quote:
quote:Speech before the US House of Representatives, 02/12/09
What if it is finally realized that war and military spending is always destructive to the economy?
What if all wartime spending is paid for through the deceitful and evil process of inflating and borrowing?
What if conservatives understood once again that their only logical position is to reject military intervention and managing an empire throughout the world?
What if the American people woke up and understood that the official reasons for going to war are almost always based on lies and promoted by war propaganda in order to serve special interests?
What happens if my concerns are justified and ignored - nothing good!
quote:https://www.accessnow.org/page/s/just-say-no-to-acta
Just Say ‘No’ to ACTA
The Anti-Counterfeiting Trade Agreement, which has already been signed by eight countries, poses a dangerous threat to the inherent freedom and openess of the Internet. Under ACTA, ISPs and websites will be given more power to track what we do online, while forcing them to turn over our information and reporting our activity to the authorities -- all in the name of copyright protection! This controversial intellectual property accord, which was negotiated in secret, violates our fundamental rights to free speech and access to our culture.
The European Parliament, which will soon hold a final consent vote on ACTA, may be our only hope to stop this dangerous agreement. A "No" vote on ACTA by the Parliament will dismantle ACTA in its current form and make countries back to the negotiating table. Call on the EU Parliament to take a stand and vote “NO” on ACTA!
quote:Ritholtz: OWS - The Risks Facing America Today
I will be attending one of the local protests. With a bullhorn. With others. With people in the political sphere. I am going both to talk to those who want to listen (if there are such people) and to listen and observe myself, and will take pictures while there.
Yes, at the end of that day I will go home. But some others may not. In fact, many others may not.
Here's the thing: Even today, CNBC is still talking about "recapitalizing the banks." What's "recapitalize" mean? It means steal from you. See, the reason you need to "recapitalize" these firms is that they*****ed away their own capital by doing dangerous, risky, even fraudulent things.
The corporate media and politicians are still claiming that "we made a profit from TARP" and that "everything was repaid."
This is a bald lie. AIG didn't repay their money. Neither did GM. Money was shuffled around in a complex shell game to appear that all was repaid but in fact what happened was that you, the taxpayer, were looted.
You were looted through higher prices at the gas pump, higher prices at the grocery store, lower wages and at the same time zero interest rates so those of you who were prudent got ****ed THREE TIMES instead of twice!
Representative government? Where? By anywhere from 100:1 to 300:1 the people demanded that TARP NOT pass. That the banks that did foolish and in some cases criminal things be forced to eat the consequences.
Again, as I've said for four years: We need a banking system because we do indeed need a way to clear payments so you can pay a bill or buy gasoline and food - so commerce can flow. We do not need these banks that committed these acts.
But rather than do the right thing, our politicians were bought and paid for on both sides of the aisle. It's particularly telling - and galling - that when allegedly being "grilled" by Hank Paulson in 2008 the banksters left the meeting smiling and yucking it up.
First they ****ed you, then the government paid them to **** you again.
Lees ook de commentsquote:Bloomberg: Wall Street Sees ‘No Exit’ From Financial Decline as Bankers Fret Future
Wall Street executives, facing demonstrators camped for a fourth week in New York’s financial district, say they’re anxious and angry for other reasons.
An era of decline and disappointment for bankers may not end for years, according to interviews with more than two dozen executives and investors. Blaming government interference and persecution, they say there isn’t enough global stability, leverage or risk appetite to triumph in the current slump.
“I don’t think it’s a time to make money -- this is a time to rig for survival,” said Charles Stevenson, 64, president of hedge fund Navigator Group Inc. and head of the co-op board at 740 Park Ave. The building, home to Blackstone Group LP Chairman Stephen Schwarzman and CIT Group Inc. Chief Executive Officer John Thain, was among those picketed by protesters yesterday. “The future is not going to be like a past we knew,” he said. “There’s no exit from this morass.”
quote:Yeah, the theft business ain't what it used to be. Poor wittle masters of the universe!
quote:“This is very demoralizing to people,” Karp said.
“Especially young guys who have gone to college and wanted to
come onto the Street, having dreams of becoming millionaires.”
Wow, don't we feel bad for them. The rest of us simply had hopes of holding onto our jobs, our houses, our retirement funds. Better that the rest of us got scr#wed over so these boys can fulfill their dreams of becoming millionaires, huh?
quote:Golly those business and finance guys talk tough when they are grabbing other peoples' money but when the backlash for that comes they are running to New Zealand?
quote:We do not have an economic problem, we have a leadership problem of epidemic proportions on a global basis. Combined with greed, it's all about me attitude and the highest corporate tax rate in the world, we have created the perfect economic storm.
quote:Oh poor dears! "Everybody" hates them. I wonder why. Obama doesn't love and adore them. In fact, they are lucky to still be alive. If this were France in 1789-92 they would all have lost their heads by now just like Louis and Marie Antoinette.
quote:So the banks essentially want to play heads I win, tails you lose. When the investment banks went public they were able to transfer risk to shareholders while reaping huge gains for themselves. If the purpose of. Wall Street is creation of capital that is to be used to create businesses to employ people, why is it that has merely become a mechanism to substitute debt for equity. Wall Street has turned into a whorehouse where people screw everyone just for money. No wonder capitalism will sow its own seeds of destruction. 99% will always beat 1%.
quote:500,000? If I made 500,000 in a year I'd be ecstatic. If, the following year, I made somewhat less than 500,000, I'd still be ecstatic. Many of us in this country feel the same way. Imagine our demoralization at reading this article. We are trying to feed families, trying to pay bills, trying to find work, while someone complains about making less than 500,000. The trader's complaint is infuriating. The disconnect between the trader and the rest of us is ultimately unsustainable.
Wat een stelletje ongewassen hippies zitten daar te commenten zegquote:Yep..Things are bad...We won't be able to rape and Pillage the peasants like we used to in the good old days..And we've shut down just about every factory we could and moved the jobs offshore...How about Wall Street actually tries to grow the economy and create jobs instaed of looking for the easy buck using mind bogglingly complicated financial devices devised by MIT Math geniuses so that no one can figure out what they are doing...these people are morally bankrupt.
