[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

"International court’s attack on Israel a sign of the free world’s moral collapse"

"Pete Hegseth Is Right for the DOD"

"Why Our Constitution Secures Liberty, Not Democracy"

Woodworking and Construction Hacks

"CNN: Reporters Were Crying and Hugging in the Hallways After Learning of Matt Gaetz's AG Nomination"

"NEW: Democrat Officials Move to Steal the Senate Race in Pennsylvania, Admit to Breaking the Law"

"Pete Hegseth Is a Disruptive Choice for Secretary of Defense. That’s a Good Thing"

Katie Britt will vote with the McConnell machine

Battle for Senate leader heats up — Hit pieces coming from Thune and Cornyn.

After Trump’s Victory, There Can Be No Unity Without A Reckoning

Vivek Ramaswamy, Dark-horse Secretary of State Candidate

Megyn Kelly has a message for Democrats. Wait for the ending.

Trump to choose Tom Homan as his “Border Czar”

"Trump Shows Demography Isn’t Destiny"

"Democrats Get a Wake-Up Call about How Unpopular Their Agenda Really Is"

Live Election Map with ticker shows every winner.

Megyn Kelly Joins Trump at His Final PA Rally of 2024 and Explains Why She's Supporting Him

South Carolina Lawmaker at Trump Rally Highlights Story of 3-Year-Old Maddie Hines, Killed by Illegal Alien

GOP Demands Biden, Harris Launch Probe into Twice-Deported Illegal Alien Accused of Killing Grayson Davis

Previously-Deported Illegal Charged With Killing Arkansas Children’s Hospital Nurse in Horror DUI Crash

New Data on Migrant Crime Rates Raises Eyebrows, Alarms

Thousands of 'potentially fraudulent voter registration applications' Uncovered, Stopped in Pennsylvania

Michigan Will Count Ballot of Chinese National Charged with Voting Illegally

"It Did Occur" - Kentucky County Clerk Confirms Voting Booth 'Glitch'' Shifted Trump Votes To Kamala

Legendary Astronaut Buzz Aldrin 'wholeheartedly' Endorses Donald Trump

Liberal Icon Naomi Wolf Endorses Trump: 'He's Being More Inclusive'

(Washed Up Has Been) Singer Joni Mitchell Screams 'F*** Trump' at Hollywood Bowl

"Analysis: The Final State of the Presidential Race"

He’ll, You Pieces of Garbage

The Future of Warfare -- No more martyrdom!

"Kamala’s Inane Talking Points"

"The Harris Campaign Is Testament to the Toxicity of Woke Politics"

Easy Drywall Patch

Israel Preparing NEW Iran Strike? Iran Vows “Unimaginable” Response | Watchman Newscast

In Logansport, Indiana, Kids are Being Pushed Out of Schools After Migrants Swelled County’s Population by 30%: "Everybody else is falling behind"

Exclusive — Bernie Moreno: We Spend $110,000 Per Illegal Migrant Per Year, More than Twice What ‘the Average American Makes’

Florida County: 41 of 45 People Arrested for Looting after Hurricanes Helene and Milton are Noncitizens

Presidential race: Is a Split Ticket the only Answer?

hurricanes and heat waves are Worse

'Backbone of Iran's missile industry' destroyed by IAF strikes on Islamic Republic

Joe Rogan Experience #2219 - Donald Trump

IDF raids Hezbollah Radwan Forces underground bases, discovers massive cache of weapons

Gallant: ‘After we strike in Iran,’ the world will understand all of our training

The Atlantic Hit Piece On Trump Is A Psy-Op To Justify Post-Election Violence If Harris Loses

Six Al Jazeera journalists are Hamas, PIJ terrorists

Judge Aileen Cannon, who tossed Trump's classified docs case, on list of proposed candidates for attorney general

Iran's Assassination Program in Europe: Europe Goes Back to Sleep

Susan Olsen says Brady Bunch revival was cancelled because she’s MAGA.

Foreign Invaders crisis cost $150B in 2023, forcing some areas to cut police and fire services: report

Israel kills head of Hezbollah Intelligence.


Status: Not Logged In; Sign In

politics and politicians
See other politics and politicians Articles

Title: Exclusive: Murdered DNC staffer's family, friends set record straight
Source: crimewatchdaily.com
URL Source: https://crimewatchdaily.com/2016/09 ... -set-record-straight/#comments
Published: May 21, 2017
Author: Michelle Sigona
Post Date: 2017-05-21 08:58:06 by sneakypete
Ping List: *Crime and Corruption*     Subscribe to *Crime and Corruption*
Keywords: Clinton, Murder, Corruption
Views: 23300
Comments: 62

Seth Rich, a 27-year-old staffer for the Democratic National Committee, was shot in the back in the early morning hours of July 10, 2016.

"It appears he was targeted," said D.C. Police Captain Anthony Haythe. "He was shot multiple times."

Seth was shot at 4:19 in the morning, just two minutes after hanging up with his girlfriend, Kelsey Mulka.

"We were on the phone just wrapping up our conversation, he had kind of told me that he was getting close to his house," said Mulka.

Seth's grieving girlfriend is speaking out for the very first time since his murder. They had dated for two years.

"There really aren't -- no words -- that can accurately express how devastating and horrific it is to bury someone that you love," said Mulka.

