interaction with the digital realms. The public is finally saying that they will control how the digital world interacts with them, and not the other way around.

 

RAPED BY WASHINGTON: A TECHNOLOGY TALE

RAPED BY WASHINGTON: A TECHNOLOGY TALE

XYZ Company (not their actual name) was one of many, solicited by the U.S. Government to help America create new jobs, national security enhancements and new energy options.

In the process, XYZ experienced, within the highest levels of Washington, DC: fraud, lies, organized crime, hit-jobs and an epic abuse of the public trust. They saw the theft of taxpayer dollars, by federal officials and corrupt campaign billionaires.

This is their story.

Like the others, who experienced the same abuse, they are a team of engineers. They are the kinds of folks who invent and build “the next big thing”. They have received decades of issued patents, awards, contracts with famous clients, and been on TV for their accomplishments. They had a huge stack of reference letters, and customer orders, that they personally hand-delivered to top Washington, DC officials to show the market demand for what they were to work on. They received a Congressional Commendation in the Iraq War Bill. They had “street cred”. Popular Science, NPR and Network news applauded them.

In XYZ’s case, The U. S. Government asked them to deliver “the next big thing”. Unfortunately for XYZ, their technology threatened to put a rigged multi-billion dollar, insider, criminal commodity scam, set up by corrupt senators and Silicon Valley campaign financiers, out of business.

XYZ did not know this, when everything began.

XYZ, and their peers, witnessed White House staff, Department of Energy officers, U.S. Senators and sociopathic Silicon Valley billionaires, engage in crimes with impunity, audacity and a complete disregard for ethics.

They, and staff from Bright Automotive, ZAP Automotive, Fischer, Aptera, Elio, Eco Motors, and many, many, other companies, were encouraged to spend extensive amounts of their time, and money, on what, they were all told by top State and Federal officials, was a sure thing. They did not realize that they were all playing against a rigged deck that had been “hard-wired” for a few campaign financiers, from the very start. They had their dreams, companies, life savings (And maybe some of their peers) killed off by a Corrupt program operated by the heads of the Department of Energy, under the direction of senior White House officials.

There was more than enough money to fund all of the applicants – so there was no possibility of the fund running out of money. Any excuses about “not enough money” by Steven Chu, and his staff, have been shown to have been lies in order to protect the Silicon Valley Cartel from having any competitors. There are still unspent billions of dollars sitting in the fund, half a decade later.

All of those applicants, in the top-tier final-round groups, had exceeded the technical, and financial, qualifications by many magnitudes, beating Tesla, Solyndra and Fisker many times over. Any excuses about “not being technically qualified”, by Steven Chu, and his staff, have been shown to have been lies, in order to protect the Silicon Valley Cartel from having any competitors. Evidence now shows that Chu had his staff, and contractors: McKinsey, Argonne Labs, Deloitte and IBM Consulting, rig the review process to favor campaign financiers stock and sabotage their competitors.

In one case, Steven Chu told an electric car company, which competed with Silicon Valley campaign financiers, that they were disqualified because they had not planned to use enough gasoline!!!! Rejections by Chu and his staff got even more ludicrous from there.

Most of Chu’s picks failed. They went bankrupt, got raided by law enforcement, and were investigated for stock manipulation fraud, lied on their financial reports and were all connected to the same campaign financiers. Funny coincidence.

In fact, news analysts always asked why Chu didn’t spread the risk by awarding even a single funding approval to any company who was not one of his business associates holdings? Energy Secretary Moniz, known around Washington as “Chu Too”, still, laughingly, orders the Department of Energy press office to send out monthly stories proclaiming the Green Energy CleanTech program “not that big of a failure”.  That cover-up pitch has worn so thin that the media now responds with overt derision and belly laughs. The Department of Energy Program has now set the world record, (for all of recorded history to date) for government funding for the most failures, in the shortest timeframe, with the biggest taxpayer losses in history!

History has also proven that the Department of Energy only awarded funds to Silicon Valley campaign financier-approved holdings, and sabotaged any other applicant, particularly any that competed with John Doerr, Elon Musk, Eric Schmidt, Steve Jurvetson and the “Silicon Valley Cartel” of campaign purchasers.

The entire Department of Energy ATVM and LGP funding programs, and a portion of the TARP program was used to pay kick-backs to campaign finance billionaires.

It turned out that XYZ technology had put Steven Chu’s, Diane Feinstein’s, Harry Reid’s and White House Staff’s personal stock profits at risk (A criminal, and moral, conflict of interest in the first place). Those people, and their backers, had rigged the funding for the lithium battery and indium solar chemicals in which they controlled the profit stream. They didn’t like any technology which showed up the failures of the monopolized mineral mining deals they had picked, so they sabotaged every other energy technology.

Unfortunately, they picked the wrong horse. Lithium blows up when it gets wet. Millions of dollars of millionaire wet-dream Fisker sports cars turned into piles of ash, in spectacular fireballs of destruction, when they got damp from storms. Lithium explodes, on its own, spontaneously, for no apparent reason. Aircraft have crashed because their lithium batteries turned into fireballs, killing the crew. Boeing lost vast amounts of money when it had to redo its lithium batteries because they kept igniting.  Tesla’s burst into flames from bumps in the road. A recent Tesla crash killed the driver and burned him into an unrecognizable lump. Getting the lithium from Bolivia and Afghanistan has gotten quite a lot of people killed, including U.S. soldiers. To get it, you need to invade another country. The mining deals, to process the lithium minerals are under investigation for their connections to the Russian mafia and Goldman Sachs criminal commodity market manipulation. When lithium “goes thermal”, in its daily fire incidents around the world, it releases toxic vapors which have been proven to cause brain damage, lung damage, liver damage, fetal damage and neurological toxicity. The “we smell smoke” issues, in many trains and planes, is often someone’s lithium ion cell phone battery going off.  Lithium battery fires have set children, senior citizens, homes and offices on fire. Tesla lithium battery partner: Panasonic, is under global investigation for corruption. Lithium battery factories poison the workers, and nearby villages, to death.

While Chu’s Silicon Valley financiers joined up with Goldman Sach’s to flood Washington, and Wall Street, with articles saying that “Afghanistan is the Saudi Arabia of lithium” and “Trillions of dollars of lithium in Afghanistan for the taking”… the pitch turned out to be a poorly researched scam to try to get jobs for Russian mining companies. Many, now feel, that Russians may have trumped up the pitch about what a sweet deal “taking over Afghanistan” was. Main stream news report that the U.S. loss from Afghanistan, to U.S. taxpayers as of today, is six trillion dollars, and climbing. Chu’s handover of federal cash to so many Russian owned, Silicon Valley-partnered, companies with investors who are now on FBI “Watch-Lists” raises many eyebrows. While Kleiner Perkin’s “Troll farms” flood the internet with “Elon Musk is a Genius”, “Oil Sucks”, “Batteries are Good” spam, the public has gotten wise to the grift.

So: Yah, that whole lithium thing may not have been thought out very well.

Of course the same mining deals, and monopoly skims, applied to indium. The mining chemical that, now fiasco’d, Solyndra and Abound Solar needed. The FBI and law enforcement shut them down and they are still being reviewed for embezzlement and kick-backs. The Solyndra disaster was particularly painful for Senator Feinstein’s family who owned the stock, employment service, leases, real estate contracts, supplier holdings, construction company and other kick-back “perks” for both Solyndra and Tesla.

So the Silicon Valley scam of “monopolize-one-energy-chemical” thing was a bust and the whole lithium thing blew up, literally.

Steven Chu and the Silicon Valley billionaires hate oil, but they didn’t hate it enough to not try to copy it. They thought: ‘the oil companies have this one chemical, called petroleum, we will get us one chemical and control it, and kill oil, and be all ‘not oil’.  They saw the “treasure maps” about the “trillions of dollars” of these mining chemicals and wanted those trillions in their pockets. They were willing to do anything to get it.

Science doesn’t work like that.

Greed overcame technical reality, and the great “Cleantech” rush turned into the “Cleantech Crash” (Per the 60 Minutes tv show).

To keep XYZ out of the funding, and prevent them from competing with the campaign financiers. Chu first said, in a recorded conversation, he would waive the fee he was going to charge them (Federal lawyers question the legality of charging citizens for federal awards in the first place). Then he assigned his top staffer to respond to them to give feedback to their investors who were loaning the money to pay that “fee”. The staffer promised, in writing, to respond.  XYZ called him, faxed, him, Fed-ex’d him and messenger’d him and he never got back to XYZ with the critical information the investors needed in order to release the funds for the “fee”. His secretary, on multiple occasions, even stated that he was “in the next office and would get right back to you”.

The day after the deadline for the “fee”, Steven Chu’s top staffer finally responded, in writing, and said, “oh, you missed the deadline” , “you are out of the program”. He had intentionally waited until after the arbitrary deadline in order to cut off the XYZ application.  Alas, for DOE, XYZ had another application in process, and that one became part of a federal crime investigation that brought down some of the biggest names in politics.

XYZ, and the other applicants, experienced huge numbers of lies, misrepresentations, manipulations, “missing hard-drives”, “lost” documents, stone-walling and actual attacks.

Because they filed a complaint, the Campaign Financiers, and, likely, White House staff, hired their associated front groups: Gawker Media, Media Matters, Google and In-Q-Tel to run retribution hit-jobs on those who complained

One company, in the same boat, published this damning letter in the media:

Secretary Steven Chu
U.S. Department of Energy
Washington, D.C.
Dear Secretary Chu,

Today Bright Automotive, Inc will withdraw its application for a loan under the ATVM program administered by your department. Bright has not been explicitly rejected by the DOE; rather, we have been forced to say “uncle”. As a result, we are winding down our operations. Last week we received the fourth “near final” Conditional Commitment Letter since September 2010. Each new letter arrived with more onerous terms than the last. The first three were workable for us, but the last was so outlandish that most rational and objective persons would likely conclude that your team was negotiating in bad faith. We hope that as their Secretary, this was not at your urging. The actions – or better said “lack of action” — by your team means hundreds of great manufacturing and technical jobs, union and non-union alike, and thousands of indirect jobs in Indiana and Michigan will not see the light of day. It means our product, the Bright IDEA plug-in hybrid electric commercial vehicle, will not provide the lowest total cost of ownership for our commercial and government fleet customers, saving millions of barrels of oil each year. It means turning your back on a bona fide step forward in our national goal to wean America away from our addiction to foreign oil and its implications on national security and our economic strength. In good faith we entered the ATVM process, approved under President Bush with bi-partisan Congressional approval, in December of 2008. At that time, our application was deemed “substantially complete.”

As of today, we have been in the “due diligence” process for more than 1175 days. That is a record for which no one can be proud. We were told by the DOE in August of 2010 that Bright would get the ATVM loan “within weeks, not months” after we formed a strategic partnership with General Motors as the DOE had urged us to do. We lined up and agreed to private capital commitments exceeding $200M – a far greater percentage than previous DOE loan applicants. Finally, we signed definitive agreements with state-of-the-art manufacturer AM General that would have employed more than 400 union workers in Indiana in a facility that recently laid-off 350 workers. Each time your team asked for another new requirement, we delivered with speed and excellence. Then, we waited and waited; staying in this process for as long as we could after repeated, yet unmet promises by government bureaucrats. We continued to play by the rules, even as you and your team were changing those rules constantly – seemingly on a whim. Because of ATVM’s distortion of U.S. private equity markets, the only opportunities for 100 percent private equity markets are abroad. We made it clear we were an American company, with American workers developing advanced, deliverable and clean American technology.

We unfortunately did not aggressively pursue an alternative funding path in China as early as we would have liked based on our understanding of where we were in the DOE process. I guess we have only ourselves to blame for having faith in the words and promises of our government officials. The Chairman of a Fortune 10 company told your former deputy, Jonathan Silver, that this program “lacked integrity”; that is, it did not have a consistent process and rules against which private enterprises could rationally evaluate their chances and intelligently allocate time and resources against that process. There can be no greater failing of government than to not have integrity when dealing with its taxpaying citizens. It does not give us any solace that we are not alone in the debacle of the ATVM process. ATVM has executed under $50 million of transactions since October of 2009. Going back to the creation of the program, only about $8 billion of the approved $25 billion has been invested. In the meantime, countless hours, efforts and millions of dollars have been put forth by a multitude of strong entrepreneurial teams and some of the largest players in the industry to advance your articulated goal of advancing the technical strength and clean energy breakthroughs of the American automotive industry. These collective efforts have been in vain as the program failed to finance both large existing companies and younger emerging ones alike. Our vehicle would have been critical to meet President Obama’s stated goal of one million plugin electric vehicles on the road in 2015 and his commitment to buy 100 percent alternative fueled vehicles for the Federal Fleet. So, we are not the only ones who will be disappointed. The ineffectiveness of the DOE to execute its program harms commercial enterprise as it not only interfered with the capital markets; it placed American companies at the whim of approval by a group of bureaucrats. Today at your own ARPA-E conference, Fred Smith, the remarkable leader of FedEx, made the compelling case to reduce our dependence on oil; a product whose price is manipulated by a cartel which has caused the greatest wealth transfer in our history from the pockets of working people and businesses to countries, many of whom are not our allies.

And yet, having in hand a tremendous tool for progress in this critically strategic battle — a tool that drew the country’s best to your door — you failed not only in the deployment of funds from ATVM but in dissipating these efforts against not just false hope, but false words. For us, this is a particularly sad day for our employees and their families, as well as the employees and families of our partners. We asked our team members on countless occasions to work literally around the clock whenever yet another new DOE requirement came down the pike, so that we could respond swiftly and accurately. And, we always did.

Sincerely,

Reuben Munger

Mike Donoughe
CEO,  COO

______________________________

Of course the Department of Energy got sued, for running a corruption operation, by applicant’s trying to gain a modicum of justice and get their damages covered. All of those applicants discovered that the news head-lines about: “no justice left in America”, may be true. In one lawsuit the feds dismissed the case because, according to the court, there is no law that prevents the Department of Energy from engaging in corruption. Nice!

No law enforcement, or regulatory entity, at the State or Federal level, seems to want to upset the pig trough of kick-backs and corruption. It is hard for the FBI, or the SEC, to stomach putting their own bosses in jail.

XYZ had the customers, the factories, the suppliers, the jobs and every advantage. So did all of the hundreds of other domestic companies, that experienced these attacks and manipulations. But Japanese and Russian companies got some of the cash because they were partners with the Silicon Valley campaign financiers and those campaign financiers, directly, got handed the rest of the money that went out.

In Tesla’s (Solyndra’s financial and real estate sister) case, the “fee” was entirely waived for Tesla. Even though Tesla had the worst debt-ratio of any applicant; horrible credit ratings per Treasury; no design; inaccurate price models; a BOM that was $100K over budget per car; no factory; lawsuits with it’s founders, exploding batteries, many technical problems, no experience and few customers; to mention only some of the vast numbers of red flags; Tesla was hand-held through Steven Chu’s program and handed cash without any questions. Major papers have recently outed Elon Musk as the biggest taker of government kick-backs in history: over $6 Billion of “payola” from taxpayer’s pocket’s to billionaire Musk’s bank vaults, protected from investigation, at the highest levels.

So, it didn’t hurt that Steven Chu was nominated, and placed in Office, by Tesla’s owners and investors.

Every single item of technology that XYZ, and the sabotaged applicants, built; worked. The big players, that Steven Chu funded, copied them and now sell copies of their products globally, proving that they work. They, laughingly, tell the applicants they stole from to “sue them if you think you can afford the millions of dollars of legal expenses” to go after a Kleiner Perkins, Google or the rest.


____________________________

This article shows how the Senator, or Secretary of Energy, that shakes your hand, is picking your pocket with his other hand:

Small businesses claim US government stealing their ideas

 Eric Shawn

By Eric Shawn

Feds putting companies out of business?

“They stole all my stuff and used taxpayer money to do it,”  John Hnatio, a Maryland small business owner, says of the U.S. government.

Hnatio claims the government has put his company, FoodquestTQ, nearly out of business by stealing his firm’s software that was designed to be licensed to the Food and Drug Administration to monitor food safety.

The FDA “took our ideas, plagiarized my doctoral dissertation on which a patent was based, and then they infringed on our patent. The result was that it decimated our business,” he adds.

Hnatio says his company has been left hanging by a thread. He has had to fire employees and says that the remaining three, including himself, are receiving no salary and have been forced to go on unemployment insurance.

“I have never seen anything like it,” says Hnatio, who is a retired federal government official.

He says the FDA “duplicated exactly what we were selling to industry and they were giving it away for free…instead of helping small business commercialize their product, what we are seeing is a dragon, in the name of the U.S. government that is eating their own young.”

FoodquestTQ is only one of numerous small businesses that accuse the government of stealing their intellectual property or trade secrets when they enter into contracts or research agreements with federal agencies.

“The government interceded, stole the technology and attempted to use this in classified programs,” says Jim O’Keefe, the president of the small New Jersey technology company Demodulation. He has filed a $50 million lawsuit against the U.S. government, accusing it of taking his firm’s research.

Demodulation developed an advanced technology involving fiber coated wire, called microwire, which is thinner than a human hair. The company says its microwire can be used for a variety of national security applications, such as tracking drones, keeping tabs on soldiers on battlefields, transmitting information without a power source, and that it even has the ability “to render objects invisible to radar.”

“It sounds incredible and impossible that the U.S. government is taking things from people,” says Demodulation lawyer Sean Callagy. “We believe this is the greatest country in the world with the greatest justice system in the world but the U.S. government is not an eagle or a flag, but human beings. And human beings make mistakes.”

The lawsuit accuses the Department of Energy and the National Nuclear Security Administration, among others, of illegally swiping the firm’s information by “using microwire and Demodulation’s trade secrets in its mission to gather intelligence.”

It also says that the U.S. has even built “a secure facility for the production of microwire” on its own.

“There are classified reports showing the technology,” declares Demodulation attorney Ben Light, who says that after the company “shared the secret sauce” about microwire with  federal officials, they simply “took (the) wire.”

The Department of Energy referred Fox News’ requests for comment to the National Nuclear Security Administration, which did not respond to repeated requests for a comment about the company’s allegations.

The Department of Justice denies Demodulation’s charges in court filings.

Stuart Delery, an Acting Assistant Attorney General, wrote that while “the United States admits that it continues to conduct research regarding what is generally known as ‘microwire,”  he says that the government did not act improperly.