.... Aaron Barr?quote:Housewives, students and security pros among Anonymous members
Members of the infamous hacking collective Anonymous range from housewives to information security professionals, according to a panel of security experts who claim to have infiltrated the group.
Speaking to the press at RSA Conference Europe, Akamai director of security intelligence Joshua Corman argued that the group has a diverse range of constituents, with varying levels of technological know-how.
Some are "very political", some are housewives, some have no hacking skills – while others are so-called "greyhats" with day jobs in information security, and a lot are students, he said.
He added that the large numbers of students in Anonymous represents a failure on the part of the IT security industry to engage with kids who have an interest in hacking and want to develop their skills in the area.
The panel also included Aaron Barr, who was famously chief executive of security firm HB Gary when Anonymous targeted him in retaliation for his investigatory work into the group.
He explained that LulzSec initially broke off from Anonymous, headed by members frustrated that decision making within the group took too long, adding that it operates almost like a "special operations group".
Also present was Will Gragido, senior product line manager at HP's DVLabs, who advised firms keen to mitigate the risk of attack by hacktivist groups to consider a defence-in-depth approach, including DDoS mitigation and web app security.
"Preparedness is key," he said. "It would be foolish to prepare for only one type of attack where there are several to be concerned about."
Ik kan me herinneren dat poll's erg populair zijn bij Anons.quote:Op vrijdag 14 oktober 2011 15:02 schreef Perrin het volgende:
Screenshots van een Fox News(!!) poll:
[ afbeelding ]
[ afbeelding ]
(via Commondreams)
twitter:st4rbuck_ twitterde op vrijdag 14-10-2011 om 22:21:41#OpSyria: Tango down: http://t.co/4NAUYTsL More info on IRC: http://t.co/MWqN7kRA #Anonymous #Syria #OpFreedom reageer retweet
http://www.shell.com/ doet het weer/nog.quote:The Syrian government is waging war against its citizens. Shell is a major investor in Syria. It is a key associate of the state oil company which controls the internal market.
Shell believes that companies should play an active role in supporting human rights and that it needs a licence to operate from society. But it has no such license now in Syria and it is doing business with an elite that commits gross and systematic human rights violations, including torture, arbitrary killing, and collective punishment
"It is noted that Shell, Total, BP, and OMV have purchased Syrian crude since the uprising, thus directly contributing to the budget the Assads what he has used for buying weapons to kill innocent civilians. Royal Dutch Shell bought 586400 barrels on 29 May 11, Austrias OMV bought 586400 barrels on 28 Jun 11, BP bought 586400 barrels on 10 Apr 11, and another 586400 barrels on 20 Apr 11."
"The EU sanctions prohibit European customers from buying Syrian oil but dont prohibit European companies with operations inside Syria from continuing their ventures there. Firms with existing contracts to buy Syrian oil have until Nov. 15 to do so."
All the while, Dick Benschop, head of Shells Dutch arm claims, "Halting the Shells operation in Syria would hurt the Syrian people more than its government"
This shows Shell does not care about human rights abuses in Syria.
Shell must recognize that the Syrian people are being killed by bullets that Shell has paid for. Shell officials have failed to understand that when people are massacred, the last thing they care about is the availability of petrol and petrol prices.
Shell must stop production immediately and show that human rights abuses and killing civilians are not acceptable.
Shell must recognize that once the Syrian people gain their freedom, they may not welcome Shell again if it appears sympathetic to the Assad regime.
Our objective is to urge Shell to reconsider its stand and stand with the people of Syria by halting its operations in Syria. It does not need to wait for orders from the EU to do so. If it does wait, it proves the point that it is willingly supporting murderous dictators for cheap oil.
Poster http://postimage.org/image/1hs8lw2is/
Twitter:
https://twitter.com/#!/Op_Syria
https://twitter.com/#!/RevoluSec
https://twitter.com/#!/Syrian_MAJOR
We Are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
quote:Occupy Wall Street live: protests spread around the world
5.08pm: In between gossiping about the celebrity and media life of New York, the scurrilous website Gawker does some notworthy journalism. It has just posted a great story under the headline"Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPD", detailing the role of "security consultant" Thomas Ryan, who it says has infiltrated the Occupy Wall Street organisers.
Since the Occupy Wall Street protest began on September 17, New York security consultant Thomas Ryan has been waging a campaign to infiltrate and discredit the movement. Ryan says he's done contract work for the U.S. Army and he brags on his blog that he leads "a team called Black Cell, a team of the most-highly trained and capable physical, threat and cyber security professionals in the world." But over the past few weeks, he and his computer security buddies have been spending time covertly attending Occupy Wall Street meetings, monitoring organizers' social media accounts, and hanging out with protesters in Lower Manhattan.
As part of their intelligence-gathering operation, the group gained access to a listserv used by Occupy Wall Street organizers called September17discuss. On September17discuss, organizers hash out tactics and plan events, conduct post-mortems of media appearances, and trade the latest protest gossip. On Friday, Ryan leaked thousands of September17discuss emails to conservative blogger Andrew Breitbart, who is now using them to try to smear Occupy Wall Street as an anarchist conspiracy to disrupt global markets.
What may much more alarming to Occupy Wall Street organizers is that while Ryan was monitoring September17discuss, he was forwarding interesting email threads to contacts at the NYPD and FBI, including special agent Jordan T. Loyd, a member of the FBI's New York-based cyber security team.
You can read more here. Interestingly, Gawker says it was Ryan who revealed himself as a snitch. Ryan leaked an archive of emails on Friday in the hope of undermining the Occupy Wall Street movement, but, it appears he accidentally included some of his own forwarded emails in the dump.
Knorrepot.. op verreweg de meeste plaatsen verliep 't vreedzaam.quote:Op zondag 16 oktober 2011 10:13 schreef Pietverdriet het volgende:
In Rome konden we goed zien wat een feestje dit is...
