Several Members of Congress Introduce Bill to Protect Consumers from Cryptocurrency – Crowdfund Insider

This past week, House Representative Rashida Tlaib, along with Representatives Jess Chuy Garca and Chairman of Task Force on Financial Technology Stephen Lynch, introduced the Stablecoin Tethering and Bank Licensing Enforcement (STABLE) Act (HR 8827). The goal of the legislation is to protect consumers from risks posed by emerging digital payment instruments, such as Facebooks Libra and other Stablecoins currently offered in the market.

In a release, Tlaib, Garca, and Lynch, explained that consumer vulnerabilities could be exploited and obscured by bad actors looking to issue stable-coins. This threat combined with the financial strains of the pandemic necessitate the STABLE Act that would:

Representative Tlaib stated:

Getting ahead of the curve on preventing cryptocurrency providers from repeating the crimes against low- and moderate-income residents of color that traditional big banks have isand has beencritically important. From the OCC to the Federal Reserve to those peddling stablecoins, the protections the STABLE Act would make possible are more needed than ever amid a pandemic that will breed riskier financial decisions out of necessity because our federal government continues to fail us all by not providing adequate relief legislation. I thank Congressman Garca and Chairman Lynch for co-leading this important effort to see these protections made a reality.

Representative Lynch said the bill is a concrete step toward protecting Americans finances and ensuring safety and soundness in financial institutions.

The elected officials said that Facebook has attempted to take advantage of the financial exclusion and gap in the market.

Additionally, the Representatives said that JP Morgan, Apple, and Paypal/Venmo have also considered issue their own stablecoins that also have the potential to take advantage of unbanked and underbanked communities.

Public Money Action Director and Yale Law School Associate Research Scholar Ral Carrillo added that the STABLE Act shuts the door on Big Tech companies like Facebook that are trying to enter the banking space without following the appropriate rules or conducting business on a level playing field.

The legislation was entered into the House Financial Services Committee at the end of last month. The legislation is embedded below.

Read more:
Several Members of Congress Introduce Bill to Protect Consumers from Cryptocurrency - Crowdfund Insider

Bitcoin: This Time It Really Is Different – Seeking Alpha

Source

Bitcoin (BTC-USD) has appreciated by roughly 500% in under two years now. Incidentally, this is also about BTC's price appreciation since the Mid-March meltdown bottom about nine months ago. This illustrates a long-term double-bottom in Bitcoin during a crucial transformation phase in its developmental growth cycle.

Bitcoin's stellar gains as well as numerous other factors illustrate that extremely promising future prospects exist for the gold standard of the digital asset (blockchain enterprise) industry. By the way, it's not all about Bitcoin, but we'll get to that later.

BTC 1-Year Chart

Source

We see extremely strong lift-off lately, and I don't think it is anything like back in 2017. In fact, much has changed in three years. Various factors, including higher demand by institutional interests, imply Bitcoin's recent surge is just the beginning of a much more long-term advance higher.

Source

Citigroup's (NYSE:C) "leaked" $300,000 near-term price target for Bitcoin is one of many pieces to a very interesting puzzle. This information suggests that an increasing number of institutions, JPMorgan (NYSE:JPM) not excluded, are likely moving in before the next wave above $20,000 begins.

Source: Binance.com

We see that Bitcoin has been on a relentless rampage higher lately. As the U.S. dollar weakens, Bitcoin and other inflation-proof/-resistant digital currencies, and blockchain enterprises are likely to continue to move higher in the future. Increasing demand due to wider application and user growth in the "digital asset" segment should enable this phenomenon to progress quite quickly in my view.

Source

BTC has come a long way fast though, and we cannot ignore extremely heavy resistance coming up at $19,500-$20,000. Sell orders are quite stacked here, so Bitcoin may get some turbulence before a true breakout above $20,000 will occur.

Nevertheless, given Bitcoin's current technical, fundamental, and psychological backdrop, it looks like it is only a matter of time until $20K turns history.

We can see that Bitcoin's price action has moved in waves throughout its existence, and I don't see why this time it will be any different. The chart clearly illustrates that every subsequent peak in each wave is substantially higher than the initial wave's top. Thus, we estimate that Bitcoin's next significant top could occur at around 2022-2025, and at a price of anywhere from $75,000 to $275,000 (current EST based our widely-sourced data base).

Bitcoin's current dominance level of around 62.5% in the cryptocurrency complex is staggering, and I believe there are numerous blockchain enterprise projects that likely have a lot of catching up to do.

Source

As the coronavirus crisis unfolds, digital coins continue to become more popular and prominent around the world. Governments and central banks are devaluing their currencies around the globe. This is a key fundamental factor why digital assets can continue to take share in the decentralized global medium of exchange market.

