Ecuador cuts WikiLeaks founder Julian Assange’s internet …

Julian Assange. Jack Taylor/Getty Images

Ecuador has cut off Julian Assange's internet connection in its London embassy and Wikileaks says it's because of a tweet he sent.

The 46-year-old founder of the publishing platform and anti-secrecy organization WikiLeaks has lived in the embassy in Knightsbridge, London since 2012, when he took refuge there to avoid extradition to Sweden over a rape allegation, which he denies.

Assange maintains that if he were to go to Sweden to answer questions about the allegations against him, he would then be extradited to the US because of his political activities with WikiLeaks.

Last year, Sweden dropped its investigation into the rape allegation but Assange could still be arrested and charged with breaching the terms of his UK bail if he were to set foot outside the embassy.

Assange's active use of Twitter played a part in the Ecuadorian government's decision to cut off his internet connection. In a statement, the government said it acted to remove Assange's ability to communicate with the outside world because it was concerned that his posts risked damaging Ecuador's relationship with the UK and the European Union.

Meanwhile, the official Wikileaks account said on Twitter that Assange was not able to make phone calls, receive visitors, speak to the press, or send tweets, and that Ecuador was demanding he delete a tweet about the arrest of Catalan politican Carles Puigdemont.

WikiLeaks is fiercely controversial and has repeatedly drawn the ire of the US government for its release of classified documents, including internal memos from US embassies and agencies and, in one case, a video known as "Collateral Murder" showing a US helicopter firing on journalists in Iraq.

In the run-up to the 2016 US presidential election, WikiLeaks released emails and documents taken from the Democratic Party, dominating the news cycle with headlines unfavorable to the Democratic nominee, Hillary Clinton. The US government has said the documents were stolen by Russian hackers and released to undermine faith in the election and destabilize Clinton's candidacy.

Assange's five years of self-imposed captivity have not been easy. WikiLeaks says he has had health problems but has not left to seek treatment for fear of being arrested. His relationship with his Ecuadorian hosts has also been at times strained. Leaked documents obtained by BuzzFeed in 2015 detailed apparent concerns about his psychological health and included photos of a bookcase strewn across his room in 2013.

Ecuador has cut off Assange's internet before. In 2016, it temporarily deactivated his access over concerns that WikiLeaks' releases were interfering in the US presidential election.

View post:
Ecuador cuts WikiLeaks founder Julian Assange's internet ...

Chelsea Manning: We Need to Stop This ‘Death Machine of Power …

Chelsea Manning wants to change America. On Tuesday, the freed whistleblower appeared on Democracy Now! to discuss her plan with hosts Amy Goodman and Juan Gonzalez.

The appearance was Mannings first live television interview since President Barack Obama pardoned her in 2017. Manning was sentenced to 35 years in prison in 2013 after leaking more than 700,000 documents to WikiLeaks in 2010 while serving as an Army intelligence analyst in Iraq. The leaked materialsthe largest classified data dump in United States historyincluded documents related to the Iraq War, the U.S. war in Afghanistan and diplomatic cables.

During her conversation with Goodman and Gonzalez, Manning discussed Iraq, dismantling the prison system, transgender rights, her run for a Senate seat and other topics.

Manning is running as a Democrat in the November elections, challenging senior Democrat Ben Cardin for his seat in Maryland. She explained her decision to run for political office:

You know, it wasI thought I was done. I thought, OK, like I can go home now. But I dont feel like its thisI mean, in this environment, in this place, this time that were in is what I feared when Ibecause I saw, you know, and I realized its expanded more and more, that its not just the military, its not just the intelligence community. Its notits police. Its the justice system. Its immigration. Like all these systems are overlapping, and theyre suffocating people, deliberately and methodically, over decades. And this has been a continuingyou know, like people have been building this whirling death machine of power for decades now.

And you can focus in on a particular war or a particular moment or a particular controversy, but its the overwhelming awe of the giganticness of this system that has driven me to try to fight back. And we need to startyou know, like we dont need to fix these systems, we need to stop them. We need to push back on them, whether its immigration or whether its the military or whether its the intelligence apparatus, because theyre all a part of the same system. And people are suffering. And we cant wait. We cant wait anymore. We cant wait for change.

Watch the full Democracy Now! interview with Manning in the videos below.

Managing Editor

Eric Ortiz is the managing editor of Truthdig. A journalist and innovator with two decades in digital media, Ortiz founded the mobile app startup Evrybit, a live storytelling and reporting tool, as a 2014 John

See the original post here:
Chelsea Manning: We Need to Stop This 'Death Machine of Power ...

Bitcoin (BTC) price: News & Live Chart – Trading Analysis …

Bitcoin is a digital currency, sometimes referred to as a cryptocurrency, best known as the world's first truly decentralized digital currency. Bitcoin is traded on a peer-to-peer basis with a distributed ledger called the Blockchain, and the Bitcoin exchange rate to the US Dollar and other major currencies is determined by supply and demand as with other global exchange rates. The traded value of Bitcoin has proven volatile through various booms and busts in demand. Ultimately, however, many see Bitcoin as a store of value against government-backed fiat currencies.

Abbreviated as BTC, Bitcoin is actively traded against the world's major currencies across decentralized markets. Bitcoins are kept in so-called Bitcoin wallets, which depend on private keys and cryptography to secure its Bitcoins to a specific entity or user.

By comparison to government-backed global currencies, Bitcoin remains fairly complex for the typical user to acquire and use in regular transactions. Growing interest and significant global investments in Bitcoin wallet and Blockchain technology have nonetheless made buying and selling Bitcoin far more accessible to the average user. And indeed growing acceptance by government entities have ameliorated the ambiguity of legal and regulatory status for Bitcoin and Bitcoin exchanges.

You can find historical price of Bitcoin on our chart and latest news and analysis on the Bitcoin exchange rate.

Read more:

Bitcoin (BTC) price: News & Live Chart - Trading Analysis ...

Encryption Software Market – Global Forecast to 2022

The encryption software market size is expected to grow from USD 3.87 Billion in 2017 to USD 12.96 Billion by 2022, at a Compound Annual Growth Rate (CAGR) of 27.4%.

The demand for encryption software is likely to be driven by various factors, such as proliferation in the number of cyber-attacks and the stringent government regulations and compliances that mandate the adoption of encryption among various verticals.