The Department of Justice claims the government did not take any proprietary information or develop the microwire technology based on Demodulation’s work, and that “none of the asserted patents have been infringed on by the United States.”

 Delery also pointed out that some of Demodulation’s patents had expired.

“The only reason the patents expired is because Demodulation was driven out of business,” responds the firm’s lawyer, Light. “It doesn’t affect the entire case because any infringement during the period when the patents were enforced is still compensable.”

O’Keefe says the government denials are “an impossibility based on the evidence I have.”

He is calling for “reform and legislation to protect us. I hope through our litigation we will be able to expose some of the problems.”

It turns out that the government is routinely accused of similar wrongdoing and sometimes has to pony up.

The U.S. Army settled a case in November by paying $50 million to a Texas company, Apptricity, which claimed the government  took some of its software, which tracks military equipment from MRE’s to troops, without paying for it.

The company’s court papers said that the government “willfully infringed” on its copyrights, “failed to provide information” about what it did and was engaged in “actively concealing the Army’s misappropriation of Apptricity software.”  

The complaint said the Army paid for using the software on five servers and 150 devices, but actually “copied and installed Apptricity software on at least 98 servers and at least 9,063 devices” without telling the company.

“I don’t think there was malicious intent,” Apptricity’s founder and president Tim Garcia tells Fox News in the aftermath of the settlement.  He says his company pursued its case by the “standard process through the Court of Claims.”

There are numerous other companies that have filed similar actions at the Washington, D.C.-based court, which is the venue for legal claims against the federal government. Among them:

Liberty Ammunition, which is suing the government for allegedly infringing on its copyright for developing a lead-free “green bullet” after it worked on the invention with the Department of Defense.

Net Results, which claims that the Army infringed on its patent  for a “mine detecting device” by giving out its design to six other government contractors.

In 2009, NASA was ordered to pay $28.3 million to Boeing after the court found that the government infringed on the company’s aluminum alloy patent.

In a noted case in 1999, the U.S. government paid then Hughes Electronics $154 million in damages after a 30- year long legal battle found that the government illegally appropriated the company’s satellite technology.

The U.S. Court of Federal Claims calls itself “the people’s court,” and says it is considered “the keeper of the nation’s conscience.” It is situated right across Lafayette Park from the White House.

“There is no reason to think it can’t happen,” observes New York University law Professor Jeanne Fromer, an intellectual property and copyright law specialist.

“The government can take patent rights, as long as they compensate for it. It is not dissimilar, in that sense, to notions of eminent domain.”

“The government is a big sprawling place and there are lots of people acting in it. I think some of them act very nobly…but it’s hard to say that everyone always does.”

“We are hearing more frequently from companies about intellectual property theft by the government,” notes John Palatiello, head of the Washington, D.C.- area lobbying group, the Business Coalition for Fair Competition, which is studying the issue.

“Companies are becoming more vocal about it.”

Hnatio believes there is a troubling explanation for alleged government flinching.

“What we are seeing is a direct competition between the private sector and the U.S. government. The problem for small businesses is that they are simply being destroyed by their own government in spite of the fact that we hear politicians say all the time, that small business is important…it’s extremely disturbing because it means we lose jobs, and it means we lose our competitive edge in the world. It creates a very dangerous situation for our national security.”

Fox News repeatedly requested comment from the FDA regarding Hnatio’s allegations about FoodquestTQ, but the agency did not issue a statement.

While the Demodulation case is expected to go to trial next year, Hnatio says he has been left without any money to hire a lawyer to go to court.

“From the time I was a little kid I dreamed of starting a business. But I do have to tell you that there is a grave danger to the American dream,” he says.

Follow Eric Shawn on Twitter: @EricShawnonFox

Becky Diamond contributed to this report.

________________________

One of the Cleantech peers was a fellow named Gary D. Conley. He blew the whistle on Solyndra and Tesla and was later found with a bullet in his head behind Beale Air Force base in Northern California. That was always a disturbing item. Do crazy Silicon Valley billionaires really do mobster things? Type: “Silicon Valley Cartel” and take a look. There have been over 80 CleanTech-connected investment bankers, reporters and technicians who took “the big sleep” in mysterious and unexpected ways during the Cleantech Crash. Many of them must have seen their “trillion dollars” suddenly vaporize and headed for the window…the rest?.., Hard to tell, yet…

Between then, and now, some interesting and unexpected things happened:

The Solyndra FBI raid; The Snowden/Assange/Guccifer leakers revealed that every corrupt politician since 9/11 has been surveilled and recorded doing all of their dirty deeds; The Chinese and Russians broke into the CIA, White House, Federal Records and Sony and grabbed all of the documents that show who was really in bed with whom; The GOP took over Congress; The Age of Transparency went full boogie and some of the biggest political names at the White House, NHTSA, DOJ, IRS, DOE, and other agencies, suddenly resigned to “spend more time with their families (It was because they got caught in the Cleantech Crash investigations, actually); The West lost control of the Middle East; Main stream print-news died and digital online independent news sprang to life; The Lois Lerner case proved that the White House uses federal agencies to put hit-jobs on U.S. Citizens that it does not like; The rest of the world began taking the internet away from Silicon Valley; Even Bill Cosby imploded; and more shockers seem to pop up daily…

We appear to live in a new world where things done in the dark, always come to light.

XYZ set out to serve their country, help out with the economy and make something cool and exciting.

What they got was ripped off, attacked, and punished for doing what the American Dream said they were supposed to do. Over 80 of their peers were targeted, and terminated, because they dared to build something better than the Silicon Valley campaign financiers.

In an ironic twist of fate, Russian and Chinese lawyers are now offering to front the costs of suing Elon Musk, John Doerr and Eric Schmidt for RICO Racketeering, fraud and infringement… hmmmmmm? This could get interesting.

This is a cautionary tale for voters everywhere. You have inherited an America with a Washington DC run amuck with corruption. The District of Columbia represents Goldman Sachs and six dot com billionaires, and not you!

You get a chance to change that in 2016. Will you go for the chump or the champ this time?

 

(This story includes authorships from ZAP Motors Staff, Bright Automotive Staff, Eric Shawn, Carol Leonning, Dave Lessons, Washington Post, Fox News, LA Times, and Susan Alexander. For updates, see http://www.xyzcase.com )

WHITE HOUSE IMPLICATED IN MASSIVE CORRUPTION SCANDAL

 

WHITE HOUSE IMPLICATED IN MASSIVE CORRUPTION SCANDAL

From a forensic report summary:

“The facts show that President Obama funded his presidential campaign by giving a Cartel of Silicon Valley billionaires exclusive kickbacks to “Cleantech” taxpayer cash, federal services, federal contracts, foreign mining deals, tax waivers and stock pumps in exchange for internet search manipulation, campaign marketing, voter data harvesting and revolving door cash.

History, forensic facts and leaked documents prove that Elon Musk, John Doerr and his Kleiner Perkins operation, Eric Schmidt, Steve Jurvetson, and their related associates, engaged in a criminally corrupt kick-back scheme to fund the Obama, Reid and Feinstein Campaigns via manipulations of the TARP and Department of Energy funding programs.

White House staff have clearly shown a willingness to run cover-ups; character assassinate adversaries using their controlled media tabloids and IRS agency staff; and terminate business competitors, of their campaign funders, using the FCC, DOE and other agencies”

Extensive Hard Evidence Now Points To The Following:

Steven Chu, the Secretary of Energy, was placed in office by John Doerr’s Kleiner Perkins Cartel in order to effect an organized crime operation to steer taxpayer funds to John Doerr, Elon Musk and a cadre of Silicon Valley VC’s.

White House staff Rahm Emanual, David Axelrod, David Plouffe, Bill Daley and Robert Gibbs, assisted in the scam by redirecting federal policy in order to implement the crimes. All of these staff suddenly quit the White House, when confronted about these suspicions.

A large portion of the crime involved manipulating mining stocks, with help from Goldman Sachs. In particular, Afghan lithium for Tesla and Fisker, and Afghan indium for the notorious FBI-raided Solyndra and Abound. Kleiner had relationships with Russian mobsters, for a portion of the middle-east commodities deals. Steven Chu gave federal money to Russian controlled companies as part of the scam. Goldman has now been caught doing the same kind of mining commodity stock manipulation.

Kleiner and Sachs promoted an extensive set of media releases entitled: “Afghanistan is the Saudi Arabia of Lithium” and “A TRILLION DOLLARS OF LITHIUM in Afghanistan” in order to market their profiteering scam. The scam was intended to provide the Silicon Valley Cartel with trillions of dollars of personal profits, and the Reid, Feinstein (Who are shareholders in the stock deals) and Obama political campaigns, with back-door financing.

All competitors, to the Kleiner Perkins Cartel, had “hit-jobs” put on them by Chu, Doerr, Gibbs and Musk. The hit-jobs ranged from character assassination via Gawker Media, Media Matters and Think Progress, to economic attacks by In-Q-Tel, to political attacks via Sidney Blumenthal and New America Foundation. Every Dept. of Energy applicant that competed with Kleiner’s holdings was sabotaged by Steven Chu. History has proven that only Cartel companies received the DOE funding, and that all competitors, to Kleiner companies, were targeted by government officials, and Kleiner operatives, and terminated, or black-listed. A number of strange deaths of whistle-blowers are also under investigation.

All of the evidence from leaks, Chinese hacks, eye-witness reports, investigators, emails, HSBC and Welles Fargo leaks, offshore tax records, financial water-fall analysis, forensic accounting, surveillance, phone records, Senate testimony, and a host of other sources, appears to extensively confirm these charges and validate an organized cover-up.

Every single one of the suspects has received financial and career benefits from their crimes, which has now been tracked, and proven, by forensic legal accountants and FOIA disclosures.
————————————–

** Keywords: Organized Crime, Public Corruption, Stock Market Manipulation, Homicide, Bribery, Embezzlement, Harassment, Commodity Pricing & Monopolization Scams, Market Opportunity Sabotage in The TARP and Department of Energy funding programs.

** OVERVIEW: A Silicon Valley Cartel paid State & Federal officials cash and web marketing services to provide exclusive kick-backs, market rigging, stock market manipulation and engage in other crimes.

** Regions: United States, Afghanistan, England

** Suspects: Elected political figures, appointed political figures, government contractors, venture capitalists

** Persons-of-interest and “POI Keywords” for in-agency data-base searches: Gawker Media, In-Q-Tel, New America Foundation, Elon Musk, Tesla Motors, Space-X, Solyndra, John Doerr, Kleiner Perkins, David Axelrod, Rahm Emanual, Steven Rattner, Bill Daly, Raj Gupta, McKinsey Consulting, Deloitte Consulting, Steven Chu, Jonathan Silver, Lachlan Seward, Jay Carney, Robert Gibbs, Goldman Sachs, Stu Blankfein, HSBC, Steve Jurvetson, Steve Westly, Steve Spinner, Allison Spinner, see additional POI on “Names” page…

This case is dedicated to the victims of these crimes, who lost their jobs, income, companies, dreams and lives

— RECENTLY SUBMITTED DOCUMENTS FOR THE XYZ/INVESTIGATION 22 CASE. PLEASE WIKI EDIT AND UP/DOWN VOTE:

 

 

 

STANFORD ELITE FAÇADE SHATTERED. SILICON VALLEY FAKE SOCIALITES SHOWN UP

STANFORD ELITE FAÇADE SHATTERED. SILICON VALLEY FAKE SOCIALITES SHOWN UP

Genius Girl, a Harvard-Stanford admissions hoax and elite college mania

 https://img.washingtonpost.com/rf/image_1484w/2010-2019/WashingtonPost/2015/06/22/Local-Enterprise/Images/Harvard_Donation-0f11f-871.jpg?uuid=ni7c1hklEeWTt17dwFatig
In this 2012 photo, a group tours the campus of Harvard in Cambridge, Mass. (Elise Amendola/Associated Press)

https://img.washingtonpost.com/wp-apps/imrs.php?src=http://3.bp.blogspot.com/-Zs5GeU9CgW4/T5gYj_jPYyI/AAAAAAAAANA/rqt55XTggSg/s1600/dvorak_petula.jpg&w=80&h=80

By Petula Dvorak Columnist June 22 Follow @petulad

Super-achievers (and your uber-ambitious parents) — take a deep breath, go to the pool, have an ice pop.

Do not take summer research statistics. Do not hire a robotics tutor. Do not start yet another thread on a parenting forum asking for advice on how to get your child into the much-sought-after Thomas Jefferson High School for Science and Technology in Northern Virginia.

Petula is a columnist for The Washington Post’s local team who writes about homeless shelters, gun control, high heels, high school choirs, the politics of parenting, jails, abortion clinics, mayors, modern families, strip clubs and gas prices, among other things. View Archive

Because the great Harvard-Stanford admissions hoax of 2015 should tell you all you need to know about where Ivy League insanity can lead. And it’s pretty ugly.

The hoax was concocted by a TJ student who claimed that she was so amazeballs brilliant at one of the country’s best public high schools that Harvard and Stanford universities were totally fighting over her.

She said Facebook’s Mark Zuckerberg called her to persuade her to pick Harvard. (Um, which he never graduated from.) She waved around a letter from a Stanford dean who wrote (in the exact same, cute handwriting as the dean from Harvard, oddly) “Go Trees!” Then the two schools supposedly offered her dual enrollment — two years at one campus and two years at the other.

She was a media darling back home in South Korea, where she became known as “Genius Girl.”

Ouch when it all came crashing down, right?

[Harvard-Stanford admissions hoax becomes international scandal]

Her elaborate ruse was uncovered last week, and her dad, who has been described as a tech executive with a South Korean company, issued a poignant apology that acknowledged the pressure cooker that his daughter’s life had become.

“I am sincerely sorry for causing trouble with what is not true,” he wrote, according to Yonhap, the South Korean news agency. “I am deeply repentant that I failed to watch properly over how painful and difficult a situation the child has been in so far and that I even aggravated and enlarged her suffering.... From now on, the whole family will live a quiet life, devoting ourselves to getting the child cured well and taking good care of her.”

Our college admissions death struggle has been building for years. Kids are taking the SAT a dozen times, applying to two dozen schools and hiring college admissions coaches for their best shot at an Ivy League welcome letter.

Now add to that madness students from an even more competitive culture 7,000 miles away from the Washington suburbs.

In South Korea, TJ — yes, a public high school in an American suburb — gets rock-star status. The Korean Embassy has the admissions requirements for TJ on its Web site. Preschools near Korean churches advertise that they can help kids get into TJ. There is an entire subculture of Korean parents who establish residency in Northern Virginia — one parent comes, while the other usually stays behind — with the sole purpose of getting their kid into TJ.

South Korea’s college admissions mania makes our homegrown version look like amateur hour.

Students there often have 14-hour school days, and the entire nation’s air traffic is grounded — to keep airspace quiet — on the national testing day for the one, big college entrance exam that can determine a student’s future.

The stories of teen suicides are frequent — it is the leading cause of death among teens in South Korea — and 60 percent of teens said they suffer from chronic, school-related stress, according to a government survey,

(The leading causes of death among American teens are, ranked in order: accidents, homicide and suicide, according to the U.S. Centers for Disease Control and Prevention.)

TJ is an impressive place, filled with in­cred­ibly smart kids. This year, one of its seniors, Pooja Chandrashekar, made national news by getting into all eight Ivies.

[Super student gets 14 college welcome letters, including all 8 Ivies]

Pooja had a 4.57 grade-point average and near-perfect SAT scores. She founded a national nonprofit group that pushes middle school girls to get into STEM programs, and she developed a mobile app that predicts with 96 percent accuracy whether a person has Parkinson’s disease based on speech-pattern analysis.

“We celebrate the accomplishment of students who get into all eight Ivies,” Brandon Kosatka, TJ’s director of student services, told The Washington Post’s T. Rees Shapiro last week. “That’s the bar, and our kids are shooting for that. They don’t like to be the second-best. If that’s the bar, then, yes, that creates anxiety for them.”

That’s the bar? Kids are doomed.

The relentless pressure to achieve may be triggering suicides in some of the nation’s highest-achieving areas.

In the Palo Alto school district in Silicon Valley, there were two waves of suicides in the past five years. Most of the teens stepped in front of trains.

In Northern Virginia, suicide clusters among high-achieving high schoolers prompted an investigation by federal health officials.

[Two teen suicides in two days: Unthinkable until it happened]

I was at one of the memorials last year, and the students I talked to all said they, too, feel the crush of school stress. Most get only four or five hours of sleep every night because they’re so laden with homework and scheduled activities.

Here’s the worst part of it, the part that Genius Girl illustrates so perfectly.

This is not about academics. It is not about a monastic love of learning, the dogged pursuit of discovery, the challenge of exploration or the odyssey of the mind.

This entire, whackadoo college admissions obsession is about status.

Genius Girl would have breezed into just about any university in America. And the truth is, most successful Americans did not graduate from an Ivy League school. Just ask Mark Zuckerberg, if you can get him on the phone.

There is no nobility in driving kids to stress, exhaustion, delusional hoaxes and suicide in a craven race for platinum-plated university credentials.

Parents and kids? Lean back, let go and be honest about what it is you’re really trying to achieve. Maybe have an ice pop while you’re at it.

Twitter: @petulad

 

THE IVY LEAGUE FAÇADE WILL DESTROY YOUR CHILDREN:

Don’t Send Your Kid to the Ivy League

The nation’s top colleges are turning our kids into zombies

By William Deresiewicz

In the spring of 2008, I did a daylong stint on the Yale admissions committee. We—that is, three admissions staff, a member of the college dean’s office, and me, the faculty representative—were going through submissions from eastern Pennsylvania. The applicants had been assigned a score from one to four, calculated from a string of figures and codes—SATs, GPA, class rank, numerical scores to which the letters of recommendation had been converted, special notations for legacies and diversity cases. The ones had already been admitted, and the threes and fours could get in only under special conditions—if they were a nationally ranked athlete, for instance, or a “DevA,” (an applicant in the highest category of “development” cases, which means a child of very rich donors). Our task for the day was to adjudicate among the twos. Huge bowls of junk food were stationed at the side of the room to keep our energy up.