Mijn impressie in Brussel was dat het vooral de gebruikelijke anti-globalistische en anderszins naar links hangende kringen zijn die zich onder deze banier hebben geschaard, te zien aan de meegevoerde spandoeken en vlaggen. En dan zijn er zesduizend mensen: dat is welgeteld een half procent van de populatie van Brussel, voor een demonstratie die een pan-Europees karakter zou moeten hebben. Ik heb zo mijn vragen bij zowel de nieuwheid als de werkelijke massa van deze 'Occupy'-acties.quote:Op zondag 16 oktober 2011 10:13 schreef Pietverdriet het volgende:
In Rome konden we goed zien wat een feestje dit is...
Het protest moet zich nog vormen, maar er zit volgens mij voldoende reele grond in. Het gaat MI om een afrekening met de tijdgeest van de afgelopen 25 jaar. Uiteraard zijn protest bewegingen niet helemaal rationeel en populistisch. Je kun het niet beoordelen door naar enkele boze of domme mensen te luisteren onder degene die zich verzameld hebben.quote:Op zondag 16 oktober 2011 11:33 schreef Reya het volgende:
[..]
Mijn impressie in Brussel was dat het vooral de gebruikelijke anti-globalistische en anderszins naar links hangende kringen zijn die zich onder deze banier hebben geschaard, te zien aan de meegevoerde spandoeken en vlaggen. En dan zijn er zesduizend mensen: dat is welgeteld een half procent van de populatie van Brussel, voor een demonstratie die een pan-Europees karakter zou moeten hebben. Ik heb zo mijn vragen bij zowel de nieuwheid als de werkelijke massa van deze 'Occupy'-acties.
Bizar...quote:Op zondag 16 oktober 2011 14:10 schreef rene29 het volgende:
Weet niet of onderstaand filmpje al voorbij is gekomen.
Mensen gearesteerd omdat ze hun eigen geld wilden opnemen...
quote:Is it a Crime? The Transgressive Politics of Hacking in Anonymous
Michael Ralph and Gabriella Coleman are professors at New York
University and are collaborating on an article on the role of dissent
and direct action within Anonymous and in the 2011 "Arab Spring"
uprisings across Africa and southwest Asia. They seek to bring
anthropological knowledge and perspectives to bear on public
discussion and debates.
Anti-nonymous?quote:http://www.knoxvilletechnology.com/
Business Protection Group is an anonymous group of network security professions that provide Internet Security to Private Firms. Our staff provides companies with the information on hackers which they need to present a case to the courts. We wish to keep our members anonymous to protect their families from retaliation for what we do. We are not affiliated with any Government or Local Police Department. Our members decided that Governments have too much red tape that is allowing most if not all of the serious hacking offenders get away with millions of dollars in sensitive Trade Secrets. we were founded in 2011 shortly after the huge increase of bold attacks from Anonymous, Lulzsec, and Antisec on government and Private Company computers. Business Protection Group brings accountability to a lawless Internet.
Maar ze werken niet samen met een overheid?quote:If there is a network of computers connected to the Internet, it is at risk of attack and loss of secret information. Most hackers do it for fun, while others do it for profit. we do not draw a line between which is more serious of a offense. Our stance is that any breach of security of a private firm is against the law and should carry the same punishment. The Maximum Penalty.
Once caught, these individuals should never be allowed to access another computer in their lifetime.
Ah, DDOS = terrorism.quote:Distributed Denial Of Service attacks are the most common form of Internet related crime against businesses. While it does not create a risk of stolen data, it does prevent access to your companies assets. If your company requires the Internet for revenue or communications, this attack can cost you millions. There is however very little that can be done to stop an attack in progress, and this is why we believe shutting down the criminal hacker groups is the best method to combat it.
Ik neem aan dat ze door PayPal geboycot gaan worden?quote:Our operation runs entirely on donations and our target queue is prioritized by the donation size. The donations help cover normal business expenses, including air travel to various countries as we track down these criminals. We ask that any company that submits a investigative request to please donate the amount you feel it is worth for the legal and or personal destruction of your hackers life.
Wat triestquote:Tijdens de Occupy-betoging in Rome heeft een groep gemaskerde militanten vernielingen aangericht in de kerk van de heiligen Marcellinus en Petrus. Dat is door een woordvoerder van het bisdom Rome bekend gemaakt.
quote:Vikram S Pandit D0x (CitiGroup)
During Occupy Wall street, protesters had made way to CitiBank to withdraw their funds and close their accounts. They were met with strong police prescence and arrested. We as american citizens MUST have full control over our money and lively hood. When this is taken away from us, what else do we have? So the CEO of CitiBank has blindly jumped into the sights of the CabinCr3w…
————————————————Target
Vikram S Pandit
————————————————Personal
D.O.B: 14 January 1957 (age 54)
Cell Phone: 646-512-4269 (Possibly Cancelled)
Office: (212) 793-1201
E-mail: vikram.pandit@citi.com
CEO of Citigroup
————————————————Family
Wife: Swati
Children: 2
————————————————Education
Alma mater: Columbia University
New York City
————————————————Known Addresses
-GREENWICH ADDRESS:
144 Pecksland Rd
Greenwich, CT
(203) 661-1214
Single Family Residence, 5 Bed, 7.50 Bath, 5105 Sq. Ft
SOLD FOR $3,400,000 IN 1999
Cost Per Sqft of home: $666/sqft (lulz)
-NY ADDRESS:
310 E 53rd St, Apt 29A
New York, NY 10022-5246
(ADDRESSES “VERIFIED” BY http://www.contact-the-ceo.com/page1.html)