Our Top 5 List

These are our top five transactional coins of choice for the future, and market caps on these can probably go much higher. All of DASH coins in circulation account for about a total market cap of roughly $1 billion, Zcash, about $800 million. These are not particularly big numbers in the greater scene of things. For instance, Facebook (FB) is worth around $820 billion, Tesla's (NASDAQ:TSLA) market value is about $540 billion. $800 million seems minuscule when you are talking about crucial components capable of revolutionizing the monetary payment system globally. In fact, I believe transactional coins remain extremely attractive here intermediate and long term.

Without getting too deep into technical I will keep it brief. Functional coins have an ability to perform and or assist with numerous tasks/functions across the sprawling blockchain industry.

Our Top 5 List

These are just several of the top functional coins we see having substantial upside once the $19,500-$20,000 level gets surpassed by Bitcoin. Swipe (SXP-USD) is an interesting option as well.

While Bitcoin has appreciated considerably in recent months, there is still substantial intermediate- and long-term growth going forward in my view. Naturally, when you are dealing with an asset class as volatile as the cryptocurrency complex, significant corrections are to be expected. Therefore, it is possible that Bitcoin could correct from recent highs.

However, I expect corrections to be shallow and very transitory from here, as strong underlying fundamental, technical, and psychological support should enable Bitcoin to move beyond $20,000. In our base case estimate, I expect Bitcoin to top out at a range of $75,000-$100,000 over the next 1-2 year period.

Bitcoin is a very volatile asset and is not suited for everyone. Numerous factors like increased government regulation, hacking, functionality issues (such as speed, cost, and scale), fraudulent activity, and other negative elements could impact Bitcoin's popularity and thus affect BTC's price negatively.

Therefore, for investors with low- to mild-risk tolerance, perhaps a position size of 3-5% of total portfolio holdings may be appropriate. For investors with higher risk tolerance, a position size of 10% or more of total portfolio holdings may make sense.

Please keep in mind that no one knows exactly how Bitcoin's future will play out. The digital asset could be worth a lot more than it is now several years down the line or it could be worth a lot less if negative elements begin to materialize surrounding the digital asset market.

Want the big picture?If you would like full articles, daily market updates,comprehensive technical analysis, trade triggers, portfolio strategies, options insight, and much more, consider joiningAlbright Investment Group!

Disclosure: I am/we are long ASSETS MENTIONED. I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it (other than from Seeking Alpha). I have no business relationship with any company whose stock is mentioned in this article.

Additional disclosure: This article expresses solely my opinions, is produced for informational purposes only and is not a recommendation to buy or sell any securities. Please always conduct your own research before making any investment decisions.

Read this article:
Bitcoin: This Time It Really Is Different - Seeking Alpha

Financial threats in 2021: cryptocurrency transit, web skimmers move to the server side and extortion plague – Business Review

In 2021, many financial cybercriminals are likely to target Bitcoin more often, while other cybercriminals will switch to transit cryptocurrencies when demanding payment from victims for enhanced privacy. On top of that, extortion practices will become even more widespread, be it as part of DDoS or ransomware attacks, with the operators of the latter consolidating and using advanced exploits to target victims. These are the key predictions from Kaspersky regarding anticipated changes in the financial sectors threat landscape.

Financial cyberthreats are among the most dangerous as they directly impact the financial wellbeing of victims be it individuals or organizations. Drastic changes in 2020 unavoidably affected the way financial attackers operate. Albeit not all of the tactics, techniques and procedures have been influenced by the change of how we live and work nowadays, their influence cannot be understated. Based on a review of what has happened over 2020, Kaspersky researchers were able to prepare a forecast of the important developments in the financial threat landscape of 2021 in order to help organizations prepare for these new threats better. Here is a summary of their key predictions:

This year was substantially different from any other year we experienced, and yet, many trends that we anticipated to come to life last year came true regardless of this transformation of how we live. These include new strategies in financial cybercrime from reselling bank access to targeting investment applications and the further development of already existing trends, for instance, even greater expansion of card skimming and ransomware being used to target banks. Forecasting upcoming threats is important, as it enables us to better prepare to defend ourselves against them, and we are confident our forecast will help many cybersecurity professionals to work on their threat model, says Dmitry Bestuzhev, a security researcher at Kaspersky.

See the original post:
Financial threats in 2021: cryptocurrency transit, web skimmers move to the server side and extortion plague - Business Review

APAC leads the way in regulating cryptocurrency markets – Tech Wire Asia

Asian markets have been stepping up crypto regulation in recent years, will Europe and the US follow suit? Source: AFP

The worldwide cryptocurrency markets were sent into flurries of trading activity again in the past couple of weeks, as Bitcoin once again approached the mythical US$20,000 mark for one Bitcoin. The steady climb to this point from US$10,000 per Bitcoin has taken less than three months this time, once again drawing an intense level of scrutiny not just from the public, but from regulators as well.