The junior officer in charge, a young man who looked to be about 30, presented each case, rat-a-tat-tat, in a blizzard of admissions jargon that I had to pick up on the fly. “Good rig”: the transcript exhibits a good degree of academic rigor. “Ed level 1”: parents have an educational level no higher than high school, indicating a genuine hardship case. “MUSD”: a musician in the highest category of promise. Kids who had five or six items on their list of extracurriculars—the “brag”—were already in trouble, because that wasn’t nearly enough. We listened, asked questions, dove into a letter or two, then voted up or down.

With so many accomplished applicants to choose from, we were looking for kids with something special, “PQs”—personal qualities—that were often revealed by the letters or essays. Kids who only had the numbers and the résumé were usually rejected: “no spark,” “not a team-builder,” “this is pretty much in the middle of the fairway for us.” One young person, who had piled up a truly insane quantity of extracurriculars and who submitted nine letters of recommendation, was felt to be “too intense.” On the other hand, the numbers and the résumé were clearly indispensable. I’d been told that successful applicants could either be “well-rounded” or “pointy”—outstanding in one particular way—but if they were pointy, they had to be really pointy: a musician whose audition tape had impressed the music department, a scientist who had won a national award.

“Super People,” the writer James Atlas has called them—the stereotypical ultra-high-achieving elite college students of today. A double major, a sport, a musical instrument, a couple of foreign languages, service work in distant corners of the globe, a few hobbies thrown in for good measure: They have mastered them all, and with a serene self-assurance that leaves adults and peers alike in awe. A friend who teaches at a top university once asked her class to memorize 30 lines of the eighteenth-century poet Alexander Pope. Nearly every single kid got every single line correct. It was a thing of wonder, she said, like watching thoroughbreds circle a track.

ADVERTISEMENT

These enviable youngsters appear to be the winners in the race we have made of childhood. But the reality is very different, as I have witnessed in many of my own students and heard from the hundreds of young people whom I have spoken with on campuses or who have written to me over the last few years. Our system of elite education manufactures young people who are smart and talented and driven, yes, but also anxious, timid, and lost, with little intellectual curiosity and a stunted sense of purpose: trapped in a bubble of privilege, heading meekly in the same direction, great at what they’re doing but with no idea why they’re doing it.

READ: William Deresiewicz Responds to His Critics

When I speak of elite education, I mean prestigious institutions like Harvard or Stanford or Williams as well as the larger universe of second-tier selective schools, but I also mean everything that leads up to and away from them—the private and affluent public high schools; the ever-growing industry of tutors and consultants and test-prep courses; the admissions process itself, squatting like a dragon at the entrance to adulthood; the brand-name graduate schools and employment opportunities that come after the B.A.; and the parents and communities, largely upper-middle class, who push their children into the maw of this machine. In short, our entire system of elite education.

I should say that this subject is very personal for me. Like so many kids today, I went off to college like a sleepwalker. You chose the most prestigious place that let you in; up ahead were vaguely understood objectives: status, wealth—“success.” What it meant to actually get an education and why you might want one—all this was off the table. It was only after 24 years in the Ivy League—college and a Ph.D. at Columbia, ten years on the faculty at Yale—that I started to think about what this system does to kids and how they can escape from it, what it does to our society and how we can dismantle it.

http://www.newrepublic.com/sites/default/files/u184683/lede_art_feature_deresiewicz_cuffs_645.jpg

 

A young woman from another school wrote me this about her boyfriend at Yale:

Before he started college, he spent most of his time reading and writing short stories. Three years later, he’s painfully insecure, worrying about things my public-educated friends don’t give a second thought to, like the stigma of eating lunch alone and whether he’s “networking” enough. No one but me knows he fakes being well-read by thumbing through the first and last chapters of any book he hears about and obsessively devouring reviews in lieu of the real thing. He does this not because he’s incurious, but because there’s a bigger social reward for being able to talk about books than for actually reading them.

I taught many wonderful young people during my years in the Ivy League—bright, thoughtful, creative kids whom it was a pleasure to talk with and learn from. But most of them seemed content to color within the lines that their education had marked out for them. Very few were passionate about ideas. Very few saw college as part of a larger project of intellectual discovery and development. Everyone dressed as if they were ready to be interviewed at a moment’s notice.

Look beneath the façade of seamless well-adjustment, and what you often find are toxic levels of fear, anxiety, and depression, of emptiness and aimlessness and isolation. A large-scale survey of college freshmen recently found that self-reports of emotional well-being have fallen to their lowest level in the study’s 25-year history.

So extreme are the admission standards now that kids who manage to get into elite colleges have, by definition, never experienced anything but success. The prospect of not being successful terrifies them, disorients them. The cost of falling short, even temporarily, becomes not merely practical, but existential. The result is a violent aversion to risk. You have no margin for error, so you avoid the possibility that you will ever make an error. Once, a student at Pomona told me that she’d love to have a chance to think about the things she’s studying, only she doesn’t have the time. I asked her if she had ever considered not trying to get an A in every class. She looked at me as if I had made an indecent suggestion.

There are exceptions, kids who insist, against all odds, on trying to get a real education. But their experience tends to make them feel like freaks. One student told me that a friend of hers had left Yale because she found the school “stifling to the parts of yourself that you’d call a soul.”

 

“Return on investment”: that’s the phrase you often hear today when people talk about college. What no one seems to ask is what the “return” is supposed to be. Is it just about earning more money? Is the only purpose of an education to enable you to get a job? What, in short, is college for?

The first thing that college is for is to teach you to think. That doesn’t simply mean developing the mental skills particular to individual disciplines. College is an opportunity to stand outside the world for a few years, between the orthodoxy of your family and the exigencies of career, and contemplate things from a distance.

Learning how to think is only the beginning, though. There’s something in particular you need to think about: building a self. The notion may sound strange. “We’ve taught them,” David Foster Wallace once said, “that a self is something you just have.” But it is only through the act of establishing communication between the mind and the heart, the mind and experience, that you become an individual, a unique being—a soul. The job of college is to assist you to begin to do that. Books, ideas, works of art and thought, the pressure of the minds around you that are looking for their own answers in their own ways.

MAP: America’s 10 Richest Universities Match These Countries’ GDPs

College is not the only chance to learn to think, but it is the best. One thing is certain: If you haven’t started by the time you finish your B.A., there’s little likelihood you’ll do it later. That is why an undergraduate experience devoted exclusively to career preparation is four years largely wasted.

Elite schools like to boast that they teach their students how to think, but all they mean is that they train them in the analytic and rhetorical skills that are necessary for success in business and the professions. Everything is technocratic—the development of expertise—and everything is ultimately justified in technocratic terms.

Religious colleges—even obscure, regional schools that no one has ever heard of on the coasts—often do a much better job in that respect. What an indictment of the Ivy League and its peers: that colleges four levels down on the academic totem pole, enrolling students whose SAT scores are hundreds of points lower than theirs, deliver a better education, in the highest sense of the word.

At least the classes at elite schools are academically rigorous, demanding on their own terms, no? Not necessarily. In the sciences, usually; in other disciplines, not so much. There are exceptions, of course, but professors and students have largely entered into what one observer called a “nonaggression pact.” Students are regarded by the institution as “customers,” people to be pandered to instead of challenged. Professors are rewarded for research, so they want to spend as little time on their classes as they can. The profession’s whole incentive structure is biased against teaching, and the more prestigious the school, the stronger the bias is likely to be. The result is higher marks for shoddier work.

It is true that today’s young people appear to be more socially engaged than kids have been for several decades and that they are more apt to harbor creative or entrepreneurial impulses. But it is also true, at least at the most selective schools, that even if those aspirations make it out of college—a big “if”—they tend to be played out within the same narrow conception of what constitutes a valid life: affluence, credentials, prestige.

READ: Send your kid to the Ivy League! A rebuttal.

Experience itself has been reduced to instrumental function, via the college essay. From learning to commodify your experiences for the application, the next step has been to seek out experiences in order to have them to commodify. The New York Times reports that there is now a thriving sector devoted to producing essay-ready summers, but what strikes one is the superficiality of the activities involved: a month traveling around Italy studying the Renaissance, “a whole day” with a band of renegade artists. A whole day!

I’ve noticed something similar when it comes to service. Why is it that people feel the need to go to places like Guatemala to do their projects of rescue or documentation, instead of Milwaukee or Arkansas? When students do stay in the States, why is it that so many head for New Orleans? Perhaps it’s no surprise, when kids are trained to think of service as something they are ultimately doing for themselves—that is, for their résumés. “Do well by doing good,” goes the slogan. How about just doing good?

If there is one idea, above all, through which the concept of social responsibility is communicated at the most prestigious schools, it is “leadership.” “Harvard is for leaders,” goes the Cambridge cliché. To be a high-achieving student is to constantly be urged to think of yourself as a future leader of society. But what these institutions mean by leadership is nothing more than getting to the top. Making partner at a major law firm or becoming a chief executive, climbing the greasy pole of whatever hierarchy you decide to attach yourself to. I don’t think it occurs to the people in charge of elite colleges that the concept of leadership ought to have a higher meaning, or, really, any meaning.

The irony is that elite students are told that they can be whatever they want, but most of them end up choosing to be one of a few very similar things. As of 2010, about a third of graduates went into financing or consulting at a number of top schools, including Harvard, Princeton, and Cornell. Whole fields have disappeared from view: the clergy, the military, electoral politics, even academia itself, for the most part, including basic science. It’s considered glamorous to drop out of a selective college if you want to become the next Mark Zuckerberg, but ludicrous to stay in to become a social worker. “What Wall Street figured out,” as Ezra Klein has put it, “is that colleges are producing a large number of very smart, completely confused graduates. Kids who have ample mental horsepower, an incredible work ethic and no idea what to do next.”

For the most selective colleges, this system is working very well indeed. Application numbers continue to swell, endowments are robust, tuition hikes bring ritual complaints but no decline in business. Whether it is working for anyone else is a different question.

 

It almost feels ridiculous to have to insist that colleges like Harvard are bastions of privilege, where the rich send their children to learn to walk, talk, and think like the rich. Don’t we already know this? They aren’t called elite colleges for nothing. But apparently we like pretending otherwise. We live in a meritocracy, after all.

The sign of the system’s alleged fairness is the set of policies that travel under the banner of “diversity.” And that diversity does indeed represent nothing less than a social revolution. Princeton, which didn’t even admit its first woman graduatestudent until 1961—a year in which a grand total of one (no doubt very lonely) African American matriculated at its college—is now half female and only about half white. But diversity of sex and race has become a cover for increasing economic resegregation. Elite colleges are still living off the moral capital they earned in the 1960s, when they took the genuinely courageous step of dismantling the mechanisms of the WASP aristocracy.

The truth is that the meritocracy was never more than partial. Visit any elite campus across our great nation, and you can thrill to the heart-warming spectacle of the children of white businesspeople and professionals studying and playing alongside the children of black, Asian, and Latino businesspeople and professionals. Kids at schools like Stanford think that their environment is diverse if one comes from Missouri and another from Pakistan, or if one plays the cello and the other lacrosse. Never mind that all of their parents are doctors or bankers.

That doesn’t mean there aren’t a few exceptions, but that is all they are. In fact, the group that is most disadvantaged by our current admissions policies are working-class and rural whites, who are hardly present on selective campuses at all. The only way to think these places are diverse is if that’s all you’ve ever seen.

Let’s not kid ourselves: The college admissions game is not primarily about the lower and middle classes seeking to rise, or even about the upper-middle class attempting to maintain its position. It is about determining the exact hierarchy of status within the upper-middle class itself. In the affluent suburbs and well-heeled urban enclaves where this game is principally played, it is not about whether you go to an elite school. It’s about which one you go to. It is Penn versus Tufts, not Penn versus Penn State. It doesn’t matter that a bright young person can go to Ohio State, become a doctor, settle in Dayton, and make a very good living. Such an outcome is simply too horrible to contemplate.

This system is exacerbating inequality, retarding social mobility, perpetuating privilege, and creating an elite that is isolated from the society that it’s supposed to lead. The numbers are undeniable. In 1985, 46 percent of incoming freshmen at the 250 most selective colleges came from the top quarter of the income distribution. By 2000, it was 55 percent. As of 2006, only about 15 percent of students at the most competitive schools came from the bottom half. The more prestigious the school, the more unequal its student body is apt to be. And public institutions are not much better than private ones. As of 2004, 40 percent of first-year students at the most selective state campuses came from families with incomes of more than $100,000, up from 32 percent just five years earlier.

The major reason for the trend is clear. Not increasing tuition, though that is a factor, but the ever-growing cost of manufacturing children who are fit to compete in the college admissions game. The more hurdles there are, the more expensive it is to catapult your kid across them. Wealthy families start buying their children’s way into elite colleges almost from the moment they are born: music lessons, sports equipment, foreign travel (“enrichment” programs, to use the all-too-perfect term)—most important, of course, private-school tuition or the costs of living in a place with top-tier public schools. The SAT is supposed to measure aptitude, but what it actually measures is parental income, which it tracks quite closely. Today, fewer than half of high-scoring students from low-income families even enroll at four-year schools.

The problem isn’t that there aren’t more qualified lower-income kids from which to choose. Elite private colleges will never allow their students’ economic profile to mirror that of society as a whole. They can’t afford to—they need a critical mass of full payers and they need to tend to their donor base—and it’s not even clear that they’d want to.

And so it is hardly a coincidence that income inequality is higher than it has been since before the Great Depression, or that social mobility is lower in the United States than in almost every other developed country. Elite colleges are not just powerless to reverse the movement toward a more unequal society; their policies actively promote it.

 

Is there anything that I can do, a lot of young people have written to ask me, to avoid becoming an out-of-touch, entitled little shit? I don’t have a satisfying answer, short of telling them to transfer to a public university. You cannot cogitate your way to sympathy with people of different backgrounds, still less to knowledge of them. You need to interact with them directly, and it has to be on an equal footing: not in the context of “service,” and not in the spirit of “making an effort,” either—swooping down on a member of the college support staff and offering to “buy them a coffee,” as a former Yalie once suggested, in order to “ask them about themselves.”

Instead of service, how about service work? That’ll really give you insight into other people. How about waiting tables so that you can see how hard it is, physically and mentally? You really aren’t as smart as everyone has been telling you; you’re only smarter in a certain way. There are smart people who do not go to a prestigious college, or to any college—often precisely for reasons of class. There are smart people who are not “smart.”

I am under no illusion that it doesn’t matter where you go to college. But there are options. There are still very good public universities in every region of the country. The education is often impersonal, but the student body is usually genuinely diverse in terms of socioeconomic background, with all of the invaluable experiential learning that implies.

U.S. News and World Report supplies the percentage of freshmen at each college who finished in the highest 10 percent of their high school class. Among the top 20 universities, the number is usually above 90 percent. I’d be wary of attending schools like that. Students determine the level of classroom discussion; they shape your values and expectations, for good and ill. It’s partly because of the students that I’d warn kids away from the Ivies and their ilk. Kids at less prestigious schools are apt to be more interesting, more curious, more open, and far less entitled and competitive.

If there is anywhere that college is still college—anywhere that teaching and the humanities are still accorded pride of place—it is the liberal arts college. Such places are small, which is not for everyone, and they’re often fairly isolated, which is also not for everyone. The best option of all may be the second-tier—not second-rate—colleges, like Reed, Kenyon, Wesleyan, Sewanee, Mount Holyoke, and others. Instead of trying to compete with Harvard and Yale, these schools have retained their allegiance to real educational values.

Not being an entitled little shit is an admirable goal. But in the end, the deeper issue is the situation that makes it so hard to be anything else. The time has come, not simply to reform that system top to bottom, but to plot our exit to another kind of society altogether.

The education system has to act to mitigate the class system, not reproduce it. Affirmative action should be based on class instead of race, a change that many have been advocating for years. Preferences for legacies and athletes ought to be discarded. SAT scores should be weighted to account for socioeconomic factors. Colleges should put an end to résumé-stuffing by imposing a limit on the number of extracurriculars that kids can list on their applications. They ought to place more value on the kind of service jobs that lower-income students often take in high school and that high achievers almost never do. They should refuse to be impressed by any opportunity that was enabled by parental wealth. Of course, they have to stop cooperating with U.S. News.

More broadly, they need to rethink their conception of merit. If schools are going to train a better class of leaders than the ones we have today, they’re going to have to ask themselves what kinds of qualities they need to promote. Selecting students by GPA or the number of extracurriculars more often benefits the faithful drudge than the original mind.

The changes must go deeper, though, than reforming the admissions process. That might address the problem of mediocrity, but it won’t address the greater one of inequality. The problem is the Ivy League itself. We have contracted the training of our leadership class to a set of private institutions. However much they claim to act for the common good, they will always place their interests first. The arrangement is great for the schools, but is Harvard’s desire for alumni donations a sufficient reason to perpetuate the class system?

I used to think that we needed to create a world where every child had an equal chance to get to the Ivy League. I’ve come to see that what we really need is to create one where you don’t have to go to the Ivy League, or any private college, to get a first-rate education.

High-quality public education, financed with public money, for the benefit of all: the exact commitment that drove the growth of public higher education in the postwar years. Everybody gets an equal chance to go as far as their hard work and talent will take them—you know, the American dream. Everyone who wants it gets to have the kind of mind-expanding, soul-enriching experience that a liberal arts education provides. We recognize that free, quality K–12 education is a right of citizenship. We also need to recognize—as we once did and as many countries still do—that the same is true of higher education. We have tried aristocracy. We have tried meritocracy. Now it’s time to try democracy.

William Deresiewicz is the author of Excellent Sheep: The Miseducation of the American Elite and The Way to a Meaningful Life, coming out August 19 from Free Press. He taught at Yale from 1998 to 2008.

ComPost

Don’t send your kids to Ivy League Schools! This means YOU.

Share on Facebook

Share on Twitter

Share on Google Plus

Share via Email

More Options

Share on Whatsapp

Share on Pinterest

Share on LinkedIn

Share on Tumblr

Share on LinkedIn

Share on Pinterest

Share on Tumblr

Resize Text

Print Article

 

Comments35

 

July 22, 2014

I had no choice but to use this picture. (AP Photo/Lisa Poole)

I had no choice but to use this picture. (Lisa Poole/Associated Press)

You need to stop sending your kids to Ivy League schools.