Although there are pockets of darkness, for the most part this neighborhood is pretty well-lit. Investigators tell Crime Watch Daily in the early morning hours of July 10, Seth was walking home. He was only about a block and a half away from home when he was gunned down, shot in the back.

"The officers who were there and they said 'Yeah, he was quite talkative, he did not realize he had been shot,'" said Joel Rich, Seth's father.

But an hour and a half later at a nearby hospital, Seth was pronounced dead.

Heartbreaking news to Kelsey Mulka. She was just on the phone with him, and in a split-second he was gone. Now Mulka is breaking news in our exclusive interview, revealing details, telling Crime Watch Daily there was no sign of trouble in his voice that terrible morning.

"I wasn't alarmed," said Mulka.

"He's kind of known as a goofball, but to me it was very clear to me that there was so much more," said Mulka. "It didn't matter who you were, where you came from or where you were going. If he thought you were in trouble, he wanted to help. If you were sad he was going to make you happy, he was going to make you laugh."

Still reeling from Seth's death, Kelsey is horrified to discover that the story of a conspiracy theory is swirling around his death. It all began on Dutch television. The founder of Wikileaks, Julian Assange, made a shocking assertion.

ASSANGE: There's a 27-year-old that works for the DNC who was shot in the back, murdered.

ANCHOR: That was just a robbery, I believe wasn't it?

ASSANGE: No, there's no finding.

ANCHOR: What are you suggesting?

Assange suggested Seth Rich may have become a target after being accused of leaking DNC emails, which led to the resignation of its chairwoman Debbie Wasserman Schultz.

Seth's best friend, Michael Cass-Antony, is also breaking his silence in this exclusive interview, telling Crime Watch Daily he's disgusted by the reports.

"All those lies that are being bandied about in the news are just that, and the reason that nobody close to him has refuted them is because there's no reason to," said Cass-Antony. "Because he spoke for himself. Because anybody who knows him knows how good of a person he was, knows how much he cared for the DNC and for where he worked and how much he believed in his cause."

But it's not just those close to Seth who adamantly deny those shocking claims. The police department in D.C. doesn't buy it either. The Metropolitan Police Department of the District of Columbia released an official statement which reads, in part:

"At this time, there is no indication that Seth Rich's death is connected to his employment at the DNC." -- Metro DC Police

And just the suggestion of Seth's shooting being a political hit has his parents outraged.

Seth's mom and dad want to set the record straight about the character of their beloved son, and disclose details of this case only to Crime Watch Daily.

"He had just found out he was going to go to work for the Clinton campaign doing data analysis and helping getting people out to vote," said

Seth's parents say he got the offer but tragically never had the chance to accept. They found the beginnings of his letter of acceptance in a draft email on his computer. Seth had only typed two lines, and his parents are sharing it with us.

"'All my life I wanted to be in a position that I can make a difference.' That resonates with me because that is the heart of what my son would have said, and working on Hillary's campaign, he would be making a difference," said Mary Rich, Seth's mother.

Police suspect Seth's murder is connected to a recent rash of robberies.

"There were a few robberies that we have investigated that we're looking into to see if those parties involved in those robberies could be the parties involved in our murder," said D.C. Police Captain Anthony Haythe.

But investigators go on record to confirm that Seth still had his wallet, watch and phone when he was discovered shot in the street.

continued at link......

Click for Full Text!


Poster Comment:

Yeah,he was murdered during a robbery. That's why he wasn't robbed.

I am convinced that his murder had nothing to do with him informing on Clinton/DNC "irregularities" .

Ok,ok,reasonably certain.

OK,OK,OK,I hear they have been making a honest effort to order the murders of fewer people this year than last year because they have mellowed out now that they are geezers. Happy now?

C'mon,people! How many times do we have to read news reports of informers or suspected informers close to the Clintons being murdered before it begins to dawn on people that all these murdered people had ONE thing in common?Subscribe to *Crime and Corruption*

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 55.

#1. To: sneakypete (#0)

There's a claim that his computer had evidence of communications with Wikileaks. Is there no follow up on that, or was it not true?

But even if Seth did not leak the emails to Wikileaks, that doesn't mean he was not killed because of them. He could have been falsely accused as the leak source, and killed because of it.

Pinguinite  posted on  2017-05-21   10:36:38 ET  Reply   Untrace   Trace   Private Reply  


#10. To: Pinguinite (#1) (Edited)

There's a claim that his computer had evidence of communications with Wikileaks. Is there no follow up on that, or was it not true?

I don't know. I don't follow this stuff as closely as I used to. I am burnt out at all the lies and all the partisan politics and Party Animal Games being played by both branches of the Ruling Party.

I am convinced that America,as she stands today,is destined to fall by design of the ruling classes. What sort of government replaces the non-working nightmare we have now all depends on if the globalists or the nationalists win the dust up that follows.

sneakypete  posted on  2017-05-23   11:22:27 ET  Reply   Untrace   Trace   Private Reply  


#12. To: sneakypete (#10)

What sort of government replaces the non-working nightmare we have now all depends on if the globalists or the nationalists win the dust up that follows.

I don't know that history shows us any example at all of an oppressive, native government being overthrown and replaced with one that truly cherishes rights and liberties. In the case of the US revolution, what was deposed was a foreign monarchy over a land that was largely untamed where self sufficiency was a requirement of survival.