————————————————Legal
Pellegrini v. Citigroup Inc. et al
Share|
Plaintiff:Beverly Pellegrini
Defendants:Citigroup Inc., Win Bischoff, Vikram S. Pandit, Gary L. Crittenden, Charles O. Prince, III, John C. Gerspach, Sallie L. Krawcheck, C. Michael Armstrong, Alain J.P. Belda, George David, Richard D. Parsons, Kenneth T. Derr, John M. Deutch, Andrew N. Liveris, Roberto Hernandez Ramirez, Ann Dibble Jordan, Klaus Kleinfeld, Anne M. Mulcahy, Judith Rodin, Sanford I. Weill, Robert E. Rubin, Franklin A. Thomas, Saul Rosen, Citigroup Global Markets Inc., Merrill Lynch, Pierce, Fenner & Smith Incorporated, Morgan Stanley & Co. Incorporated, UBS Securities LLC, Wachovia Capital Markets, LLC, Banc of America Securities LLC, RBC Capital Markets Corp., Deutsche Bank & Securities Inc., Goldman, Sachs & Co., Barclays Capital Inc., Credit Suisse Securities (USA) LLC, Wells Fargo Securities, LLC and KPMG, LLP
Case Number:1:2009cv03669
Filed:April 9, 2009
Court:New York Southern District Court
Office:Foley Square
Office County:XX Out of State
Presiding Judge:Judge Sidney H. Stein
Nature of Suit:Other Statutes - Securities/Commodities/ExchangesCause:15:77 Securities Fraud
Jurisdiction:Federal QuestionJury Demanded By:Plaintiff
——-
Asher et al v. CitiGroup, Inc. et al
Plaintiffs: Lionel Asher and Mary J. Asher
Defendants: CitiGroup, Inc., Charles O. Prince, III, Sallie L. Krawcheck, John C. Gerspach, Sanford I. Weill, Michael Armstrong, Alain J.P. Belda, George David, Kenneth T. Derr, John M. Deutch, Roberto Hernandez Ramirez, Ann Dibble Jordan, Klaus Kleinfield, Andrew N. Liveris, Dudley C. Mecum, Anne M. Mulchahy, Richard D. Parsons, Judith Rodin, Robert E. Rubin, Franklin A. Thomas, Rosen Saul, Win Bischoff, Vikram S. Pandit, Gary L. Crittenden, Citigroup Global Markets Inc., Merrill Lynch, Pierce, Fenner & Smith Incorporated, Morgan Stanley & Co. Incorporated, UBS Securities LLC, Wachovia Capital Markets, LLC, Banc of America Securities, LLC, RBC Capital Markets Corporation and KPMG LLP
Case Number:1:2009cv04485
Filed:May 11, 2009
Court:New York Southern District Court
Office:Foley Square Office
County:NewYorkPresiding
Judge:Judge Sidney H. SteinPresiding
Judge:Judge Unassigned
Nature of Suit:Other Statutes - Securities/Commodities/Exchanges
Cause:15:77 Securities Fraud
Jurisdiction:Federal Question
Jury Demanded By:Plaintiff
——-
Riddle v. Citigroup et al
Plaintiff:Beverly A. Riddle
Defendants: Citigroup, Citibank NA, Citi, Joseph Bonelli, Beth McCahey, Alison Levy, Marcie Mintz, Jeff Holbrook, Sarah Lashen, Sherrie Bachtler, Karen Segal, Helen O’Hehir, Lisa Coen, Steve Randich, Ed Zobitz, Chuck Prince, Pat Finn, Vikram Pandit, Members of the Citigroup Board of Directors, Jane Doe(s) and John Doe(s)
Case Number:1:2009cv05805Filed:June 24, 2009
Court:New York Southern District Court
Office:Foley Square Office
County:NewYork
Presiding Judge:Judge Alvin K. Hellerstein
Nature of Suit:Civil Rights - Employment
Cause:42:2000e Job Discrimination (Employment)Jurisdiction:Federal Question
Jury Demanded By:Plaintiff
——-
DeBerry et al v. GMAC Mortgage LLC et al
Plaintiffs:Willie Joe DeBerry, Joyce DeBerry and Shayla DeBerry Allen
Defendants:GMAC Mortgage LLC, Alvaro De Molina, Homecomings Financial LLC, Bruce Paradis, Citimortgage Inc and Vikram Pandit
Case Number:7:2009cv00107
Filed:August 28, 2009
Court:Georgia Middle District Court
Office:Valdosta Office
County:Cook
Presiding Judge:Judge Hugh Lawson
Nature of Suit:Torts - Property - Truth in Lending
Cause:15:1601 Truth in Lending
Jurisdiction:Federal QuestionJury Demanded By:None
——-
Plus Many More:
Two pages of legal action:
http://dockets.justia.com/search?query=vikram+pandit
————————————————Financial
Detailed Financial information:
http://bit.ly/rqChzu
Article:
http://people.forbes.com/profile/vikram-s-pandit/19716
Triest dat ze die man persoonlijk willen/gaan pakken. Ik snap dat die hele commotie in Amerika (en inmiddels in andere landen) frustratie opwerkt, maar dit vind ik te ver gaan.quote:
Ik vind heel veel dingen te ver gaan. Het regime bepaald het geweldsniveau.quote:Op maandag 17 oktober 2011 19:32 schreef ATOMIC_FUUU het volgende:
[..]
Triest dat ze die man persoonlijk willen/gaan pakken. Ik snap dat die hele commotie in Amerika (en inmiddels in andere landen) frustratie opwerkt, maar dit vind ik te ver gaan.
quote:From a single hashtag, a protest circled the world
(Reuters) - It all started innocuously enough with a July 13 blog post urging people to #OccupyWallStreet, as though such a thing (Twitter hashtag and all) were possible.
It turns out, with enough momentum and a keen sense of how to use social media, it actually is.
The Occupy movement, decentralized and leaderless, has mobilized thousands of people around the world almost exclusively via the Internet. To a large degree through Twitter, and also with platforms like Facebook and Meetup, crowds have connected and gathered.
As with any movement, a spark is needed to start word spreading. SocialFlow, a social media marketing company, did an analysis for Reuters of the history of the Occupy hashtag on Twitter and the ways it spread and took root.
The first apparent mention was that July 13 blog post by activist group Adbusters (r.reuters.com/suc54s) but the idea was slow to get traction.
The next Twitter mention was on July 20 (r.reuters.com/tuc54s) from a Costa Rican film producer named Francisco Guerrero, linking to a blog post on a site called Wake Up from Your Slumber that reiterated the Adbusters call to action (r.reuters.com/vuc54s).
The site, founded in 2006 "to expose America's fraudulent monetary system and the evil of charging interest on money loaned," is a reference to the biblical verse Romans 13:11 that reads in part: "The hour has come for you to wake up from your slumber, because our salvation is nearer now than when we first believed."