In brief, according to a piece in the most recent New Republic by William Deresiewicz, who taught at Yale for 20 years, the students who are sent there are conformist, over-privileged overachievers. They emerge from homogeneous backgrounds and grow up to be elitist little twits. (He also went to one, but he is different now.)

They overcame a little diversity, mainly not socioeconomic, to get in.

ADVERTISING

 

 

Ivy League applicants’ biggest hardship was having so little hardship in their lives that they had to hire people to take them on bus trips during the summer so they would have things to write college essays about.

Need to overcome adversity to get in? Not to worry. Your parents will get you the finest adversity that money can buy! And one for your sister, too, when she’s old enough.

They walked out of their separate housing entrances for the well-heeled and got onto planes to their enrichment summers. “Spend An Entire Three Hours on a Greyhound Bus!” the brochures proclaimed. “Understand enough about diversity in broad, oversimplified strokes to write either a single college essay of five paragraphs or the entire movie ‘Crash’!”

They get in and learn nothing because they are too terrified of failure to study things they do not already know. (The only thing Ivy Leagues are good for, Deresiewicz admits, is if you need people to memorize 30 lines of Alexander Pope with absolute precision. They excel at that.)

They develop the firm conviction that if you march to the beat of a different drummer, you are doing something wrong. We are all listening to this drummer for a reason. Your drummer must be screwing up.

When they get out, they are obsessed with status and give society less than they might have. Or something. The point is that the education is not value-added. If anything, it is value-subtracted. It produces conformist, unimaginative people who are desperate for outside approval.

And, well, I don’t disagree. Of course I don’t. I don’t know how. Besides, if I disagreed, you might not like me, and I want you to like me! That means more than anything in the world! PLEASE LIKE ME! I can fax you some of my high school report cards if that would sway you!

If you cannot tell from the foregoing, I went to an Ivy League school. I didn’t learn very much, but I drank a lot.

I remember freshman year, sitting around with a group of my peers, talking about our deepest fears. “I’m afraid,” someone said, “that I won’t ever be able to become a great writer because my childhood was too happy.”

Everyone nodded. There was a silence.

“My mom died,” said someone else.

“LUCKY!” we said. “That must have made a great application essay! I had to fly all the way to Bhutan and build houses for half an hour.”

Later we all became ibankers. There was a moral in that somewhere.

So the question becomes: if we’re serious about this, how do we go about fixing it?

The simplest way is not to send your kids to Ivy League schools. Not — note — that “we” stop sending kids to Ivy League schools. Or that “one” stops sending them there. Or that “you” (everyone else) stops sending them. It is that you — you in particular — do that.

And that’s the problem.

Of course everyone agrees that the most efficient way of producing good human beings who aren’t elitist turds is to break down the system.

But for every person who has read this article and knows that the Ivy League schools are elitist twit factories — that you must seek elsewhere for the truly well-educated, and that state schools, while “impersonal,” give you a real chance to get to know your fellow man on an equal basis, that work in the service industry is the best kind and that second-tier schools let you exercise true curiosity — there are thousands upon thousands who haven’t. If everyone would just read this article (or one like it) and agree what to do, we could proceed. Not even everyone! Just all the Concerned Parents who are currently embroiled in the helicopter derby whose only conclusion is admission into an elite institution, the parents who hover over their children, shredding stray seagulls in their rotor blades.

“You thought the way to guarantee that little Preston IV was successful, well-rounded and a productive member of society was to send him to Harvard? Nonsense. He needs to overcome adversity and expand his scholastic horizons, and avoid all those elitist twerps who just sit there reciting Pope. If you send him to an Ivy, you are stunting him for life!”

The trick is that you have to get everyone to agree. It’s a prisoner’s dilemma of sorts, and the stakes are your children’s prospects. If some people don’t get the memo about Massive Structural Shifts in How We Are Educated, their kids will get into Ivy League schools in your kids’ place, and all the employers who did not read the article will keep assuming that going to an Ivy League school is a mark of quality and hire them instead. It is no use enclosing copies of the New Republic with your child’s ibanking applications and scrawling “HE DIDN’T GO TO YALE BECAUSE YALE WOULD HAVE DONE HIM A DISSERVICE!” at the bottom of his resume. First off, that is creepy. Second off, it is unconvincing.

Besides, it seems so unfair, as Mitt Romney’s dad probably used to lament a lot. I worked my whole life to overcome adversity and earn a comfortable place for my children, and now you tell me that is the worst thing I could have done? That my children will be out-of-touch elitists who don’t know the value of good honest labor and strive only to conform? If I’d known I was just supposed to dunk them straight back into adversity, I wouldn’t have bothered with this American Dream business in the first place.

Still, if that’s what we’ve agreed to do, it’s fine. We just have to make sure we’re all on board.

Soon the conversation from Suburban to Suburban will be much different. “Hello, Gail,” Florence will say, at the country club. “Trip is working at McDonald’s this summer and reading Emerson to himself. What’s your daughter doing?”

Gail will shrink a little into her Adirondack chair. “Well,” she will hedge, “Campbell is — she’s going to Columbia, actually.”

Florence will nod in sympathy. “Some kids take longer to find themselves,” she says. “But we all have to march to our own drummer.”

“Oh, absolutely,” Gail will say. “I only hope you’re right.”

But, fortunately, there are still a few people who haven’t read the article.

The point is: You need to stop sending your kids to Ivy League schools. You first. I’ll watch and see what happens.

https://img.washingtonpost.com/rf/image_180x180/WashingtonPost/Content/Blogs/compost/Images/petri%20photo%20by%20erik%20uecke.jpg

Alexandra Petri writes the ComPost blog, offering a lighter take on the news and opinions of the day. She is the author of “A Field Guide to Awkward Silences”.

GAWKER MEDIA EXPOSED! EVERYBODY HATESTHEM AND THEIR ADVERTISERS

 

HOW #GAMERGATE SHATTERED GAWKER’S MYTH OF INVINCIBILITY

A few years ago, Gawker Media went through their own mythical period. When online public shaming was still praised as “callout culture” and righteous “internet rage” by activists, Gawker was out in front, leading the charge.

Gawker mercilessly destroyed the careers of its targets, many of whom, such as Justine Sacco and Pax Dickinson, were guilty of nothing more than off-colour jokes on social media. They were the shamers-in-chief of the internet: all the more frightening because the sins they punished were so ubiquitous and mundane. Former Gawkerite Adam Weinstein portrays this period as a kind of golden age for the blogging network.

The world has changed rapidly. Public shaming is no longer cool;  John Ronson resoundingly won the argument against it with his new book, despite vain attempts of activists to (you guessed it!) publicly shame him. Attempts to portray Ronson as hostile to the”historically powerless” fell flat, as commentators eagerly embraced a mainstream author willing to speak out against the new mob mentality.

Gawker Media, which relied so heavily on the practice to grant itself the veneer of righteousness, has now become one of the most derided publications on earth. Their botched attempt to out Conde Naste executive David Geithner as gay caused outrage across the media and political landscape. Meanwhile, their long history of violating celebrities’ privacy is swiftly catching up to them in the form of  Hulk Hogan’s $100m lawsuit, filed against Gawker for the release of a sex tape involving the wrestler.

Throughout history, great empires, states, political movements and institutions have all fallen victim to the myth of invincibility. From the Romans at the Battle of Teutoburg to the British Empire in the Boer war, the destruction of these myths is all the more painful due to the triumphs that preceded them. Few would call Gawker invincible today. Its reputation is on the rocks, as the company plans to relaunch itself later today. The Geithner story has proved to be disastrous for the company, triggering a string of editorial resignations in addition to the storm of external condemnation.

But the story doesn’t strike me as a case of imperial myth-shattering. In the major historical examples – the Boers, the Vietcong, the Germanic tribesmen – great powers were humiliated at the very height of their glory by poorly-equipped, underdog opponents who should have been walkovers. The Geithner story, where Gawker had to fight the entire media establishment by itself, doesn’t fit this pattern at all. So what does?

Gawker vs Gamergate

When a few thousand gamers started to draw attention to poor standards in video games journalism last September, no one predicted it would grow into a year-long movement that spanned the globe. Nor did anyone predict the damage it would do to Gawker Media. Gamers had no track record as campaigners or great organisers, nor as social media activists. When #GamerGate emerged, it was a bolt from the blue, and some predicted it would be over in a week.

But gamers were determined. They had a laundry list of complaints against the gaming press, and they had Gawker in their sights from the beginning. The name of Gamergate’s hub on Reddit – “/r/KotakuInAction” – is revealing. (Kotaku, for those of you who don’t know, is Gawker’s video games vertical.) The near-ruination of game developer Brad Wardell by Kotaku’s poor reporting, a steady stream of outrage-mongering on the topics of race and gender, and perceived conflicts of interest on the part of Kotaku writers meant many gamers had gone sour on the site by the start of Gamergate. One supporter of the hashtag described Kotaku as “yellow journalism and tabloid gossip brewed into a foul, brain-killing mess.”

Twitter in 2014 was the land of #YesAllWomen and #CancelColbert, a haven of politically correct outrage. The emergence of a culturally libertarian, anti-censorship, anti-narrative hashtag like Gamergate was unexpected, to say the least. Progressive journalists in the games and tech press reacted with instant hostility and released a string of articlesbranding gamers as reactionary, sexist “hyper-consumers.” As Slate‘s David Auerbachargued at the time, games journalists had essentially declared war on their own audience.

Gamers used the attacks to their advantage, sending a deluge of complaints to companies that advertised with their antagonizers. Gawker, with its long history of unethical reporting, was particularly vulnerable to this strategy and lost its first sponsorjust days after Gamergate began its campaign. They had already locked themselves in a losing battle — but their Quinctilius Varus had yet to enter the field. That came later.

If there is one feature that unites the imperial downfalls of history, it is the moment of hubris. The moment at which an opponent’s strength is wildly underestimated, or one’s own is wildly overestimated.

In October 2014, Gawker writer Sam Biddle did both. He no doubt intended to do to Gamergate what he had done to Justine Sacco — publicly shame them, or “degrade them into submission,” as he put it. But his tweets — posted, disastrously, during national bullying awareness month — caused a PR calamity that would lead to one of Gawker’s most visible humiliations. The shamers were about to be shamed.

Gamergate’s boycott campaign pivoted, focusing all of its firepower on Gawker Media’s advertisers and sponsors. Within a day, Biddle had taken to Twitter to issue a public apology — an act that would become a feature of Gawker in the months to come. Editorial director Joel Johnson reiterated his apology on the front page of Gawker — another sign of the future. Johnson also sent a memo to Gawker’s writers warning them to watch their words on social media. A publication whose writers were famed for their recklessness was beginning to show signs of caution.

Even Gawker couldn’t hide the extent of their defeat. Editor-in-Chief Max Read summed up his feelings in a headline: “How We Got Rolled by the Dishonest Fascists of GamerGate.” A few months later, the full extent of the damage was revealed — Gamergate had cost Gawker seven figures in lost advertising revenue. The myth of invincibility was over.

Gawker vs Gamergate had all the features of a historic humiliation. On the one hand, there was Gawker, one of the web’s Great Powers. A well-resourced, New York-based “internet bully” with a reputation for destroying people. On the other hand, there were gamers — disorganised amateurs. It’s hard to find a better underdog story.

 

WHO IS GAWKER MEDIA?

Public reports and investigative reporters have much to say about Nick Denton and Gawker Media. It is believed, that Gawker Media is a “hit-job” service created to character assassinate, damage and reduce the brand affect of adversaries of the Cartel. Journalists, and others, have charged Gawker Media with everything from tax evasion, to being the front for White House and Silicon Valley Billionaire “hit-jobs”, to being a targeted political agenda manipulation machine. Victims have charged that Gawker Media and Nick Denton have worked in the employ of Jay Carney, Robert Gibbs, John Doerr, Elon Musk, Steve Jurvetson and other political notables.

Gawker Media had financial connections, business connections, political connections and communications with the key suspects and took actions which helped the key suspects while attacking and damaging their adversaries. Recents leaks, investigations and lawsuits have revealed some of Gawker’s dirty secrets. Outside-of-U.S. investigations on Nick Denton’s previous activities in England, are of interest, as well. Wrestler Hulk Hogan had top celebrity endorsement value for American voters, when he was about to endorse an opposing political candidate, Gawker took him out…but, that may have been a fatal mistake for the Gawker attack dogs.

They have endured numerous abuse lawsuits from staff, victims and others. The following is some of the news coverage about Gawker Media and Nick Denton:


Dear Hulk Hogan:

We wanted to give you encouragement and applause in your trial against Gawker Media and Nick Denton.

This may be one of the biggest things you will ever do in your life.

Your case helps redeem many others, and fix a broken part of modern American society. It really is a big deal!

Many of us believe that politicians used social media metrics, and fancy calculations, to figure out that your name, attached to any political endorsements, could get tens of millions of voters to pay more attention to, or like, the candidate that you endorsed.

They felt threatened by that possibility, so they used their character assassination tool, known as Gawker Media, to take you out.

We have all seen the news, these days, about characters like Sidney Blumenthal, Richard Berman, etc, and their “take-down tools” for political paybacks.

Gawker Media showed up one day, out of the blue, in many innocent people’s lives, and took their lives away for political hit-job reasons.

Nick Denton is on camera saying his job is to destroy lives for profit. His staff refer to themselves in social media as “Character Assassins”.  When they take a target out, they never give the target a chance to counter the slander and libel they are about to print because they don’t want the victim to have a chance, in advance, to counter the vicious defamation attack they are about to blast across the media-waves .

Once Gawker fires off the attack, that the Press Office of a famous institution ordered them to do, their buddies at famous search engines lock it in top position on the internet so that Gawker can both profit from the ad sales and get paid “ damages bonuses” for the intensity of the calculated attack.

The news says they stole Romney’s tax forms, Apple’s IPOD prototype, Palin’s book, Santorum’s brand, The CIA’s Bin Ladin hunter’s secrecy, and so, so much more.. Anything, against anybody, for a buck, it seems.

Now we hear that overseas police want to talk to Denton about the British “Hydrant” and “Tabloid Phone Hacking Scandals”. We see that a young gay boy tossed a brick through Denton’s window because he said Denton abused him. We see HSBC leaks and tax investigation’s that seem to indicate that Gawker evades taxes with off-shore hide-aways.

We see lawsuits, by Gawker’s own people, for sexual and economic abuse.

These Gawker people seem to be horrific examples of the worst that a society can manifest.

Many others have lost their lives because of a sudden Gawker take-down attack. So far, there has been little, or no, justice. Someone in Washington, DC, is protecting Gawker but that shield of coverage has now seemed to have worn thin.

Go get ‘em Hulk. Your super-hero days are still alive and well.

Signed-    AMERICA

HULK-HOGAN.png


 

Gawker Media: Hypocrites vs. Douchecanoes

In 2002, a failed British journalist named Nick Denton started Gawker, a bitchy gossip blog run out of his Manhattan apartment. Over 10 years later, Gawker and its sister sites have become the biggest names in clickbait “journalism,” pulling down millions of visitors a month and making its owner a millionaire several times over. The secret to Denton’s success? He took the aggressive, lynch mob mentality of British tabloids, which specialize in ruining people’s lives, and injected it into America’s comparatively placid, Oprahfied media market.

In particular, Gawker, Jezebel, Valleywag, and their sister sites specialize in witch hunts: digital vigilantism against those who fail to keep up with leftist orthodoxy. Geoffrey Miller, Pax Dickinson,Justine Tunney, Violentacrez: the list of people whom Gawker has garroted for “racism” or “misogyny” could fill a phone book. With an army of Twitter twits behind it, Gawker Media truly is the moral majority of the left, instigating mob action against those who sin against the religion of toleranceGawker’s provocations are even encouraging real-world violence now, as Valleywag’s overfed man-baby of an editor Sam Biddle eggs on attacks against San Francisco tech workers from the safety of the East Coast.

Video Player

“Which makes the revelation that Denton has been allowing trolls to terrorize his female employees all the more delicious.”

For the past few months, 4chan has been engaged in a trolling operation against Jezebelposting pictures of rape and gore porn in the comments section. Despite the fact that these shocking and disgusting images are stressing out staffers to the point where they’re developing PTSD, Denton has steadfastly refused to do anything about the problem. Jezebel’s staff recently snapped and posted an open letter on the site demanding that Gawker Media do something, calling 4chan’s trolling “a very real and immediate threat to the mental health of Jezebel’s staff and readers.”

Fat chance of this happening, however. As others have pointed out, Gawker Media’s business model depends on getting clicks; indeed, their writers are paid according to how many page views their articles get. Since comments help drive traffic to websites, fighting 4chan’s rape porn trolling will reduce Gawker’s profitability. Not only that, Google itself ranks web pages according to how many comments they have, as comments are extremely difficult to fake. Fewer comments means a lower page rank, which translates into less search traffic and less money for Denton to blow on exotic vacations with his boy-toy hubby. If Gawker Media was willing to testify in federal court as to why they should be allowed to rip off their interns, you can bet your bottom peso that they aren’t going to do jack about this.

 

And there’s the punch line. Gawker Media, the company that gets people fired from their jobs for making “sexist” jokes, has been creating a hostile work environment for its women staffers for months. They’re the leftist equivalent of a priest who rails against homosexuality only to be caught molesting altar boys in the confessional booths. In staying silent on this for so long, Dodai Stewart, Lindy West, and Jezebel’s other star employees have shown themselves to be frauds. They don’t care about feminism, “fat shaming,” or whatever cause they’re screeching about today; all they care about is money and power. And now we have the proof.

