#Privacy, #Facebook Coin, Uber, PayPal, Visa to Back Facebook’s GlobalCoin Cryptocurrency

#Privacy, #Facebook Coin, Uber, PayPal, Visa to Back #Facebook’s GlobalCoin Cryptocurrency

Starting with Facebook can’t get into China and 2015 Facebook Announces a Payments Feature for Its Messenger App

2019 #WeChat has become the centerpiece of digital life in China

where people use it to order movie tickets, subway passes, food delivery and rides. If Facebook succeeds in turning its own messaging services into a platform for everything, it could ultimately threaten established services such as Snapchat, Yelp, Venmo, eBay and even Apple and Amazon.

IN CHINA THERE IS NO PRIVACY!

IN AMERICA THERE IS NONE! THANKS TO THE DEMOCRAT$ AND THE REPUBLICAN$

  1. Cambridge Analytica and Facebook: The Scandal and the Fallout So Far Revelations that digital consultants to the Trump campaign misused the data of millions of Facebook users set off a furor on both sides of the Atlantic. https://www.businessinsider.com/cambridge-analytica-trump-firm-facebook-data-50-million-users-2018-3/
  2. Are you ready? Here is all the #data Facebook and Google have on you
    https://www.theguardian.com/commentisfree/2018/mar/28/all-the-data-facebook-google-has-on-you-privacy
  3. #Trump linked firm Cambridge Analytica collected personal information from 50 million Facebook users without permission https://www.businessinsider.com/cambridge-analytica-trump-firm-facebook-data-50-million-users-2018-3/
  4. Comparing #Obama Cambridge Analytica https://www.politifact.com/truth-o-meter/statements/2018/mar/22/meghan-mccain/comparing-facebook-data-use-obama-cambridge-analyt/

Facebook can’t get into China and wants to be WhatsApp China’s top app.

#Tencent-owned WeChat is China’s most popular messaging app and has a mobile payments feature known as #WeChat Pay. #Facebook Coin, which would be pegged to the U.S. dollar and allow users to transfer money through Facebook-owned messaging application WhatsApp, according to Bloomberg.

Facebook wants to be America’s version of China’s WeChat

and started developing its own digital currency to make it easier for users to send money to their messaging contacts. Facebook didn’t offer many details on its digital currency endeavors but said a “new small team” was looking for ways to make use of the type of technology powering bitcoins and other cryptocurrencies.

Facebook has reportedly lined up Uber, PayPal, Visa and others to invest $10 million each in the consortium governing its secretive crypto project.
https://www.coindesk.com/report-uber-paypal-visa-to-back-facebooks-globalcoin-cryptocurrency

Tencent, is more than just a messaging app. It’s what some analysts dub a “super-app” because it offers everything from mobile payments to the ability to book flights and even play games — all without leaving the app. ‘WeChat of the West’
https://www.cnbc.com/2019/03/13/facebook-wants-to-copy-wechat-pay-with-facebook-coin-payments.html

The reason why FB wants these partners. To turn every single account holder into a new banking account. Personal and business at the same time. Very centralized indeed. Multiple privacy concerns and contracts. Personal data is at risk.
Facts: 1. Facebook is issuing its own ‘cryptocurrency’
2. Evan Cheng is Facebooks’s Director of Blockchain engineering

One of Facebook’s most senior engineers just became Director of Engineering, Blockchain


3. Evan Cheng is advisor of #chainlink
4. Facebook will need an oracle for the purpose they’re looking for.

Facebook Gave Data Access to Chinese Firm Flagged by U.S. Intelligence

“https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html

Sarah Jamie Lewis ‏@SarahJamieLewis
Can’t wait for a cryptocurrency with the ethics of Uber, the censorship resistance of Paypal, and the centralization of Visa, all tied together under the proven privacy of Facebook. I’ve always said the thing that cryptocurrency was missing was consortiums of corporations fully invested in the existing financial sector. Who, seriously, looked around the room and said, “shit, we really need to invite PayPal”
Do you trust 2/3 of paypal, visa, uber and facebook <insert other corps here> not to collude to publish contradictory checkpoints? What does byzantine consensus even mean in that scenario? “Facebook won’t control the coin” it will just develop the coin and then assemble the initial members of the consortium after which point the power will be distributed to the consortium members, that Facebook picked, and who are all large corporations.