Guerrero's post was retweeted once and then there was silence until two July 23 tweets -- one from the Spanish user Gurzbo (r.reuters.com/wuc54s) and one from a retired high school chemistry teacher in Long Island, New York named Cindy tweeting as gemswinc. (r.reuters.com/xuc54s)
Gurzbo's post was not passed along by anyone but Cindy's was, by eight people, including a Delaware-based opponent of the Federal Reserve, a vegan information rights supporter, a Washington-based environmentalist and an Alabama-based progressive blogger.
Again, there was relative silence for nearly two weeks, until LazyBookworm tweeted the Occupy hashtag again on August 5. (r.reuters.com/zuc54s) That got seven retweets, largely from a crowd of organic food supporters and poets.
HASHTAG REVOLT
The notion of Occupy Wall Street was out there but it was not gaining much attention -- until, of course, it did, suddenly and with force.
Social media experts trace the expansion to hyper-local tweeters, people who cover the pulse of communities at a level of detail not even local papers can match.
In New York, credit goes to the Twitter account of Newyorkist, whose more than 11,000 tweets chronicle the city in block-by-block detail. His was one of the first well-followed accounts to mention the protests in mid-September.
Trendistic, which tracks hashtag trends on Twitter, shows that OccupyWallStreet first showed up in any volume around 11 p.m. on September 16, the evening before the occupation of lower Manhattan's Zuccotti Park began. Within 24 hours, the tag represented nearly 1 of every 500 uses of a hashtag.
The first two weeks of the movement were slow, media coverage was slim and little happened beyond the taking of the concrete park itself. But then a demonstration on the Brooklyn Bridge prompted hundreds of arrests and the spark was ignited.
On October 1, #OccupyBoston started to show up on Twitter. Within a couple of weeks, #OccupyDenver and #OccupySD and others appeared.
The Occupy Wall Street page on Facebook started on September 19 with a YouTube video of the early protests. By September 22, it reached critical mass.
"Newcomers today, welcome! Feel free to post. Advertise your own pages of resistance. Network until it works," read one posting meant to inspire protests elsewhere.
For young activists around the world, who grew up with the Internet and the smartphone, Facebook and Twitter have become crucial in expanding the movement.
They are pioneering platforms like Vibe that lets people anonymously share text, photos and video over short distances for brief periods of time -- perfect for use at rallies.
"No one owns a (Twitter) hashtag, it has no leadership, it has no organization, it has no creed but it's quite appropriate to the architecture of the net. This is a distributed revolt," said Jeff Jarvis, a journalism professor at City University of New York and author of the well-known blog BuzzMachine.
Some reports say the protesters have raised as much as $300,000 in donations to cover everything from pizza to video equipment but others put the figure much lower.
The Alliance for Global Justice, which calls itself "the fiscal sponsor for Occupy Wall Street," has raised $23,200 via WePay.com.
OCCUPY EVERYWHERE
As of Monday afternoon, Facebook listed no fewer than 125 Occupy-related pages, from New York to Tulsa and all points in between. Roughly 1 in every 500 hashtags used on Twitter on Monday, all around the world, was the movement's own #OWS.
The websites keep proliferating -- We Are the 99 Percent, Parents for Occupy Wall Street and Occupy Together, even the parody Occupy Sesame Street (concerned mostly with the plight of monsters living in garbage cans).
Online streaming video has also been a huge resource for the protesters, using cheap cameras and high-speed wireless Internet access.
Supporters, opponents and the merely curious got the chance last Saturday to watch the Occupy Wall Street protesters decide whether to occupy a major public park, Washington Square Park, in the Greenwich Village area.
They saw warnings the police were about to arrive in riot gear and with horses, vans and buses to take away protesters if there were mass arrests. Local media reported about 10 arrests among the 3,000 or so people in the park.
As the seconds to a possible confrontation ticked down, the tension led to various reactions from those watching online.
"Anyone arrested is a political prisoner," said one.
"Here comes Czar Bloomberg's Cossacks," said another, in reference to New York Mayor Mike Bloomberg and the appearance of the mounted police.
There were "we are watching" messages of support from cities across the United States and some who found it the best entertainment going on a Saturday night.
"So much more exciting than a TV show" was one comment.
(Reporting by Ben Berkowitz; Additional reporting by Martin Howell and Anthony DeRosa in New York; Editing by John O'Callaghan)
Typisch een voorbeeld van de Amerikaanse fascistische politiestaat. Alles word in het werk gesteld om de banksters de hand boven het hoofd te houden, hoe kunnen die agenten zichzelf nog in de spiegel aankijkenquote:
Something is up?twitter:AnonymousIRC twitterde op maandag 10-10-2011 om 00:02:12#Anonymous to @Telecomix. This is a emergency distress signal. Please activate all operatives and agents handling #Egypt. #OpEgypt reageer retweet
quote:Anonymous veröffentlicht DB-Dump von Pädophilen-Handelsseite
Das Internet-Kollektiv Anonymous veröffentlichte am heutigen Montag die gesamte Benutzer-Datenbank der Website "Lolita City", einer, wie die Hacktivisten schreiben, "Darknet-Handels-Seite für Pädos". Insgesamt wurden die Daten von knapp 1600 Personen - sowie Informationen über den Server-Standort des Forums - veröffentlicht. Die Aktion ist Teil der bekannten "Operation Antisec".
Der Datenbank-Dump enthält insgesamt 1589 Benutzernamen. Klarnamen oder Passwörter sind nicht enthalten. Anonymous zufolge wurden die Passwörter mit SHA512 gehasht und aus Sicherheitsgründen in einer separaten Datenbank hinterlegt. Neben den Foren-Benutzernamen und Informationen über die Aktivität der Benutzer finden sich aber deren Nicknames für die anonymen Kommunikationsnetze TorChat und TorPM.
Neben den Benutzer-Informationen veröffentlichen die Anons auch Informationen über den Server-Standort des Forums. Mit Hilfe verschiedener technischer Maßnahmen, bei denen Anonymous offenbar eine Reihe von Cluster-Servern einsetzte, kamen die Anons zu dem Schluss, dass "Lolita City" in den USA gehostet wird.