Maybe there have been a few cases of oppressive dictatorships being brought down, but whether they were cases where general freedoms were restored, taxes repealed, and government bureaucracy was significantly scaled back, I don't know. People just have a natural tendency to take control of all that is around them, and even when revolutions occur, it's usually not for the purpose of giving, but of taking.

Pinguinite  posted on  2017-05-23   11:48:18 ET  Reply   Untrace   Trace   Private Reply  


#13. To: Pinguinite (#12)

Maybe there have been a few cases of oppressive dictatorships being brought down, but whether they were cases where general freedoms were restored, taxes repealed, and government bureaucracy was significantly scaled back, I don't know. People just have a natural tendency to take control of all that is around them, and even when revolutions occur, it's usually not for the purpose of giving, but of taking.

History is full of examples. Kicking the Catholic Church out of ruling authority all over Europe is one prime example.

Removing monarchies from power all over Europe is another.

The nation created by the America Revolution is another.

Then there are examples due to losing wars,like when Japan lost WW-2 and we forced the Japanese to form another type of government with the Emperor only being a figurehead,and forcing the Nazi's out of power in Germany.

Then there is the example of the west,primarily America,forcing the communists into bankruptcy that resulted in the total collapse and replacement of the communist system there.

Right at this moment the whole west seems to be going through a reverse phase as we are not only allowing medieval jihadists to come in to destroy our nations,we are even paying them for doing so,

sneakypete  posted on  2017-05-23   12:27:37 ET  Reply   Untrace   Trace   Private Reply  


#14. To: sneakypete (#13)

I did mention the US revolution being an exception as it throws off not a native government but a foreign one, and any colonial revolution would qualify. The US was still mostly frontier, even in the east by today's standards, and people were acclimated to self-sufficiency (unlike today) which factored into their politics.

The French revolution deposing it's monarchy was a disaster for the French, and monarchies are not necessarily bad in any event, though it depends entirely on the monarch. I know England had, I think it was one of the King James's for about 3 years but he did such a poor job the English basically fired him and he accepted peaceful and not uncomfortable exile, though maybe my facts aren't quite right on that. Certainly people living under a monarch in the past have had, in sum, more rights and less taxation than present day USA.

But the problem with revolutions is that the rebels that take control invariably do just that, imposing their values on the population just freed from the values of the previous government. And if the kingpin rebel doesn't take control, then some underling more ambitious will cut him down and replace him. But even well meaning people will cause harm by trying to do good. It's a One Ring to Rule Them All type thing. Power corrupts.

So if/when the US fed apparatus collapses, it would create a vacuum of power that any new government would quickly fill. It's one of the reasons I see the proper future of the USA being a breakup into perhaps 6-8 different countries. It's the only way to dissolve the huge black hole in DC sucking up all that's good in the country. Decentralization/outsourcing is already a corporate reality and I think it needs to become a political reality, and I think technology will help make that happen, in time.

Pinguinite  posted on  2017-05-23   13:22:20 ET  Reply   Untrace   Trace   Private Reply  


#15. To: Pinguinite (#14)

Decentralization/outsourcing is already a corporate reality and I think it needs to become a political reality, and I think technology will help make that happen, in time.

Politically it is all about centralizing,and thanks to today's ability to handle data,it will be virtually impossible for a revolution to happen again,ever.

The first,and most important thing they are going to do is eliminate cash and create a digital debit and credit system that contains ALL of every individual on Earth's entire history.

Piss off some government flunky or just be known to run your mouth about "nonsense" like individual liberties,and you are toast. There will be no running and hiding from the authorities because there will be no cash and all of your digital assets will have disappeared the instant some minimum wage government flunkie was ordered to delete your personal ID number.

You won't even be able to buy a cup of coffee at the convenience store where you dialed the toll-free number to tell the authorities where to come and pick you up to take you to the salt mines because people that don't exist don't have bank accounts or ID numbers. The ONLY thing you can do for free is call to turn yourself in.

Beware the cashless society.

sneakypete  posted on  2017-05-23   18:35:46 ET  Reply   Untrace   Trace   Private Reply  


#17. To: sneakypete (#15)

There will be no running and hiding from the authorities because there will be no cash and all of your digital assets will have disappeared the instant some minimum wage government flunkie was ordered to delete your personal ID number.

Even with digital money, control will not necessarily reside with the government. Bitcoin is a decentralized currency that no government, central bank or other entity, governmental or non-governmental, can control. It's not possible to delete a bitcoin wallet. At least not until quantum computing becomes a reality, and then someone will make a quantum currency.

Of course govs will create their own digital currency which would/could be as you describe. But Bitcoin has real market worth that would compete with any electronic debit currency.

Pinguinite  posted on  2017-05-23   21:37:28 ET  Reply   Untrace   Trace   Private Reply  


#22. To: Pinguinite (#17)

But Bitcoin has real market worth that would compete with any electronic debit currency.

No it won't and can't because there won't be anywhere you can legally spend it. What good is money to you that you can't use?

sneakypete  posted on  2017-05-23   22:48:42 ET  Reply   Untrace   Trace   Private Reply  


#27. To: sneakypete (#22)

No it won't and can't because there won't be anywhere you can legally spend it. What good is money to you that you can't use?

Bitcoin is information, and "spending" consists of trading information. You can legally "spend" bitcoin anywhere Freedom of Speech exists.