The encryption software market has been segmented on the basis of components (solution and services), applications, deployment types, organization sizes, verticals, and regions. The services segment is expected to grow at the highest CAGR during the forecast period and the solution segment is estimated to have the largest market size in 2017 in the market.

Professional services have been widely adopted by organizations, as these services involve expert consulting, support and maintenance, and optimization and training for cybersecurity. However, the managed services segment is expected to grow at the highest CAGR during the forecast period, as managed security vendors provide extensive reporting capabilities for validating the regulatory compliance with internal security policies for the users.

The disk encryption application is estimated to hold the largest market share in 2017. The importance of encrypting a disk is that, if the encrypted disk is lost or stolen, the encrypted state of the drive remains unchanged, and only an authorized user will be able to access its contents. The cloud encryption application is expected to grow at the fastest rate during the forecast period.

Encryption solutions and services have been deployed across various verticals, including Banking, Financial Services, and Insurance (BFSI); aerospace and defense; government and public utilities; healthcare; telecom and IT; retail; and others (manufacturing, education, and media and entertainment). The telecom and IT vertical is expected to grow at the highest CAGR during the forecast period. However, the BFSI vertical is estimated to have the largest market size in 2017.

The global encryption software market has been segmented on the basis of regions into North America, Europe, Asia Pacific (APAC), Middle East and Africa (MEA), and Latin America, to provide a region-specific analysis in the report.

Key Topics Covered:

1. Introduction

2. Research Methodology

3. Executive Summary

4. Premium Insights 4.1 Attractive Opportunities In Encryption Software Market, 2017-2022 4.2 Encryption Software Market, Share Of Top 3 Applications And Regions, 2017 4.3 Encryption Software Market, By Service, 2017-2022 4.4 Encryption Software Market, By Professional Services, 2017 4.5 Encryption Software Market, By Deployment Type, 2017-2022 4.6 Encryption Software Market, By Organization Size, 2017-2022 4.7 Market Investment Scenario, 2017-2022

5. Market Overview 5.1 Introduction 5.2 Market Dynamics 5.2.1 Drivers 5.2.1.1 Growing Concern Over Critical Data Loss In On-Premises Environment 5.2.1.2 Exploitation Of Big Data Analytics Poses Risk To Cloud Environment 5.2.1.3 Regulations To Increase Adoption Of Encryption Solutions 5.2.2 Restraints 5.2.2.1 Lack Of Budget For Adopting Best-In-Class Encryption Solutions 5.2.2.2 Lack Of Awareness About Encryption And Performance Concerns Among Enterprises 5.2.3 Opportunities 5.2.3.1 Surge In Demand For Integrated, Cloud-Based Encryption Solutions Among Smes 5.2.3.2 Large-Scale Adoption Of Encryption Solutions In Bfsi Vertical 5.2.4 Challenges 5.2.4.1 Complexities In Management Of Encryption Keys 5.2.4.2 Lack Of Skilled Workforce Among Enterprises 5.3 Regulatory Implications 5.3.1 Payment Card Industry Data Security Standard 5.3.2 Health Insurance Portability And Accountability Act 5.3.3 Federal Information Security Management Act 5.3.4 Sarbanes-Oxley Act 5.3.5 Gramm-Leach-Bliley Act 5.3.6 Federal Information Processing Standards 5.3.7 General Data Protection Regulation 5.4 Innovation Spotlight 5.5 Use Cases 5.5.1 Large-Scale Adoption Of Email Encryption By Financial Organizations In The Uk 5.5.2 Adoption Of Encryption Solution By A Clinical Research Company 5.5.3 Reliance Of Small And Medium Financial Companies On Data Encryption 5.5.4 Large-Scale Adoption Of Encryption By It And Telecom Company 5.5.5 Need For Best-In-Class Encryption Solutions For Government Sector In Canada 5.5.6 Healthcare Vertical Relying On Cloud-Based Encryption Solutions 5.6 Type Of Encryption Algorithms 5.6.1 Data Encryption Standard 5.6.2 Advanced Encryption Standard 5.6.3 Triple-Des 5.6.4 Blowfish Algorithm 5.6.5 Homomorphic Encryption 5.6.6 Rsa 5.6.7 Diffie-Hellman Key Exchange 5.6.8 Quantum Cryptography 5.6.9 Post Quantum Cryptography

6. Encryption Software Market Analysis, By Component 6.1 Introduction 6.2 Solution 6.2.1 Types Of Data Encrypted 6.2.1.1 Data At Rest 6.2.1.2 Data In Transit 6.2.1.3 Data In Use 6.2.2 Types Of Encryption 6.2.2.1 Symmetric Encryption 6.2.2.2 Asymmetric Encryption 6.2.3 Key Management 6.3 Services 6.3.1 Professional Services 6.3.1.1 Support And Maintenance 6.3.1.2 Training And Education 6.3.1.3 Planning And Consulting 6.3.2 Managed Services

7. Encryption Software Market Analysis, By Application 7.1 Introduction 7.2 Disk Encryption 7.3 File/Folder Encryption 7.4 Database Encryption 7.4.1 Application-Level Encryption 7.4.2 Database-Level Encryption 7.5 Communication Encryption 7.5.1 Voice Encryption 7.5.2 Email Encryption 7.5.3 Instant Messaging Encryption 7.6 Cloud Encryption

8. Encryption Software Market Analysis, By Deployment Type 8.1 Introduction 8.2 On-Premises 8.3 Cloud

9. Encryption Software Market Analysis, By Organization Size 9.1 Introduction 9.2 Large Enterprises 9.3 Small And Medium-Sized Enterprises

10. Encryption Software Market Analysis, By Vertical 10.1 Introduction 10.2 Banking, Financial Services, And Insurance 10.3 Aerospace And Defense 10.4 Healthcare 10.5 Government And Public Utilities 10.6 Telecom And It 10.7 Retail 10.8 Others

11. Geographic Analysis

12. Competitive Landscape

13. Company Profiles

For more information about this report visit https://www.researchandmarkets.com/research/ggnh82/encryption?w=5

Media Contact:

Laura Wood, Senior Manager press@researchandmarkets.com

For E.S.T Office Hours Call +1-917-300-0470 For U.S./CAN Toll Free Call +1-800-526-8630 For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1907 Fax (outside U.S.): +353-1-481-1716

View original content:http://www.prnewswire.com/news-releases/encryption-software-market---global-forecast-to-2022-300618670.html

SOURCE Research and Markets

http://www.researchandmarkets.com

See more here:
Encryption Software Market - Global Forecast to 2022

Edward Snowden: Leaks that exposed US spy programme – BBC News

Edward Snowden, a former contractor for the CIA, left the US in late May after leaking to the media details of extensive internet and phone surveillance by American intelligence. Mr Snowden, who has been granted temporary asylum in Russia, faces espionage charges over his actions.