Please share this article by using the link below. When you cut and paste an article, Taki’s Magazine misses out on traffic, and our writers don’t get paid for their work. Email editors@takimag.com to buy additional rights.http://takimag.com/article/gawker_media_hypocrites_vs_douchecanoes/print#ixzz3CCvoAIP4


 

IN THIS INTERVIEW, NICK DENTON WAS RECORDED ADMITTING THAT HE MAKES MONEY BY DESTROYING PEOPLE:

WEBWRAP3

WRAPWEB


 

Nick Denton charged with ordering phone-hacking, helping Anonymous hackers, stealing Mitt Romney’s tax records, hiding money in Russia and Caymans and MORE…


IS GAWKER MEDIA THE WHITE HOUSE PRESS SECRETARY’S “PLAUSIBLE DENI-ABILITY” HIT SQUAD? STILL MORE…


 

 

 

 


ADRIAN COVERT: NICK DENTON’S SELF-CONFESSED HIRED CHARACTER ASSASSIN:

ADRIAN-COVERT

Adrian Covert is now under permanent surveillance by multiple private investigators and law enforcement entities

ADRIAN COVERT GAWKER ASSASSIN

ADRIAN-COVERT-AND-ELON-MUSK

ADRIAN COVERT : ELON MUSK’S SPECIAL FRIEND

ADRIAN-COVERT-FACEBOOK

CNN MONEY LOSES CREDIBILITY BY HIRING A CONFESSED CHARACTER ASSASSIN:

ASSASSIN

Did Covert run hit-jobs on targets to help cover a felony his bosses handlers were running with U.S. Tax Dollars? What did Covert know about Elon Musk’s and John Doerr’s felony lithium mining scam with taxpayer cash? Federal Archives of Covert writings prove he only promoted Musk and attacked Musk & John Doerr competitors.

 


 

 

 


Is blogger John Herrmann a hired character assassin hit-man for Nick Denton?

By Powers Destin
First printed in The LA Rebuke

John_HERRMANN

If you look up John Herrmann in Wikipedia you find that, according to Wkipedia:

“…Herrmann soon was a part of the Ware group, a secret apparatus of the CPUSA and Comintern in Washington, D.C., which supplied classified information to Soviet intelligence. …Herrmann was a paid courier for the CPUSA, delivering material emanating from the secret cells of sympathetic government employees being cultivated by Hal Ware to New York. Herrmann also was the person who introduced … Alger Hiss.

…The Ware group’s activities were investigated …and Herrmann was placed under surveillance and questioned many times in Mexico by the FBI. He died …. from chronic alcoholism.”

That isn’t the exact same John Herrmann we know and love from Gawker Media and the Awl, but there may be eerie similarities to the Nick Denton hit-man.

This New Yorker is said to be a shill for Gawker Media, where he writes attack articles at the request of White House press corps, in order to stealth up the true instigators of the attacks. It is also claimed, that he goes online, under a massive number of pseudonyms, and writes all of the attack comments in the commenting section of the blog under each attack article. IS this true? To confirm this, one would need to subpeona FBI and NSA phone tracking and email archiving of Herrmann’s email and cell phone activities from past years.

Many targets have stated that Herrmann organizes other writers when given a “kill order” by his political handlers. They infest a blog, together, with vitriol and hate, cobbled together from non-verified facts and manipulated heresay, it is said by those he has sought to bring down.

One encounters Herrmann as a pasty, pudgy little man with the hipster affectations of dark mood swings and impertinent denial. We met him, covertly, at a coffee shop nestled among the metropolitan masses.

Does he report directly to Robert Gibbs and Jay Carney at the White House or are his orders intermediated only through Nick Denton? Only a Senate investigation has the power to uncover the tentacular connections of the attack bloggers of the web.

In this writers opinion,and mind you, these are all opinions and not facts, so do your own research, I think that Mr, Herrmann is complex and deserves more study. It is easy for one to dismiss him as a sad internet hack, one step removed from a common troll, but that would be unfair, I think. He is, most likely, much more interesting.


 

Was John Herrmann secretly working for IN-Q-TEL?

Video Player

1TRACKBACKS & PINGBACKS

 

British Elite Political Pedophiles and Phone Hacking Connections

———————————

Is blogger John Herrmann a hired character assassin hit-man for Nick Denton?

 

Is blogger John Herrmann a hired character assassin hit-man for Nick Denton?

By Powers Destin
First printed in The LA Rebuke

John_HERRMANN

If you look up John Herrmann in Wikipedia you find that, according to Wkipedia:

“…Herrmann soon was a part of the Ware group, a secret apparatus of the CPUSA and Comintern in Washington, D.C., which supplied classified information to Soviet intelligence. …Herrmann was a paid courier for the CPUSA, delivering material emanating from the secret cells of sympathetic government employees being cultivated by Hal Ware to New York. Herrmann also was the person who introduced … Alger Hiss.

…The Ware group’s activities were investigated …and Herrmann was placed under surveillance and questioned many times in Mexico by the FBI. He died …. from chronic alcoholism.”

That isn’t the exact same John Herrmann we know and love from Gawker Media and the Awl, but there may be eerie similarities to the Nick Denton hit-man.

This New Yorker is said to be a shill for Gawker Media, where he writes attack articles at the request of White House press corps, in order to stealth up the true instigators of the attacks. It is also claimed, that he goes online, under a massive number of pseudonyms, and writes all of the attack comments in the commenting section of the blog under each attack article. IS this true? To confirm this, one would need to subpeona FBI and NSA phone tracking and email archiving of Herrmann’s email and cell phone activities from past years.

Many targets have stated that Herrmann organizes other writers when given a “kill order” by his political handlers. They infest a blog, together, with vitriol and hate, cobbled together from non-verified facts and manipulated heresay, it is said by those he has sought to bring down.

One encounters Herrmann as a pasty, pudgy little man with the hipster affectations of dark mood swings and impertinent denial. We met him, covertly, at a coffee shop nestled among the metropolitan masses.

Does he report directly to Robert Gibbs and Jay Carney at the White House or are his orders intermediated only through Nick Denton? Only a Senate investigation has the power to uncover the tentacular connections of the attack bloggers of the web.

In this writers opinion,and mind you, these are all opinions and not facts, so do your own research, I think that Mr, Herrmann is complex and deserves more study. It is easy for one to dismiss him as a sad internet hack, one step removed from a common troll, but that would be unfair, I think. He is, most likely, much more interesting.

 

Disturbing New Revelations In White House “Hit-Jobs” on The American Public

Congressional, News & Private Investigators have now proven that Administration
Officials used Federal Agencies to put “Hit-Jobs” on members of the American Public
that the Administration did not like. The IRS was used to attack ideological
adversaries, the Department of Energy was used to attack business competitors of the
Administrations campaign financiers. The White House Press Office was used to seed
character assassination articles in the media, via associated front-tabloids and
organizations.

House chairman: Documents prove IRS ‘political targeting’ of conservatives

More

The Blog

IRS Targeting ‘Still Happening’

Congressman alleges conservative groups still under scrutiny

 By JIM SWIFT
Single PagePrintLarger TextSmaller Text Alerts

This morning on America’s Newsroom with Bill Hemmer on FOX News Channel, California Republican congressman Darrell Issa alleged that the IRS hasn’t changed its procedures and is still targeting conservative groups.

HEMMER:  “Can you say today whether or not the targeting is still happening?”

ISSA: “The targeting is still happening. It is clearly, still a procedure…”

Watch part of the exchange below:

The chairman of the top House committee probing the IRS political witch hunt of President Obama’s foes said documents prove that the agency targeted conservatives and then tried to destroy the evidence and he promised “news” on the panel’s investigation next week.

“I promise you – there will be news on the IRS side as early as next week. So stay tuned,” said Rep. Jason Chaffetz, chair of the House Oversight and Government Reform Committee.

Chaffetz this week detailed elements of his panel’s probe in an address to the Ripon Society in Washington, accusing the IRS of violating a House subpoena in destroying evidence and mocking President Obama’s claim on Jon Stewart‘s Comedy Channel show that “the real scandal around the IRS” is underfunding the agency.

 

“Probably the biggest thing our committee is looking at is the IRS,” said the Utah lawmaker. “You have political targeting that is factual at this point. There are no ifs, ands or buts. You had groups within the IRS who were politically targeting conservatives and impeding their First Amendment rights,” he added.

More from the Washington Examiner

Congress to probe antitrust, consumer costs, of healthcare industry mergers

The merger mania among healthcare companies will be probed in the Senate for antitrust violations.

 

What’s more, because the panel sought documents from the IRS when the targeting of Tea Party and other conservative groups made headlines, there is still information coming out about the episode.

“You’re going to continue to hear more about this. Because when the targeting became evident, the Oversight and Government Reform Committee put in place a subpoena for the documents – a small window of Lois Lerner’s e-mails. Internally, the IRS put a preservation order in place — don’t destroy or get rid of any of these documents. These documents and e-mails were in the possession of the IRS. And on March 4, 2014, they destroyed them” he said.

“Imagine if the IRS had given you a summons for you to produce documents. You had them in your possession, and then you destroyed them. What would happen to you? Do you think they would say, ‘Oh, darn it!’ No, which is why Congress has to stand up for itself. You cannot — with a duly issued subpoena and eternal preservation order in place — go out and destroy documents and say there is no consequence to that; nobody’s going to be held accountable, and nobody is at fault.

“And yet that’s essentially what we’ve heard from the President, who has said repeatedly there is not even a ‘smidgeon’ of corruption. He was on the Daily Show with Jon Stewart the other night and said, ‘You know what the real scandal is? The real scandal is that the IRS is underfunded. They need more agents, more people, and Congress passed a bad law.’ You know this ridiculous law the president is talking about? It was passed in 1913. He makes it look as if we had passed this law. That little detail he said on the Daily Show, you’re going to see that surface. We will continue to pursue this, and I promise you – there will be news on the IRS side as early as next week. So stay tuned.”

Paul Bedard, the Washington Examiner’s “Washington Secrets” columnist, can be contacted at pbedard@washingtonexaminer.com.

How White House Staff Put Hit-Jobs on Domestic American Business Competitors on Orders from Silicon Valley Campaign Financiers

How White House Staff Put Hit-Jobs on Domestic American Business Competitors on Orders from Silicon Valley Campaign Financiers

 

Silicon Valley billionaires John Doerr, Eric Schmidt, Elon Musk and Steve Jurvetson told White House senior officials Rahm Emanual, David Axelrod, Robert Gibbs and Bill Daley to “take-out” American companies, individuals and organizations that got in their way.

West Wing staff used Sidney Blumenthal to coordinate media character assassinations through their control of Gawker Media, Media Matters, New America Foundation, In-Q-Tel and Think Progress. Everyone from a CBS Reporter, to an energy company, to a writer, to a book publisher, to a financial analyst, and on and on; got savaged by these attacks. People’s lives, careers, brands, income, home-ownerships, jobs and worlds were destroyed because of the capricious arrogance and smug self-involvement of a few wealthy elitists who were offended by anything that touched their golden bubble.

The attacks did not stop with mere media “hatchet jobs”. The IRS was used as a weapon. The Lois Lerner case is now in the history books as one of the most audacious uses of a federal agency for domestic hit-jobs on average American citizens, ever discovered.

The world heard about White House attack-dogs like Richard Berman, and Sidney Blumenthal, from the Monica Lewinsky case. Blumenthal was charged with discrediting Lewinsky so her statements would have less impact on Bill Clinton’s political career.

Hacking, email and voice mail deletion, website re-direction to fake websites, floods of fake web traffic (in order to kill your web business) and other malicious acts were all on the table.

Monica Lewinksy, Cheryl Attkisson, and other well-known names, have openly discussed the attacks on them, but, it turns out, there were thousands more.

These, massive, organized attacks, on non-terrorist, average, domestic U.S. citizens leaves the public scratching their heads. Why would the highest office, in the nation, stoop to the lowest forms of aggression and dirty deeds?

One possible answer lies in a previous history lesson. During the reign of FDR as President, JP Morgan attempted to take over the U.S. Government in a case known as the “Business Plot”. A highly decorated U.S. Marine hero, named Smedley Butler, exposed the plot and helped get it shut down. At the time, if the plot had succeeded, it would have been one of the largest business crimes in history. (Websearch: “Smedley Butler and the Business Plot”)

Something similar may have been what broke the Obama Administration.

Just before Obama got in the Presidential game, Goldman Sachs and Silicon Valley pitched the idea that there was “a trillion dollars of electric car lithium in Afghanistan” and that “Afghanistan was the Saudi Arabia of lithium”. (Websearch those phrases).

Silicon Valley billionaires traded exclusive federal contracts, supposedly worth trillions of dollars, for the market monoploy for the mining deals for their solar panels and electric cars. In this deal; Obama, Reid & Feinstein got all the campaign cash they needed, and all the search engine manipulation they needed, in order to win their elections. In exchange, Steven Chu, and his corrupted Department of Energy, gave John Doerr, Eric Schmidt, Elon Musk and Steve Jurvetson the monopolies on electric cars, solar and all of the “green-washed” “Cleantech” markets.

So that’s a lot of crime. Stock market manipulation, bribes, rigged loans and Department of Energy funding, kick-backs..that all sounds pretty bad.

The White House-rs, and billionaires, must have figured: “in for a penny, in for a pound” and decided to just go all the way on the whole crime thing.

It is hard to keep a big crime quiet, generally. In Washington DC, it is impossible. There will always be an opposition party that wants your crime exposed. The naïve Silicon Valley newbie DC manipulators did not do a very good job at being covert corruptors.

The whole thing just went from bad, to worse. That “one more” little hit-job on an Attkisson suddenly needed “one more” little hit job on an SEC investigator, and then…”oops”, now this other reporter found out: “Take them out too”… It escalated rapidly. Fear makes bad guys do worse things, but more stupidly.

So, to fund campaigns, the “Cleantech Crash” (See the 60 Minutes episode of the same title) was caused. This, either, accidently, took place at the start of “The Age of Transparency”, initiated by Snowden, Asssange, Manning, HSBC, Chinese OPM hack, Sony Leaks, or, it caused the leaks to get generated because of the audacity of the crimes. We may never know.

In any case, now everybody has everything on everybody. The world is sifting through all of the behind-the-scenes emails, and things are getting a view in a new light.

Over 45 people have had to quit the Obama Administration, at the peak of their careers, when they got caught. It is now quite obvious who was dirty in the deal. Still, though, the newer press and Blumenthal-inspired West Wing hit-men persist in following in the steps of their hatchet-men predecessors.

Congress knows who each, and every, one of them are. They are zero-ing in on the dirty tricks teams because they have destroyed the credibility of the U.S. political system and ground Washington productivity to a halt. Targeting Hulk Hogan and Rick Santorum for political hit jobs by Gawker Media may make for fun tabloid times, but those simpleton attacks do nothing to move U.S. public policy productivity forward.

The Sony hack revealed that one of the largest companies in the world was run by petulant, whining, children who threw tantrums if someone looked sideways at their toy shovel in the sandbox. The White House appears to have the same MO.  The TV Show “West Wing” sought to portray a noble, moral, enlightened White House. The reality of the recent news, and expose’s, reveals a White House full of vindictive, bitter, school-children who would rather attack those who speak up, deliver digital retribution from on high and empower monopolies for Silicon Valley buddies, no matter what the cost to the rest of America.

 

Vance Leland

(Opinion Piece)

 

Ashley Madison Sex Web Site totally hacked. All Major Dating Websites Now Hacked. User Data For Sale By Hackers. How To Stay Protected Online!

Ashley Madison Sex Web Site totally hacked. All Major Dating Websites Now Hacked. User Data For Sale By Hackers. How To Stay Protected Online!

Ashley Madison – an online cheating site – has been hacked

AshleyMadison has been hit by hackers who are threatening to release the personal data of millions of customers.

https://icons.duckduckgo.com/ip2/money.cnn.com.icomoney.cnn.com/2015/07/20/technology/ashley-madison-hack…

More results

Online Cheating Site Ashley Madison Hacked

Large caches of data stolen from online cheating site AshleyMadison.com have been posted online by an individual or group that claims to have completely …

https://icons.duckduckgo.com/ip2/krebsonsecurity.com.icokrebsonsecurity.com/2015/07/online-cheating-site-ashleymadiso…

More results

Ashley Madison hacked: A case of digital Robin Hood …

The affair-enabling dating site AshleyMadison was hacked, putting the information of its cheating clients at risk. But can the hackers claim the moral …

https://icons.duckduckgo.com/ip2/www.csmonitor.com.icocsmonitor.com/USA/USA-Update/2015/0720/Ashley-Madison-h…

More results

Adultery site Ashley Madison hacked, personal data leaked

It is unknown how many people managed to see the leaked adultery site’s personal details. AshleyMadison has always been a controversial site.

https://icons.duckduckgo.com/ip2/www.cnbc.com.icocnbc.com/2015/07/20/adultery-site-ashley-madison-h…

More results

Hackers Target Users of Infidelity Website Ashley Madison

The parent company of AshleyMadison, a dating site aimed at those looking for extramarital affairs, confirmed its systems were hacked by an intruder …

https://icons.duckduckgo.com/ip2/www.wsj.com.icowsj.com/articles/affair-website-ashley-madison-ha…

More results

Ashley Madison lets users delete accounts after hack – NY …

Adulterous dating site AshleyMadison is letting cheaters delete their accounts for free — a move that could appease the vigilante hackers who breached the system.

https://icons.duckduckgo.com/ip2/www.nydailynews.com.iconydailynews.com/news/national/ashley-madison-lets-users-d…

More results

Ashley Madison: Adultery Website Hack Could Expose 37 Million …

This file photo illustration shows the homepage of the AshleyMadison dating website displayed on a laptop, August 20, 2013, in Hong Kong.

https://icons.duckduckgo.com/ip2/abcnews.go.com.icoabcnews.go.com/Technology/ashley-madison-adultery-websit…

More results

Ashley Madison website for cheating spouses is hacked

AshleyMadison, a website that bills itself as a place to arrange extramarital affairs, has been hacked.

https://icons.duckduckgo.com/ip2/www.chicagotribune.com.icochicagotribune.com/bluesky/originals/ct-ashley-madison-hacke…

More results

Cheating website Ashley Madison hacked, personal info posted …

NEW YORK (AP) — The parent company of AshleyMadison, a matchmaking website for cheating spouses, says it was hacked and that the personal information of some of …

https://icons.duckduckgo.com/ip2/www.sfgate.com.icosfgate.com/business/technology/article/Cheating-webs…

 

Web Security 101 for The Average Person:

How to protect yourself on the internet.

The most average, boring, “uninteresting” consumers are the ones that are the most targeted, the most “mood-manipulated”, the most hacked and the most data-harvested!

Every single thing you write in an email or text, or click on, will, eventually be psychologically analyzed by governments, lawsuit adversaries, foreign interests, hackers and marketing companies in order to learn what you really think and how you think. They can ALL get ahold of all of that material going back at least ten years. Nothing is ever deleted off of a hard drive. Everything can be recovered using modern physics.

Here are a variety of recent news articles, from across the web, on how to take car of your personal web security:

Your most important link is:  https://www.privacytools.io

This will tell you about all of the latest security tools you can use.