Einen interessanten Fund machten die Anons in der Datenbank: dort ist jemand mit dem Nickname "Th3J35t3r" ("The Jester") als Benutzer von Lolita City verzeichnet. Ob es sich allerdings tatsächlich um den berüchtigten Hacktivisten handelt, der durch Aktionen gegen WikiLeaks und Anonymous auffiel, ist nicht zu sagen. Womöglich verwendete schlichtweg jemand den selben Nickname - unter Umständen sogar mit dem Ziel, dem sonst unter diesem Nick auftretenden Hacktivisten zu schaden. Es dürfte jedenfalls interessant sein, auf eine Stellungnahme von "The Jester" zu diesem Thema zu warten.
Die Aktion wird von den teilnehmenden Anons als Teil der bekannten "Operation Antisec" sowie der speziell gegen Pädophile vorgehenden "Operation Darknet" bezeichnet. Die Hacktivisten kündigen an, bald noch gegen weitere Websites, auf denen Darstellungen von Kindesmissbrauch gehandelt werden, vorzugehen.
Yep, maar nog niet in dit topic.quote:
Het artikel gaat verder.quote:The Real Role Of Anonymous In Occupy Wall Street
Anonymous has caught the attention of the media--and even Homeland Security--with its biggest contribution to Occupy Wall Street: hype. But, so far, the amorphous, leaderless hacktivist movement has disappointed anyone expecting full-on revolution from a Guy Fawkes-masked army or a massive cyber attack.
Anonymous does, however, have prominent members and often unites a large number of sympathizers. The gap between expectations and reality when it comes to Occupy Wall Street results from the disconnect between those dominant members and fringe elements who hit up the costume shop and start posting YouTube videos.
The story of how Anonymous and Occupy Wall Street intertwine dates back to February 2010, to the birth of "The 99 Percent Movement."
The notion of “the 99 percent” most likely started with journalist David DeGraw in his 2010 book, The Economic Elite vs. The People of the United States. “The harsh truth is that 99% of the US population no longer has political representation,” DeGraw writes. As a follow-up, he formed the 99 Percent Movement, a social network soliciting ideas for a platform of economic and legal reform.
In January 2011, the movement’s host site, AmpedStatus.com, was repeatedly taken down by unknown attackers. It was then that Anonymous hacktivists contacted DeGraw, offering to set up a more secure site. That grew into a collaboration called A99, which published a laundry list of demands in March. And on March 12, A99 announced Operation Empire State Rebellion (#OpESR) with the Arab-Spring-style demand of forcing a man from office--in this case, Federal Reserve Chairman Ben S. Bernanke. On June 1, A99 hastily called for multi-city occupations on the 14th. (In New York, it would have taken the same spot, Zuccotti Park, that is home to the present occupation.) But the OpESR action was a flop. Just 16 people showed up in Manhattan, and similarly feeble numbers in 22 other cities.
Meanwhile, organizers at activist magazine Adbusters had been developing their own occupation idea since February, which crystallized in a July 13 call to action. “Adbusters has never communicated directly with Anonymous,” said senior editor Micah White in an email.
But Anonymous spread the word vigorously, using Twitter, blogs, Internet Relay Chat (or IRC, their preferred discussion forum) and eventually YouTube videos. A sometime hacktivist named Robert whom I met at the September 17 protest in New York said that he knew about the campaign just two hours after the Adbusters page went live.
“The geek aspect is most important in the early days of a movement,” said Joseph Menn, a Financial Times security correspondent and author of the book Fatal System Error. “Once you get mainstream coverage, it’s self-perpetuating.”
quote:An October 2nd YouTube video announces We declare our war against the New York Stock ExchangeOn October 10th, NYSE shall be erased from the Internet.
In reality, on the 10th, a short distributed denial of service (DDoS) attack slowed down the NYSE site for about a half hour and took it offline for a couple minutes.
If the site was down for two minutes, thats not much of a protest, said Josh Shaul, CTO of Application Security, Inc. and an expert in database vulnerabilities. It shows that the big guns of Anonymous certainly didnt come out for this event.
In fact, many prominent sites and Twitter accounts denounced it ahead of time, in part because the DDoS tools to be used are easy to trace back to the hacker. Many of our brothers and sisters have gone down in the fight for using such tactics, like the Wikileaks defendants who took down Visa, Paypal, and Mastercard [sic], said a communiqué. We do not want history to repeat itself, and are sincerely worried.
Some even claimed it was a troll--a hoax--designed to lure Anonymous members into breaking the law, possibly by a federal agent. I got an indication of that back on October 4 when not_me sent an email saying It's not coming through usual channels and they're convinced it's government.
quote:How Diaspora* Found Its Tiger Stripe in the Midst of a Paypal Fiasco
We want to update you on the whole PayPal fiasco. We have good news and bad news, but after the day we’ve all had, why don’t we start with the good news?
So the good news is… actually, the GREAT news is that Silicon Valley startup Stripe has come to the rescue to enable Diaspora* donations on its service instead of PayPal. So we’re back, baby!
When PayPal mysteriously and arbitrarily decided to freeze everyone’s donations, we reached out to various payment services. Stripe responded right away to our call for help and swung into action, helping us get our online donations capability back up and running in just a few hours. Think about it. In just a few hours, we got a whole new payment service installed. We ran two credit cards through the system, so it should be OK. You can check out their amazing new service at the Diaspora* Foundation’s donation page. Stripe is really cool and simple and works great. As you can imagine, we got the opportunity to spend a lot of time with them today, and like us, they are inspired by a social mission: to make it as easy as possible for, say, a Honduran and an Indonesian, not only to chat together, but also to have meaningful economic exchanges on the web. So we’re very excited to have the opportunity to work together.
Now, for the bad news… We had raised $45,000 in just a few days, and then PayPal froze our account. Even though we’ve complied with every PayPal request, including providing them with our certificate of incorporation, they still won’t give us an explanation for any of their moves. And it wasn’t buyer’s remorse: From the thousands of donations we received, we had only one complaint and refunded that person’s money immediately. PayPal just sent us an email saying “appeal denied,” where they announced that they would lock up the Diaspora* community’s donations for 180 days. Yes, you heard that right. PayPal gets to earn interest on all of our donations for 6 months, while we have to wait for PayPal to come up with a reason to justify their decision. And it seems that this is common practice for PayPal, as the case of Shelley Michaels, Steve Hudgell, independent developers, WikiLeaks, and so many others show. Obviously, PayPal’s behavior is unacceptable, which is why we have asked our lawyer to get involved.