As the scandal widens, BBC News looks at the leaks that brought US spying activities to light.

The scandal broke in early June 2013 when the Guardian newspaper reported that the US National Security Agency (NSA) was collecting the telephone records of tens of millions of Americans.

The paper published the secret court order directing telecommunications company Verizon to hand over all its telephone data to the NSA on an "ongoing daily basis".

That report was followed by revelations in both the Washington Post and Guardian that the NSA tapped directly into the servers of nine internet firms, including Facebook, Google, Microsoft and Yahoo, to track online communication in a surveillance programme known as Prism.

Britain's electronic eavesdropping agency GCHQ was also accused of gathering information on the online companies via Prism.

Shortly afterwards, the Guardian revealed that ex-CIA systems analyst Edward Snowden was behind the leaks about the US and UK surveillance programmes.

He has been charged in the US with theft of government property, unauthorised communication of national defence information and wilful communication of classified communications intelligence.

The GCHQ scandal widened on 21 June when the Guardian reported that the UK spy agency was tapping fibre-optic cables that carry global communications and sharing vast amounts of data with the NSA, its US counterpart.

The paper revealed it had obtained documents from Edward Snowden showing that the GCHQ operation, codenamed Tempora, had been running for 18 months.

GCHQ was able to boast a larger collection of data than the US, tapping into 200 fibre-optic cables to give it the ability to monitor up to 600 million communications every day, according to the report.

The information from internet and phone use was allegedly stored for up to 30 days to be sifted and analysed.

Although GCHQ did not break the law, the Guardian suggested that the existing legislation was being very broadly applied to allow such a large volume of data to be collected.

GCHQ and NSA eavesdropping on Italian phone calls and internet traffic was reported by the Italian weekly L'Espresso on 24 October. The revelations were sourced to Edward Snowden.

It is alleged that three undersea cables with terminals in Italy were targeted. Italian Prime Minister Enrico Letta called the allegations "inconceivable and unacceptable" and said he wanted to establish the truth.

After fleeing to Hong Kong, Edward Snowden told the South China Morning Post that the NSA had led more than 61,000 hacking operations worldwide, including many in Hong Kong and mainland China.

He said targets in Hong Kong included the Chinese University, public officials and businesses.

"We hack network backbones - like huge internet routers, basically - that give us access to the communications of hundreds of thousands of computers without having to hack every single one," Mr Snowden was quoted as saying.

Claims emerged on 29 June that the NSA had also spied on European Union offices in the US and Europe, according to Germany's Der Spiegel magazine.

Media playback is unsupported on your device

The magazine said it had seen leaked NSA documents showing that the US had spied on EU internal computer networks in Washington and at the 27-member bloc's UN office in New York.

The paper added that it had been shown the "top secret" files by Edward Snowden.

One document dated September 2010 explicitly named the EU representation at the UN as a "location target", Der Spiegel wrote.

The files allegedly suggested that the NSA had also conducted an electronic eavesdropping operation in a building in Brussels, where the EU Council of Ministers and the European Council were located.

It is not known what information US spies might have obtained. But observers say details of European positions on trade and military matters could be useful to those involved in US-EU negotiations.

The German government summoned the US ambassador on 24 October - a very unusual step - after German media reported that the NSA had eavesdropped on Chancellor Angela Merkel's mobile phone.

The allegations dominated an EU summit, with Mrs Merkel demanding a full explanation and warning that trust between allies could be undermined. She discussed the matter by phone with US President Barack Obama. He assured her that her calls were not being monitored now and that it would not happen in future. But the White House did not deny bugging her phone in the past.

Past surveillance by secret police - whether Nazi or communist - has made Germans very sensitive about privacy issues. Mrs Merkel grew up in the former East Germany, where the Stasi spied on millions of citizens.

France's President Francois Hollande meanwhile expressed alarm at reports that millions of French calls had been monitored by the US.

The Guardian later reported that the NSA had monitored the phones of 35 world leaders after being given their numbers by another US government official. Again, Edward Snowden was the source of the report.

A total of 38 embassies and missions have been the "targets" of US spying operations, according to a secret file leaked to the Guardian.

Countries targeted included France, Italy and Greece, as well as America's non-European allies such as Japan, South Korea and India, the paper reported on 1 July.

EU embassies and missions in New York and Washington were also said to be under surveillance.

The file allegedly detailed "an extraordinary range" of spying methods used to intercept messages, including bugs, specialised antennae and wire taps.

The Guardian report also mentioned codenames of alleged operations against the French and Greek missions to the UN, as well as the Italian embassy in Washington.

US Secretary of State John Kerry said that activities to protect national security were "not unusual" in international relations.

US allies in Latin America were angered by revelations in Brazil's O Globo newspaper on 10 July that the NSA ran a continent-wide surveillance programme.

The paper cited leaked documents showing that, at least until 2002, the NSA ran the operation from a base in Brasilia, seizing web traffic and details of phone calls from around the region.

US agents apparently joined forces with Brazilian telecoms firms to snoop on oil and energy firms, foreign visitors to Brazil, and major players in Mexico's drug wars.

Mexico, Brazil, Colombia and Chile all demanded answers from the US.

But the revelations on Latin America kept coming, and in September more specific claims emerged that emails and phone calls of the presidents of Mexico and Brazil had been intercepted.

Also, the US had been spying on Brazil's state-owned oil firm Petrobras.

Brazilian President Dilma Rousseff cancelled a state visit to the US in the most high-profile diplomatic move since the scandal hit.

Documents leaked to the Washington Post in mid-August suggested the NSA breaks US privacy laws hundreds of times every year.

The papers revealed that US citizens were inadvertently snooped on for reasons including typing mistakes and errors in the system,

In one instance in 2008, a "large number" of calls placed from Washington DC were intercepted after an error in a computer program entered "202" - the telephone area code for Washington DC - into a data query instead of "20", the country code for Egypt.

Later in August, the Washington Post reported that US spy agencies had a "black budget" for secret operations of almost $53bn in 2013.

In January 2014, the Guardian newspaper and Channel 4 News reported that the US had collected and stored almost 200 million text messages per day across the globe.