——————————————-

 

Basic Rules of Safety To Survive the Internet!

 

1. Never log in to anything without using a disposable email address. Never sign in to anything without using a disposable email address. Only use Apps and sites that do not use a login and keep you anonymous. Do not let the internet know that you are using the internet or you will instantly be targeted. EVERY government network has already been broken into at least a dozen times. Every retail network has been broken into nearly a hundred times. Otherwise: “Over 42 different countries spy agencies, thousands of hackers and thousands of marketing manipulation services will be all over you and your ID, money and life will get stolen”

2. Never send unencrypted email. Always use GPG, or other encryption, and change your password weekly.

3. Never backup or save files on “the cloud”. When you put files out on the web on other services you quadruple the ease with which your files can be broken into and stolen. It is like leaving all of your notebook computers on the curb every night.

4. Don’t buy any hardware unless it is open-source certified, globally, to be “back-door free”. Many companies built spy door gates into their hardware but now all of the hackers have the keys to those doors. If you have un-certified servers, routers, wifi, etc. then the gates of hell are wide-open to any hacker these days.

5. Never buy anything online with an account that has more than $200.00 in it. Have one account only for buying things online and never connect it to any other account and never put more than $200.00 in it. Expect your accounts to be hacked and your money to be stolen.

6. Always remember you are 3 CLICKS FROM DISASTER any time you are connected to a network. These days, ANYBODY can take everything of yours off of ANY electronic device with just 3 clicks of most modern hacking software. BE CAREFUL!

7. Always use fake ID, Disinformation and a false name if you must log-in to a service like NETFLIX or other subscription service. You will be tracked, tagged and process manipulated if you don’t.

8. Never post your picture online or you will be processed with imaging comparison software by third parties. Dating sites sell your image but hundreds of others run image comparison software on every image on the internet and abuse them for marketing too.

9. Never keep ANY files on your computer! Use an “air gap” where you never connect drives with actual documents to the live internet. Keep your Outlook .pst files, your photos, your documents, your movies and EVERYTHING you create, on an external encrypted hard drive. NEVER connect that hard drive to your computer unless your internet connection is physically unplugged and your wireless connection is removed or turned off in a way that you can check that it is turned off. If your mobile device is “always connected”, ANY kid can take EVERYTHING off of it, with just two mouse-clicks, any time they want to. It IS OK to keep fake files on your computer to keep hackers on a wild-goose chase.

10. Tape over any camera on any device you own. ANY kid can secretly turn your camera on and watch you taking a shower, getting undressed, cheating on your partner, having  sex or writing your secrets, with just two mouse-clicks, any time they want to.

11. Don’t use the CONTACTS and CALENDER in OUTLOOK, ICAL or on your device. ANY kid can now download all of your contacts off of your phone and computer and watch them as well. A business competitor can download all of your calender appointments and bug your business meetings or get your business meetings cancelled. An ex lover and see who your new lover is and mess with that. Foreign countries can EASILY steal your technology Otherwise: “Over 42 different countries spy agencies, thousands of hackers and thousands of marketing manipulation services will be all over you and your ID, money and life will get stolen”

12. ALWAYS, ALWAYS pull the battery out of your device when you are not immediately using it. ANY kid can now download all of your contacts off of your phone and computer and watch them as well. A business competitor can download all of your calender appointments and bug your business meetings or get your business meetings cancelled. An ex lover and see who your new lover is and mess with that. Foreign countries can EASILY steal your technology. You device may appear to be turned off, you may have even seen it “turn off” but it is still on and pretending to be off.

———————————-

 

Inside the shadowy world of data brokers

 

From CIO Magazine. From: http://www.cio.com

 

By Matt Kapko

 

Most consumers would not recognize the names of the large data brokers that constantly collect detailed information on their finances, health and other personal information. It’s safe to say most people probably have no idea this is happening at all. Those who are aware should be shocked by the extent to which their online and offline behaviors are being sifted through for profit. Call it panning for gold in the digital age.

 

The World Wide Web has always been a vehicle for advertising, but as the Internet permeates every facet of society from our apps to our appliances its role is expanding in kind. While surfing the Web or updating social apps on our smartphones, we blindly share valuable information about ourselves often without considering the ramifications – or, in some cases, even knowing we are sharing it. Despite these growing privacy concerns, without advertising the Internet would deliver very few of the experiences many of us enjoy today. Companies need to be profitable to survive, and for most that path to revenue is advertising. While companies like Facebook and Google capture most of their data through consumer-facing products and services they offer for free, outside firms are collecting and organizing virtually all activity elsewhere.

 

As 2013 came to a close, Sen. Jay Rockefeller (D-W.Va.) issued a scathing report about the role and unchecked power of data brokers. Following a year-long investigation by the Senate commerce committee into the collection, use and sale of consumer data for marketing purposes, he called these companies and their practices “the dark underside of American life.”

 

“Your smartphones are basically mini tracking devices that supply the kind of information that really talks about who you are on a day-to-day basis.” –Federal Trade Commissioner Julie Brill

 

“In 2012, the data broker industry generated $150 billion in revenue. That’s twice the size of the entire intelligence budget of the United States government — all generated by the effort to detail and sell information about our private lives,” Rockefeller adds.

 

Privacy concerns have ebbed and flowed with the rise of the Internet for decades now, but the backlash against data collection has grown more recently as consumers wake up to the reality that their personal information is being bought and sold as a commodity. Former NSA contractor Edward Snowden’s revelations about the wide and almost unfathomable reach of the federal government’s surveillance apparatus has only stoked these flames of discontent.

 

Recent reports from the likes of CBS’ news magazine “60 Minutes” are shining fresh light on data brokers as well. During that featured report, Federal Trade Commissioner Julie Brill says “your smartphones are basically mini tracking devices” that supply “the kind of information that really talks about who you are on a day-to-day basis.”

 

That data may include information like when someone comes home or leaves, the places or establishments they frequent and when and where they swipe their credit cards to make purchases.

 

“I think most people have no idea that it’s being collected and sold and that it’s personally identifiable about them, and that the information is basically a profile of them,” Brill says. “Consumers don’t know who the data brokers are. They don’t know the names of these companies.”

 

By flying under the radar, data brokers have largely been able to keep consumers at bay. The sheer volume of them, which easily number in the thousands, confuses consumers and matters of privacy all the more.

“When you’re collecting across billions of data points, regardless of its accuracy, there’s going to be groups of individuals behaving the same way.”

 

The largest of these companies — Acxiom, Datalogix, Epsilon and Experian — are bridging together data from the online and offline worlds and selling it to the likes of Facebook, Twitter and others to enhance their respective ad products. The general approach is to group and categorize consumers for marketers’ online ad targeting efforts. Programmatic ads are then sold and targeted based on these profiles, which the industry insists are anonymous and not personally identifiable.

 

Regulators and legislators across the political spectrum are making it a top priority to investigate these data brokers and enact laws that could curtail their way of business. But as more troubling details about the operation and seemingly unrestricted reach of these data brokers come to the surface, it’s unclear what can or will be done to rein in their most damning practices.

 

Daniel Kaufman, deputy director for the FTC’s Bureau of Consumer Protection, says the agency is currently studying nine data brokers. “They collect an enormous amount of data and they are not consumer-facing,” he said at last week’s GigaOm Structure Data conference in New York City.

 

“How are they getting their data? How do they make sure it’s accurate? Who are they sharing it with?” Kaufman says. The FTC takes law-enforcement actions, and it doesn’t create regulations. However, he adds that “the commission has been supportive of legislation that would support or improve the transparency of data brokers.”

 

The how, when and where of data collection may be perceived by many as nefarious, but the real debate begins over why. “Quite simply, in the digital age, data-driven marketing has become the fuel on which America’s free market engine runs,” the Digital Marketing Association wrote to members of Congress in 2012. That generally sums up the view of almost marketer today, and the sentiment is even more on point and agreed upon in the world of real-time marketing on social media.

 

“It’s become an essential part of the marketing mix,” says Adam Kleinberg, CEO of Traction, an advertising and interactive agency in San Francisco. Data brokers are “becoming increasingly important because the way digital media is being purchased is moving toward the robots. Programmatic advertising and programmatic media buying is using tools that automate the process,” he says. “You enhance the targeting efficiency by leveraging that data. It’s just gotten to the point in the past few years where 30 to 40 percent of media is purchased that way.”

 

These profiles are directional and optimized behaviorally, Kleinberg says. The cookies that follow us around the Internet are being used to index us based on behaviors such as what we search, visit, click on or buy. “If you actually saw your data you’d think ‘wow, these people don’t know me at all,'” he says.

 

“The power of the data in certain circumstances is in the massive quantity and patterning that is possible. When you’re collecting across billions of data points, regardless of its accuracy, there’s going to be groups of individuals behaving the same way,” Kleinberg adds.

 

“There is sensitive data that is collected and sold on you… What’s new is this big data that is being collected and cross referenced with those things,” he says. “The reality is that most of this big data is simply being used anonymously to better target you with an ad.”

 

While he freely admits “the ability to look at that individual data is a little scary,” he adds that “anyone who’s buying digital media today is buying data.”

 

From that the debate usually pivots around the promise of self-regulation versus the need for legal protections and regulations. Industry groups like the Internet Advertising Bureau and the Network Advertising Initiative have already developed standards and best practices which member companies must adhere to, but it appears unlikely that will remain their exclusive responsibility. Regulatory agencies and elected officials aren’t subscribing to simple notion that the ends justify the means. Legislation could be on the horizon as they aim for a middle ground.

 

Sharing the view of the industry at large, Kleinberg says he thinks the responsibility should come from within because regulators don’t have a deep understanding. “I think that the industry organizations are actually taking it very seriously and putting together standards that accommodate reasonable privacy restrictions like allowing people to opt out,” he says.

 

“I think consumers care less than we think in the moment. They care in the abstract sense,” Kleinberg says. “I can’t tell you of an example where data has been abused.”

 

To embolden the case for self-regulation, the industry needs to do more to explain what data means, Kleinberg adds. “The terms data and big data get lumped together as this big sinister beast and a lot of it is not innocuous … it’s anonymized by obscurity,” he says. “We should not rush to judge all of it without understanding that nuance.”

 

 

——————————————–

 

 

How your enemies, competitors and corporate theives can have you attacked and robbed on “data-mining” services?

 

 

Every time you touch a keyboard, you hand your opposition the tools of your own destruction!

 

There are a group of BIG DATA Data Mining, privacy harvesting companies that can: find your kids for any stalker, kill off any chance you have of ever getting a job, destroy your credit, destroy your chances of getting a home, anticipate what you might do tomorrow, make you buy things you would not have otherwise bought, tell spammers and junk phone callers where and when to find you, tell everyone what your political affiliations are, and millions of other things that you never thought you were actually showing to the internet.

 

They grab every mouse move, hand twitch, the direction of your mouse travel, every word, password, page and link that you engage in. They know how long you looked at something, when you back-spaced, how many stories about sex you looked at and in what order. Are you a politician? This is the way your opponents wipe you out in elections.

 

OR… do YOU have an opinion that conflicts with certain politicians? BANG! Push a button and you are TOAST via a “data burn”! You saw what happened to Micheal on the “BURN NOTICE” tv series, Right?

 

If someone does not like you, they can get input data to these services that will wipe you out and there is nothing you can do; there is no way to know if they data really came from you, an attacker or a mistake. When you fill out that apartment credit application, you just handed these guys a knife to stab you in the heart with.

 

What are you going to do about it?

 

Make it a FELONY for ANY data mining operation to NOT let you see EVERY single bit of data they have on you and correct OR DELETE IT!?

 

How Spy Agencies Destroy Members of The Public That Politicians Put Hits On!

 

Did you piss off a corrupt Senator, The President’s press secretary or the head of a federal agency by speaking out or reporting corruption?

 

Then you get a “hit job”

 

Got some dating site profiles? Suddenly very pretty girls will contact you, on your dating sites, but they will harrass, disparage and harangue you in an attempt to give you low self-esteem and demoralize you so you don’t feel motivated. Those girls aren’t actually girls, though, they are intelligence interns in a warehouse in Virginia. Those OK CUPID, Plenty of Fish and Match.com hotties may just be some nerd named Norman with a neck beard and six computer screens outside of DC.

 

Have you heard of the term: “Honey Trap” websearch that term and then try searching the term: “Snowden Honey Trap”. Read about that. The hot girls they send to manipulate you are hot coed undergrads from Stanford and Yale, with a hankering for the spy business.

 

Did you just get fired after your boss got a phone call from a helpful party who wanted to “share some important information about you..” That was a slander job by those boys in Virginia.

 

Are you suddenly finding it hard to get an interview? Is it strange that recruiters and interviewers suddenly stop talking to you after the first contact? Those potential hirers have databases, that you can’t see, and your enemies have put code phrases in your employment profile that makes you un-hireable.

 

Did your company get a bad review on Yelp or Google? Did it suddenly get frozen into the top position on every Google search. Yes, the CIA-Funded Google does have the power to destroy your life on-command.

 

All that surveillance for “Your protection” …it’s being used to monitor your actions and figure out how to put roadblocks in front of you, as punishment for pissing of that Senator.

 

It is called a “Q Request Filing”. Q Requests are not even supposed to exist, but they do. Q Request processors are experts in psychological warfare, mood manipulation, brand damage, character assassination and personal attacks.

 

So, how do you counter-measure such political and business attacks?

 

– Hire private investigators to track down the attackers.

– Sue them in Civil court, the U.S. Court of Claims and small claims court

– Engage in massive press outreach to expose the attackers

– Expose the funding sources and investments of the attackers

– File complaints with every relevant regulatory and law enforcement agencu and make sure the media tracks the status of those complaint investigations

 

 

 

———————————————————-

 

We live in a whole new world!

 

How many tens of millions of dollars have you spent on your personal web security?

 

What’s that, you didn’t spend tens of millions of dollars on your personal web security?

 

Sony Pictures did, Target did, Home Depot did, JP Morgan did, The White House did, PF Chiang did.. and they all got hacked!

 

What do we learn from this? You are more at risk than you realize!

 

There are a few problems that have caused all this:

 

First there are the “backdoors”. Spy agencies had companies like Cisco, Intel, Juniper and others, put hardware and software backdoors in all of their network equipment so that spies, and law enforcement, can get inside any network if there are “bad-guys” on it. The hackers got ahold of the keys to many of those backdoors. In many cases, they only need to get past one door to be inside your whole network. The problem is, many of the backdoors are in the hardware of the devices and those devices are distributed all over the Earth. None of these companies want to shoulder the cost of pulling out and upgrading all of those devices. Many users believe the companies should be liable for any break-ins via their backdoors. There is a big legal discussion around all of that.

 

Next we have bad IT. If you, or your network provider, are using funky, simple, passwords; then the hackers are auto-testing all of the ports and will eventually get in via computerized trial-and-error. They will just point $35.00 worth of software, that they downloaded off some Russian site, at your IP address and let it run for a few weeks until it gets in and texts them that they can now scrounge through your life. Some of these hackers are just bored teenagers in Thailand, the Ukraine or other impoverished areas where they can’t find work. They have plenty of time on their hands. Other’s are state agencies with $100M budgets and orders to “get as much as they can find” from the competing nations.

 

Third we have non-distributed networks. Networks are just too big. There are wide open football sized file repositories that should only be ping-pong table sized.

 

Fourth we have a glut of Silicon Valley companies who made their business model revolve around harvesting and manipulating your activities and personal information. Not only do they make billions doing this, they also get paid by federal and third party marketing groups to do it. They have every incentive to do it and no incentive to not do it.

 

“Internet security” means keeping your assets from getting stolen or abused. What are your “assets”?

 

They are:

 

Your money

 

Your credit

 

Your identity

 

Your privacy

 

Your intentions (ie: what you might do online and how to trick you into doing specific things)

 

Your activity history

 

Your time

 

Your brand

 

All of these things have monetary value. They are worth money to someone. Other’s can make money off of these things that you own.

 

You may not be an evil bad guy with dark intentions, but to marketing companies, you are going to get tracked, monitored and manipulated just as much, if not more. The thought that you “have nothing to hide” is the biggest falsity on the internet. You have everything to hide from the hackers and harvesters.

 

All of these companies, (most you probably never heard of), are panning for digital gold in your private records: White Pages: Address.com; Google; Spokeo; Marketo; Been Verified; Facebook; Peek You; Intellius; ZabaSearch; US Search; inBloom; Salesforce.com; IBM Data Services; People Finders; TWITTER; Veromi; US People Search; Private Eye; Public Records Now; Addresses.com; People Smart; Advanced Background Checks; People Lookup; TalentShield; BeenVerified; GIS BackGround Checks; CVCertify; Conair; Social Intelligence; Dun And Bradstreet; EquiFax; Infortal; Kroll Backgrounds; Onesource; Checkpeople. Most consumers would not recognize the names of the large data brokers that constantly collect detailed information on their finances, medical, legal, sexual and other personal information. It’s safe to say most people probably have no idea this is happening at all. Those who are aware should be shocked by the extent to which their online and offline behaviors are being sifted through for profit. Axciom openly stated that they sell your information to government agencies. They got in trouble for selling your sexual, drinking, STD, abuse and mental issues to third parties.

 

In 2013 Sen. Jay Rockefeller (D-W.Va.) issued a scathing report about the role and unchecked power of data brokers. Said Federal Trade Commissioner Julie Brill: “Your smartphones are basically mini tracking devices that supply the kind of information that really talks about who you are on a day-to-day basis.”

 

There are a group of Data Mining, privacy harvesting companies that can: find your kids for any stalker, kill off any chance you have of ever getting a job, destroy your credit, destroy your chances of getting a home, anticipate what you might do tomorrow, make you buy things you would not have otherwise bought, tell spammers and junk phone callers where and when to find you, tell everyone what your political affiliations are, and millions of other things that you never thought you were actually showing to the internet.

 

They grab every mouse move, hand twitch, the direction of your mouse travel, every word, password, page and link that you engage in. They know how long you looked at something, when you back-spaced, how many stories about sex you looked at and in what order.

 

OR… do YOU have an opinion that conflicts with certain politicians? BANG! Push a button and you are TOAST via a “data burn”! You saw what happened to the character Michael on the “BURN NOTICE” TV series, Right?