Since we announced the news earlier today, hundreds of you have tweeted and emailed PayPal urging that they release the funds. To all of you, we say THANK YOU. Unfortunately, the fight continues. Please keep up the pressure! If we keep pressing PayPal and draw media attention to their decision, they will have to relent.
quote:Diaspora is an open-source and distributed community of social networks run by users that enables you to own your own personal data, control with whom you share, and discover cool stuff throughout the Web
twitter:anonymouSabu twitterde op woensdag 19-10-2011 om 16:32:23ATTN: Media: #OpPayPal is back for round two. On a new phase: awareness and account closings: credit unions. Prepaid ccs. Alts. Spread news. reageer retweet
quote:http://pastebin.com/88Lzs1XR
As promised here is the entire user database of the 1589 users active on Lolita City, an darknet trading site for pedos.
While we were not able to obtain the password credentials (they use an SHA512 hash separate database to secure their passwords), but we were able to determine the following info of the server location.
quote:Son of Stuxnet Found in the Wild on Systems in Europe
A little more than one year after the infrastructure-destroying Stuxnet worm was discovered on computer systems in Iran, a new piece of malware using some of the same techniques has been found infecting systems in Europe, according to researchers at security firm Symantec.
The new malware, dubbed “Duqu” [dü-kyü], contains parts that are nearly identical to Stuxnet and appears to have been written by the same authors behind Stuxnet, or at least by someone who had direct access to the Stuxnet source code, says Liam O Murchu. He’s one of the leading experts on Stuxnet who produced extensive analysis of that worm with two of his Symantec colleagues last year and has posted a paper detailing the Duqu analysis to date.
Duqu, like Stuxnet, masks itself as legitimate code using a driver file signed with a valid digital certificate. The certificate belongs to a company headquartered in Taipei, Taiwan, which Symantec has declined to identify. F-Secure, a security firm based in Finland, has identified the Taipei company as C-Media Electronics Incorporation. The certificate was set to expire on August 2, 2012, but authorities revoked it on Oct. 14, shortly after Symantec began examining the malware.
The new code does not self-replicate in order to spread itself — and is therefore not a worm. Nor does it contain a destructive payload to damage hardware in the way that Stuxnet did. Instead, it appears to be a precursor to a Stuxnet-like attack, designed to conduct reconnaissance on an unknown industrial control system and gather intelligence that can later be used to conduct a targeted attack.
“When we talked about Stuxnet before, we expected there was another component of Stuxnet we didn’t see that was gathering information about how a plant was laid out,” O Murchu says. “But we had never seen a component like that [in Stuxnet]. This may be that component.”
Although Duqu was created some time after Stuxnet, a component similar to it could have been used by Stuxnet’s attackers to gather intelligence for their payload.
Duqu appears to have been operative for at least a year. Based on the dates the binary files were compiled, Symantec says attacks using the malware may have been conducted as early as December 2010, about five months after Stuxnet was discovered, and about 18 months after Stuxnet was believed to have first been launched on computers in Iran.
“The real surprising thing for us is that these guys are still operating,” O Murchu says. “We thought these guys would be gone after all the publicity around Stuxnet. That’s clearly not the case. They’ve clearly been operating over the last year. It’s quite likely that the information they are gathering is going to be used for a new attack. We were just utterly shocked when we found this.”
Symantec received two variants of the malware on Oct. 14 from an unidentified research lab “with strong international connections.”
“Obviously this is a sensitive topic, and for whatever reason, they’ve decided at this point they don’t want to be identified,” O Murchu says, referring to earlier beliefs about Stuxnet had been created by a nation state with the aim of sabotaging Iran’s nuclear program.
Symantec received two variants of the malware, both of which had infected the same machine. Since then, O Murchu and his colleagues have found other samples on about 10 machines. The researchers found, after searching their own malware archive for similar files, that one of the variants was first captured by Symantec’s threat detection system on Sept. 1, 2011. Symantec has declined to name the countries where the malware was found, or to identify the specific industries infected, other than to say they are in the manufacturing and critical infrastructure sectors.
Although the vast majority of Stuxnet infections were based in Iran, O Murchu says the Duqu infections that have been discovered so far are not grouped in any geographical region. He said, however, that this could change if new infections are discovered.
The name given to the malware is based on a prefix “~DQ” that the malware uses in the names of files that it creates on an infected system. O Murchu says the malware uses five files. These include a dropper file that drops all of the components onto an infected system that the malware will need to do its work; a loader that places the files into memory when the computer starts; a remote access Trojan that serves as a backdoor on infected systems to siphon data from it; another loader that executes the Trojan; and a keystroke logger.
Like Stuxnet, Duqu uses a sophisticated and unique technique to hide its components in the memory of a machine, rather than on the hard drive, to avoid detection by anti-virus engines, and also tricks the system into loading files from memory instead of from hard disk. This technique was one of the first red flags Symantec had found in Stuxnet that indicated it was doing something beyond other types of malware they had seen before.
The malware is configured to run for 36 days, after which it automatically removes itself from an infected system.
O Murchu says they still have no idea how Duqu was delivered to infected systems. Stuxnet primarily used a zero-day vulnerability that allowed it to spread to systems via an infected USB stick.
“There’s an installer component [to Duqu] we haven’t seen,” O Murchu saus. “We don’t know if the installer is self-replicating. That’s a piece of the jigsaw that we’re missing right now.”
The variants are about 300 kilobytes in size — compared to Stuxnet’s 500 kb — and use a custom protocol to communicate between an infected system and a command-and-control server to siphon data from an infected machine and load new components onto it. According to O Murchu, the malware tries to disguise its malicious communication by appending it to a 100 x 100 pixel jpeg file. The appended data is encrypted, and the researchers are still analyzing the code to determine what the communication contains.
Daar gaat het Isreal-topicquote:
quote:A single complaint about an anonymous article or posting online could be enough to legally force a website to take it down – if new Parliamentary proposals on defamation get passed into law.