Pinguinite  posted on  2017-05-23   23:52:51 ET  Reply   Untrace   Trace   Private Reply  


#31. To: Pinguinite, sneakypete (#27)

Bitcoin is information, and "spending" consists of trading information. You can legally "spend" bitcoin anywhere Freedom of Speech exists.

As for U.S. law and your creative interpretations of it, remind me again about why you emigrated to Ecuador.

Only the U.S. government has authority to issue legal currency within the United States. Make any phony crap and issue it as currency and you get prosecuted.

Bitcoin is considered property and not legal tender in any U.S. jurisdiction.

https://en.wikipedia.org/wiki/Virtual_currency

In 2013, Financial Crimes Enforcement Network (FinCEN), a bureau of the US Treasury, in contrast to its regulations defining currency as "the coin and paper money of the United States or of any other country that [i] is designated as legal tender and that [ii] circulates and [iii] is customarily used and accepted as a medium of exchange in the country of issuance", also called "real currency" by FinCEN, defined virtual currency as "a medium of exchange that operates like a currency in some environments, but does not have all the attributes of real currency". In particular, virtual currency does not have legal tender status in any jurisdiction.[2]

[...]

The IRS decided in March 2014, to treat bitcoin and other virtual currencies as property for tax purposes, not currency.[11][12]

[...]

A cryptocurrency is a digital currency using cryptography to secure transactions and to control the creation of new currency units.[21] Since not all virtual currencies use cryptography, not all virtual currencies are cryptocurrencies. Cryptocurrencies are generally not legal tender. Ecuador is the first country attempting a government run digital currency -no cryptocurrency; during the introductory phase from Christmas Eve 2014 until mid February 2015 people can open accounts and change passwords. At the end of February 2015 transactions of electronic money will be possible.[22][23]

https://www.cryptocoinsnews.com/ecuador-bans-bitcoin-favor-own-national-cryptocurrency/

Ecuador Bans Bitcoin In Favor Of Own National Cryptocurrency

Venzen Khaosan on 27/07/2014

On the 23rd of July, the government of Ecuador effectively banned bitcoin, along with all other cryptocurrencies, reports the PanAm Post. The legislation forms part of a reform of the country’s monetary and financial laws. The bill was approved by 91 members of parliament, with 22 votes against and 3 abstentions. President Rafael Correa, who introduced the reform bill, will sign it into law.

[...]

nolu chan  posted on  2017-05-24   16:51:10 ET  Reply   Untrace   Trace   Private Reply  


#34. To: nolu chan (#31)

As for U.S. law and your creative interpretations of it, remind me again about why you emigrated to Ecuador.

Because I like it better. I'll also remind you that a common tactic employed by those losing a debate is to resort to insults. You should be above that.

Only the U.S. government has authority to issue legal currency within the United States. Make any phony crap and issue it as currency and you get prosecuted.

Prosecution is only for imitating US legal tender currency, otherwise known as counterfeiting. Any community wanting to use poker chips as money is free to do so, so long as no representation made about the poker chips being US issued currency.

Bitcoin is considered property and not legal tender in any U.S. jurisdiction.

In particular, virtual currency does not have legal tender status in any jurisdiction.[2]

You bolded the part about currency having "legal tender status". But what is "legal tender"? Correct me if I'm wrong, but currency that is "legal tender" means (at least in the USA) that if you offer payment having that status and the receiver refuses to accept it, the debt is considered paid. In other words, legal tender laws force people to accept crap money as something of real value. Currency is given such status when it has no intrinsic value on its own, as currency with intrinsic value, such as gold and silver does not require legal tender status.

So quite naturally, bitcoin will never, ever, ever have legal tender status. Ever. If someone doesn't want it, they suffer no penalty for refusing it. But even so, bitcoin still is a marketable commodity, albeit a virtual one.

And, by the way, FINCEN doesn't make federal law anyway. And neither does the IRS.

Ecuador Bans Bitcoin In Favor Of Own National Cryptocurrency

Meaning what, exactly? That I could go to jail because I have access to bitcoin which exists solely as data in redundant databases worldwide, And I happen to be walking down the street in Ecuador? Do you think Ecuador law calls for imprisoning anyone who has *access* to bitcoin?

Did you know that you can get a bitcoin debit card? What you do is open an account at an international vendor. They send you a plastic debit card. You deposit bitcoin in your debit card account. And then when you use your card at any point of sale worldwide, or an ATM, the transaction goes through and your account is deducted the equivalent amount of bitcoin, including service fees, of course. So in this case, bitcoin doesn't even enter Ecuador jurisdiction. The exchange between bitcoin and the national currency (US Dollars) takes place in the country having the bitcoin debit card service. So Ecuador cannot do squat (it's not unusual for stupid laws to be passed in Latin America). Did you hear that President Maduro in Venezuela wants to ban lines of people that extend out of bakeries? Apparently the country's food shortage is embarrassing so this is his way of making people not hungry.

But this is what I meant about technology trumping law. This is reality today. Check out wirex: https://wirexapp.com/

Pinguinite  posted on  2017-05-25   1:45:51 ET  Reply   Untrace   Trace   Private Reply  


#37. To: Pinguinite (#34)

As for U.S. law and your creative interpretations of it, remind me again about why you emigrated to Ecuador.

Because I like it better. I'll also remind you that a common tactic employed by those losing a debate is to resort to insults. You should be above that.

Give up with that crap already. You documented it all online and I have copies of your posts and you know it.