See, decentralized. “Facebook won’t directly control the coin, nor will the individual members of the consortium — known as the Libra Association. Some of the members could serve as “nodes” along the system that verify transactions and maintain records of them, creating a brand-new payments network, according to people familiar with the setup.”
In the future, Paypal will verify your transaction behind the scenes as you pay for your Uber seamlessly using your phone, just top up your Facebook Libre account with Visa or Mastercard. So much innovation.

Roxana Nasoi @roxanasoi

Ever wondered how PayPal shares your Data? And to who?
Let’s go with the major funnels:
1. PayPal shares your data with Auditors. Internal and external, due to its nature.
2. PayPal shares your data with Customer Services. In the process of handling claims, customer services need access to your account history – so basically they need your historical data information. In case of disputes, they can access the last 30 to 90 days. Maybe even more?
3. PayPal shares your data with Fraud agencies and AML services. You will discover that after $1k to $2k, you need to KYC in order to continue using your account. If you use PayPal for business purposes, but your account is a personal one, you can end up with funds frozen.
4. Next is Financial Products. All those business and personal finance tools you see inside your PayPal dashboard can’t be used without your financial data. To add more, new products are created based on user data patterns. Unknown the extent of external financial products.
5. Don’t forget about your data being shared with Commercial Partnerships. Don’t worry, banks do the same. Apps do the same. Nothing new here.
6. PayPal uses your data for Marketing and PR. Need another example? Try Facebook, Google (Gmail) etc. Data sells, and we can’t really talk about performance and customer experience without backing claims with data reports.
7. PayPal (along with 95% of systems) shares your data with Operational Services.
8. Group Enterprises also have access to your data. Blame it on group dynamics if you want to or on contracts you’ll never have a say in.
9. Commercial Partners (to no surprise) can access your data, as well through a service called PayPal for Partners (Merchants use it).
10. Legal. From disputes to payment protection to lawsuits, to internal or partner legal firms – yes, they can access the data. Or have access to it in some form.
11. Other services and agencies. At some point they argued that government agencies cannot claim access to a user’s data. However, this is an overstatement. Under the premise of fraud, Gov agencies can and will get access. Based on historical examples, we know it’s possible.
This is probably the main reason why we do need crypto. A coded architecture that makes it incorruptible.
“Code is Law”.
Bitcoin has managed to provide a clear first example of incorruptibility, where growth and maturity of one system does not change the core.

Your City, Your State, Your K12 Public School all attacked using NSA weapon.

Your City, Your State, Your K12 Public School all attacked using NSA weapon.

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc
By Nicole Perlroth and Scott Shane
May 25, 2019

In Pennsylvania School Districts Stockpiling Huge budget surplus accounts, while still raising property taxes every year

WannaCry? Hundreds of US schools still haven’t patched servers
A dive into vulnerability data shows even big districts’ servers still offering up SMB v. 1.

I think patching your software and making backups will protect you better than blaming the Gov’t
or
… than blaming the government who weaponized an unknown flaw in software and made sure not to tell the software vendor, in order to prevent a patch which customers could install, you mean?
or
Microsoft was warned, and the patch came out a month before Shadow Brokers dumped it.

If you’re wondering why ransomware continues to be such a problem for state and local governments and other public institutions, all you have to do to get an answer is poke around the Internet a little. Publicly accessible security-scan data shows that many public organizations have failed to do more than put a bandage over long-standing system vulnerabilities that, if successfully exploited, could bring their operations to a standstill.

While the method by which RobbinHood ransomware infected the network of Baltimore City two weeks ago is still unknown, insiders within city government have pointed to the incomplete efforts by the Office of Information Technology to get a handle on the city’s tangle of software, aging servers, and wide-flung network infrastructure. Baltimore isn’t even the only city to have been hit by ransomware in the last month—Lynn, Massachusetts, and Cartersville, Georgia, both had electronic payment systems taken offline by ransomware this month. Greenville, North Carolina, was struck by the same RobbinHood ransomware affecting Baltimore in April.