Measures against online anonymity are a key part of proposals published today in a committee report that will be debated when Parliament votes on changing the UK's defamation laws.
Though the draft Defamation bill mainly deals with traditional media and issues such as libel tourism, one of its expressed aims is to bring internet publishing and social media in line with the mainstream press.
"We agree that the internet cannot be exempt from the law of the land, and that the rule of law should apply to the fullest extent possible online," states paragraph 93 of the report.
The two core recommendations of the committee include a new "notice and take-down procedure", and "measures to encourage a change in culture in the way we view anonymous material that is user-generated, including via social media".
The notice and take-down procedure would mandate that, upon receiving a complaint, website editors would need to publish the complaint next to the original article. If the complainant wishes to push the matter further and get a take-down order, they can initiate a defamation action which would be cheaper and more streamlined than it currently is. It would involve both parties submitting a comment to a defamation judge who would then make a decision on the case.
This will apply to public parts of social media sites, such as Twitter, forums and public Facebook pages, as well as blogs and online publications. Mumsnet and TripAdvisor were both specifically named by the report. It will apply equally to sites that are moderated and sites that are not.
The scenario for anonymous postings – articles and presumably videos and sound tracks – is even tougher. If one complaint is received, the web editor or website hoster will have to take the post down, unless the writer or creator is willing to identify him/herself. Paragraph 125 states:
We recommend that any material written by an unidentified person should be taken down by the host or service provider upon receipt of complaint, unless the author promptly responds positively to a request to identify themselves, in which case a notice of complaint should be attached. If the internet service provider believes that there are significant reasons of public interest that justify publishing the unidentified material — for example, if a whistle-blower is the source — it should have the right to apply to a judge for an exemption from the take-down procedure and secure a "leave-up" order."
If the writer or creator does identifies him/herself, the dispute can then be taken to before a defamation judge, following the same notice and take-down procedure stated above.
One protection for anonymous writers is built into the bill – if there is an overriding public interest in publication, something that could protect whistle-blowers for example.
Acknowledging the practical limitations on what they recommend, including the time and expense of tracking down anonymous users, the committee expressed the hope that their new laws will change what they called the "Wild West" of online culture, making for a general shift over future years.
We expect, and wish to promote, a cultural shift towards a general recognition that unidentified postings are not to be treated as true, reliable or trustworthy. The desired outcome to be achieved — albeit not immediately — should be that they are ignored or not regarded as credible unless the author is willing to justify or defend what they have written by disclosing his or her identity.
quote:Terroristen attackieren Hans-Peter Uhl
(Berlin) Hans-Peter Uhl (CSU), die Internet-Koryphäe der CDU/CSU-Bundestagsfraktion, wurde heute Mittag Opfer eines terroristischen Angriffs.
Cyberkriminelle griffen heimtückisch und skrupellos die Homepage von Uhl an und ersetzten die Seite mit eigenen Kommentaren.
Ob die sich "Anonymous" nennenden Angreifer wirklich aus dem Umfeld dieser Hackergruppe kommen, oder die Urheber des Attentats eher dem Umfeld des Chaos Computer Club (CCC) oder der Piratenpartei zuzurechnen sind, steht noch nicht fest.
Hans-Peter (Erich) Uhl wurde gestern durch seine fulminante und dennoch humorvolle Rede zur Verteidigung des Bundestrojaners in ganz Deutschland weltberühmt.
Wann die Internetseite des in Bayern überaus populären Politikers wieder erreichbar sein wird, steht noch nicht fest.
Der Staatsschutz soll bereits die ersten Ermittlungen aufgenommen haben.
quote:"Herr Uhl, es ist etwas passiert"
"Wie? Was?"
"Ihre Homepage wurde gehackt. "
"Meine was?"
"Sie wissen schon: Internet. Und nun ist alles weg"
"Na endlich!"
quote:http://fakeconvos.com/index.php
Welcome to Fake Convos!
Fake Convos is a fun web app that lets you easily create fake Facebook news feeds and conversations. Unfortunately there is not much more to say. The best thing to do is just get started. Log in with Facebook to create a new convo!
Guilty until proven innocent. En burgers staan te springen om hun onschuld te bewijzen.quote:MEP proposes 'black box' PC monitoring system
Under the pretext of a plea for children to be better protected on the internet, MEP Tiziano Motti has proposed installing a black box on every computer in Europe, to monitor and record every little scrap of traffic.
"We politicians are often hypocrites," Motti told EuropaPortalen of his plan. "On the one hand, we say that pedophilia is terrible and that it must be fought. On the other hand we do not give police the necessary tools to combat it. With my suggestion we can stop the hypocrisy."
Motti's proposal is to use a technology developed by Italian hacker Fabio Ghioni dubbed 'Logbox' to record every scrap of traffic that originates from every computing device across the EU.
That's worth a second-glance: Motti isn't just suggesting that PCs and laptops need to be monitored, but nothing capable of being connected to the Internet. As a result, Logbox would be installed on smartphones, featurephones with WAP access, eReaders, Blu-ray players and even TVs.
Logbox sits quietly in the background, monitoring the traffic for violations - and alerting authorities if something untoward, such as an image of child abuse, is discovered. Any evidence gathered is encrypted and stored securely, waiting for the police to show up.
"It allows the honest citizens to anonymously register their activities on the internet in a comprehensive, secure and neutral manner that can not be abused," Motti's proposal explains. "So, users can clearly demonstrate that they have not committed criminal acts so that the police do not waste time on the innocent in their investigations."
quote:Other MEPs haven't quite agreed with Motti's proposal. ActivePolitic has gathered some dissenting responses, including MEP Lars Christian Engstrom's rejection of Motti's proposal. "If it were China, North Korea or Saudi Arabia who had proposed this, what would we say then? It's scary in a democratic Europe to even hear a politician suggest such a thing. It is so absurd that I really hope we never have to discuss it seriously in Parliament."
Last year, Motti convinced the European Parliament to support a proposal extending the data storage directive to cover Google search terms, again using child abuse as the hot-button topic. Hopefully, Motti's latest wheeze won't be so lucky.
Read more: http://www.thinq.co.uk/20(...)ystem/#ixzz1bLmuo8bo
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |