Bitcoin for Beginners and Dummies! Easily understand all ...
Bitcoin For Dummies: Amazon.es: Prypto, Consumer Dummies ...
Bitcoin For Dummies: Amazon.co.uk: Prypto ...
Bitcoin for dummies - Video - CNET
Weekly Update: 24 crypto assets live on ParJar fiat on/off ramp, FantomVision PWA, $LINK + Voyager, $GHOST for $ESH Hodlers... – 17 Apr - 23 Apr'20
Hiya folks! Hope the shelter-at-home is treating you well. As you might know that the super cyclone Amphan struck Eastern India and Bangladesh day before yesterday. As a result, I went into radio silence for two days. Now that I am back in the grid (albeit with ultra-super slow internet; this post took 4+ hours of retries just to upload pictures), let’s get rolling with the weekly update catch-up series again. Here’s your week at Parachute + partners (17 Apr - 23 Apr'20): 24 cryptocurrencies are now live on ParJar for trading with fiat in Europe, India and UK. This is massive! The new ParJar and #cryptoforeveryone masks look great Clinton! Designers in Parachute, Clinton is looking for fresh original designs for merchandise in the Parachute Shop. You can bag some cool $PAR and discount codes if your art makes it to the store. The #par4par raffle currently has a 500k $PAR prize pool. If you have 10k $PAR in your ParJar, you can claim a ticket. Get in on it! Foo hosted a Parena so that winners can get a taste of the raffle with their prize $PAR. Bose hosted a random TTR trivia this week for a 10k $PAR prize pot. Don't forget her rules: "you argue and you're wrong, you skip next question". Gamerboy's Tiproom quiz theme was a secret. Did you find out what it was? Charlotte’s Tuesday TTR trivia was fun as always. Victor hosted an animal-themed trivia for 1k $PAR in prize per question. Two-for-Tuesday continued with the ongoing series of letters. This week Gian got Parachuters to post music "featuring bands or artists whose name starts with the letters M, N, O or P". As always, super thankful for the playlist Sebastian! 136 music videos in total. Dang! Jason’s #wholesomewed prompt involved Parachuters sharing unconventional art pieces. "They can be made by you or someone else". Visit the Parachute Shop for more epic merch like these Uber cool #wholesomewed entries by (clockwise from top left) Fakhir, Erol, Pars, Georg, Eric, OilJam, Peace Love Click here to track this week’s aXpire burn transaction. CEO Gary Markham wrote about Time Recording in his latest blog post. More insights into 2gether’s study about women in crypto were released. This is part of their original study report on female crypto consumers which was first published in March. $BOMB founder Zachary Dash set the ball rolling on a proposal system for brainstorming on ideas for the project. Click here for a sample proposal. For #XIOSocial discussions, Citizens talked about what interest rate would be ideal for $XIO when the dApp launches. $LINK was added to Voyager’s platform this week. Click here for the full range of available assets. Voyager also featured in MyFirstBitcoin.info's list of "Where To Buy Bitcoin". They also launched an integration with crypto trading education platform Market Rebellion this week. Switch announced that $ESH token holders will be eligible to claim John McAfee-backed $GHOST coins on 25th May. News of Ghost’s launch was shared in bitcoin.com, Cointelegraph, CoinPedia, Crypto News Flash and CryptoNewsZ. Neva Fomo’s review of SwitchDex was released this week. The winners of the #BUIDLonFantom Developer contest were announced this week. The FantomVision block explorer was upgraded to a Progressive Web App (PWA) which can be installed on your device as an application. The team hosted a monthly AMA in their Discord. This will be happening every month from now. A new technical paper on smart was contracts was published as well. Bitcoin is a clear favourite for trading among female users Bounty0x’s fundraiser on Republic came to a close this week with funding crossing over targeted amount by nearly three times. Founder Angelo Adam also shared a sneak peek into how the Hypedia platform could look like. Uptrennd Head of Community, Luke, started an #InfectedWithGratitude giveaway that brought 2 days of wholesome joy to the community. Founder Jeff Kirdeikis sat down for an Altcoin Buzz interview to talk all things crypto. IOST joined Uptrennd this week. Coingecko joined in the fun too. Awesome! Congratulations on onboarding 30k+ new users in 2020 alone. The team also set the ball rolling for a community-powered blockchain awards. The District0x District Weekly can be read here. Meme Factory now has a fixture inside the virtual world of Cryptovoxels. Hydro made it to the semifinal round of Ground Up Ventures’ March Madness Startup Competition. Congrats! With news of Google’s smart debit card leaking out recently, the team at Hydro discussed the implications of the tech giant entering digital banking. They also wrote at length about FinTech in Brazil and strategies to bank the unbanked. The team also made a presentation at the Canada FinTech Summit this week. For the latest Sentivate development updates click here, here, here and