A National Security Agency (NSA) program is said to have extracted and stored data from the SMS messages to gather location information, contacts and financial data.

The documents also revealed that GCHQ had used the NSA database to search for information on people in the UK.

The programme, Dishfire, analyses SMS messages to extract information including contacts from missed call alerts, location from roaming and travel alerts, financial information from bank alerts and payments and names from electronic business cards, according to the report.

Through the vast database, which was in use at least as late as 2012, the NSA gained information on those who were not specifically targeted or under suspicion, the report says.

The revelations came on the eve of an expected announcement by President Obama of a response to recommendations by a US panel on ways to change US electronic surveillance programmes.

See original here:
Edward Snowden: Leaks that exposed US spy programme - BBC News

Adrian Lamo, hacker who turned in Chelsea Manning to FBI …

Adrian Lamo was found dead in his Kansas apartment Wednesday, March 14, 2018. (Reuters)

Adrian Lamo, the notorious computer hacker who turned in Chelsea Manning to the FBI and was arrested for hacking into The New York Times and Microsoft, has died in Kansas at age 37.

Sedgwick County spokeswoman Kate Flavin said Friday that Lamos body was at the morgue in Wichita. The Wichita Eagle reported Lamo was found dead in his apartment Wednesday.

Charley Davidson, a Wichita police officer told the media outlet there was nothing suspicious about his death. It was not immediately clear how Lamo died.

JUDGE LOCKS SELF IN COURTROOM, CAUSES $3G IN DAMAGE TRYING TO BREAK FREE: REPORT

The computer hacker was living in Wichita for about a year, his friend Lorraine Murphy told theWichita Eagle. She said she sent Lamo a message in December 2016 asking how he was and he said he was homeless in Wichita.

Adrian was always homeless or on the verge of it, Murphy said. He bounced around a great deal, for no particular reason.

She added: He was a believer in the Geographic Cure. Whatever goes wrong in your life, moving will make it better. And he knew people all over the country.

Chelsea Manning was convicted in 2013 of leaking a trove of classified documents. (Reuters)

However, Lamo did not make many friends along the way. Murphy said he often received death threats for his hacking.

Davidson said there is no indication foul play is involved in Lamos death.

RUMORED SITE OF $55M IN CIVIL WAR-ERA GOLD DRAWS FBIS ATTENTION, REPORT SAYS

Manning, who is transgender and went by Bradley at the time of her arrest, was convicted in 2013 of leaking a trove of classified documents. President Barack Obama commuted her sentence and she was released from military prison in May 2017 after serving seven years of a 35-year sentence.

Following her release,Manningannounced in January she has filed to run in Maryland for the seat of Democratic Sen. Ben Cardin.

Lamo testified that Manning contacted him because of his notoriety in the hacking community. He said the two met online after Manning read an article about Lamo,The Guardianreported.

Adrian Lamo was arrested in 2004 for hacking The New York Times and Microsoft.(Reuters)

He told the British newspaper that he thought about Manning every day.

The decision was not one I decided to make, but was thrust upon me, he said.

Lamos father, Mario, wrote a post on toFacebookmourning the death of his son.

With great sadness and a broken heart I have to let know all of Adrians friends and acquaintances [sic] that he is dead. A bright mind and compassionate soul is gone, he was my beloved son.

He was convicted of computer fraud after he was arrested in 2004 for hacking The New York Times and Microsoft.

The Associated Press contributed to this report.

Read this article:
Adrian Lamo, hacker who turned in Chelsea Manning to FBI ...

Roger Stone claimed contact with WikiLeaks founder Julian …

In the spring of 2016, longtime political operative Roger Stone had a phone conversation that would later seem prophetic, according to the person on the other end of the line.

Stone, an informal adviser to then-candidate Donald Trump, said he had learned from WikiLeaks founder Julian Assange that his organization had obtained emails that would torment senior Democrats such as John Podesta, then campaign chairman for Democratic presidential candidate Hillary Clinton.

The conversation occurred before it was publicly known that hackers had obtained the emails of Podesta and of the Democratic National Committee, documents that WikiLeaks released in late July and October. The U.S. intelligence community later concluded that the hackers were working for Russia.

The person, who spoke to The Washington Post on the condition of anonymity because of the ongoing federal investigation into Russian campaign interference, is one of two Stone associates who say Stone claimed to have had contact with Assange in 2016.

The Washington Post's Fact Checker took a closer look at Julian Assange's assurance that there is no link between the Russian government and the hacked DNC emails that WikiLeaks released during the 2016 presidential campaign. (Jenny Starrs/The Washington Post)

The second, former Trump adviser Sam Nunberg, said in an interview Monday that Stone told him that he had met with Assange a conversation Nunberg said investigators for special counsel Robert S. Mueller III recently asked him to describe.

Stones possible connection to Assange has been under scrutiny since the 2016 campaign, when he made public claims that he was in contact with the London-based WikiLeaks founder. Since then, Stone has emphatically denied any communication with Assange or advance knowledge of the document dumps by WikiLeaks, which embarrassed Clinton allies and disrupted the 2016 campaign. WikiLeaks and Assange have also said they never communicated with Stone.

Potential contacts with WikiLeaks have been probed by federal investigators examining whether allies of President Trump coordinated with Russians seeking to tilt the 2016 race. The president has repeatedly denied any collusion with Russia.

Peter Carr, a spokesman for Muellers office, declined to comment.

[A German hacker offers a rare look inside the secretive world of Julian Assange and WikiLeaks]

Stone, a longtime Trump friend, briefly worked for his presidential campaign in 2015 and then remained in his orbit as an adviser.

In an interview Monday, he again denied that he had any advance notice about the hacked emails or any contact with Assange. He said he only recalled having one conversation with anyone in which he alluded to meeting the WikiLeaks founder a comment he said he made as a joke to a long-winded Nunberg.

Former Trump advisor and longtime friend Roger Stone discusses his communication with Russian hacker Guccifer 2.0 and Wikileaks founder Julian Assange. (McKenna Ewen,Jorge Ribas/The Washington Post)

I wish him no ill will, but Sam can manically and persistently call you, Stone said, recalling that Nunberg had called him on a Friday to ask about his plans for the weekend. I said, I think I will go to London for the weekend and meet with Julian Assange. It was a joke, a throwaway line to get him off the phone. The idea that I would meet with Assange undetected is ridiculous on its face.

Stone said that he does not recall any similar conversation with anyone else.