Your stated legal arguments were legal nonsense, just as your current legal arguments are delusional.

- - - - - - - - - - - - - - - - - - - -

http://www.cjmciver.org/cgi-bin/lwanread.cgi?2004-09-19 [can no longer access at link]

In your article on The Trial, you stated:

* If I proceed, I've got a 50/50 chance of winning, but I'm being handed a sure 'win' of sorts -- in the form of no criminal record -- on a silver platter.

At that moment the expatriation argument seemed to weigh heaviest of all things. This whole 'justice' system is a joke and I had the opportunity to make it all go away.

I looked at the judge and in what might be my most infamous moment, said 'I'll take it'.

[...]

I'm intrigued, and plan to visit this place -- I'll call it Oz -- and see for myself what it's like, because in my personal situation, with no wife, no kids, and a skill where geography means nothing, I actually have little practical need to stay in America. If learning a new language is the biggest obstical, I can overcome it. I have family that I love and very good friends that are very dear to me here, but beyond that, it seems all the land of the free has to offer me is continued second rate citizenship which culminated with criminal charges on May 17th. Is that actually going to change? The famed retort 'If you don't like America, why don't you leave' isn't just a sarcastic comment anymore. Beyond being a suggestion, it might be a good idea.

When you present your wackaloon views of the law to police or courts, it does not end well. You presumed you can present your nutbaggery to the police and act like a jerk and not face consequences.

What you proved is that you have a right to express your views on the law, and when you act on your misguided views, the police have the right to put your butt in jail. When the rubber met the road, you pleaded guilty, and you had no case to proceed with other than fringe tax protester gobbledygook.

As for your LWAN (Living Without A Number) delusion, you had a Social Security Number all the time, just as you have one now. Once you have one, it stays with you, delusional tax protester gobbledygook notwithstanding. Nor do your delusions entitle you to drive without a valid license, or with a suspended license, without consequences.

Regarding the law, you have a penchant to state things as fact which are directly contrary to actual law or opinions of the U.S. Supreme Court. You are entitled to your opinion even if it is delusional and has no basis in law. Others are entitled to state actual law.

As you discovered, acting on your delusions may entitle you to a jail cell.

And you made clear that you decided to leave the U.S. because you felt all the country had to offer you was continued second rate citizenship, and the best way to make the U.S. justice system leave your life would be for you to leave the country.

nolu chan  posted on  2017-05-25   17:55:03 ET  Reply   Untrace   Trace   Private Reply  


#38. To: nolu chan (#37)

You seem to have forgotten the discussion was about digital current, not me. You should learn to lose with at least a little bit of grace instead of resorting to insults and attacking with issues not raised.

Lawyer strategy: When the law is on your side, pound on the law. When the facts are on your side pound on the facts. When neither is on your side, pound on the table.

Pinguinite  posted on  2017-05-25   23:26:52 ET  Reply   Untrace   Trace   Private Reply  


#44. To: Pinguinite (#38)

You seem to have forgotten the discussion was about digital current, not me. You should learn to lose with at least a little bit of grace instead of resorting to insults and attacking with issues not raised.

Lawyer strategy: When the law is on your side, pound on the law. When the facts are on your side pound on the facts. When neither is on your side, pound on the table.

No, it was about the power of the government.

You were babbling your sovereign citizen nonsense about how the government lacks power to enforce its laws against your sovereign citizen observations. I will not waste my time with your legal babble. The Federal government has enough power to regulate currency.

You pushed the babble of a tax fraudster. He was sent for a second stretch at Club Fed for fraud, and his son followed. The business was shut down by the Federal government and barred by permanent injunction from selling its bogus products regarding the law.

You decided you had the right to drive without a valid license. You tried your sovereign citizen nonsense with the local cops on a traffic stop for driving at night without headlights, was arrested for no valid license, and criminally convicted upon your plea of guilty.

You decided that the way for you to get out from under the sheer power of the local fuzz of Maryland was to retreat to Ecuador. But you still want to tell me that the Federal government is powerless to do much of anything in the face of your proclamations of bogus law.

As for your load of crap that you tried to unload on me that you went to Ecuador "because [you] like it better," that is contradicted by your own contemporary writings.

When the law is on your side, argue actual laws. When the facts are on your side, argue the facts. And when you have no real argument, make up sovereign citizen nonsense and proclaim the lack of power of the Federal government. Or the lack of power of the state of Maryland. But do it from Ecuador, and not in a U.S. courtroom, or to a cop. That ends predictably.

https://www.youtube.com/watch?v=VnSd-E3Hb3Y

Judge Hysterically Owns a Sovereign Citizen

https://www.youtube.com/watch?v=aptvDqvt5M4

Sovereign Citizen in Court on Trial for No Valid Registration -- GUILTY

https://www.youtube.com/watch?v=0Dvcd4Yzqjs

Sovereign Citizen: The Sitcom - Gettin' Tazed

nolu chan  posted on  2017-05-31   17:28:54 ET  Reply   Untrace   Trace   Private Reply  


#45. To: nolu chan (#44)

No, it was about the power of the government.

It was at the point of discussion about bitcoin where you suddenly decided to issue a personal attack instead of discussing the issue of the legality of bitcoin. If you think I said something about cryptocurrency that wasn't accurate, then the proper response, assuming you choose to respond at all, which is, of course optional on your part, would be to refute it, not issue a personal attack.

I am not the one that turned the discussion from bitcoin to me. That was you who did that. I suppose I should be flattered that you consider me so important.

Since you didn't post any legal material refuting my statement about it being legal for a community to use poker chips as money instead of US legal tender, and given that is your practice to do so, I think it's safe to assume you searched but found no such material.

Legal Tender laws create an obligation only on the receiver of legal tender, not the person who tenders. If two people make an exchange of maple leaves for real goods or services, it's not a violation of legal tender law. Counterfeit laws prohibit creating something that purports to be legal tender US currency. It is not against the law to make rounds of metal of whatever sort so long as no representation is made that they are legal US currency.

Now on the issue of cryptocurrency, I am a software professional and I have studied cryptocurrency and blockchain technology. So while you likely know more about so-called case law and such than me, I likely know more about Information Technology issues than you do, including bitcoin and cryptocurrency. That you despise me as greatly as you do doesn't change that. I suggest you grow up and get used to that fact. Once you do, you'll be amazed at what it's like to carry on objective discussions like an adult.

Pinguinite  posted on  2017-06-01   2:02:12 ET  Reply   Untrace   Trace   Private Reply  


#55. To: Pinguinite (#45)

Protecting one's privacy for a criminal enterprise using the Tor (The Onion Router) network (created by DARPA and the NRL and since federally funded) and the Onion browser (created by DARPA and NRL and since federally funded) and Bitcoin (created anonymously) and the SHA256 hash (created by the NSA) — it's foolproof, what could possibly go wrong?

https://en.wikipedia.org/wiki/Ross_Ulbricht

[excerpt]

Ross Ulbricht

Ross William Ulbricht (born March 27, 1984) is a former darknet market operator, best known for being convicted of creating and running the Silk Road website until his arrest. He was known under the pseudonym "Dread Pirate Roberts".

Ulbricht was convicted of money laundering, computer hacking, conspiracy to traffic fraudulent identity documents, and conspiracy to traffic narcotics in February 2015. He is currently serving a life sentence without the possibility of parole. The conviction and sentence went to appellate court, but the appeal was denied on May 31, 2017.

[...]

Silk Road, arrest and trial

Main article: Silk Road (marketplace) § Arrest and trial of Ross Ulbricht

"The Dread Pirate Roberts" attributed his inspiration for creating the Silk Road marketplace as "Alongside Night and the works of Samuel Edward Konkin III." As early as 2009 Ulbricht had been contemplating the idea of building an online black market that would use Tor and bitcoin to evade law enforcement. Tor is a protocol which encrypts data and routes internet traffic through intermediary servers which anonymize IP addresses before reaching a final destination. By hosting his market as a Tor site, Ulbricht could conceal its IP address. Bitcoin is a cryptocurrency; while all bitcoin transactions are recorded in a log, the blockchain, if users can avoid linking their identities to their online "wallets" they can conduct transactions with considerable anonymity.

Ulbricht began work on developing his online marketplace in 2010 as a side project to Good Wagon Books. He also sporadically kept a diary during the operating history of Silk Road; in his first entry he outlined his situation prior to launch, and predicted he would make 2011 "a year of prosperity" through his ventures. Ulbricht may also have included a reference to Silk Road on his LinkedIn page, where he discussed his wish to "use economic theory as a means to abolish the use of coercion and aggression amongst mankind" and claimed "I am creating an economic simulation to give people a first-hand experience of what it would be like to live in a world without the systemic use of force." To author Nathaniel Popper, the creation of Silk Road was an act of "sheer desperation" after Ulbricht exhausted most of the nest egg he had out of college on his failed businesses. Ulbricht moved to San Francisco prior to his arrest.

Ulbricht was first connected to "Dread Pirate Roberts" by Gary Alford, an IRS investigator working with the DEA on the Silk Road case, in mid-2013. In October 2013, Ulbricht was arrested and accused by the Federal Bureau of Investigation (FBI) of being the "mastermind" behind the site. Ulbricht was taken into custody at the Glen Park branch of the San Francisco Public Library.

To prevent Ulbricht from encrypting or deleting data on the laptop he was using to run the site as he was arrested, two agents pretended to be quarreling lovers. When they had sufficiently distracted him, one of the agents took his computer away and inserted a USB flash drive that cloned all the data on the hard drive. Agent Chris Tarbell presented Ulbricht the warrant for his arrest.

Ulbricht was charged with money laundering, computer hacking, conspiracy to traffic narcotics, and procuring murder. The charge of procuring murder was removed from the indictment although the evidence was factored into Ulbricht's sentence. Ulbricht was convicted of all the remaining charges after a jury trial that concluded in February 2015. He was sentenced to life imprisonment without the possibility of parole on 29 May 2015. His lawyers submitted an appeal on 12 January 2016, centered on claims that the prosecution illegally withheld evidence of DEA agents' malfeasance in the investigation of Silk Road, for which they were convicted. The oral hearing for the appeal was 6 October 2016.. On May 31, 2017, the United States Court of Appeals for the Second Circuit denied Ulbricht's appeal, and affirmed the judgment of conviction and life sentence, in a written opinion authored by the Honorable Gerard E. Lynch, United States Circuit Judge.