here. SelfKey’s $KEY token was listed on Kyber Network this week. Read more details here. The team opened up an AMA questionnaire form for the community. AMA date not decided yet. They are also hiring currently. Apply if you’re up for it. SimpleSwap listed $KEY and joined SelfKey’s Crypto Exchange Marketplace. To learn more about Constellation’s ERC20 to mainnet $DAG swap, click here. COTI crew sat down for an AMA with KuCoin this week. The KuCoin staking campaign (announced last week) reached its cap within 5 minutes of opening up. If you were hoping to be a mode operator, hope you reached out to the team on time. To read the fee policy, click here. $COTI will be listed on Coinbit next week. Main registration for Staking 2.0 was started. The Hypedia mockups look great! Pynk is now SEIS/EIS approved which entitles investors in its fundraise round to tax benefits. Wibson hosted an online meetup with Crypto Resources Academy for their Spanish community. This was followed by an ETHSantiago meetup to discuss data privacy. Harmony founder Stephen Tse was part of a Miami DevCon Fintech panel to talk about DeFi and blockchain in finance. Also, congratulations on becoming the top blockchain project by GitHub activity. Stake Heist was formally opened with bounties to find bugs in the Open Staking Testnet Network and build stuff on it for some sweet $ONE. Delegators were also invited to test the staking dashboard in return for $ONE prizes. Watch more about it here. $ONE got listed on WazirX. Ankr published a comprehensive Open Staking node setup guide. Another major announcement this week was that a chunk of block rewards from staking in the phase 2 testnet will be converted to mainnet $ONE. Woohoo! Click here for an early sneak peek into the new IntelliShare website. A quick introduction of the testnet Pacific Program was also released. In his latest article, GET Protocol CEO Maarten Bloemers expanded on the significance of contactless ticketing in the post-coronavirus world. The article was an excerpt from the team’s submission to the Dutch Ministry of Public Health, Welfare and Sport to explore possible opportunities. Maarten was interviewed by HKB News of Korea where talked about all things GET. Their crowd management solution was featured on Cointelegraph as well. And with that, we have to say Bye for now. See you again with another update. Cheerio!
EDIT: I'm really baffled as to why there are people downvoting this. You're only preventing other people on the sub-reddit from seeing this by doing so. Think about other people who have been looking for some of these links for months before you downvote this post for zero reason. New Thread for y'all! Here are the TestFlight links I have come across so far. I will update this continually as I find more and as you guys post more. Happy testing! Tip: Use Ctrl+F to find links to your favorite applications quicker If you like what you see, feel free to Venmo me! I just graduated college and will have to start paying back loans soon, so anything is extremely appreciated. Feel free to send me your username too, if you want a shoutout on this post! Venmo: MichaelBertolino Old Post: https://www.reddit.com/iOSBeta/comments/9so4u8/discussion_testflight_public_beta_links/ Update #1: Added column for the people who wanted to know when new links were added. You're welcome. Update #1.5: I will remove the links after every tenth link that is added, so make sure to check the list daily! Update #2: Since this list is becoming a lot bigger, I'm adding a column for apps that I endorse (whether I like them or not) or have on my phone, so that people can find better quality apps quicker. Up to date as of 10/24/19 @ 10:05 AM EST
Courtesy of u/DarkUv77 & Yours Truly // Go into the settings within the Microsoft Edge browser and look at the middle option for "Join Microsoft Edge Beta" and badda-boom-badda-bing
Youtube is CENSORING Bitcoin educational video for no obvious reason! [it's spam, SCAM or deceptive?!?!]
As some of you know we produce educational bitcoin videos. Well our last one was taken down for violating youtube guidelines. Of course no one tells you what exactly you have violated. At first I was sure it's mistake but they just rejected my appeal confirming they see reason for the suspension, without pointing the actual reason though. So please help me figure out the reason and also to make some noise around this case, beucase we shouldn't leave thinkgs like that. Here is mirror of the video at Vimeo: https://vimeo.com/102230977 and here is the orignal version at youtube, so you can see the suspension notice https://www.youtube.com/watch?v=XImwmL4eBXk and here is our previous work, which isn't touched yet, and can give you better idea for the kind of content we do:
Download any of these for free at https://oppfiles.com/585933 DM me if you have any requests for anything not on the list. If you want solution manuals/testbanks, you can also request them Almost all the books are in their latest editions and some of them are available in multiple editions too. Please subscribe the sub to find all the latest textbook releases. Enjoy!
Microeconomics, Student Value, 7th Edition: Jeffrey M. Perloff
Cracking the AP Psychology Exam, 2017 Edition: Proven Techniques to Help You Score a 5 (College Test Preparation): Princeton Review
Introduction to Abnormal Child and Adolescent Psychology, 3rd Edition: Robert Weis
Managerial Economics, 4th Edition: Luke M. Froeb & Brian T. McCann & Michael R. Ward & Mike Shor
Writing that Works: Communicating Effectively on the Job: Walter E. Oliu & Charles T. Brusaw & Gerald J. Alred
Horngren's Financial & Managerial Accounting, The Financial Chapters, Global 5th Edition: Tracie L. Miller-Nobles & Brenda L. Mattison & Ella Mae Matsumura
Biology: The Dynamic Science: Peter J. Russell, Paul E. Hertz, Beverly McMillan
CCENT ICND1 100-105 Exam Cram: Anthony Sequeira
31 Days Before Your CCNA Routing & Switching Exam: A Day-By-Day Review Guide for the ICND1/CCENT (100-105), ICND2 (200-105), and CCNA (200-125) Certification Exams: Allan Johnson
Global Capitalism: Its Fall and Rise in the Twentieth Century: Jeffry A. Frieden
The Origins of the Modern World: A Global and Environmental Narrative from the Fifteenth to the Twenty-First Century (World Social Change), 3rd Edition: Robert B. Marks
Transformations: Women, Gender and Psychology, 2nd Edition: Mary Crawford
Strategic Compensation: A Human Resource Management Approach, Global 8th Edition, : Joseph J. Martocchio
Terrorism in the 21st Century, 7th Edition: Cynthia C. Combs
Campbell Biology, Canadian 2nd Edition: Steven A. Wasserman
Barron's ACT, 2nd edition (Barron's Act (Book Only)): Brian W. Stewart
The Official ACT Prep Guide: ACT
Ultimate Guide to the Math ACT: Richard Corn
Corporate Communication (Irwin Business Communications), 7th Edition: Paul A Argenti
Biological Psychology, 12th Edition: James W. Kalat
Financial Accounting: IFRS, 3rd Edition: Jerry J. Weygandt & Paul D. Kimmel & Donald E. Kieso
Society and Technological Change, 7th Edition: Rudi Volti
Java Foundations: Pearson New International 3rd Edition: John Lewis & Peter DePasquale & Joe Chase
University Physics with Modern Physics, 14th Edition: Hugh D. Young & Roger A. Freedman & A. Lewis Ford & Francis Weston Sears
Gateways to Art: Understanding the Visual Arts, 2nd Edition: Debra J. DeWitte & Ralph M. Larmann & M. Kathryn Shields
Essentials of Abnormal Psychology, 7th Edition: V. Mark Durand & David H. Barlow
Finite Mathematics, 6th Edition: Stefan Waner & Steven Costenoble
New Perspectives Microsoft Office 365 & Access 2016: Comprehensive: Mark Shellman & Sasha Vodnik
Environment: The Science behind the Stories: Jay H. Withgott & Matthew Laposata
Digital Planet: Tomorrow's Technology and You, Introductory (Computers Are Your Future), 10th Edition: Ben Beekman & George Beekman
Architecture and Interior Design: An Integrated History to the Present: Buie Harwood & Bridget May & Curt Sherman
Curren's Math for Meds: Dosages and Solutions, 11th Edition: Anna M. Curren & Margaret Witt
The Legal Environment of Business: Text and Cases, 10th Edition: Frank B. Cross & Roger LeRoy Miller
Prentice Hall's Federal Taxation 2015 Comprehensive: Thomas R. Pope & Timothy J. Rupert & Kenneth E. Anderson
Drug Use and Abuse: A Comprehensive Introduction, 9th Edition: Howard Abadinsky
Davis's Canadian Drug Guide for Nurses, 15th Edition: April Hazard Vallerand & Cynthia A Sanoski & Judith Hopfer Deglin
Psychology, 12th Edition: Carole Wade & Carol Tavris
How to Nurse: Gweneth Hartrick Doane & Colleen Varcoe
The Advertising Concept Book: Think Now, Design Later, 3rd Edition: Pete Barry
Software, Infrastructure, Labor: A Media Theory of Logistical Nightmares: Ned Rossiter
Organic Chemistry, 8th Edition: Paula Yurkanis Bruice
Humanities: Culture, Continuity and Change, The, Volume I, 3rd Edition: Henry M. Sayre
Financial Accounting, 9th Edition: Robert Libby
Preface to Marketing Management, 14th Edition: J. Paul Peter
Fundamentals of Differential Equations, 9th Edition: R. Kent Nagle & Edward B. Saff & Arthur David Snider
New Dimensions in Women's Health: Linda Lewis Alexander & William Alexander & Judith H. LaRosa & Helaine Bader
Essentials of Economics, 10th Edition: Bradley Schiller
Purchasing and Supply Management (The Mcgraw-Hill Series in Operations and Decision Sciences), 15th Edition: P. Fraser Johnson
Biological Science, 6th Edition: Scott Freeman,Kim Quillin,Lizabeth Allison,Michael Black,Emily Taylor,Author
Critical Thinking: A Students Introduction, 5th Edition: Gregory Bassham & William Irwin & Henry Nardone & James Wallace
Music for Sight Singing, 6th Edition: Thomas E. Benjamin & Michael Horvit & Robert S. Nelson
Microsoft Office 2013: Advanced (Shelly Cashman Series): Misty E. Vermaat
Entrepreneurship, 4th Edition: Andrew Zacharakis & William D. Bygrave & Andrew C. Corbett
Blockchain: Ultimate guide to understanding blockchain, bitcoin, cryptocurrencies, smart contracts and the future of money: Mark Gates
Understanding Computers: Today and Tomorrow, Comprehensive, 16th Edition: Deborah Morley & Charles S. Parker
The Boundaries of Australian Property Law: Hossein Esmaeili & Brendan Grigg
New Perspectives on Computer Concepts 2016, Introductory: June Jamrich Parsons
California Politics and Government: A Practical Approach, 14th Edition: Larry N. Gerston & Terry Christensen
Foodservice Organizations: A Managerial and Systems Approach, 8th Edition: Mary B. Gregoire
The Elements of Moral Philosophy, 8th Edition: James Rachels
Social Science: An Introduction to the Study of Society, 16th Edition: Elgin F. Hunt & David C. Colander
Psychiatric Nursing, 7th Edition: Norman L. Keltner & Debbie Steele
Microsoft SQL Server 2016: A Beginner's Guide, Sixth Edition (Beginner's Guides): Dusan Petkovic
The Analytic Hospitality Executive: Implementing Data Analytics in Hotels and Casinos (Wiley and SAS Business Series): Kelly A. McGuire
Diseases of the Human Body, 6th edition: Carol D Tamparo
Principles of Corporate Finance (Mcgraw-Hill/Irwin Series in Finance, Insurance, and Real Estate): Richard Brealey
Gerontological Nursing, 8th Edition: Charlotte Eliopoulos
How to Use SPSS®: A Step-By-Step Guide to Analysis and Interpretation, 9th Edition: Brian C Cronk
What is Life? A Guide to Biology, 3rd Edition: Jay Phelan
Archaeology: Theories, Methods, and Practice (Seventh Edition): Colin Renfrew & Paul Bahn
Problem Solving and Program Design in C, 8th Edition: Jeri R. Hanly & Elliot B. Koffman
Economics, 4th Edition: Paul Krugman & Robin Wells
Strategic Brand Management, Global 4th Edition: Kevin Keller
Winningham's Critical Thinking Cases in Nursing: Medical-Surgical, Pediatric, Maternity, and Psychiatric, 6th Edition: Mariann M. Harding & Julie S. Snyder
Maternal-Newborn Nursing The Critical Components of Nursing Care, 2nd Edition: Roberta Durham & Linda Chapman
Object-Oriented Software Engineering: An Agile Unified Methodology: David Kung
Ebersole and Hess' Gerontological Nursing and Healthy Aging, Canadian 1st Edition: Theris A. Touhy & Kathleen F Jett & Veronique Boscart & Lynn McCleary
Varcarolis's Canadian Psychiatric Mental Health Nursing, Canadian 1st Edition: Margaret Jordan Halter
Understanding Global Cultures: Metaphorical Journeys Through 34 Nations, Clusters of Nations, Continents, and Diversity, 6th Edition: Martin J. Gannon & Rajnandini K. Pillai
Principles of Contract Law, 3d (Concise Hornbook Series): Robert Hillman
Understanding Motor Development: Infants, Children, Adolescents, Adults, 7th edition: David Gallahue & John Ozmun & Jacqueline Goodway
Maternal, Fetal, & Neonatal Physiology (Maternal Fetal and Neonatal Physiology), 4th Edition: Susan Blackburn
Japanese From Zero! 1: Proven Techniques to Learn Japanese for Students and Professionals: George Trombley
Making Sense of Mass Education: Gordon Tait
Starting Out with Java: From Control Structures through Objects, 6th Edition: Tony Gaddis
Grant's Dissector, 16th edition: Alan J. Detton
Principles of Information Systems, 13th Edition: Ralph Stair & George Reynolds
OAuth 2 in Action: Justin Richer & Antonio Sanso
Study Guide for Fundamentals of Nursing: Geralyn Ochs
Shelly Cashman Series Microsoft Office 365 & Access 2016: Comprehensive: Philip J. Pratt & Mary Z. Last
Mastering the Requirements Process: Getting Requirements Right, 3rd Edition: Suzanne Robertson & James Robertson
CISSP Guide to Security Essentials, 2nd Edition: Peter Gregory
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, 3rd Edition: Joel Scambray
Campbell Biologie: Gymnasiale Oberstufe (Pearson Studium - Biologie Schule) (German Edition): Neil A. Campbell & Jane B. Reece
Linux Hardening in Hostile Networks: Server Security from TLS to Tor (Pearson Open Source Software Development Series): Kyle Rankin
Fundamentals of Electric Circuits, 6th Edition: Charles Alexander
A History of Western Society Since 1300, Advanced Placement: John P. McKay & Bennett D. Hill & John Buckler & Clare Haru Crowston & Merry E. Wiesner-Hanks & Joe Perry
Ways of the World with Sources for AP*: Robert W. Strayer & Eric W. Nelson
The Earth and Its Peoples: A Global History, Volume I: To 1550, 6th Edition: Richard Bulliet & Pamela Crossley & Daniel Headrick & Steven Hirsch & Lyman Johnson
Voyages in World History, Volume 2, 3rd Edition: Valerie Hansen & Ken Curtis
Probability & Statistics for Engineers and Scientists with R: Michael Akritas
Crime, Victims and Justice: Essays on Principles and Practice: Marijke Malsch
Contemporary Business, Canadian Edition: Louis E. Boone & David L. Kurtz & Michael Khan & Brahm Canzer
Automation, Production Systems, and Computer-Integrated Manufacturing, 4th Edition: Mikell P. Groover
Accounting, 26th Edition: Carl S. Warren & James M. Reeve & Jonathan Duchac
Social Psychology, 9th Edition: Elliot Aronson & Timothy D Wilson & Samuel R. Sommers
Cracks in the Schoolyard—Confronting Latino Educational Inequality: Gilberto Q. Conchas
The Internet of Risky Things: Trusting the Devices That Surround Us: Sean Smith
Foundations of Business, 5th Edition: William M. Pride & Robert J. Hughes & Jack R. Kapoor
Effective Help Desk Specialist Skills: Darril Gibson
Social Psychology, 12th Edition: David Myers
Becoming a Critical Thinker: A User-Friendly Manual, 6th Edition: Sherry Diestler
Prioritization, Delegation, and Assignment - E-Book: Practice Excercises for the NCLEX Exam: Linda A. LaCharity & Candice K. Kumagai & Barbara Bartz
Qualitative Inquiry in Neoliberal Times (International Congress of Qualitative Inquiry Series): Unknown
The Official (ISC)2 Guide to the SSCP CBK, 4th Edition: Adam Gordon & Steven Hernandez
Fundamentals of Futures and Options Markets, 9th Edition: John C. Hull
Practice Makes Perfect: Advanced French Grammar: All You Need to Know For Better Communication (Practice Makes Perfect Series): Véronique Mazet
New Grade 9-1 GCSE Chemistry: AQA Revision Guide: CGP Books
New Grade 9-1 GCSE Biology: AQA Revision Guide: CGP Books
New Grade 9-1 GCSE Physics: AQA Revision Guide: CGP Books
Project Management For Dummies, 4th edition: Portny, Stanley E.
PMP Project Management Professional Review Guide, 3rd Edition: Kim Heldman
PMP® Certification All-in-One For Dummies®, 2nd Edition: Snyder, Cynthia
PMP® Exam Simplified: Updated for 2016 Exam (PMP® Exam Prep Series Book 4), 5th Edition: Aileen Ellis
The Complete ‘Ace Your PMP® Exam’ Series: Essential PMP® Concepts Simplified: Shiv Shenoy
Crack the New (2016) PMP® Exam in 4 Weeks: Using Simple, Proven, Step-by-Step Approach (Ace Your PMP® Exam): Shiv Shenoy
PMP Project Management Professional Study Guide, 4th Edition (Certification Press): Joseph Phillips
Public Policy: Politics, Analysis, and Alternatives, 5th Edition: Michael E. Kraft & Scott R. Furlong
Working With Challenging Parents of Students With Special Needs: Jean Cheng Gorman
Statistics in Practice, 1st Edition: David S. Moore & William I. Notz & Michael A. Fligner
Introduction to Programming with C++,International Edition, 3rd Edition: Y Daniel Liang
Focus on Personal Finance, 5th Edition: Les Dlabay & Robert J. Hughes & Jack Kapoor & Melissa Hart
Leviathan: Thomas Hobbes, Edwin Curley
Exploring Microsoft Word 2016 Comprehensive (Exploring for Office 2016 Series): Mary Anne Poatsy & Linda Lau & Lynn Hogan
Real World Psychology, 2nd Edition: Catherine A. Sanderson & Karen Huffman
Sociology: A Down-to-Earth Approach, 13th Edition: James M Henslin
Part one My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise. However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States. In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever… Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare. Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites. Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager. My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field.. I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) . Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised. The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange. Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking. Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one) Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law. It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank. Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up. Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be. From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen? You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card. These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved. Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen. The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘. These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially. All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to. The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards. It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist. If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late…. Part 2 The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers) Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched. Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply. Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds. One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here). Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop. The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained. A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this. Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor. Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing… “Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim. After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground. A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon. Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains. “Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.” The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet. Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis. About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal. Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job) Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us. We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register. The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
Part one My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise. However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States. In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever… Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare. Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites. Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager. My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field.. I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) . Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised. The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange. Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking. Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one) Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law. It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank. Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up. Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be. From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen? You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card. These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved. Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen. The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘. These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially. All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to. The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards. It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist. If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late…. Part 2 The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers) Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched. Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply. Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds. One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here). Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop. The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained. A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this. Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor. Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing… “Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim. After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground. A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon. Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains. “Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.” The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet. Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis. About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal. Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job) Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us. We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register. The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
part 3: down the NodeRed rabbit hole - resurrection (long)
so, now that i've got about 4 weeks of NR experience under my belt, i thought i would do a follow up and show a few new flows. plus, i've picked up a few new hardware add-ons. namely a Harmony Hub and a coupla Sonoff/Tasmota S31. one of the new things i did was setup some global.variables i can use in any flow. https://imgur.com/YFJEwRd 1] is pretty obvious, does my bayesian sensors think i'm home/not_home, and then save it to a global.variable. 2] reads the MQTT for my S31 power monitor on my dumb TV. if it's > 100, then the TV is ON, <= 99, then TV is OFF (or in the process of turning off). then set a global.variable for on/off. https://imgur.com/mcuS1Vk 3] i changed the day/night temperatures to global.variables. 4] this one gets the current volume level of my Sonos and then stores that to a global.variable. (get to why further below) 5] this one i talked about in another post here: https://www.reddit.com/homeassistant/comments/abvqup/device_tracker_with_unifi2mqtt/ okay, so now that i know if my dumb TV is on/off, then i can add it into my "away" (and "bedtime") flow. that gray one on the bottom right is using the HarmonyHub control node to fire the power toggle. (which i'll get to further below) plus it'll stop my Sonos, if it's playing. https://imgur.com/nerbMv3 also you may notice the "alexa TTS" one, that's a subflow, which is a bit of reusable flow, you can put anywhere you want it. this one picks a random number between 1 and 10, then alexa TTS plays the corresponding message. https://imgur.com/bLtBlaD this was also my attempt to get alexa to say "aaaf-firmative" like newt in aliens. https://imgur.com/cUnG1IE doesn't really work, but i'm determined to make this happen. gonna have to figure out the proper phonetics of it. then i'm totally gonna get her to do a stutter like max headroom on one of the other responses. but, my ultimate goal is to get her to do "twiki" from buck rogers. beaty beaty anyways, i've also added that subflow to all my switch on/offs. along with an MQTT log. https://imgur.com/SnpAnW8 now for some of the new stuff... here's a sleep timer. if i'm listening to music in bed, i can activate this with "alexa turn on sleep" and what it does, is it takes the current volume level of my Sonos, stored in a global.var, stores it in a flow.var, then subtracts 1 every minute, until it reaches zero. if the volume is at 30, then it'll be 30 mins until zero. https://imgur.com/7QmbY2S once it reaches zero, it stops the music, sets the volume back to the original state (ie: 30) and then turns itself off. there's an issue when you use something like a Harmony Hub to turn on/off dumb devices via input_bool, or switches, or lights, etc.: that once you turn it on via NR, HA, HHub, Alexa, etc., then HA thinks it's on. if you then turn it off via the device remote, HA won't let you turn it on again, because HA thinks its already on. so, i had to use a script and a "dummy" input_boolean. by dummy i mean, that i do not care, and will not EVER care, what it's state is. on. off. whatever. won't need it. it just needs to be there for the script to work.
input_boolean: mac_x: game_x: candles_x: tv_x:
hide them from emu_hue, cause Alexa doesn't need to see them either.
so instead of key'ing off the input_booleans, i key off the script call. "alexa, turn on candles" calls the script, which toggles the i_b but i only care about the state change of the script. then NR does it's thing. https://imgur.com/Hky9fWd notice tho, that it's a little smart. if the tv is already on, via that global.var, then it just switches inputs, otherwise it turns it on, waits 7 seconds, then switches inputs. okay, here's something REALLY advanced. i have a second pi running cgminer with a USB hub and some USB stick ASIC bitcoin miners. and every once and a while, they stop working and need to be reset. and you can't just restart, you gotta kill the power to the hubs to get them to reset. and then restart cgminer. enter NR cgminer node and the cgminer API. https://imgur.com/POSkjrp so every 5 mins, hit the cgminer API, it returns stats in json, dump those to mqtt. use the function node to pull out the array nested values we need to look at. look for a zero value in any of them. if the input_boolean "auto-reset-miner" is on, then lets reset. stop cgminer, wait, turn off the USB hub, wait, turn on hub, wait, start cgminer, send an alert to mqtt and SMS me. now the real magic is the red exec "start cgminer" node. because we stopped cgminer, we have to start it again, on a whole other computer than NR is on. it basically does a SSH into the miner pi and starts up cgminer. this was difficult to accomplish inside a docker of NR. i had to move some ssh keys around and then reference them with full paths. then i had to do an ssh-copy-id so it didn't require a password.