The allegation that I met with Assange, or asked for a meeting or communicated with Assange, is provably false, he said, adding that he did not leave the country in 2016.

Through his attorney, Assange who has been living in the Ecuadoran Embassy in London since 2012 told The Post in January that he did not meet Stone in spring 2016. His attorney was unable to reach Assange on Monday evening for further comment.

WikiLeaks has denied any contact with the longtime Trump adviser.

WikiLeaks & Assange have repeatedly confirmed that they have never communicated with Stone, the organization tweeted in March 2017.

Nunberg told The Post that the questions he was asked by Muellers investigators indicated to him that the special counsel is examining statements Stone has made publicly about WikiLeaks.

Of course they have to investigate this, he said. Roger made statements that could be problematic.

He said he did not recall the exact date when Stone told him that he had met with Assange, adding that he did not take the comment as a joke at the time. He said he was glad to hear Stone told The Post that the remark was made in jest.

No one connected to the president should be connected with Julian Assange, he added.

[Roger Stone helped Donald Trump get elected president now hes helping himself]

WikiLeaks has come under intense scrutiny from U.S. officials for its distribution of hacked materials. Last year, CIA Director Mike Pompeo said it was time to call out WikiLeaks for what it really is: a nonstate, hostile intelligence service often abetted by state actors, like Russia.

In response, Assange said that Pompeo had chosen to declare war on free speech.

During the 2016 race, the organization released hacked Democratic emails at two key junctures: A cache of DNC emails landed on the eve of the partys national nomination convention and a collection of Podesta emails appeared on the same day in October that The Post revealed a tape of Trump speaking about women in lewd terms.

Stone publicly cheered on WikiLeaks during the race, at one point referring to Assange as my hero.

On Aug. 8, 2016, in an appearance at the Southwest Broward Republican Organization in Florida, Stone answered a question about what he suspected would be the campaigns October surprise by saying: I actually have communicated with Assange. I believe the next tranche of his documents pertain to the Clinton Foundation, but theres no telling what the October surprise may be.

He later said he had not meant that he had communicated with Assange directly.

On Aug. 21, Stone tweeted that something grim was looming for Podesta.

Trust me, it will soon [be] the Podestas time in the barrel. #CrookedHillary, he tweeted.

On Oct. 3, he tweeted: I have total confidence that @wikileaks and my hero Julian Assange will educate the American people soon #LockHerUp.

Payload coming. #Lockthemup, Stone tweeted on Oct. 5.

Two days later, WikiLeaks published a cache of Podestas hacked emails describing internal conflicts within the Clinton Foundation and excerpts of Clintons speeches to Wall Street executives.

The release came shortly after The Post revealed the existence of an Access Hollywood tape in which Trump described grabbing women by the genitals.

Stone also exchanged private Twitter messages with WikiLeaks that month. In one Oct. 13 exchange, he described himself as a defender of the organization and objected to its strategy of attacking me, the Atlantic reported this year. WikiLeaks replied to Stone in a private message that false claims of association were being used by Democrats to undermine the group.

Stone answered: You need to figure out who your friends are.

Assange and Stone said that the messages prove he did not have any advance knowledge of WikiLeaks plans.

A message telling Roger Stone to cease falsely suggesting contact with WikiLeaks is now the claimed proof that Roger Stone had contact with WikiLeaks when it proves what Ive said all along, Assange tweeted last month.

Stone wrote recently on his website that only in the current, highly charged atmosphere can a leaked document which is entirely exculpatory and proves that I was not collaborating with WikiLeaks, provoke an AHA moment.

In a September 2017 appearance before the House Intelligence Committee, Stone also vigorously denied he had any foreknowledge of what WikiLeaks would publish or of the hacking of Podestas emails.

Such assertions are conjecture, supposition, projection, and allegations but none of them are facts, he wrote in a prepared opening statement.

[Ex-Trump adviser Stone denies Russian collusion to House Intelligence panel]

Stone told the committee that his Aug. 21 tweet was meant as a prediction that Podestas business activities would come under scrutiny after Paul Manafort was forced to resign from the Trump campaign amid allegations about his work for a pro-Russian party in Ukraine.

Stone acknowledged that some may label him a dirty trickster, but he said he does not engage in illegal activities.

There is one trick that is not in my bag, he told the committee, and that is treason.

Rosalind S. Helderman, Ellen Nakashima and Julie Tate contributed to this report.

See the article here:
Roger Stone claimed contact with WikiLeaks founder Julian ...

Trading Cryptocurrency in 2018: The Definitive Guide

If youre like me, you think you missed out on the boom of the cryptocurrency industry. Youve probably heard stories of Bitcoin millionaires - regular, working class people who turned one months paycheck into a fortune that will keep them from ever having to work again.

Im here to tell you that the industry is still booming and its not too late to turn your own profit.

This is The Definitive Guide to Trading Cryptocurrency in 2018. By no means is this a guide to becoming a millionaire overnight, but by the end, you will know everything you need to know to begin trading, as well as some of the techniques and strategies that have proven to provide consistent gains.

What Is a Cryptocurrency?

There Are Some Risks With Cryptocurrencies

Cryptocurrencies Are Taxable In Most Countries

There Are Other Ways To Invest In Bitcoin

Begin Your Path To Crypto Trading

Trading Techniques That Will Grow Your Investment

When To Buy and Sell?

Position Sizing

Build a Strategy and Stick To It

Common Mistakes And How To Avoid Them

Pro Tips & Extra Resources

Before we jump right into trading, there are are a few things that we need to cover.

You should have a general understanding of what a cryptocurrency is because knowing the functional use of a coin can give you an edge when deciding your investments. There are hundreds of coins ranging from major players like Bitcoin (BTC) and Ethereum (ETH), to smaller coins that we refer to as altcoins. Each coin is unique and offers their own flunctional use cases. If youre feeling unclear about what a cryptocurrency is, check out some of the resources below. They give great explanations of Bitcoin and Ethereum, and blockchain, the underlying technology of which cryptocurrencies are built upon.

What is Bitcoin

How Bitcoin works

Explain Ethereum like Im five

TED Talk on blockchain

More technical view on how blockchain works

Huge collection of extra reading material on blockchain & Ethereum

Like any investment, you should be aware that there are risks with cryptocurrencies. Its going to take some work to protect your investment and some more work to grow it. Much about the direction that cryptocurrencies will take in the future is in turmoil, and this creates a very volatile market.

Trading is all about taking advantage of this volatility; the key is being smart about your investments, and patient enough to stick to your strategy.

The other major risk to be aware of is that hackers are always looking for vulnerabilities to exploit. One example is the more than $30 million worth of Tether coins that were stolen. The most surefire way to ensure the safety of your coins is by using a hardware wallet such as these by Ledger. Keep in mind that this will slow down your ability to trade those coins, as you will be transferring them between the device and your exchange accounts (more on wallets and exchanges soon).

If all of this sounds daunting, dont worry. As promised, well discuss more of what you need to know soon enough.

In 2014, the IRS declared cryptocurrencies a capital asset, thus making it subject to capital gains tax. This handy guide, breaks down how taxation works for each country.

With the booming industry that cryptocurrency has become, it is recommended to be aware of, and follow tax regulations.

As you know, the focus of this guide is all about trading cryptocurrencies, but there are other ways to get a hand in the pot. Some people choose to buy a cryptocurrency and forget about it, much like you would do with some stock in say, Amazon. Others are actually investing through the stock market via the Bitcoin Investment Trust (GBTC). If you are a firm believer in the future of Bitcoin, both are perfectly fine ways to go about it.

The advantage that trading has over these options is in the power of compounding.

In other words, our initial investments have the potential to grow exponentially, compared to those that sit on a flat amount of coins or stock.

Now that we have that stuff out of the way, lets work on making our first trade. The first things well need is to learn about are exchanges and wallets.

These are what allow us to buy and sell cryptocurrencies. There are a handful of popular crypto exchanges, some of them have advantages over others. For example, some exchanges dont allow us to deposit and withdraw using fiat currency like the U.S. dollar and euro; others arent available in certain countries. In this guide we will focus on two very popular exchanges, GDAX and Poloniex. GDAX gives us the ability to use our fiat currency to buy Bitcoin. Poloniex does not, but does give us a wide array of altcoins to trade. There, well be using major coins like Bitcoin and Ethereum to buy the altcoins, and vice versa. Other popular exchanges such as Kraken and Bittrex offer even more coins.

Keep in mind that keeping the number coins that you are trying to follow to a manageable amount is going to make trading a lot easier.

A manageable amount is obviously subjective and will vary for each person based on things such as time available to dedicate to trading. Feel free to do your own research to find the right exchange for you. I tend to value user experience of an exchange over the amount of coins on it. Ultimately, what exchanges you use is going to depend on your own personal preferences. GDAX and Poloniex will provide sufficient resources needed to be a successful trader, so they are definitely a good place to start.

No matter which you choose you will need to go through a verification process when signing up for your accounts. This sometimes involves submitting a picture of your id. All in all its usually a pretty straightforward process and shouldnt take more than a few minutes.

The next thing well need to do is deposit fiat currency into our account. The easiest way to do this is by adding a bank account. Once youve initiated the deposit, it will take 4 business days to appear in your account. Kind of a bummer, I know; but the idea is to only need to do this once, as well be growing this initial investment day by day with our trades.

When buying or selling on crypto exchanges, you have 3 different types of order at your disposal. You should be comfortable with each of them in order to be a successful trader.

Note that all orders have fees on them, though they are relatively small.

Market orders allow us to exchange any amount of coin right away at the current market price. Orders are filled using the best available price in the exchanges order book. For example, if you placed a market buy order for $100, it would buy from the lowest priced sell order(s) until you had used that $100. The advantage is that this transaction is always completed immediately; the disadvantage is that we dont know exactly what price we are going to get.

Limits orders allow us to place an order at a specific price. We can specify the amount of coin that we want to buy or sell, at the price that we want this to happen at. You may have noticed that the order book is always full of sell orders that are a little higher than the current price and buy orders that are a little lower. The advantage with limit orders is that we can do do the same with our orders. The disadvantage is that our transaction likely will not be filled immediately and will count on the market price to make its way towards us.

Stop limit orders are really only useful when selling coins. They allow us to set a condition: we specify a price, and if the price becomes less than or equal to that price, a market order is automatically placed for us. The advantage here is that if we need to step away and will not be able to watch the price, we have some protection if the market begins to plummet. The disadvantage is that we are counting on there being good buy orders available to fulfill our sells. If a massive amount of market sell orders were to be executed right before your stop is triggered, its technically possible to be left with the bottom of the barrel. This has happened before, but is not common.

I cant emphasize this enough: Trading cryptocurrencies is all about minimizing losses and maximizing gains. Were not going to win every time.

Well need to utilize all of these order types to do that to the fullest.

Once our GDAX account has been verified, and weve deposited some fiat currency we can finally make our first Bitcoin trade!

Here we are placing a market order. Notice that $100 would get us about 1% of a Bitcoin. Remember than with a market order, the amount of Bitcoin may differ slightly from the estimate here because the price of Bitcoin is constantly fluctuating.

Now imagine weve seen some indication that we are ready to sell.

A small loss, but perhaps the price was about to fall, in which case we got out just in time, minimizing our loss.

Weve made our first trade, simple as that!

We mentioned the various exchanges and now we need a way to transfer our Bitcoin between them. Wallets allow us to send and receive Bitcoins. If youre interested in a more technical explanation of wallets, you can check this out, but its certainly not required knowledge.

Creating accounts on GDAX and Poloniex gives us wallets that we can send Bitcoins between. Lets walk through sending Bitcoin from GDAX to Poloniex.

First, we need the deposit address of our Poloniex wallet. Find this by going to Balances, and then Deposits & Withdrawals:

Next well go to GDAX and initiate a withdrawal.

Fill in the amount of Bitcoin youll be transferring, and paste the address that you copied from your Poloniex wallet in as the destination.

Be careful to put the correct address because theres no getting your Bitcoin back if sent to the wrong address.

Once the transfer is initiated, it could take some time for it to be verified on the blockchain. Its not uncommon for it to take 15 minutes or more. Scaling and faster transaction speed is one of the major technical issues that Bitcoin and others are trying to solve.

There are several proven ways to make money trading cryptocurrencies. A lot of these techniques have been proven by their use on the traditional stock market. But the thing with traditional stocks is that youd be hardpressed to find the same kind of price swings as we see everyday with cryptocurrencies.

Consistent, significant price fluctuations mean more opportunities for us.

To use these techniques, we need to understand how to read charts.

If youve already opened up GDAX or some other exchange and you were overwhelmed at first, dont worry; you werent alone. Theyre called candlestick charts, and theres a quick video that explains the fundamentals really well.