But cities aren’t the only highly vulnerable targets to be found by would-be attackers. There are hundreds of thousands of Internet-connected Windows systems in the United States that still appear to be vulnerable to an exploit of Microsoft Windows’ Server Message Block version 1 (SMB v. 1) file sharing protocol, despite repeated public warnings to patch systems following the worldwide outbreak of the WannaCry cryptographic malware two years ago. And based on data from the Shodan search engine and other public sources, hundreds of them—if not thousands—are servers in use at US public school systems. Even in cases where Microsoft’s patch of SMB v. 1 has been applied, the protocol remains a potential security problem—one that some organizations can’t completely close because some vendors still require the protocol for applications such as networked copiers and scanners.

While conducting research as a follow-up to our coverage of Baltimore City’s ongoing ransomware attack, Ars discovered that neighboring Baltimore County’s public school system had eight publicly accessible servers that still were running in configurations that indicated they were vulnerable to EternalBlue, the Equation Group exploit exposed by Shadow Brokers in April 2017 and then used as part of the WannaCry malware a month later. The exploit is now packaged as part of multiple malware kits, according to security researchers.

https://arstechnica.com/information-technology/2019/05/two-years-after-wannacry-us-schools-still-vulnerable-to-eternalblue/

SEE

Where are the State AG’s in protecting the citizens from malware that “gets away” from the NSA? The weaponized software created by the NSA…. when employees who have been taught everything by the NSA leave their jobs and take what they know with them then form companies and sell their “knowledge /skills / know how” learned on the job by working for America to enemies.

https://krebsonsecurity.com/2017/12/former-nsa-employee-pleads-guilty-to-taking-classified-data/


02
Dec 17

Former NSA Employee Pleads Guilty to Taking Classified Data

A former employee for the National Security Agency pleaded guilty on Friday to taking classified data to his home computer in Maryland. According to published reports, U.S. intelligence officials believe the data was then stolen from his computer by hackers working for the Russian government.

Nghia Hoang Pho, 67, of Ellicott City, Maryland, pleaded guilty today to “willful retention of national defense information.” The U.S. Justice Department says that beginning in April 2006 Pho was employed as a developer for the NSA’s Tailored Access Operations (TAO) unit, which develops specialized hacking tools to gather intelligence data from foreign targets and information systems.

According to Pho’s plea agreement, between 2010 and March 2015 he removed and retained highly sensitive classified “documents and writings that contained national defense information, including information classified as Top Secret.”

Pho is the third NSA worker to be charged in the past two years with mishandling classified data. His plea is the latest — and perhaps final — chapter in the NSA’s hunt for those responsible for leaking NSA hacking tools that have been published online over the past year by a shadowy group calling itself The Shadow Brokers.

https://thehill.com/policy/national-security/436950-former-cia-nsa-employees-sue-agencies-over-alleged-censorship

Ex-NSA employees criticize Mike Rogers’ role with Israeli venture firm

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc By Nicole Perlroth and Scott Shane May 25, 2019

For nearly three weeks, Baltimore has struggled with a cyberattack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.

But here is what frustrated city employees and residents do not know: A key component of the malware that cybercriminals used in the attack was developed at taxpayer expense a short drive down the Baltimore-Washington Parkway at the National Security Agency, according to security experts briefed on the case.

Since 2017, when the N.S.A. lost control of the tool, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the N.S.A.’s own backyard.

It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.

The N.S.A. connection to the attacks on American cities has not been previously reported, in part because the agency has refused to discuss or even acknowledge the loss of its cyberweapon, dumped online in April 2017 by a still-unidentified group calling itself the Shadow Brokers. Years later, the agency and the Federal Bureau of Investigation still do not know whether the Shadow Brokers are foreign spies or disgruntled insiders.

< – >

WHERE ARE THE CLASS ACTION SUITS?

WHY DOESN’T THE STATE HOLD THE DEFENSE DEPARTMENT ACCOUNTABLE FOR THE DAMAGE DONE TO THEIR CITIZENS?

Breaking news. Patch yourself for the CVEs exploited by NSA tools on the loose. This includes major cities!

ETERNALBLUE was initially nicknamed EternalBluescreen —NSA never seriously considered alerting Microsoft about discovering the vulnerability (before Shadow Brokers happened), and —“held on it” (“used it,” presumably) for more than five years
https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html


NEW: Baltimore was hit with an NSA hacking tool that is being used to hijack U.S. cities. ⁦⁩ and I spent months looking into the origins of EternalBlue, a stolen NSA weapon that is popping up in more and more attacks across the country.

The NSA spent more than a year searching for the flaw in Microsoft’s software and writing the code to exploit it.

NSA TAO operators jokingly referred to it as “EternalBluescreen” because it often crashed computer systems, a risk they might tip off targets. It took months to hone. Once it became a reliable espionage tool, it netted some of the NSA’s best counter-terrorism intelligence, and there was never any serious consideration that NSA would turn over the underlying flaw to Microsoft for patching.

The NSA kept it for 5+ years until unidentified hackers threatened to publish it.

In April 2017, the group, which calls itself the ShadowBrokers, dumped it online, where it has been picked up by North Korea, Russia, Iran and, just this week, China in attacks that have cut a path of destruction around the globe. But in the last year, it has boomeranged back to the NSA’s own backyard, hitting Baltimore, Allentown, San Antonio and countless other cities in attacks that have paralyzed municipal operations and alarmed government officials, who privately say the NSA needs to account. The NSA refuses to discuss the incidents or even acknowledge that the dumped tools were part of its cyber arsenal, but in an unusually candid interview, NSA former director Mike Rogers, who oversaw the agency during the leak, deflected blame. “If Toyota makes pickup trucks and someone takes a pickup truck, welds an explosive device onto the front, crashes it through a perimeter and into a crowd of people, is that Toyota’s responsibility?

“The N.S.A. wrote an exploit that was never designed to do what was done.”

Microsoft rejects that analogy: “These exploits are developed and kept secret by governments for the express purpose of using them as weapons or espionage tools. They’re inherently dangerous. When someone takes that, they’re not strapping a bomb to it. It’s already a bomb.”

EternalBlue is being packaged as part of many malware attacks as one possible lateral movement tool. Making a bomb is very much responsibility of the creator.

NSA toyota analogy was not correct. Exploit is like a bomb its a different matter who detonate it and where. NSA is very much responsible for their malicious espionage tools.

https://twitter.com/waveslide/status/1132442317372219392

EternalBlue was leaked 2 years ago. MS patched BEFORE it hit the wild. Some industry gossip the NSA knew they’d lost control and gave MS a heads-up. THIS PATCH HAS BEEN OUT FOR TWO YEARS! If it hits your network now, you deserve it. Usually, it’s a component of a malware package.

China has also been able to intercept an NSA tool as it attacked their networks. They stopped it, copied it, modified it, and sent it back to us and all of our allies.


‏ @bitsdigits
No, it wasn’t the NSA hacking tool that did this. It was basic exemptions to the #Baltimore #CIO policies that didn’t address patch management deficiencies that did this. Has anyone looked at what .gov requirements are
https://home.dotgov.gov/registration/requirements/

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc

https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html

For nearly three weeks, Baltimore has struggled with a cyberattack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.

But here is what frustrated city employees and residents do not know: A key component of the malware that cybercriminals used in the attack was developed at taxpayer expense a short drive down the Baltimore-Washington Parkway at the National Security Agency, according to security experts briefed on the case.

Since 2017, when the N.S.A. lost control of the tool, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the N.S.A.’s own backyard.

It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.

The N.S.A. connection to the attacks on American cities has not been previously reported, in part because the agency has refused to discuss or even acknowledge the loss of its cyberweapon, dumped online in April 2017 by a still-unidentified group calling itself the Shadow Brokers. Years later, the agency and the Federal Bureau of Investigation still do not know whether the Shadow Brokers are foreign spies or disgruntled insiders.

< – >

https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html

In Pennsylvania School Districts Stockpiling Huge budget surplus accounts, while still raising property taxes every year

Bezos is the most disgusting and dirtiest person on earth!

Jeff Bezos
richest man
in America
with his 157 Billion

feels free to
Destroy the Earth

BEZOS admits that limitless growth—the growth that made him the richest man in the world—is incompatible with a habitable earth.

But instead of announcing investments in renewable energy or public infrastructure, Bezos pitches an escape from earth.

HE WANTS TO THROW YOU OFF THE EARTH – HE AND HIS MONEY GETS TO STAY.

His whole focus towards the reality of capitalism, climate change, and the intractable connections between those two things is to make more money by planning the great escape from earth !!!!!

He’s wrong.

Jeff Bezos Is a Post-Earth Capitalist

Bezos admits that the limitless growth that made him the world’s richest man is incompatible with a habitable Earth.

Bezos argues that a capitalist logic of endless growth is the way to save the Earth from poverty, homelessness, and environmental catastrophe. (Bezos does not say “climate change” or “global warming” but “pollution.”) However, capitalism is an economic system that is inextricably tied with colonial history, enslaving people and exploiting laborers, and extracting and stripping as much away from the Earth as possible in order to fuel growth. Capitalism is not the solution to the problems that Bezos describes. It’s the root of the problem.

Bezos Who Sent 20 Dic Pics To His Mistress Is Going To Conquer Space? LOL!

https://www.vice.com/en_us/article/3k3kwb/jeff-bezos-is-a-post-earth-capitalist

The richest boys merely engage in their space toy pissing contest instead of saving the planet! Aholes.

THE NEW GEOPOLITICS OF CONVERGING RISKS

THE UN AND PREVENTION IN THE ERA OF AI

Eleonore Pauwels

https://i.unu.edu/media/cpr.unu.edu/attachment/3472/PauwelsAIGeopolitics.pdf

 

@LiisaPast  Liisa Past Retweeted Foreign Policy

“To secure itself, the West needs to figure out where all its gadgets are coming from. Here’s why that’s so difficult.” Excellent take on supply chain security, @ForeignPolicy. Also important: transparency, critical infrastructure and how software elements are combined.

Educational CyberPlayGround NetHappenings 5-4-19

Ghidra, a public reverse-engineering tool developed by the National Security Agency

The source code is available for download at ghidra-sre.org along with the 9.0.2 patch.

NSA’s Ghidra Reverse Engineering Framework Stirs Up Malware Researchers

The National Security Agency released a free, public version of Ghidra, a set of tools developed internally for software reverse engineering. The agency will also release Ghidra’s source code, allowing users to improve the framework’s feature set and turn it into a more effective tool.

Ghidra became known in the security community after WikiLeaks published the “Vault 7” documents, which referenced it as a reverse engineering tool created by the NSA’s Research Directorate, among hacking tools used by the Central Intelligence Agency.

If you’re wondering why the NSA made these tools available, senior advisor for the NSA Robert Joyce said the move was powered by the need to improve cybersecurity tools, to build a community, to educate new talent, and to show what the agency uses the tax money for.

Of course, since this is what the agency uses internally for reversing engineering software, opening it to a larger audience means that NSA can have it improved with code from contributors.

NSA rolled out a version of Ghidra for the public, available for macOS, Windows, and Linux on a dedicated website. A GitHub repository is also present, where the code is expected to be published. Joyce spoke (slides here) about how the toolkit can be used and discussed its strong points.

HACKING ETHICS Google: Book 
1 • 2 • 3 • 4 • 5 • 6 • 7 • 8 • 9 • 10 • 11 •

https://www.businessinsider.com/well-these-new-zuckerberg-ims-wont-help-facebooks-privacy-problems-2010-5

This Business Insider article was originally published May 13, 2010
Facebook CEO Mark Zuckerberg and his company are suddenly facing a big new round of scrutiny and criticism about their cavalier attitude toward user privacy.
An early instant messenger exchange Mark had with a college friend won’t help put these concerns to rest.
According to SAI sources, the following exchange is between a 19-year-old Mark Zuckerberg and a friend shortly after Mark launched The Facebook in his dorm room:
Zuck: Yeah so if you ever need info about anyone at Harvard
Zuck: Just ask.
Zuck: I have over 4,000 emails, pictures, addresses, SNS
[Redacted Friend’s Name]: What? How’d you manage that one?
Zuck: People just submitted it.
Zuck: I don’t know why.
Zuck: They “trust me”
Zuck: Dumb fucks.

An algorithm wipes clean the criminal pasts of thousands

“When we started to do this by hand, we recognised very rapidly that this was going to take a long time.” He enlisted Code For America, a non-profit organisation that works on creating Silicon Valley-esque solutions to problems within the many antiquated systems powering the US government. The group had made Clear My Record, a tool that can analyse text in court files, using character recognition to decipher scanned documents. It discards any record involving a violent crime, as such records do not qualify. For those that remain, the tool automatically fills out the necessary paperwork. In other words, the algorithm replaced the process being done manually at the expungement clinics.

 

REVERSE ENGINEERING AN INSULIN PUMP WITH AN SDR AND DECAPPING

Reverse Engineering An Insulin Pump With An SDR And Decapping

 

 

Facebook Responds to Global Coalition’s Demand That Users Get a Say in Content Removal Decisions

This Business Insider article was originally published May 13, 2010

Facebook CEO Mark Zuckerberg and his company are suddenly facing a big new round of scrutiny and criticism about their cavalier attitude toward user privacy. An early instant messenger exchange Mark had with a college friend won’t help put these concerns to rest.

According to SAI sources, the following exchange is between a 19-year-old Mark Zuckerberg and a friend shortly after Mark launched The Facebook in his dorm room:

Zuck: Yeah so if you ever need info about anyone at Harvard
Zuck: Just ask.
Zuck: I have over 4,000 emails, pictures, addresses, SNS
[Redacted Friend’s Name]: What? How’d you manage that one?
Zuck: People just submitted it.
Zuck: I don’t know why.

Zuck: They “trust me”
Zuck: Dumb fucks.

#deletefacebook

#DeleteFacebook your info is breached again and again and again and again and again

https://www.businessinsider.com/well-these-new-zuckerberg-ims-wont-help-facebooks-privacy-problems-2010-5

Mercer, Zuckerberg, Sandberg, Page, Brinn, Dorsey Handmaidens to Authoritarism

Esteemed Reporter Carole Cadwalla takes down piece of shit Mark Zuckerberg at TedTalk

Years of Mark Zuckerberg’s old Facebook posts have vanished. The company says it ‘mistakenly deleted’ them.

Zuckerberg reportedly has a secret escape chute beneath his conference room

#Zuckerberg is a liar and the Congress is paid to Ignore this

A withering verdict: MPs report on Zuckerberg, Russia and Cambridge Analytica

 

EFF and more than 100 civil society organizations across the globe wrote directly to Mark Zuckerberg recently demanding greater transparency and accountability for Facebook content moderation practices. A key step, we told Facebook, is implementation of a robust appeals process giving all users the power to challenge and reverse the platform’s content removal decisions.

https://www.eff.org/deeplinks/2018/12/facebook-responds-global-coalitions-demand-users-get-say-content-removal-decisions

 

3 Facebook “companies” with 17 open GDPR investigations.

Quite something. Commissioner Dixon written testimony cites 3 Facebook “companies” represent half of the large tech platforms with a whopping 17 open GDPR investigations.

#deletefacebook now

 

General Coverup AG Barr will go to prison like Nixon’s AG John Mitchell.

General Coverup AG BARR

William Safire in New York Times, October 1992, about Attorney General Barr, whom he called “the Coverup-General”.

Nixon’s Attorney General, John Mitchell, was convicted and went to prison for perjury, conspiracy and obstruction of justice.

Tucks tie into pants

His wife Martha Elizabeth Beall Mitchell (September 2, 1918 – May 31, 1976) was the wife of John N. Mitchell, United States Attorney General under President Richard Nixon. She became a controversial figure with her outspoken comments about the government at the time of the Watergate scandal. She was held against her will in a California hotel room and forcefully sedated by a psychiatrist after a physical struggle with five men that left her needing stitches.[2][3] Nixon aides, in an effort to discredit Mitchell, told the press that she had a “drinking problem”.[4] Mitchell began contacting reporters when her husband’s role in the scandal became known, initially in an effort to defend him.[5] Nixon was later to tell interviewer David Frost in 1977 that Martha was a distraction to John Mitchell, such that no one was minding the store, and “If it hadn’t been for Martha Mitchell, there’d have been no Watergate.”

Richard Nixon and his Attorney General and campaign manager, John Mitchell

Nixon and his Attorney General and campaign manager, John Mitchell:

THE SIMPLE TRUTH
Barr #totalFail perjures himself over and over again.
Dianne Feinstein replays the timeline  asking Barr if someone is asked to lie to the government is a crime.
Barr says yes.
Feinstein asks what the charge would be.
Barr says “Obstruction”
Feinstein points to Mueller’s report outlining exactly that conduct by Trump.

Media bias “electable”, “authentic”, “likable” against #women on the 2020 campaign

Media bias against women on the 2020 campaign trail is already starting to ramp up, @jess_mc explains

Media bias against women, #electable, #likeable, #authentic

we like #uncorruptable #women

Elizabeth Warren is likable, authentic, and electable plus she is  #uncorruptable look at her policy plans.

Educational CyberPlayGround Inc. NetHappenings 4.25.19

 

Recycling isn’t about the planet. It’s about profit.
http://inthesetimes.com/article/21850/is-amazon-using-predatory-pricing-in-violation-of-antitrust-laws-monopoly

Antarctica: Thousands of emperor penguin chicks wiped out
The second largest emperor penguin colony in Antarctica disappears, satellite images show.
https://www.bbc.com/news/science-environment-48041487

‘Death by a thousand cuts’: vast expanse of rainforest lost in 2018
https://www.theguardian.com/environment/2019/apr/25/death-by-a-thousand-cuts-vast-expanse-rainforest-lost-in-2018

‘It’s a groundswell’: the farmers fighting to save the Earth’s soil
https://www.theguardian.com/world/2019/apr/24/farmers-save-earths-soil-conservation-agriculture

Dare to declare capitalism dead – before it takes us all down with it
https://www.theguardian.com/commentisfree/2019/apr/25/capitalism-economic-system-survival-earth

The kings of capitalism are finally worried about the growing gap between rich and poor
https://www.theguardian.com/commentisfree/2019/apr/24/ray-dalio-jamie-dimon-kings-of-capitalism-concerned

Will we survive the next financial crisis?
https://www.politico.com/agenda/story/2019/04/16/global-financial-crisis-000892
This essay has been adapted from FIREFIGHTING by Ben S. Bernanke, Timothy F. Geithner and Henry M. Paulson Jr., published April 16 by Penguin Books.

Is Amazon Violating U.S. Antitrust Laws? This Law Student Thinks He Has Evidence.
Amazon’s reports of low–or zero–profits have long raised suspicions that it’s selling below cost to build a global monopoly.
http://inthesetimes.com/article/21850/is-amazon-using-predatory-pricing-in-violation-of-antitrust-laws-monopoly

Sackler family want to settle opioids lawsuits, lawyer says
https://www.theguardian.com/us-news/2019/apr/24/sackler-family-opioid-lawsuit-settle

Source code of Iranian cyber-espionage tools leaked on Telegram
APT34 hacking tools and victim data leaked on a secretive Telegram channel since last month.
https://www.zdnet.com/article/source-code-of-iranian-cyber-espionage-tools-leaked-on-telegram/

Impeachment as Political Strategy
Beyond the imperatives associated with rule of law imperatives, the process would be valuable to expose and weaken Trump and the Republicans for 2020

Corrupt UAW Official Norwood Jewell was a DNC Superdelegate who helped rig the game to keep Bernie Sanders out of the election,  who suddenly retired last year as a vice-president at the United Auto Workers, is the highest-ranking labor official charged in a scheme to tap cash from a job training centre in Detroit that was financed exclusively by Fiat Chrysler, known as FCA. He is still listed as a DNC member on the Michigan Democratic Party’s website with his term set to expire in 2020. the superdelegate process was criticized by Sanders supporters for rigging the contest in Clinton’s favor. Sanders won the Michigan primary 49.8 percent to 47.3 percent, but Clinton earned more delegates.
https://apnews.com/b7a93af32acc41ca8ac115a15ee8dc07

Warren backs plan to get rid of the Electoral College ‘My view is that every vote matters’
https://www.clickondetroit.com/news/politics/warren-backs-plan-to-get-rid-of-the-electoral-college

 

The 20-Year-Old Federal Education Provision You’ve Never Heard Of: For Decades, Students Have Had the Right to Transfer Out of ‘Persistently Dangerous’ Schools
https://www.the74million.org/article/the-20-year-old-federal-education-provision-youve-never-heard-of-for-decades-students-have-had-the-right-to-transfer-out-of-persistently-dangerous-schools/

Things Didn’t Go Well When Betsy DeVos Was Confronted With Her Department’s Charter School Fraud
One billion awarded by the federal government’s Charter Schools Program (CSP) went to charter schools that never opened or opened for only brief periods. incidents of financial fraud, waste, and mismanagement in the charter school grant program are likely worse than our first estimate.
Federal Money Wasted on Defunct Charters Is Actually Worse.

#DeleteFacebook your info is breached again and again and again and again and again

HOW TO GET OFF FACEBOOK