Posts tagged evidence
Gold, Einstein And The Great Fed Robbery
One of Einstein’s great contributions to mankind was the theory of relativity, which is based on the fact that there is a real limit on the speed of light. Information doesn’t travel instantly, it is limited by the speed of light, which in a perfect setting is 186 miles (300km) per millisecond. This has been proven in countless scientific experiments over nearly a century of time. Light, or anything else, has never been found to go faster than 186 miles per millisecond. It is simply impossible to transmit information faster.
Too bad that the bad guys on Wall Street who pulled off The Great Fed Robbery didn’t pay attention in science class. Because hard evidence, along with the speed of light, proves that someone got the Fed announcement news before everyone else. There is simply no way for Wall Street to squirm its way out of this one.
Before 2pm, the Fed news was given to a group of reporters under embargo – which means in a secured lock-up room. This is done so reporters have time to write their stories and publish when the Fed releases its statement at 2pm. The lock-up room is in Washington DC. Stocks are traded in New York (New Jersey really), and many financial futures are traded in Chicago. The distances between these 3 cities and the speed of light is key to proving the theft of public information (early, tradeable access to Fed news).
We’ve learned that the speed of light (information), takes 1 millisecond to travel 186 miles (300km). Therefore, the amount of time it takes to transmit information between two points is limited by distance and how fast computers can encode and decode the information on both sides. Our experience analyzing the impact of hundreds of news events at the millisecond level tells us that it takes at least 5 milliseconds for information to travel between Chicago and New York. Even though Chicago is closer to Washington DC than New York, the path between the two cities is not straight or optimized: so it takes information a bit longer, about 7 milliseconds, to travel between Chicago and Washington. It takes little under 2 milliseconds between Washington and New York.
Therefore, when the information was officially released in Washington, New York should see it 2 milliseconds later, and Chicago should see it 7 milliseconds later. Which means we should see a reaction in stocks (which trade in New York) about 5 milliseconds before a reaction in financial futures (which trade in Chicago). And this is in fact what we normally see when news is released from Washington.
However, upon close analysis of millisecond time-stamps of trades in stocks and futures (and options, and futures options, and anything else publicly traded), we find that activity in stocks and futures exploded in the same millisecond. This is a physical impossibility. Also, the reaction was within 1 millisecond, meaning it couldn’t have reached Chicago (or New York): another physical possibility. Then there is the case that the information on the Fed Website was not readily understandable for a machine – less than a thousandth of a second is not enough time for someone to commit well over a billion dollars that effectively bought all stocks, futures and options.
Minutes before the Fed announcement at 14:00 on September 18, 2013, there was significant activity in Comex Gold Futures (traded in Chicago) and the ETF symbol GLD (traded in New Jersey). This gives us an opportunity to measure closely, the exact (to the millisecond) amount of time between trading between these two instruments. The first two charts show about 3.5 minutes of time around the Fed Announcement release, giving us an overview. The stack of charts that follow allow you to easily compare between GLD (New York) and GC Futures (Chicago) for 6 different active periods. You will see that in the first 5 pairs – before the announcement, activity first shows up in GC Futures, followed by activity in GLD between 5 and 7 milliseconds later. In the last pair, which compares activity at exactly 14:00:00.000, you will see both GC futures and GLD react exactly at the same time.
See also: More Charts of Evidence.
1. Animation of December 2013 Gold (GC) Futures followed by GLD stock on September 18, 2013 from 13:57 to 14:00:30.
2. Zooming in 150 milliseconds of time for the high activity periods minutes before and during the annoucement.
The chart shows first, Gold Futures (GC – traded in Chicago) followed by GLD (traded in New York)and clearly show events minutes before the news release: you can clearly see that Gold Futures (GC) trades before GLD. The chart shows the event at 14:00:00, where Gold Futures trades at the exact same time as GLD stock. This is physically impossible unless information was already present in Chicago and New York. It’s easiest if you compare the bottom panels of each chart which shows trading volume for each millisecond.
There are 2 possibilities, and both aren’t good news for Wall Street.
1. Released by a News Organization
The Fed news was condensed by a news service into a simple “No Tapering” message that was placed on news servers co-located next to trading machines in both New York and Chicago at some time before 2pm. The news machines are programmed to release the information at precisely 2pm, allowing the algos to react immediately at both locations. This is how some news services release privately compiled statistics like the Consumer Confidence or Chicago PMI.
In those cases, we see the exact behavior as in the last 2 charts above – an immediate reaction in New York and Chicgo. But the Fed news was released from a lock-up room which prevents transmission of any information to the outside world. Given that several large news organizations were recently caught doing this we think it’s less likely they would do something so bold, so soon. That leaves us with possibility number 2.
2. Leaked to Wall Street
The Fed news was leaked to, or known by, a large Wall Street Firm who made the decision to pre-program their trading machines in both New York and Chicago and wait until precisely 2pm when they would buy everything available. It is somewhat fascinating that they tried to be “honest” by waiting until 2pm, but not a thousandth of a second longer. What makes this a more likely explanation is this: we’ve found that news organizations providing timed release services aren’t so good about synchronizing their master clock – and often release plus or minus 15 milliseconds from actual time. Their news machines in New York and Chicago still release the data at the exact same millisecond, but with the same drift in time as the master clock. That is, we’ll see an immediate market reaction at say, 15 milliseconds before the official scheduled time, but in the same millisecond of time in both New York and Chicago. Historically, these news services have shown a time drift of about 30 milliseconds (+/- 15ms), which places the odds that this event was from a timed news service at about 10%.
What also makes this the more likely conclusion is this: we know the Bureau of Labor Statistics has recently hardened access to their lock-up room, weeding out all but respected news organizations. So imagine a reporter for one of these news organizations who is tasked with distilling the Fed news into a simple message that machines could read in less than a millisecond and interpret to mean, “buy all the things now”.; It’s unlikely that Wall Street would place so much responsibility on one news reporter. It is also unlikely that respected news organizations would tolerate this behavior.
We think it was leaked. The evidence is overwhelming.
By CBC News Posted: Aug 6, 2013 5:11 AM ET | Last Updated: Aug 6, 2013 5:30 AM ET
Surveillance questions snowball: 5 stories you may have missed
From a new spy tool to heckling hackers
As former U.S. security contractor Edward Snowden settles into a new, albeit temporary, home in Russia, he’s left a storm of questions about mass surveillance in his wake.
Part of the famous fugitive’s deal with Moscow is that he’s not allowed to release information harmful to the United States during his one-year reprieve in the country, Russian President Vladimir Putin has said.
But before Snowden left the transit zone in Moscow’s Sheremetyevo airport for a more hospitable location in Russia, he released a torrent of documents about the United States’ use of mass surveillance — further stirring up a surveillance controversy he ignited in early June.
In the past week, media outlets published shocking new details based on the documents from Snowden, while U.S. officials continued to struggle with the fallout by publishing documents of their own.
Here’s a look at the top five mass surveillance stories from the past few days.
U.S. doles out money to U.K. spy agency
How close is too close? The Guardian revealed on Thursday that in the past three years, the U.S. National Security Agency paid at least £100 million — about $157 million Canadian — to its United Kingdom counterpart.
The payments raise fears about the grip that Washington may hold on the U.K. intelligence agency, the Government Communications Headquarters (GCHQ). Documents suggest the NSA felt that the GCHQ “remains short of the full NSA ask” and the GCHQ worried that “it must pull its weight.”
In the documents, the U.K. intelligence agency also brags that it supplied “unique contributions” to the U.S. investigation into an American who attempted a car bomb attack in New York City’s Times Square in 2010.
Surveillance tool collects ‘nearly everything’
In June, Snowden made a bold statement to the Guardian. He said that while sitting at his desk, he could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email.”
Now, the Guardian says they have the documents that triggered Snowden’s statement. On Wednesday, they released leaked files from Snowden that reveal the existence of a top-secret NSA program called XKeyscore.
The program gives analysts the ability to sift through vast databases that contain emails, online chats and browsing histories of millions of people. Users don’t appear to require a warrant or authorization to use the program. Snowden said he used it during his time as a Booz Allen contract working at the NSA.
Documents tout it as the “widest reaching” system for developing intelligence from computer networks, and say it covers “nearly everything a typical user does on the internet” from content of emails and websites visited to searches. A 2008 document brags that intelligence captured by XKeyscore had helped capture 300 terrorists.
The Guardian describes the quantity of communications accessible via XKeyscore and other such programs as “staggeringly large,” with one 2007 NSA report estimating about up to two billion records are added every day to NSA databases that already contain more than one trillion records.
Some telecommunications experts compared the program to efforts by private companies to collect “big data” to better understand customer habits. But the news also spurred renewed calls for transparency about how much personal information is being collected and by whom.
NSA director faces heckling hackers
Meanwhile, the U.S. government is still struggling to counter public backlash after the first round of revelations by Snowden in early June.
At the Black Hat conference — an annual get-together of hackers and security experts in Las Vegas — NSA director Gen. Keith Alexander used his keynote speech to defend the government’s collection of phone and internet records.
Hecklers interrupted the four-star general’s speech, calling him a liar and telling him to read the constitution. But Alexander largely held his own and appeared to get a favourable reception in the end after jousting with the hecklers.
The director of the intelligence agency also revealed a few new details during the speech in an attempt to assuage public concern. He said that only 35 analysts at NSA are authorized to query a database of U.S. phone records.
Alexander also said that NSA’s collection of phone call metadata and internet records of foreigners has resulted in the disruption of 54 terrorist activities, including 13 in the United States. Of those disrupted activities, 42 — more than three-quarters — were terrorist plots.
Back in Washington, lawmakers were skeptical of the number. Sen. Patrick Leahy, a Democrat who chairs the Senate judiciary committee said, “Not by any stretch can you get 54 terrorist plots.”
NSA counters with its own document dump
New surveillance revelations kept Washington politicians busy during the past week. There was word Thursday that U.S. President Barack Obama convened a meeting with members of Congress. And on Wednesday, a judiciary committee hearing discussed the bulk collection of phone and internet records.
Shortly before the judiciary committee got underway, the Obama administration released three documents about record collection that it had declassified from top secret, part of its effort to placate opposition.
The documents are an April 2013 secret court order and two briefing papers for Congress from 2009 and 2011. Among the findings in them:
- The court order says the government can only access phone records when there is a “reasonable” suspicion that the number is associated with terrorism.
- Phone and internet metadata programs violated court orders in 2009 due to both “technical compliance” and “human implementation” errors. Those issues were later fixed, documents say.
- There’s a computer-run program that sifts through phone records using certain approved terms and then dumps that information into a “corporate store.”
Civil liberties advocates said the documents reveal a broader collection of records than previously thought.
When bulk records turn into evidence
If document releases from both sides weren’t enough, a court case also provided news on the hot topic.
It came out in a terrorism prosecution involving two Pakistan-born brothers living in Florida who are accused of a plot to bomb sites in New York in 2012.
A Miami federal court filing in the case revealed a change of course for the U.S. The justice department acknowledged the need during a terrorism prosecution to tell defendants that bulk record surveillance was used to build the case against them.
That acknowledgement may provide citizens and privacy advocates with the nugget of information they need to challenge NSA surveillance. For years, cases challenging the laws failed because there was no proof an individual had been prosecuted using these mass surveillance techniques.
Copyright © CBC 2013
Republished with permission
Posted by Robert Wenzel
Murder Mystery(?) Michael Hastings and a CyberSecurity Firm Called Endgame
Reports are beginning to surface about a connection between the reporter Michael Hastings and a mysterious cybersecurity firm known as Endgame.
Hastings has been linked to Barrett Brown, who the government alleges is the leader of the hacker group Anonymous. Brown is in jail and is being held without bail. The web site Free Barrett Brown reports:
Having previously been raided by the FBI on March 6, 2012 and not charged with any crime in relation to that incident, on September 12, 2012 Barrett Brown was again raided and this time arrested by the Federal Bureau of Investigation while he was online participating in a Tinychat session. He was subsequently denied bail and detained without charge and adequate medical treatment for over two weeks while in the custody of US Marshals. In the first week of October 2012, he was finally indicted on three counts.
These charges are related to alleged activities or postings on popular websites such as Twitter and YouTube, in which he postured for the return of property which was taken from him in March, and expressed frustration at the targeted campaign against him and a member of his family. The Department of Justice issued a press release at the time.
Also, according to the web site, Hastings was planning to interview Brown:
Before his untimely death, Hastings was working on a story about Barrett, announcing mysteriously to his followers “Get ready for your mind to be blown.” Hastings had been in touch with Barrett’s lawyers, and intended to interview him in June for the story. Barrett has been in prison for 281 days pending trial, and faces over a hundred years imprisonment for what Hastings called ”trumped up FBI charges regarding his legitimate reportorial inquiry into the political collective known sometimes as Anonymous.”
Before his suspicious death in a fiery car crash, Hastings seemed to confirm this planned interview, in a tweet and hinted it was relative to a very big story:
Barrett, at the time he was arrested,was studying Endgame. The Nation reports:
Brown began looking into Endgame Systems, an information security firm that seemed particularly concerned about staying in the shadows. “Please let HBGary know we don’t ever want to see our name in a press release,” one leaked e-mail read. One of its products, available for a $2.5 million annual subscription, gave customers access to “zero-day exploits”—security vulnerabilities unknown to software companies—for computer systems all over the world. Business Week published a story on Endgame in 2011, reporting that “Endgame executives will bring up maps of airports, parliament buildings, and corporate offices. The executives then create a list of the computers running inside the facilities, including what software the computers run, and a menu of attacks that could work against those particular systems.” For Brown, this raised the question of whether Endgame was selling these exploits to foreign actors and whether they would be used against computer systems in the United States. Shortly thereafter, the hammer came down.
The FBI acquired a warrant for Brown’s laptop, gaining the authority to seize any information related to HBGary, Endgame Systems, Anonymous and, most ominously, “email, email contacts, ‘chat’, instant messaging logs, photographs, and correspondence.” In other words, the FBI wanted his sources.
So what is Endgame? According to Darker Net:
Found at: http://wchildblog.com
By David Dayen, AlterNet:
Bank of America Whistle-blower Bombshell: “We Were Told to Lie” to Rip Off Borrowers
Bank of America whistle-blowers detail horrid schemes to fleece borrowers, reward staff for foreclosures.
Bank of America’s mortgage servicing unit systematically lied to homeowners, fraudulently denied loan modifications, and paid their staff bonuses for deliberately pushing people into foreclosure: Yes, these allegations were suspected by any homeowner who ever had to deal with the bank to try to get a loan modification – but now they come from six former employees and one contractor, whose sworn statements were added last week to a civil lawsuit filed in federal court in Massachusetts.
“Bank of America’s practice is to string homeowners along with no apparent intention of providing the permanent loan modifications it promises,” said Erika Brown, one of the former employees. The damning evidence would spur a series of criminal investigations of BofA executives, if we still had a rule of law in this country for Wall Street banks.
Image added to wchildblog.com post.
In a video from Glenn Beck he indicates that he has evidence that will rock the administration. Personally, I am not a Beck follower or supporter, having seen his past attacks and accusations of supports of Dr. Ron Paul, the fake media dramatic tears, 9-12 movement with D.C. event coverage and such over the years. My personal opinion is Glenn Beck transforms himself into whatever form is projected to appeal best to a current and future audience. Statist turned conservative, turned Tea Party, turned Libertarian, Las Vegas may have odds on the next transformation? I hope that putting all hats aside he will settle on being a concerned individual seeking truth and promoting Liberty. Time will tell shortly, if the information in this video fact or fiction.
Offering this post up as a FYI, and tomorrows result will either promote praises or tar and feathers. I bet you 5:3 Vegas has odds on this one to
What does he know?
Whatever it is, Glenn Beck implies that it is powerful enough to bring down the Administration.
More Boston event sources posted here.
=-[[[ (MischiefInMaryville walks across the keyboard)
UK officials plan to monitor Britons’ online activities by placing surveillance devices on the country’s telecom networks, a Parliamentary report says. The program would keep tabs on which websites were visited as well as who contacted whom.
On Tuesday the British Parliament’s Intelligence and Security Committee published the report outlining a massive, national surveillance program based in the country’s very electronic infrastructure. The report does not specify the number of so-called “probes” to be installed across Britain’s telecommunications networks, but says it would be part of a regime stockpiling information on nearly every move Britons make online.
“It’s been in the media and on the table of the government since last April and it’s been receiving quite a lot of attention, as you can imagine the people in Great Britain don’t like the thought of the government collecting all of their communications in this way. From their point of view, it goes against the very basis of the democratic institution that is our parliament in Britain,” deputy director of Big Brother Watch, Emma Carr, told RT.
The new program will go beyond just keeping tabs on the Brits. If anyone abroad communicates online with someone in the UK then it will allow surveillance of their personal information as well, stretching the program’s geographical reach.
The government says the installation of the probes will be critical in the online fight against terrorism and other crime, and that the content of emails or Skype calls would not necessarily be collected. Instead, they say, the program would keep track of so-called “outside the envelope” information – such as a message’s origin and recipient. An email’s contents would be accessible with a court order, though time and date of sending and receipt would be available with the authorization of a senior law enforcement or intelligence officer.
Which online services the probes would monitor were not identified in the report. However, Facebook, Twitter, Hotmail, and Google Chat are all widely used in the UK and are mentioned in other sections of the report.
However, people use encryption more and more during communicating with others on the web. It could significantly complicate the life of those, who will be trying to keep track of every word sent or received vie internet, believes Carr.
“One of the things, that came out of the evidence when was being gathered for this bill is that encryption is a very widely used tool by people who communicate via internet. And actually that’s going to make the kind of inspection of the communications that we have very difficult for the government and the internet service providers, who are going to be asked to gather all of this information,” she added.
The report said the surveillance regime would function on deep packet inspection, a monitoring method that lets an individual who intercepts data to search its contents. Though the project is still in draft form, the committee generally rejected critics’ claims that it would constitute an oppressive domestic spying program, saying that without such new security measures, rapidly developing technologies would soon “have a serious impact on the intelligence and security agencies.”
“Under current European data retention laws, deep packet inspection is not only legal, but also widely used by the private sector,” the report notes. “Whilst legislation is not a perfect solution,” it states elsewhere, “we believe it is the best available option.”
Likening the new surveillance program to an Orwellian vision of the future, investigative journalist Tony Gosling told RT that the UK should “protect the people from this Big Brother state” rather than shutting them in an “electronic cage.”
“There is great commercial pressure for this intrusion since much of this information can be sold quietly to rich corporations and commercial concerns. This is something the public cannot compete with, this lobbying power backed by commercial interests,” noted Gosling. He went on to say that this dark side to big business that “leads to a dictatorial fascist system similar to that in Nazi Germany.”
In the future, if the changes are implemented Gosling concluded that “people will think twice before emailing Orwellian Britain” and speculated that there could be a boost to the old-fashioned postal services.
By Jon Rappoport
(NaturalNews) His name is Marty Makary. He’s a cancer surgeon and researcher at the Johns Hopkins School of Medicine and the School of Public Health.
Propublica’s Marshall Allen interviewed him about patient harm, in conjunction with an ongoing propublica investigation.
Keep in mind that these quotes are coming from a mainstream doctor who is inside the system and who believes in the system. That makes Makary’s statements all the more shocking.
“…1 in 4 hospital patients are harmed by a mistake.”
“A cardiologist in Wisconsin was fired for pointing out that EKGs were misread more than 25% of the time.”
“We [doctors] are also evaluated by the number of ‘value units’ at the end of each fiscal quarter. Our management will sit down with us and say your work units are down or up and in order for you to receive a large bonus you need to increase the number of operations you do…”
“There is New England Journal of Medicine-level data that suggests that almost half of [health] care is not compliant with evidence.” [In other words, almost 50% of all health care in America isn't even based on published mainstream studies...and, I should add, there is conclusive evidence that half of these studies are untrustworthy in the first place. Therefore, to say that conventional doctors are winging it is a vast understatement. JR]
“…up to 30% of health care in unnecessary…”
“I saw cases where a patient was not told about a minimally invasive way of doing a particular surgery because of physician preference or training, and the doctor would just hope the that he [the patient] wouldn’t find out.”
The lead researcher behind the monumental study that linked Monsanto’s GMOs and best-selling herbicide Roundup to tumor development and early death is now blowing the whistle on many corporate scientists who are not just close to Monsanto and profit-harvesting GMO crops — many of them actually have or are seeking their own GMO patents. These patents, of course, enable them to make bountiful amounts of cash. Other corporate scientists are on (or ‘were’ at one point) Monsanto’s pay roll, including former Monsanto executive turned Deputy Commissioner for Foods at the FDA Michael R. Taylor.
Dr. Gilles-Eric Séralini, a French scientists who has been under assault from Monsanto and pro-GMO scientists, was responsible for perhaps the largest awakening over the dangers of Monsanto’s GMO foods that we have ever seen. Not only did the public begin to further recognize the existence and threat of GMOs thanks to his research, but numerous countries like Russia and others actually enacted a suspension on the import of genetically modified maize due to public health concerns.
This, of course, upset the Monsanto-funded corporate scientists who proverbially ‘unleashed the dogs’ on Dr. Séralini. Even Monsanto released a comment, stating that the lifelong rat study wasn’t sufficient to substantiate any real health concerns. The company itself, amazingly, only conducted a 90 day trial period for its GMOs before unleashing them on the public.
Previous Peer-Reviewed Evidence Highlighting GMO Danger Ignored by ‘Scientists’
It’s important to remember that Séralini’s work may be the most popular within the media, but it’s not the only research linking GMOs and Roundup to serious health effects. Monsanto and fellow goons failed to mention this truth, especially the fact that Monsanto’s Roundup has been associated with over 29 negative health conditions according to peer-reviewed studies available on PubMed. And these conditions are nothing minor. Health effects linked to Roundup include:
- DNA damage
- Low testosterone
- Liver damage
- Endocrine disease
These are serious disorders that result from the very Roundup that is used on crops by farmers worldwide before hitting your dinner table. In fact an increased amount of usage is now needed thanks to ineffective GMO crops that are now being eaten by mutated superbugs that have developed a resistance to Monsanto’s built-in GMO pesticides. Roundup covered crops that eventually land on dinner tables worldwide.
http://NextNewsNetwork.com | Next News Network’s WHDT World News Program airs daily at 6pm and 11pm Eastern on Comcast, DirecTV and Over-the-Air and Online at http://usmediavault.com/WHDT.html
WHDT World News is available to 6 million viewers from South Beach to Sebastian, Florida and to 2 million viewers in Boston, Massachusetts via WHDN.
WHDT broadcasts on RF channel 44 (virtual channel 9) from Palm City and is carried on cable TV channels 44 (SD) and 1044 (HD) by AT&T, on cable channels 17 (SD) and 438 (HD) in West Palm Beach by Comcast, on satellite channel 44 (SD) in West Palm Beach by DIRECTV, and on WHDN-Boston which broadcasts on RF channel 38 (virtual channel 6) from the Government Center district in downtown Boston.
More about WHDT: http://en.wikipedia.org/wiki/WHDT
Like us on Facebook: http://Facebook.com/NextNewsNet
Follow us on Twitter: http://Twitter.com/NextNewsNet
Subscribe to our YouTube Channel:
By David Rose
The Mail on Sunday today reveals shocking new evidence of the full horrific impact of US drone attacks in Pakistan.
A damning dossier assembled from exhaustive research into the strikes’ targets sets out in heartbreaking detail the deaths of teachers, students and Pakistani policemen. It also describes how bereaved relatives are forced to gather their loved ones’ dismembered body parts in the aftermath of strikes.
The dossier has been assembled by human rights lawyer Shahzad Akbar, who works for Pakistan’s Foundation for Fundamental Rights and the British human rights charity Reprieve.
Filed in two separate court cases, it is set to trigger a formal murder investigation by police into the roles of two US officials said to have ordered the strikes. They are Jonathan Banks, former head of the Central Intelligence Agency’s Islamabad station, and John A. Rizzo, the CIA’s former chief lawyer. Mr Akbar and his staff have already gathered further testimony which has yet to be filed.
How the attacks unfolded…
1. A US Air Force officer controls the drone from a base in Nevada.
2. The drone makes its way to the target in Pakistan.
3. The operator picks out the strike site using images from the Predator.
4. Tribesman later asses the wreckage caused by a missile attack.
‘We have statements from a further 82 victims’ families relating to more than 30 drone strikes,’ he said. ‘This is their only hope of justice.’
In the first case, which has already been heard by a court in Islamabad, judgment is expected imminently. If the judge grants Mr Akbar’s petition, an international arrest warrant will be issued via Interpol against the two Americans.