Soon, well learn what you can do to perform a more technical analysis on these charts, and some things that you can look for to make informed decisions during your trading. For now lets go over some of those techniques we were talking about before.

Now that weve learned about bullish candlesticks in the chart reading video above, lets take a look at a bull run.

Trailing a bull run using stop orders is one of the most important techniques you can learn.

Lets do a case study. Here, Ive taken a 24 hour chart for Ethereum:

Notice the small bull run. Now imagine we had decided to buy Ethereum somewhere around that dotted line and just before 8pm. We saw it tick up after a string of bearish candles, and for whatever reason, thought it might continue its way upward. To minimize our losses (remember our goal is minimize losses and maximize gains), we set a stop order right away. Well set it near the bottom of those last couple bearish candles (about $474). Now as we watched the price work its way up, we would continue to raise our stop price. To do this, we would go to our open orders (every exchange will show this), and click cancel on the stop limit that we had just set. Shortly after 8pm, we mightve had a stop at $480 that wouldve been triggered. If youre stop limit is triggered and the signs point to the trend continuing youre able to buy back in with a profit already in your pocket.

We were protected, setting ourselves up for a quick profit, while at the same time being prepared for a huge profit if the price continued skyrocketing. This is the idea behind what can be a very powerful technique.

When buying cryptocurrencies, specifically altcoins, it is important to know a few details about them.

A major thing to note when evaluating a coin, are its functional use cases. Most coins will have some form of mission statement on their homepage. By understanding what purpose a coin serves in the real world, we will have a better idea of how to evaluate it further.

For example, there are cryptocurrencies, such as Litecoin, with the same goal as Bitcoin. In this case, it would be a good idea to compare its market capitalization with Bitcoin. This site ranks coins by market cap. Always be sure to check there when evaluating a new coin. If you notice a large shift in market cap on a certain date, it may be worth it to check for any news that day to see what may have caused it.

On the other hand, some coins serve a very unique function in the real world. For example, Power Ledger is a fairly new and interesting cryptocurrency. The goal of this project is to provide a system for consumers to trade electricity with one another. For a young project such as this, the best thing you can do is first decide whether you believe in the technology and the team behind it. The second thing you can do is read news surrounding the project. All of that information, along with a look at the coins market cap, is going to ultimately determine whether you think the technology might reach mainstream adoption, thus making an investment worth your while.

Now that we have an idea on how to get started evaluating a coin, we are better equipped to profit using another popular technique among traders.

ICOs, as you may have guessed, are much like IPOs. This is where coins are offered for the first time to the public. ICOs are not offered through exchanges, but rather you buy them directly from the creators of the project. Usually (its different for each project) you will send them Bitcoin or Ethereum that they will use to fund their project; in turn you receive a certain amount of their new coin.

One of the best resources for finding out about current or upcoming ICOs is here. If you see a coin that peaks your interest, be sure to be extra diligent when evaluating it. Since we have no historical data to gauge how the coin might perform, its very important to understand the real-world purpose of the coin. Another thing to note is whether the ICO is capped or not. Some ICOs will be capped at a certain number, meaning that people who are late to the part, will need to wait for the coin to be offered on exchanges.

Make sure to read up on all this information that you can find, including the coins white paper. Its common practice for coins to have one up on their site, explaining the technical details on how they plan to accomplish their goal. As you read it, see if you can determine whether you think those goals can be accomplished by the team or not.

The reason that we, as traders, would want to invest in these coins at their cheap initial price is simple: Once these coins do become available on exchanges, all of those people who missed out on the ICO, will want to buy in right away. This can lead to the price to skyrocket in a very short amount of time.

As traders, we will take a 10% quick profit any day of the week.

So far, everything weve discussed has involved taking a long position on a coin. That is, our focus has been buying a coin at a lower price than what we think we will be able to sell it at later. What if we have some indication that leads us to believe that the value of a coin is about to decrease? In this case, we could take a short position, which is the same technique that made some people boatloads of money during the 2008-2009 housing bubble.

To be able to take short positions, we need to understand margin trading. Trading on margin means we are trading with borrowed money. On exchanges like Poloniex, we can trade Bitcoin with a handful of coins (there are fewer coins offered for margin trading) with 2.5x leverage. That is, if we own 1 BTC, we can borrow up to 2.5 BTC to trade with. To be clear, this is not 2.5 BTC that we own. Now, on a trade that nets us 10% profit, we are bringing home .25 BTC instead of .1 BTC.

Like any other loan, this borrowed Bitcoin must be paid back with interest. On losses, you will need to pay back the loss and the interest. Poloniex offers up a great guide to margin trading that explains everything you need to know. Its worth reiterating that the estimated liquidation price is the price at which a forced exit from our position would occur, costing us all of the Bitcoin in our margin account so that it may be used to pay back the borrowed coin. Utilizing stop limits to avoid this is almost always a good idea.

It is NOT recommended to be taking long positions on a margin trade as an inexperienced trader.

So lets take our hypothetical 1 BTC from before and take a short position on Ethereum. We are able to borrow 2.5 BTC worth of ETH and sell it. 30 minutes later, the price of ETH has plummeted 10%. Now we can close our short position, buying back 2.5 BTC worth of ETH; except now, since the price has dropped, we are buying more ETH than what we sold. Our borrowed coin can be payed back and we take the rest as profit!

The idea here is simple: were going to buy a cryptocurrency on one exchange, and sell it on another. You may have noticed that the price of a cryptocurrency is often not the exact same on each exchange. How to take advantage of this is best described in this post.

Sure, it can be difficult to have a constant eye on the price of a coin on every exchange. Luckily traders have already built bots that can help and open sourced them for others to use.

Weve come a long ways in our path to becoming crypto traders, but there are still some very important things to learn. So far, weve learned how to do a fundamental analysis of a cryptocurrency, and that its important to do this so that we fully understand them before investing. But as traders, we need to understand what kinds of things tell us when should buy or sell. We need to understand technical analysis.

Technical analysis is the study of past price patterns. This will allow us to identify opportunities for profit. The cryptocurrency market, maybe more than any other market, has a herd mentality. The tendency, especially with inexperienced traders, is to buy when the price is raising, and sell when the price is dropping. We can take advantage of this with technical analysis.

This skill is much tougher to nail down that fundamental analysis. In todays world, everyone should be able to read up on a cryptocurrency and stay up to date with news because all the information is at our fingertips. To become a truly successful trader, we need to be using both fundamental and technical analysis all the time.

Bottom line: technical analysis is not a strategy. It is one of the tools we will use to help execute our strategy.

Identifying an opportunity does not mean you should dump 100% of your funds into a coin.

Coinigy is an incredibly powerful tool for anyone who is serious about crypto trading. This video from their team explains exactly what it can do for you, but to put it in laymans terms: It makes technical analysis a breeze and really simplifies the process of trading across several exchanges. It costs $15 a month and is at least worth trying out the the free 1 month trial to see how you like it.

TradingView offers the best chart reading software there is. Its also free (with ads that will go away with a paid plan). It helps out a ton with technical analysis, but does not connect with your exchange accounts to allow trading like Coinigy.

Remember those candlestick charts we see on every exchange? By studying them, we can find indicators, and understanding what these indicators mean can help us better predict the future price of the chart. There are tons of indicators and they can take some practice to become adept at identifying. You may find it easier to focus on practicing to identify them one by one until you become comfortable with them, slowly building your repertoire until you feel youre ready to go full boar with your trading career.

Read more:
Trading Cryptocurrency in 2018: The Definitive Guide

Bitcoin and Blockchain – Bloomberg

By and

Updated on January 28, 2018, 9:40 PM EST

When Bitcoin broke intopublic consciousnessin 2013, it couldnt have been sexier: a digital currency being used to buy everything from drugs to cupcakes. Then the excitement shifted to an aspect of Bitcoin that is a bit less sexy: public online ledgers. Blockchain the technology used for verifying and recording transactions thats at the heart of Bitcoin is seen as having the potential to reshape the global financial system and possibly other industries. Both Bitcoin and its blockchain are gaining imitators as well as adherents, along with plenty of critics, includingJamie Dimon, the chief executive officer of JPMorgan Chase & Co. Its recentwild price surge and fall has given ammunition to both.

The price of Bitcoin rocketed in 2017 before giving up much of those gains, as the debate raged on whether the cryptocurrency whose total value neared $300 billion in early December should be considered a legitimate financial asset. It got a huge boost when Cboe Global Markets Inc., started futures trading tied to the digital currency and CME Group Inc. andNasdaqInc., said they would follow suit. Futures trading will push Bitcoin closer to the mainstream by making it easier to trade without the hassles of owning it directly. Bitcoin began to look almost traditional compared with the new cryptocurrencies that raised more than $3.5 billion throughinitial coin offerings. Theirexplosive growth drew warnings from regulators around the globe even beforehackers stole almost $500 million worth of a digital token called NEM from a Japanese cryptocurrency exchange. The Bitcoin community came together (mostly) in November to reject a proposed software change that had threatened a split. Meanwhile, more than 100 banks are working within theR3 consortium,created to find ways to use blockchain as a decentralized ledger to track money transfers and other transactions. Australia's stock exchange plans to start using blockchain to process equity transactions.Blockchain is also being tested by retailers like Wal-Mart Stores Inc. forensuring foodsafety, as industries explore what advantages the technology might hold over traditional databases.

Virtual currencies arent new online fantasy games have long used them but the development of a secure digital currency without a central issuer rightly turned heads. Mysterious spikes and drops in the price of Bitcoin since its birth helped build an early reputation for the currency as a tool for selling drugs and laundering money. Its history also featured arrests for Ponzi schemes. Theperson or peoplewho created the Bitcoin system under the pseudonym Satoshi Nakamoto solved a problem central to any currency preventing counterfeiting and did it without relying on a governments authority. The softwarealso solved one specific hurdle for digital money how to stop users from spending the same unit of currency twice. The breakthroughideawas blockchain, a publicly visible, anonymous online ledger that records every single Bitcoin transaction. Its maintained by a network of miners whose computers perform the calculations that validate each transaction, preventing double-spending. They earn a reward of newly issued Bitcoin. The pace of creation is limited, and no more than21 millionwill ever be issued.

Since Bitcoin first boomed, theres been no shortage of critics to call its rise abubbleand to argue that the currency has no intrinsic value. In September, Dimon called Bitcoin a fraud.But a month later his chief financial officer followed rivals at Goldman Sachs Group Inc. and Citigroup Inc. in expressing openness to working with cryptocurrencies.Entrepreneurs in the field say that focusing on the price of Bitcoin is missing the point its value is as proof of concept for a new kind of payment system not reliant on third parties like governments, big banks or credit-card companies. Others say blockchain advocates are hyping what amounts to no more than a new kind of database. Proponents of ether, the second most commonly used digital currency, respond that the etherium blockchaindoes far more than let Bitcoin users send value from one person to another. Its advocates think it could be a universally accessible machine for running businesses, as the technology allows people to do more complex actions in a shared and decentralized manner.

First published Oct. 3, 2013

To contact the writers of this QuickTake: Olga Kharif in Portland at okharif@bloomberg.net Matthew Leising in Los Angeles at mleising@bloomberg.net

To contact the editor responsible for this QuickTake: John O'Neil at joneil18@bloomberg.net

The rest is here:

Bitcoin and Blockchain - Bloomberg

What is Bitcoin? – Definition from WhatIs.com

Bitcoin is a digital currency (also called crypto-currency) that is not backed by any country's central bank or government.Bitcoins can be traded for goods or services with vendors who accept Bitcoins as payment.

Bitcoin-to-Bitcoin transactions are made by digitally exchanging anonymous, heavily encrypted hash codes across a peer-to-peer (P2P) network. The P2P network monitors and verifies the transfer of Bitcoins between users. Each user's Bitcoins are stored in a program called a digital wallet, which also holds each address the user sends and receives Bitcoins from, as well as a private key known only to the user.

The Bitcoin network is designed to mathematically generate no more than 21 million Bitcoins and the network is set up to regulate itself to deal with inflation.Bitcoins can be spent by initiating a transfer request from a Bitcoin address in the customer's wallet to a Bitcoin address in the vendor's wallet. As of this writing, one Bitcoin (also called a BTC) is worth $104 -- but just as with stocks, the value of Bitcoins can fluctuate quickly.

In the United States, Bitcoins are controversial because they can be used to anonymously transfer illicit funds or hide unreported income from the Internal Revenue Service (IRS). Bitcoin policy now requires transactions that involve traditional, government-backed currencies to be attached to an identity.

This CNN video provides an overview of Bitcoin:

Read more from the original source:

What is Bitcoin? - Definition from WhatIs.com