- - - - - - - - - - - - - - - - - - - -

https://en.wikipedia.org/wiki/Silk_Road_(marketplace)#Arrest_and_trial_of_Ross_Ulbricht

Silk Road (marketplace)

Silk Road was an online black market and the first modern darknet market, best known as a platform for selling illegal drugs. As part of the dark web, it was operated as a Tor hidden service, such that online users were able to browse it anonymously and securely without potential traffic monitoring. The website was launched in February 2011; development had begun six months prior. Initially there were a limited number of new seller accounts available; new sellers had to purchase an account in an auction. Later, a fixed fee was charged for each new seller account.

In October 2013, the Federal Bureau of Investigation (FBI) shut down the website and arrested Ross William Ulbricht under charges of being the site's pseudonymous founder "Dread Pirate Roberts". On 6 November 2013, Silk Road 2.0 came online, run by former administrators of Silk Road. It too was shut down, and the alleged operator was arrested on 6 November 2014 as part of the so-called "Operation Onymous”.

Ulbricht was convicted of eight charges related to Silk Road in U.S. Federal Court in Manhattan and was sentenced to life in prison without possibility of parole.

The prosecutor believed that none of the six contracted murders-for-hire occurred. One charge of procuring murder is to be dealt with in a separate pending trial in Maryland; the other five were never filed.

He is currently serving his life sentence at the Metropolitan Correctional Center, New York.

[...]

Arrest and trial of Ross Ulbricht

Ulbricht was indicted on charges of money laundering, computer hacking, conspiracy to traffic narcotics, and attempting to have six people killed. Prosecutors alleged that Ulbricht paid $730,000 to others to commit the murders, although none of the murders actually occurred. Ulbricht ultimately was not prosecuted for any of the alleged murder attempts.

The FBI initially seized 26,000 bitcoins from accounts on Silk Road, worth approximately $3.6 million at the time. An FBI spokesperson said that the agency would hold the bitcoins until Ulbricht's trial finished, after which the bitcoins would be liquidated. In October 2013, the FBI reported that it had seized 144,000 bitcoins, worth $28.5 million, and that the bitcoins belonged to Ulbricht. On 27 June 2014, the U.S. Marshals Service sold 29,657 bitcoins in 10 blocks in an online auction, estimated to be worth $18 million at current rates and only about a quarter of the seized bitcoins. Another 144,342 bitcoins were kept which had been found on Ulbricht's computer, roughly $87 million. Tim Draper bought the bitcoins at the auction with an estimated worth of $17 million, to lend them to a bitcoin start-up called Vaurum which is working in developing economies of emerging markets.

[...]

On March 15, 2015, director/screenwriter Alex Winter debuted at the South by Southwest Film Festival a movie based on Silk Road. Deep Web gives the inside story of the arrest of Ross Ulbricht.

In a letter to Judge Forrest before his sentencing, Ulbricht stated that his actions through Silk Road were committed through libertarian idealism and that "Silk Road was supposed to be about giving people the freedom to make their own choices" and admitted that he made a "terrible mistake" that "ruined his life".

On May 29, 2015, Ulbricht was given five sentences to be served concurrently, including two for life imprisonment without the possibility of parole. He was also ordered to forfeit $183 million. Ulbricht’s lawyer Joshua Dratel said that he would appeal the sentencing and the original guilty verdict. On May 31, 2017, the United States Court of Appeals for the Second Circuit denied Ulbricht's appeal, and affirmed the judgment of conviction and life sentence, in a written opinion authored by the Honorable Gerard E. Lynch, United States Circuit Judge.

- - - - - - - - - - - - - - - - - - - -

https://en.wikipedia.org/wiki/Tor_(anonymity_network)

Tor (anonymity network)

Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the next node destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.

An adversary might try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user's computer. The NSA had a technique that targets a vulnerability – which they codenamed "EgotisticalGiraffe" – in an outdated Firefox browser version at one time bundled with the Tor package, and in general, targets Tor users for close monitoring under its XKeyscore program. Attacks against Tor are an active area of academic research, and are welcomed by the Tor Project itself. However, Tor was not only developed for a time in the early 2000s by individuals who "were on contract from DARPA and the U.S. Naval Research Laboratory", but since its inception the bulk of its funding has come from the federal government of the United States.

History

The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Onion routing was further developed by DARPA in 1997.

The alpha version of Tor, developed by Syverson and computer scientists Roger Dingledine and Nick Mathewson and then called The Onion Routing project, or TOR project, launched on 20 September 2002. The first public release occurred a year later. On 13 August 2004, Syverson, Dingledine and Mathewson presented "Tor: The Second-Generation Onion Router" at the 13th USENIX Security Symposium. In 2004, the Naval Research Laboratory released the code for Tor under a free license, and the Electronic Frontier Foundation (EFF) began funding Dingledine and Mathewson to continue its development.

In December 2006, Dingledine, Mathewson and five others founded The Tor Project, a Massachusetts-based 501(c)(3) research-education nonprofit organization responsible for maintaining Tor. The EFF acted as The Tor Project's fiscal sponsor in its early years, and early financial supporters of The Tor Project included the U.S. International Broadcasting Bureau, Internews, Human Rights Watch, the University of Cambridge, Google, and Netherlands-based Stichting NLnet.

From this period onwards, the majority of funding sources came from the U.S. government.