 

If someone does not like you, they can get input data to these services that will wipe you out and there is nothing you can do; there is no way to know if they data really came from you, an attacker or a mistake. When you fill out that apartment

 

So you wonder: “hmmm, If all network devices are now hacked! How can I have a NETWORK-FREE LIFE!

 

Touching any device connected to a network is the same as asking the Russian mob to “keep an eye on your stuff while you run to the store”:

 

You might as well leave your unlocked safe deposit box at the curb of your nearest ghetto.

 

Do you ever take off your clothes? That camera on your cell phone, tablet, PC or appliance is recording you in secret. All those nude photos of all of the starlets that are online from “The Fappening”…you could be next…

 

Hundreds of millions of consumers are having their personal data hacked from most big retailers.

 

The White House, NASA, The CIA and all those other sites you thought were super secure.. nope..not so much: Hacked!

 

The Snowden, Assange and Manning leaks, along with the CIA Torture report, show, more than anything else, that all nation states lie to each other and they have played a one-ups-man-ship game of you-hack-me-I’ll-hack you, that now every single network has been broken into hundreds of times.

 

CBS news revealed that the U.S. and Israel built the STUXNET virus to take out Iran’s nukes but Iran got ahold of it, and has passed derivatives of it to every anti-U.S. group.

 

Now nation-state-class regenerative virus attacks are running daily against U.S. corporations with complex viruses that self-mutate like the T3 Terminator in the famous sci-fi film franchise.

 

Want to see all of Hollywood’s secret movie contracts and all of the movie star’s social security numbers? Say hello to “Sony-Pocalypse”! The Koreans appear to have gutted all of the personal records and private communications of the whole studio system. Now we know that Sony’s own staff think that Adam Sandler is a Dick!

 

The USB connector, on all USB devices, has high odds of having a hacking virus built into the USB connection itself.

 

The sad thing is that there are hundreds of ways to solve the problem but those ways involve making networks hacker-proof and the spy agencies won’t allow that.

 

A large group of public organizations and consumer companies, who have brought hardware and software forward that is actually hacker proof, have been attacked for doing so.

 

Even famous companies: Apple and Google were just attacked by the FBI for adding a slightly stronger encryption to their phones.

 

Think you are a boring, non-attractive target? Think again! Ever take your clothes off? ..have sex? ..Buy stuff? Got a credit card?

 

Technology can absolutely fix the problem. Technologists are being blockaded from fixing the problem because of certain person’s over-whelming need for “control”. Where will it end?

 

How can you survive as a company, agency or individual in the mean-time? Since the “mean-time” could last for the next 20 years, at the “pace-of-politics”, you need to be ready to make a big commitment:

 

 

To be truly NETWORK FREE:

 

– You cannot own anything with a built-in hard drive. Boot any device from an external drive and try to never connect the drive when the device is on a network. Have a USB nub to put things on when you need to email or go online. Disconnect the main external hard-drive when you must go online. Use the external operating system on a USB drive called: TAILS from the people who brought you TOR.

 

– Consider having a tablet that is only for surfing the web. Set up ALL accounts on it with the universal login that all web users default to: John Doe. 1 Main Street, Anytown, USA, 91111. Never take any download off of it and never connect it to your home network or any other device.

 

– Buy old typewriters, paper file cabinets and 1990’s flip phones. Use pre-hack technology. The Russian’s have now switched to this.

 

– Don’t write anything on a social network.

 

Companies now realize that sending their design plans, CAD, campaign plans and electronic layouts by email, or FTP, is the same as handing them directly to Chinese and Korean copycat factories. Hackers can get into anything on-line with two mouse clicks, these days. Your personal assets are just as valuable to the hackers.

 

YAHOO

 

Stay safe. Be Aware. Once you adopt security techniques they will, eventually, become second nature.

 

——————————————-

 

When a technology company hires “opposition researchers” to spy on you, this is what they do to “build an interdiction file on you”:

 

 

– Acquisition and tracking of your Comcast, Netflix, Hulu and related media uses for the last 10 years.

 

– Acquisition and tracking of your PG&E bills and usage curves for the last 10 years.

 

– Live feed observation from all cameras on your mobile devices, computers, smart devices and nearby surveillance cameras, even though those devices appear to be turned off.

 

– Acquisition and tracking of every keystroke on your devices via a delayed buffer file that remotely sends itself to surveillance servers when you believe your devices are turned off.

 

– Acquisition and tracking of all of your Paypal, credit card, debit card, club card and service card transactions for the last 10 years.

 

– “Stingray” device deployment in your neighborhood to spoof all of your wireless devices and create a archived database of all phone calls, text messages, voicemails and web search URLS.

 

– Routing your computer to spoofed URLS for Facebook, LinkedIn, Twitter and other sites that appear to be authentic but are actually monitoring sites.

 

– Acquisition, tracking and archiving of all third party business surveillance camera feeds on your daily routes of travel and any off-route deviations you may take.

 

– Identification and file creation for all investors, family members and associated partners who may have stock holdings or revenue access to your companies.

 

– Acquisition and tracking of all of your bank accounts, trust funds, shell corporations and any professional financial services people identified in the international databases for the last 20 years.

 

– Acquisition and tracking of the RFID circuits in your car and the radio system in your car.

 

– Wifi and Laser inteferomtry observance of speech surface vibrations and air space disruptions, which, essentially, mean that they can see inside buildings and hear speech without bugging anything by listening to the vibrations of nearby windows, ceramics, plastics or other objects.

 

– Computerized cross matrix comparison of all IRS and State tax filings compared with all revenue streams from the last 15 years.

 

– Computerized Cross matrix studies on you and your psychological state via the surveillance databases of Palantir, LucidWorks, Epic, PINWALE, XKeyScore, Stormwatch and others.

 

– Use of nearby Zone satellite array transponders for signal-specific targeting of your activities.

 

 

——————-

 

How an adversary will conduct a surveillance operation on you and how to trip them up:

 

#1 How you get targeted for surveillance:

 

– By being a human that owns, or is near, any device that can connect to a network

 

– By having any police record

 

– By having any tax record

 

– By making any public statement in social media, that is a political opinion

 

– By owning a business

 

– By doing anything that causes three or more people to regulary pay attention to you

 

– By shopping on line

 

– By using email

 

– By having a website or socal media page

 

– By being in a lawsuit

 

– By writing a complaint letter

 

– By signing a petition

 

 

#2. When you engage in any of these actions you are assigned a surveillance code. The more you do any of these things, above, the deeper your surveillance becomes

 

#4. Who surveils you:

 

– Your government

– Foreign governments

– Local police

– State police

– Federal intelligence agencies

– Democrat opposition researchers

– Republican opposition researchers

– Marketing companies

– Business competitors

– Lovers

– Ex-lovers

– Family members

– Your children

– Hackers

– Foreign organized crime groups

– Neighbors

– Bored teenage gangs

– Lobby groups

– Think tanks

– Political psychologists

– Consumer electronics companies

– Silicon Valley data harvesters

– the CIA

– the NSA

– the DIA

– the FBI

– NEST

– Senators

– the White House press office

– Gawker Media

– the Verge

– Unit 52 of the Chinese surveillance group

– Google

– Linked-in

– Amazon.com

– Experion

– or by “information services” who sell your data to the parties above

 

 

#5. Why do they target you:

 

– to acquire political advantage

– to manipulate political advantage

– to damage political efforts

– to trick you into buying things

– to determine if you might be causing trouble

– to determine if you might be about to cause trouble

– to sell your data assets without your knowledge

– to determine your voting intentions

– to manipulate your voting intentions

– to see if you are a threat to government

– to see if you are a financial threat to a competitor

– to determine the best ways to damage your effort if you are a threat to a competitor

– to get secret information in order to write news stories

– to put misleading information in front of you in order to steer you away from competing with something

– to find out who you are talking to in order to manipulate your contacts

– to trick you by putting manipulated information in front of you with missing pieces and watching how you fill in the missing parts, there-by exposing your thinking

– to trick you into thinking many other people are doing a certain thing and that  you should “follow the crowd”

– to put certain words, or short phrases in front of you that candidates then repeat on tv so that you become programmed to accept those phrases

– to identify a city, or region, which might be about to unite under a common complaint, or goal

– to disinform

– to capture location, use and input data about you from your mobile device apps

– to secretly update the spyware already on your system

– to look at other spies that are spying on you and spy on them

– too turn off, or destroy, your device, remotely, iff you “cause trouble”

– to identify if you are exhbiting too much independent thinking and deepen your surveillance if you are

————

Deep dive into QUANTUM INSERT

 

http://blog.fox-it.com/2015/04/20/deep-dive-into-quantum-insert/

 

 

What is a QUANTUM INSERT attack on you?

 

QUANTUMINSERT is described as a ‘HTML Redirection’ attack by injecting malicious content into a specific TCP session. A session is selected for injection based on ‘selectors’[3], such as a persistent tracking cookie that identifies a user for a longer period of time.

 

The injection is done by observing HTTP requests by means of eavesdropping on network traffic. When an interesting target is observed, another device, the shooter, is tipped to send a spoofed TCP packet. In order to craft and spoof this packet into the existing session, information about this session has to be known by the shooter.

 

All the information required by the shooter is available in the TCP packet containing the HTTP request:

•Source & Destination IP address

•Source & Destination port

•Sequence & Acknowledge numbers

 

For the attack to succeed the packet injected by the shooter has to arrive at the target before the ‘real’ response of the webserver. By exploiting this speed difference or race condition, one can impersonate the webserver.

 

A video was posted online by The Intercept that shows the inner workings of QUANTUMHAND, which uses QUANTUMINSERT against targets visiting Facebook: https://vimeo.com/88822483.

 

Any nation state, or skilled hacker, could perform QUANTUM attacks as long as the traffic passes through their country or they possess other capabilities to get the required TCP session data.

 

QUANTUMINSERT could be used for lateral movement within internal networks.

 

Detection is possible by looking for duplicate TCP packets but with different payload and other anomalies in TCP streams.

 

The usage of HTTPS in combination with HSTS can reduce the effectiveness of QI. Also using a content delivery network (CDN) that offers low latency can make it very difficult for the QI packet to win the race with the real server.

 

 

Who is able to perform these attacks

 

Anyone who can passively or actively monitor a network and send spoofed packets can perform QUANTUM-like attacks. The NSA is allegedly able to perform this attack on a large scale on the internet and with a high success rate, which of course not everyone can simply do. This is because it requires the capability to listen in on potentially high volumes of internet traffic, which requires substantial resources and a fast infrastructure. This means that internet service providers (ISP) can potentially also perform these attacks.

 

A nation state could perform QUANTUM-like attacks when traffic passes through their country. An example of this is the recent research on China’s Great Cannon[4] by CitizenLab that confirms this.

 

What are QUANTUM INSERTS used for

 

QUANTUM attacks are possible against various protocols and for different purposes. For both offensive and defensive capabilities as the following table shows:

 

QUANTUMINSERT:  A man-on-the-side attack. Brief hijack of connection to redirect target to exploit server.

QUANTUMBOT:  Capable of hijacking idle IRC bots and hijacking c2 communication from bots.

QUANTUMBISQUIT: Enhances QIs effectiveness against proxies and other hard to reach targets

QUANTUMDNS: DNS injection/redirection of A records. Targets single hosts or chaching name servers

QUANTUMHAND: Exploits the computers of Facebook users

QUANTUMSKY: Denies access to a webpage by injecting/spoofing RST packets.

QUANTUMCOPPER: File download/upload disruption and corruption.

 

 

Source: https://firstlook.org/theintercept/document/2014/03/12/one-way-quantum/

 

All of these programs attempt to race the response packet to the target before the response of the real server arrives.

 

NSA has QUANTUMINSERT capabilities since 2005. The first QUANTUM tool was QUANTUMSKY, realised in 2004. The most recent development, according to the slides was done in October of 2010.

 

Man-on-the-Side vs Man-in-the-Middle

 

The QUANTUM attacks described in the Snowden leaks are all man-on-the-side (MOTS) attacks, while China’s Great Cannon attack uses man-in-the-middle (MITM) capabilities. There is been some misinformation on the matter in write-ups. The difference between the two can be observed by looking at the network traffic of the attacks[4]. The Great Firewall of China (not to be confused with The Great Cannon), injects additional TCP reset (RST) packets, and the original real responses can be observed after these RST packets, but real responses can be observed after these RST packets. This is a sign of a MOTS attack, rather than a MITM attack. The network traffic related to the Great Cannon showed only modified packets and no original responses. In other words: the original packets were replaced. This is a sign of a MITM attack, rather than a MOTS attack. The CitizenLab report describes this in great detail.

 

Monitor and shooter locations

 

The attack can be done against remote networks on the internet, but also inside internal networks for lateral movement purposes. The closer the monitor and shooters are to the target, the higher the success rate.

 

Similar attacks

 

There has been work on injecting packet into TCP sessions. Some tools that perform a similar attack to QUANTUMINSERT are:

•The attack performed by Kevin Mitnick back in 1994 used the same principles as QUANTUMINSERT, though he predicted TCP sequence numbers rather than observing them[5].

•Hunt, a tool released in 1999 was able to spoof and hijack connections.

•TCP Session Hijacking by Cheese, an article released in 2009, describes the technique accompanied by source code showing how to do it[6].

•AirPwn[7], a framework for 802.11 (wireless) packet injection.

 

How we performed a QUANTUMINSERT attack

 

We used three virtual machines (VM) to simulate the monitor, client and shooter, as described in the leaked slides. In this controlled environment it was relatively easy to outrace the server response and inject a HTTP response into the TCP session of the web browser.

 

The monitoring VM received a copy of all the client traffic and was configured to search for a specific pattern in the HTTP request. When a matching packet was found, the monitor service would notify the shooter about the current IPs, ports, sequence and ACK numbers of the session. The shooter would then send a spoofed TCP packet containing the right values for the session and a not so malicious HTTP response to prove the insert was successful.

 

The monitor is a simple Python script that can read Tcpdump or Tshark output for the required sequence numbers, ACK numbers, IP addresses, TCP ports and optionally HTTP cookie values. The shooter is also written in Python using Scapy for crafting and sending the spoofed packets. We then tested this code over the internet in a controlled environment. One of the harder parts was finding a service provider that permitted source IP spoofing close to our office.

 

Detection of QUANTUM INSERT attacks

 

Among the leaked NSA documents was a slide from the Communications Security Establishment Canada describing how to detect QUANTUMINSERT attacks:

 

Detect QUANTUMINSERT CSEC

Source: https://www.eff.org/files/2015/01/23/20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf

 

To clarify the above, the first content carrying packet is the first packet containing data received by the client from the server. If there are two packets received with the same sequence numbers but have a different payload, it is a possible QI attack.

 

Theoretically an insert can be done anywhere in the TCP session, for example in long lived HTTP/1.1 sessions. A redirect could also be performed that would have less than 10% difference with the real payload. For example by doing the QI on a similar domain name on a HTTP 302 redirect.

 

It is even possible to start ‘shooting’ before the client sends the HTTP request, resulting in a faster response than the real HTTP response. However, by doing so you will lose the ability to identify and target specific users. According to the leaked slides, NSA targeted clients with QUANTUMINSERT using selectors such as HTTP cookies.

 

So in practice we have to look for duplicate HTTP response packets with significant differences in their content.

 

In order to detect this using an IDS one would need to observe the network traffic between client and the internet.

 

Payload inconsistency

 

A client will receive duplicate TCP packets with the same sequence number but with a different payload. The first TCP packet will be the “inserted” one while the second is from the real server, but will be ignored by the client. Of course it could also be the other way around; if the QI failed because it lost the race with the real server response.

 

quantum_insert_wireshark

Example of duplicate sequence and ack numbers, but with different payload sizes.

 

Checking the first content carrying packet is probably the easiest way to detect a QI, but offers no guarantees, as an inject can be present later in the TCP session. Checking only the first content carry packet reduces the amount of false positives.

 

A retransmission with a different payload size will sometimes look like a QUANTUMINSERT, this can happen when a retransmission is cut short, for example during TCP window size changes.

 

TTL anomalies

 

The injected packets also show a difference in their Time To Live[9] (TTL) values. Because the QI packets are usually inserted closer to the target client, the TTL is relatively higher than that of the real responses, because they come from further away. While the initial TTL can be modified, it is difficult to exactly predict the correct TTL value.

 

Slight variations in TTL values are not unusual, due to route changes on the internet.

 

Other anomalies

 

Other anomalies can be seen if the spoofed packets are not carefully crafted. For example, the TCP Timestamp value is usually set if it was also set in the TCP SYN packet. However this could vary between operating systems.

 

Other values such as the Differentiated Services Code Point (DSCP) in the IP header can also be observed for anomalies.

 

Detection using IDS

 

We created a number of packet captures (pcaps) when performing the Quantum Insert attack, which can be found here: https://github.com/fox-it/quantuminsert/tree/master/pcaps

 

This helped us with developing detection for a number of Intrusion Detection Systems and we hope others find these pcaps useful for further analysis and research.

 

While we have released Snort signatures in the past, we realised that this was not going to be enough to detect Quantum Insert. The Fox-IT Security Research Team successfully made detection for Quantum Insert and released this proof of concept code into the public domain on our GitHub: https://github.com/fox-it/quantuminsert/tree/master/detection

 

Snort

 

We made custom patches to the Snort Stream pre-processor to be able to detect possible Quantum Inserts. We found this to be the most efficient way rather than creating our own pre-processor. When a possible QI is detected it will trigger an event and also try to log the payload of the other TCP packet that was inconsistent as extra data.

 

See the README.md for more technical details: https://github.com/fox-it/quantuminsert/tree/master/detection/snort

 

We hope these patches will eventually find its way upstream.

 

Bro

 

We made a Bro policy to check for inconsistencies in the first content carrying packet. Keeping track of multiple packets would be better, if this could be done in the core functionality of Bro. We attempted to use the rexmit_inconsistency event, but this did not seem to work. Others have also reported this on the mailing lists[10], however it never got much attention. It should be feasible to improve Bro so that it can also keep track of older TCP segments, in order to detect QI like attacks. There’s even an official Bro ticket for this: BIT-1314[11].