My Sister’s Health has Been Mysteriously Failing For Years, and I Think I Know Why [Part 2]
Part 1 here. Hello Reddit. I’m back with an update. I’ve been at Jesse’s since yesterday. We found some odd files on the hard drive. The files are almost exclusively videos, they last anywhere from six seconds to two hours. Jesse says that when he opened the drive, on a virtual machine inside a dummy computer of his, all the files were hidden even though the drive is full. He told me he revealed the files, and watched a few before calling me. When I arrived, he was trying to get into one of the worn old laptops. My heart was pounding when he sat me down at his desk with the dummy laptop to peruse the hard drive files. “Now, none of the videos are violent or abusive, so don’t worry about that.” He paused. “At least, none of the videos I’ve seen, I guess.” I nodded gravely and opened “My Computer”. The drive was titled “Paradise Land”, I stared at it for a moment before digging deep inside myself and clicking on it. An endless list of filenames appeared, starting with DCIM_081290.mp4. “Are you okay to go through this while I keep working on the laptop?” “Yeah, yeah you try to get into that.” I said, almost automatically. I was feeling numb, and beyond reality. Jesse gave me some earbuds and went over to the mess of cords and two computers on his bed, and I stared down the list of filenames. DCIM_092690.mp4, DCIM_102990.mp4, DCIM_010291.mp4: the filenames aren’t sequential and they seem like random numbers. Finally I flared my nostrils and clicked the first one. Jesse was right, it was just kids. Four children, probably five years old or younger, were playing in a sandbox. The footage was grainy and the colors slightly muted, like video captured on a cheap point-and-shoot. They shovelled, filled their buckets, wet the sand, made some sand castles, and played. All the things kids normally do in a sandbox. This clip went on for 15 minutes, and showed no more than the children playing continuously. The second clip I clicked on featured children in some communal playroom, like you might find at a church or daycare center. Probably twenty kids up to eight years old seemed to be readying the space for naptime, laying out blankets and pillows through the room about a foot apart. They smiled and joked, and dutifully but happily equipped the room for napping children. The video lasted about two minutes, ending before naptime began. This footage was also grainy and muted, as if it were shot by outdated tech. I was really confused. Why stock footage of children doing nothing? The third video featured again about twenty children up to eight years old, all walking down a forest path. They all walked in two lines on either side of a ten foot length of rope, each holding onto one of the maybe thirty loops tied into it. This was some sort of preschool walk trip, but there weren’t any adults visible. I assume it was an adult walking behind them and filming, but. . . . that almost made me feel worse. The fourth video I clicked opened with one small girl waving at the camera, in what looked like a preschool classroom. She was sat at one of the dozen desks, though she was alone in the room. Warbled infomercial music began to play, the camera zoomed out a bit and revealed some apparatus on her desk. A small dish, a knife, and an apple. Without words she began to present each item to the camera, then showed the viewer how to core an apple. She smiled at the camera but violently sawed into the apple with jerky movements. This unsettled me, and only went on for seven minutes. The next video showed kids about ten years old playing in the snow, working together to make a snowman. Then there was a video of a classroom full of kids quietly working at their desks, admirably focused on their work in a way that kids never are. The next video was another how-to with warbly infomercial music, where a child showed the camera how to make a papier-mache mask with newspaper, flour, a balloon, scissors, and some markers. Then a clip of two babies at the beach. I watched and skipped through about fifty videos before I took the earbuds out for a break. I texted my dad and let him know I was safe at Jesse’s, sleeping over. He replied and said he loves me. Jesse happily explained to me about how a virtual drillbit works but I could barely take it in. “Have you ever watched one of those youtube videos, ‘I ordered a mystery box from the dark web’?” He asked me. I said no, as I haven’t. I don’t know anything about the dark web. “Well,” he explained, “They sometimes get stuff like hard drives with weird shit on them. Maybe someone got this stuff in a dark web box and dumped it behind the library.” I entertained the idea and it almost felt real, like I didn’t steal these electronics from my older sister’s room. I went back to the videos: more videos of kids, playing in some fall leaves, babies in a playpen, toddlers in a small blow-up kiddie pool having fun. Nobody spoke in any videos, and there were never any adults shown. Just children. I started to watch one in every dozen videos, making my way down the list faster. Nothing changed stylistically from the other videos, and I was reeling with confusion. Then Jesse tapped me on the shoulder. He got into one of the laptops. I abandoned the hard drive with its weird, cult-like videos and joined him on the bed to see what was on the laptop. It seemed pretty bare, except for a single .txt file on the desktop. Jesse opened it, and it contained two onion links, which Jesse recognized for what they were. He quickly installed some safety measures, since this laptop was running on his family’s home internet, and pasted the first link into tor. I waited with bated breath. I’d never seen anything mysterious on the dark web, Jesse showed me how to watch Sailor Moon but this was the unknown. I hoped I was ready. The page that opened was colourful and polished. “Earn $500,000 fast! Your contribution is easy to make and you can start right now! No contribution rejected, going rates START at $500,000! Click now, learn how you can be set for LIFE with Paradise Land!” This was colorfully emblazoned across the green and gold background. The entire page was a link, which we guessed would be the second link in the notepad document so Jesse clicked it. This new page was stark and amateurish. In large, block, black font the page was titled “Paradise Land” just like the hard drive. In the center left was a video, the thumbnail said “Paradise Land”. I felt a heaviness creep into the pit of my stomach. The page featured no navigation whatsoever, just the off-center video on a glaring white screen. Jesse looked at me. “Are you ready to watch?” “Um, sure, I guess.” I wasn’t embarrassed by my hesitance. Jesse didn’t judge, either. He took a deep breath and clicked the triangle on the video thumbnail and made it full screen. The title filled the screen in muted purple bubble letters, and an animated sunrise cued the beginning of more warbly 80’s how-to video music. This quality was the worst yet, it looked like it was 144p from back in the day on youtube. A room faded into the shot, I squinted and it looked like maybe a doctor’s office. A man in a white lab coat entered the frame and waved jovially, greeting the viewers. At first I thought his face wasn’t moving, but I realized he was wearing a latex Ronald Reagan mask. I looked at Jesse. He looked at me, and we both turned back to the screen. “Welcome. You’re here because you are having a pregnancy crisis, or you need money.” The figure nodded empathetically and laced his fingers together at his waist. “My name is Doctor Gooderham. If you’re here, it’s because you’ve been directed from a pregnancy crisis link, or a link advertising a method to earn $500,000 US dollars in bitcoin. No matter why you are here, I and my team of associates, can help.” Again his body language displayed remarkable empathy, even obfuscated by the lost video quality. This was a man that someone in a desperate situation could trust. If it weren’t for that mask. That grinning mask. “Here at Paradise Land, a remote island whose location is of course undisclosed, our mission is to use a hidden reset button on humanity, and grow a new society from the ground up based on love, acceptance, kindness, purity, communication, and sound moral values. We believe that a colony of children reared outside of any current global influence can be shaped into the beautiful vision we have for the world, as newborn children are clean slates who will readily accept the doctrine of kindness and love.” He spoke tenderly like a father to his children, but it sent chills down my spine. Grain slid in repeating bars down the screen, and I watched the grinning mask explain that the Paradise Land organization would pay $500,000 US dollars to anyone worldwide who would give birth to an unregistered child in the presence of an organization member and allow that child to be taken to Paradise Land to become a member of the pure new society. He further explained that an organization member would be stationed in your city thirty days before your expected due date. They would be on call and ready at a moment’s notice to collect you and bring you to a comfortable hotel room with all necessary medical supplies to assist with the birthing process. I was shuddering. He said that then, the member would transfer the money, in bitcoin to you, you confirm it, and they leave with the child. Nobody ever knows that baby existed, and you never see them again. It chilled my belly. “If you wish to know more information about Paradise Land please contact the email address shown on your screen now.” On cue a line of text appeared on the bottom of the frame: [[email protected]](mailto:[email protected]). Jesse wrote it down. “We would happily send you literature and footage of children flourishing at Paradise Land. Your baby will be happier here, in a world of purity and happiness. And you will be set for life!” The man nodded and the music crescendoed, signaling the ending of the video. “Please, contact the email address. We will both be happier, if we work together.” The camera slowly panned back while he said this last urgent farewell, fading back out to white. I stared at the screen idiotically. Jesse just sat there and gave me my time to process it. I still can’t process it. My sister’s been selling babies. Babies! What the fuck! I’ve been so distraught about the idea of my little nieces and nephews being sold that I can’t even think straight. What the hell would Mel even do with that much money? How does she even know how to use bitcoin? In my distress I told Jesse everything, the truth about how I came across the laptops. I told him that “Paradise Land” seemed like a huge crock to me. “I know right. It’s too good to be true and the whole delivery is unnerving.” “Listen this had kind of been a lot so I’m gonna go crash on the couch now if that’s okay?” Jesse gave me my blankets and pillows and I got comfy on the couch. I didn’t expect to be able to sleep, so I started to play word games on my phone. I fell asleep with it in my hand and woke up that way. I called dad this morning and let him know I’d be coming home. He said Mel is still out, hasn’t been home yet. He sounds so worried. I feel so bad for him and I wish Mel would come home and stop this nonsense. So I walked back home and wrote what I can remember to update you guys. Thanks for all your comments, I feel like I’m not going through this alone. Jesse said he would try to get into the second laptop today, and also contact the email address. I don’t know if I even want him to. I’m still reeling from today’s discoveries. In fact, I’m exhausted. I’ll lie down for a nap and then see if Jesse got any results. If he does I’ll update you all tomorrow, if I can. Part 3 here
Learn the ins and outs of Bitcoin so you can get started today. Bitcoin For Dummies is the fast, easy way to start trading crypto currency, with clear explanations and expert advice for breaking into this exciting new market. Understanding the mechanisms and risk behind Bitcoin can be a challenge, but this book breaks it down into easy-to-understand language to give you a solid grasp of just ... "The Good Wife" Bitcoin for Dummies (TV Episode 2012) cast and crew credits, including actors, actresses, directors, writers and more. Bitcoin for dummies. April 23, 2013. Culture ... Transcript-So here's a deal with Bitcoin, and the US [unk]-- -'Cause Bitcoin's been around for a very long time. ... Spotify's best music of 2014 ... The first time bitcoin was mined, the founder, Satoshi Nakamoto, released 50 bitcoin, which he kept. Moving forward, when a miner completed a puzzle, he or she got 25 bitcoin. In the summer of ... The Bitcoin.com mining pool has the lowest share reject rate (0.15%) we've ever seen. Other pools have over 0.30% rejected shares. Furthermore, the Bitcoin.com pool has a super responsive and reliable support team.
Bitcoin's definitely revolutionizing how you're able to invest and pay for goods, and even if Bitcoin were to fall.. blockchain technology is here to stay. So it's a good idea to start learning ... Music Sports Gaming Movies & Shows News Live Fashion Learning Spotlight 360° Video ... Bitcoin For Dummies uploaded a video 6 years ago 3:25. Check Out the UPDATED Version of this Ultimate Guide Here: https://youtu.be/sEtj34VMClU This video will teach you how to buy cryptocurrency for beginners ste... Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube. Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.