In November 2014 there was speculation in the aftermath of Operation Onymous that a Tor weakness had been exploited. A representative of Europol was secretive about the method used, saying: "This is something we want to keep for ourselves. The way we do this, we can’t share with the whole world, because we want to do it again and again and again." A BBC source cited a "technical breakthrough" that allowed the tracking of the physical location of servers, and the number of sites that police initially claimed to have infiltrated led to speculation that a weakness in the Tor network had been exploited. This possibility was downplayed by Andrew Lewman, a representative of the not-for-profit Tor project, suggesting that execution of more traditional police work was more likely. However, in November 2015 court documents on the matter generated serious ethical security research as well as Fourth Amendment concerns.

- - - - - - - - - - - - - - - - - - - -

https://theintercept.com/2015/07/01/nsas-google-worlds-private-communications/

XKEYSCORE

NSA's Google for the World's Private Communications

Morgan Marquis-Boire, Glenn Greenwald, Micah Lee
The Intercept
July 1 2015, 9:49 a.m.

[excerpt]

One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.

[...]

XKEYSCORE for hacking: Easily collecting user names, passwords and much more

XKEYSCORE plays a central role in how the U.S. government and its surveillance allies hack computer networks around the world. One top-secret 2009 NSA document describes how the system is used by the NSA to gather information for the Office of Tailored Access Operations, an NSA division responsible for Computer Network Exploitation (CNE) — i.e., targeted hacking.

Particularly in 2009, the hacking tactics enabled by XKEYSCORE would have yielded significant returns as use of encryption was less widespread than today. Jonathan Brossard, a security researcher and the CEO of Toucan Systems, told The Intercept: “Anyone could be trained to do this in less than one day: they simply enter the name of the server they want to hack into XKEYSCORE, type enter, and are presented login and password pairs to connect to this machine. Done. Finito.” Previous reporting by The Intercept revealed that systems administrators are a popular target of the NSA. “Who better to target than the person that already has the ‘keys to the kingdom?’” read a 2012 post on an internal NSA discussion board.

This system enables analysts to access web mail servers with remarkable ease.

The same methods are used to steal the credentials — user names and passwords — of individual users of message boards.

Hacker forums are also monitored for people selling or using exploits and other hacking tools. While the NSA is clearly monitoring to understand the capabilities developed by its adversaries, it is also monitoring locations where such capabilities can be purchased.

Other information gained via XKEYSCORE facilitates the remote exploitation of target computers. By extracting browser fingerprint and operating system versions from Internet traffic, the system allows analysts to quickly assess the exploitability of a target. Brossard, the security researcher, said that “NSA has built an impressively complete set of automated hacking tools for their analysts to use.”

Given the breadth of information collected by XKEYSCORE, accessing and exploiting a target’s online activity is a matter of a few mouse clicks. Brossard explains: “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds. Simple. As easy as typing a few words in Google.”

These facts bolster one of Snowden’s most controversial statements, made in his first video interview published by The Guardian on June 9, 2013. “I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge to even the president, if I had a personal email.”

[...]

- - - - - - - - - - - - - - - - - - - -

https://en.wikipedia.org/wiki/Tailored_Access_Operations

Tailored Access Operations

The Office of Tailored Access Operations (TAO) is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least circa 1998. TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States. The NSA terms these activities "computer network exploitation".

TAO is reportedly "now the largest and arguably the most important component of the NSA's huge Signals Intelligence Directorate (SID)[7] (SIGINT), consisting of more than 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers."

A document leaked by former NSA contractor Edward Snowden describing the unit's work says[not in citation given] TAO has software templates allowing it to break into commonly used hardware, including “routers, switches, and firewalls from multiple product vendor lines". According to The Washington Post, TAO engineers prefer to tap networks rather than isolated computers, because there are typically many devices on a single network.

[...]

Organization

TAO's headquarters are termed the Remote Operations Center (ROC) and are based at the NSA headquarters at Fort Meade, Maryland. TAO also has expanded to NSA Hawaii (Wahiawa, Oahu), NSA Georgia (Fort Gordon, Georgia), NSA Texas (San Antonio, Texas), and NSA Colorado (Buckley Air Force Base, Denver).

Since 2013, the head of TAO is Rob Joyce, a 25-plus year employee who previously worked in the NSA's Information Assurance Directorate (IAD). In January 2016, Joyce had a rare public appearance when he gave a presentation at the Usenix’s Enigma conference.

In the Remote Operations Center, 600 employees gather information from around the world. Their motto is "Your data is our data, your equipment is our equipment - anytime, any place, by any legal means."[citation needed]

Data Network Technologies Branch: develops automated spyware

Telecommunications Network Technologies Branch: improve network and computer hacking methods

Mission Infrastructure Technologies Branch: operates the software provided above

Access Technologies Operations Branch: Reportedly includes personnel seconded by the CIA and the FBI, who perform what are described as "off-net operations," which means they arrange for CIA agents to surreptitiously plant eavesdropping devices on computers and telecommunications systems overseas so that TAO's hackers may remotely access them from Fort Meade. Specially equipped submarines, currently USS Jimmy Carter, are used to wiretap fibre optic cables around the globe.

Virtual locations

Details [citation needed] on a program titled QUANTUMSQUIRREL indicate NSA ability to masquerade as any routable IPv4 or IPv6 host. This enables an NSA computer to generate false geographical location and personal identification credentials when accessing the Internet utilizing QUANTUMSQUIRREL.

nolu chan  posted on  2017-06-02   18:03:57 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 55.

        There are no replies to Comment # 55.


End Trace Mode for Comment # 55.

TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com