 

See the README.md for additional technical details:https://github.com/fox-it/quantuminsert/tree/master/detection/bro

 

Suricata

 

We asked the lead developer of Suricata, Victor Julien, if he could verify Suricata’s coverage for QI by supplying him a pcap. Victor explained that Suricata has an event called ‘stream-event:reassembly_overlap_different_data’ that can be alerted on when triggered using a default signature. We received an additional signature that detects HTTP 302 responses in possible QI payloads.

 

https://github.com/fox-it/quantuminsert/tree/master/detection/suricata

 

Evasion

 

Note that these detection methods are possibly not evasion proof, one could also easily spoof a FIN packet after the QI packet to close the session. This would stop tracking the TCP segments in most IDS systems. Later packets in this stream will not be matched with previous packets.

 

Other possibilities is to try to create a partial overlap of data, thus avoiding detection of duplicate sequence numbers.

 

Other work

 

The following blog post[12] describes how to perform QI containing Proof of Concept code to perform the attack: https://github.com/stealth/QI

 

HoneyBadger[13], is a comprehensive TCP stream analysis tool for detecting and recording TCP attacks written by David Stainton can most likely also detect this attack.

 

While writing this article a DoS attack on GitHub was going on and a analysis was posted by NETRESEC[8], we did not see duplicate packets in the screenshots that could indicate a QUANTUM (man on the side) attack. However, the difference in TTL values was noticeable.

 

The detection for this attack has been included in our Cyber Threat Management platform.

 

 

 

 

Additional sites where you can conduct your own research:

 

http://www.aclu.org

 

http://www.propublica.org

 

 

 

 

More results

More results

 

 

Did President Obama Know That his Senior White House Staff Were Running An Organized Crime Operation, In the Energy Markets, Right Out Of The West Wing?

Did President Obama Know That his Senior White House Staff Were Running An Organized Crime Operation, In the Energy Markets, Right Out Of The West Wing?

 

          – Blogoyavitch may burn Valarie Jarrett, as his prison term looks to overturn

          –  Elon Musk and John Doerr found to have direct financial and communications connections to the deals

          –  White House found to have ordered Steven Chu and Energy Department to rig funding only for White House financiers

         –   Jofi Joseph, and other former White House aides, along with Secret Service  ex-staff, said to have dropped files on WikiLeaks

          – 60 Minutes expose’ links Chinese deals to venture capital “cleantech” backers in Silicon Valley! Felony?

          –  Tens of thousands of new emails uncovered

          –  Federal investigators: “There is no doubt that a major crime was committed!”

          –   All cash traced from crooked Senator to White House orders to campaign financier

SEE MORE AT HTTP://WWW.XYZCASE.COM

 

MAROONED BY TESLA! FIRES, POSSIBLE HACKING DEATHS, MULTIPLE DEFECTS. OWNERS LAMENT

More Tesla fires and accidents. One Tesla driver burned “beyond recognition”. Hackers can now surf the internet for the nearest Tesla and remotely crash it.

 

 

 

“SEEKING LAWYER TO SUE SONY PICTURES; HAVE PRE-KOREAN EVIDENCE OF NAUGHTY DEEDS BY SONY”

“SEEKING LAWYER TO SUE SONY PICTURES; HAVE PRE-KOREAN EVIDENCE OF NAUGHTY DEEDS BY SONY”

By Tony Dime – AV Web News

The kids at Sony seem to have been very naughty children. They let their IT system go to pot, and got hacked, and outed, as “racist”, “misogynist”, “campaign rigging”, “high school tantrum throwing” kinds of people, per their own emails. Hollywood Reporter, The Verge, Wikileaks, and a variety of tabloids and pundits, have delighted in dissecting the fraternity house, inside antics, of Sony Pictures. Their boss got fired. They got ridiculed for turning Zero Dark Thirty into a, slightly fabricated, political vote-churn tool. Other execs got kicked to the curb. All of their financial, contracting, political cash layout, and tax dynamics were placed under investigation, and even more sketchy bits are shaking loose…

The latest issue has to do with Sony’s hope for its future. The movie box office numbers, from walk-in theaters, are not so swell. The world has discovered, and embraced, digital media. Netflix users are going up, up, up and print media is dead. Sony’s future depends on digital media.

Sony is rushing to play catch-up with Sony Vue Video-on-Demand and VR headsets to watch digital movies in. Other content owners are worried about Sony being in charge of their digital content if Sony can’t even keep its own digital house in order. Documents from the hacks, and whistle-blowing from past employees and investment banks, confirm that Sony has spent many billions on it’s digital video program and intends to make vast billions of dollars off of digital video-on-demand.

Sony was not always in a jam to try to get digital done right. In 1998 Sony approached a small technology group (Let’s call them “ABC Group”) in San Francisco, that had developed the first full-screen web video. The technology was the first to deliver full screen, high definition, full frame-rate, full color, small data demand, movies and music, over the internet, using any standard browser.

No other company had done this exact thing before, nor had anybody patented it, and demonstrated it, nor did anyone have this much of a leg up on it, like “ABC Group” had. “ABC Group”, accurately, predicted that movies on the web, and their technology approach, would be a “big thing”.

This was before YouTube, Napster, Bittorent, iTunes, Vudu, or the rest, had even been formed. One of this group’s biggest pitches was that their movies were un-hackable, because their technology allowed them to put thousands of digital padlocks throughout each movie, so that no hacker would even bother with the hassle of trying to open all of those locks. Today, Sony appreciates that factor more than ever.

Sony had kept it’s eye on this group, since this group first developed, built and patented, the first  wearable VR headset movie system.  Sony’s Director of Worldwide Pay-Per-View: Lawrence Hess; Sony’s Vice President of Marketing: Ira Rubenstein; Sony’s Manager of Corporate Development: Steven C. Tsai; Sony’s Vice President of Sales & Advertising for Pay Television & Airlines: Cheryl Koll; and Sony’s Director of Marketing: Andrew Schneider; contacted the heads of “ABC Group” and said that they wanted the technology and invited “ABC” to come to Sony Headquarters in Los Angles to make a full board presentation.

At one of the (recorded) meetings, there were so many Sony Executives, many of whom had flown in from Japan, that many were shaking hands, for first-ever meetings, and commenting: “Oh, you are the head of so-and-so department, I read about you in Variety all the time.”

In addition to the above, other Sony luminaries at the discussions included: Sony’s Vice President of Post Production Services: Patricia Furnare; Sony’s Director of Marketing for Sony Semiconductor: Thuy T. Nguyen; Sony’s Product Marketing Manager for Consumer a/v/d for Sony Semiconductor: Grace Wei; Area Sales Manager for Sony Semiconductor: Jerry K. Smith; Sony Vice President of Corporate Development: Patrick Kennedy; Sony Vice President of Business & Legal Affairs: Eric I. Baum and other top Sony leaders.

During one of the largest meetings, a fight broke out between Sony executives in which one group said, about “ABC’s” technology: “We must stop this, it could destroy our business plan”; while another group yelled out: “We must do this, it is the business plan of our future.”

“ABC” demonstrated their Playstation-like video cartridges and gamebox/video player web connected hardware box and software. Many, many non-disclosure agreements were signed by Sony pictures, but were later found to have been broken by Sony executives.

After dangling “investment” and “acquisition offers” and requiring extensive “investment review” of the technology, Sony later says: It is “too early to talk about this”…. It is a bit too “futuristic”…” Essentially a “Thanks, but no Thanks”.

“ABC” had many “how to” meetings with all of the key Sony engineers and executives. Extensive numbers of highly encouraging emails, letters and contracts were exchanged. All of those documents and communications have now been recovered and this reporter has viewed many of them.

Years later, “ABC” discovers a patent that Sony had rushed out to file, right after one of the largest meetings with “ABC”. The man who had first solicited “ABC” on behalf of Sony: Sony’s Vice President of Marketing: Ira Rubenstein; had listed himself as the “inventor”. The patent described a clone of the “ABC” technology. Many of the other Sony executives, from those meetings with “ABC”, had also put their names on the patent as “co-inventors”. “ABC” always found this sudden inventive spirit by Mr. Rubenstein to be amazing, since, at the same time, he was sending emails to the founders of “ABC” describing himself as a “computer idiot” and lamenting his inability to get technology to work.

This was the same Ira Rubenstein who stood on stage at the Variety Entertainment Magazine industry-wide event, and proclaimed to the heads of the entertainment industry, that: “The future of the web will be brought to you by Sony Pictures and “ABC Group”…” As he pointed to “ABC Group” staff standing in the room. He said this on-camera, on behalf of Sony Pictures.

Sony’s patent filing, and their later digital music and video roll-outs, turned out to be complete copies of the system ABC had engineered, built, launched, demonstrated and patented. IT turned out that Sony went right out and copied the technology as soon as they got done sifting through “ABC’s” intellectual property.

In an even more profound slap in the face: when forensic intellectual property experts scoured Sony’s federal patent files, they found an ironic smoking gun! In Sony’s own patent files, submitted to the U.S. Government, the hired patent writers, who had drafted the patent, had accidently left in the written notations about “ABC Group”! In all of Sony’s patent materials, then, the only outside source of inspiration mentioned was “ABC Group”. This proves where Sony got their engineering and intellectual property from, in Sony’s own materials.

Sony’s own materials come back to bite Sony, in the backside, again, after the Korean hack. What they had said that digital media exploitation was making, in public, was not what the true numbers were. It was making more than Sony had said, and Sony planned big profits, in the next years, off of that single technology shift. Everyone enjoyed seeing all of the South Pacific Island trips, private schools and multiple homes that Sony executives were always bragging about. That digital media exploitation sure pays well. “ABC” was curious about when their money from Sony might show up so they could, also, get a private beach house in Tahiti.

After seeing some of the newer confirming documents, “ABC” asked George Clooney’s agent, a party who Sony, at one time, respected, to assist with negotiating a settlement. Sony’s CEO, though, was facing extraction, and that potential settlement deal did not evolve.

To date, according to Sony documents, and Staff, Sony has made over $18 Billion+ dollars exploiting “ABC’s” technology. Sony has paid “ABC” and its lead staff exactly ZERO!

Big companies tried to stop, hit-job, blockade and blacklist ABC from getting “those damn movies on that internet”; but it is now the main way that people see media. It is no longer possible for Sony to say the technology couldn’t have worked. It is working in Sony’s own products.

Current Sony lawyers say that they were not around “back then” and that Sony has “No obligation”. The records, recordings and documents tell a different story. “ABC” wrote the head of Sony Corporate in Japan. They advised him that Sony executives were being dishonorable. He has yet to reply.

“ABC” is looking for a law firm to sue Sony. Suing Sony is a pricey proposition and Sony knows this. That is why Sony used to be quite cavalier about their actions. In the post hack days, with hard evidence on the table, maybe they will change their tune.

The value of a big corporation is it’s brand. If the brand of Sony is tied to remarks and actions about racism, women, ego’s and idea theft, then Sony has a long row to hoe. Sony might want to do the right thing here and finally return “ABC”’s phone call. Sony Vice President of Litigation: Kathleen M. Hallinan; said that “ABC” was too small to take Sony on and refuses to even have a single discussion about the matter.

Will this ever go away? “ABC” says: “Never!.. not until we get a fair discussion.”

Sony just launched their Sony Vue copy of ABC’s technology so the clock has a long time to run.

Sony, why won’t you do the right thing and try to work this out?

If you are an experienced law firm, and you want to sue Sony Pictures on behalf of “ABC”, and split the winnings, let me know and I will forward your info.

 

 

 

 

 

 

Don’t be dumb about what Reddit really is: “Reddit is a Psych Warfare Unit for a group of crazed billionaires.”

Don’t be dumb about what Reddit really is: “Reddit is a Psych Warfare Unit for a group of crazed billionaires.”

Reddit’s Venture Capitalists are campaign financiers who use Reddit to control voters perceptions. They run all of the Reddit users through Palantir Mood Analysis Software, Axciom personality scans, LucidWorks intention prediction tests, Recorded Future intention and mood manipulation processors and qualitative perspective algorithms. Then they adjust which comments are upvoted according to which war they want to start to make a profit.

These financiers are nutso billionaires who will bribe, kill and lie to keep their power, their billions and their narcissitic bubble wrapped tightly around their bank vaults.

Do not ever think that Reddit issues are just about some blogger attitudes. It is about who controls public opinion for political special interests, over at Reddit command-central. If you don’t know who In-Q-Tel and Kleiner Perkins are, and how they fit into the control machine at Reddit, you need to find out fast.

The Millenial kids, that get wrapped up in the trivial gamer arguments, on Reddit, are just free content labor for the Silicon Valley Cartel.

Was Aaron Schwartz set-up and killed because he wouldn’t “play the game”? Was Ellen Pao offed from management because she dared to stand up to Kleiner Perkins? Why was Reddit the only live AMA that Obama did globally? Why was Victoria really fired from Reddit? When someone finds out Reddit’s secret, why do people suddenly go away”?

 

 

 

How Pedophiles and Electric Car Scandals Are Connected?

   

How Pedophiles and Electric Car Scandals Are Connected?

 

When you first heard about both of them, the idea of the most famous politicians, in your country, helping to organize, execute and operate, unspeakable crimes, on a national basis was inconceivable. It sounded “too far out”, “beyond logic” and “too wild”.

Each time those smiley-faced, affable, perfect hair-do-wearing, glad-handing politicians and technology billionaires picked up a baby and held it up before the press camera’s you didn’t shudder with revulsion, or question their ulterior motives…until now!

Later you heard rumors. Then you saw whispers on the alternative news. Then you saw articles in more main-stream news. Then there were documentaries on 60 minutes. In both cases, they began with a whimper and rose to a global out-cry.

In the case of the Famous Politician World Pedophile Ring, the details are hard to stomach:

60 MINUTES HAS AIRED THE FOLLOWING HORRIFIC DOCUMENTARY:

https://youtu.be/KRObgttIyeg

A Documentary aired which exposed England’s VIP Paedophile ring. Its members included highly ranking individuals, some of which remain in power today. (youtu.be)

submitted 8 hours ago by OhBlindOne

·         172 comments

sort by: 

new

want to join the discussion? login or register in seconds.

top comments

[–] Imdrasil 50 points (+50|-0) 8 hours ago 

Top of Form

I’m 7 minutes in, this is just horrifying.

Bottom of Form

·         permalink

[–] smoss 30 points (+30|-0) 7 hours ago 

Top of Form

I’m half-way in….What the fuck. Nothing infuriates me more than taking advantage of others, specially young boys and girls.

How is it possible that these people can live knowing they’ve destroyed these kids, now adults, lives?

Bottom of Form

·         permalink

 

·         parent

[–] OmniscientGiraffe 52 points (+54|-2) 7 hours ago 

Top of Form

Many politicians are sociopaths.

They don’t have a conscience like you or I do.

Bottom of Form

·         permalink

 

·         parent


5 replies

[–] Totalbabe 16 points (+16|-0) 6 hours ago 

Top of Form

Now, the infuriating thing will be, who sees punishment? I will guess noone. Yet there are people rotting in cells. Welcome to the world they’ve built. If you are rich, you get a pass. If you’re poor. God help you.

Bottom of Form

·         permalink

 

·         parent


2 replies

Load more replies (3 remaining)

[–] BaIoo 3 points (+3|-0) 7 hours ago 

Top of Form

it’s deeply, deeply saddening.

Bottom of Form

·         permalink

 

·         parent

Load more replies (1 remaining)

[–] Ladderjack 42 points (+42|-0) 8 hours ago 

Top of Form

I’m hearing lots of terrible things about the people involved but. . .I’m not hearing much being done about it. Am I just not looking in the right places for news?

Bottom of Form

·         permalink

[–] KinkRaven 39 points (+40|-1) 7 hours ago 

Top of Form

Pretty much nothing is being done and nothing will.

Money talks and all that…

Bottom of Form

·         permalink

 

·         parent

[–] blanketswithsmallpox 17 points (+17|-0) 7 hours ago 

Top of Form

It’d take some pretty huge balls and a good political backing for prosecutors to go after these men. They’d also have to drum up a lot of solid evidence before indictment. I’m sure there are people working on it behind the scenes we don’t know about but it’s hell waiting.

Bottom of Form

·         permalink

 

·         parent


3 replies

[–] Guerilla 21 points (+21|-0) 7 hours ago 

Top of Form

What a ridiculous question. Didn’t you already hear about the porn filter that BY PURE COINCIDENCE also bans political sites? Well, in case you didn’t know the filter is to protect the kids because child porn and porn is just one word difference. Also, they’re spying on you for your protection to find a capture pedophiles and terrorists.

Jesus dude, what more do you want? Actually arrest the pedophiles in their government? That sounds preposterous.

Bottom of Form

·         permalink

 

·         parent

Load more replies (9 remaining)

[–] tazmanian 40 points (+40|-0) 7 hours ago  (edited 7 hours ago)

Top of Form

I learnt two things from this video.

1.    There are sadistic creepy assholes everywhere in the world

2.    In Australia, 60 minutes only has 30 minutes.

Bottom of Form

·         permalink

[–] magzy 11 points (+11|-0) 5 hours ago 

Top of Form

Australia here. They did a couple of other segments in that show to make up the 60 mins.

Bottom of Form

·         permalink

 

·         parent

[–] cccmikey 1 points (+1|-0)  

Top of Form

Including 12+ minutes of ads..

Bottom of Form

·         permalink

 

·         parent

[–] sneakybells 36 points (+37|-1) 7 hours ago  (edited 7 hours ago)

Top of Form

Here’s an old post from /r/conspiracy that’s incredibly relevant.

Bottom of Form

·         permalink

[–] lbruiser 16 points (+16|-0) 7 hours ago 

Top of Form

archive.is If you are into that kinda thing.

Bottom of Form

·         permalink

 

·         parent

[–] sneakybells 8 points (+8|-0) 7 hours ago 

Top of Form

just edited the post

Bottom of Form

·         permalink

 

·         parent


2 replies

[–] Appex 3 points (+3|-0) 5 hours ago 

Top of Form

Thats so fucked up..

Bottom of Form

·         permalink

 

·         parent

Load more replies (1 remaining)

[–] WhoFramedReaderRabit 6 points (+6|-0) 5 hours ago 

Top of Form

very interesting read, does anybody know why there are “satanic rituals” in many of these cases. It reminds me of True Detective.

Bottom of Form

·         permalink

 

·         parent

[–] sneakybells 10 points (+10|-0) 5 hours ago 

Top of Form