Since the time Bitcoin came to truly global prominence in 2017, however, the cryptocurrency industry has done a lot of growing up. And in many countries, that means regulation. In recent years, numerous serious cybersecurity breaches have been widely reported on, with hackers infiltrating crypto exchanges, stealing millions of dollars worth of virtual currency. Recent research conducted by TIE shows that 75% of cryptocurrency exchanges are reporting dubious volumes.

In the Asia Pacific (APAC) region, a hotbed for cryptocurrency trading, the regions financial hubs Singapore and Hong Kong have introduced new licensing laws with a prerequisite to obtaining regulatory approval before trading is allowed.

The requirements will include an evaluation of the exchange monitoring technologies being used, including market surveillance for the detection of market abuse behavior, in addition to Know Your Client (KYC), Anti-Money Laundering (AML), and Combating the Financing of Terrorism (CFT) screening solutions that are typical for the onboarding of institutional clients.

Cryptocurrency exchanges need to implement robust control systems to detect, prevent, and report market abuse behavior and financial crime, to offset allegations that crypto markets can be misappropriated for criminal activities, as they are mostly decentralized and deregulated.

In Hong Kong, the Securities & Futures Commission (SFC) treats cryptocurrency assets no different than any other regulated security asset, so crypto exchanges looking to launch a trading venue in HK are subject to the new licensing laws and combined with restrictions limiting trading to institutional clients only.

Almost exactly the same is the situation in Singapore, where the Monetary Authority of Singapore (MAS) issued guidelines stating that Initial Coin Offerings (ICO) basically resemble capital market products like securities, and will be regulated under the Securities and Futures Act. Crypto platforms here are also subject to a licensing regime and are limited to serving accredited investors only.

The financial hubs are not the only ones looking to establish guidelines to protect investors. Japans Financial Services Agency (FSA) used to permit its crypto industry to operate on a self-regulating basis, but a 2018 cyber-breach at Coincheck, one of Japans largest cryptocurrency exchanges, of a record US$530 million caused the FSA to tighten its regulations on crypto exchanges and to introduce new screening requirements, including a new licensing obligation.

In the 2017 heyday of crypto trading, the Chinese cryptocurrency market accounted for 90% of all crypto trading in the market, but in September 2017, China outlawed ICOs as a means of unauthorized and illegal funding, while crackdowns on crypto trading resulted in the closure of 88 cryptocurrency exchange platforms and the closure of 85 ICOs. This motivated Hong Kong and Singapore to respond to growing investor demand, resulting in an explosive growth of new crypto exchanges.

It appears that the regulatory decision in China to outlaw crypto trading pushed other governments in the APAC region to implement regulatory frameworks to oversee the trading of these new asset types, including new licensing rules to regulate cryptocurrency trading and encourage liquidity.

It will be interesting to see if the forward momentum in Asia can be replicated in Europe and the US, where cryptocurrency regulation has been slower-moving but has shown the potential to be implemented.

Joe Devanesan| @thecrystalcrown

Joe's interest in tech began when, as a child, he first saw footage of the Apollo space missions. He still holds out hope to either see the first man on Mars, or Jetsons-style flying cars in his lifetime.

Go here to read the rest:
APAC leads the way in regulating cryptocurrency markets - Tech Wire Asia

WikiLeaks – Search the DNC email database

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

Link:
WikiLeaks - Search the DNC email database

Edward Snowden asks Trump to pardon Wikileaks founder Julian Assange – ZDNet

NSA whistleblower Edward Snowden took to Twitter today to ask US President Donald Trump to pardon Wikileaks founder Julian Assange during his last days in office.

"Mr. President, if you grant only one act of clemency during your time in office, please: free Julian Assange. You alone can save his life," Snowdentweeted.

Assange, who has gained international fame for founding the WikiLeaks portal, is currently in custody in London, UK.

He wasarrested in April 2019for breaking pre-trial release conditions in a 2012 UK case.

At the time, Assange absconded and requested political asylum in the Ecuador embassy in London, where he lived until his arrest in 2019 when Ecuadorian officials withdrew the WikiLeaks founder's asylum status.

US authoritiesformally charged Assangefor conspiring to leak US classified materials a month after his arrest. The indictment was updated a month later to include accusations that Assangetried to recruit famous hacker groupslike Anonymous and LulzSec to carry out hacks on his behalf and steal sensitive files to publish on WikiLeaks.

The WikiLeaks founder has been fighting the extradition case ever since his arrest, but a first ruling is expectedon January 4, 2021.

Assange has repeatedly threatened to commit suicide if extradited to the US, threats that his lawyers have been using as the central piece of their defense case and the reason why Snowden mentioned that a pardon from Trump would save Assange's life.

Trump previously also considered pardoning bothSnowdenandAssange.

Last week, Tulsi Gabbard, a House representative for the state of Hawaii, also asked Trump topardon both Assange and Snowden. In October, Gabbard also introduced a bill to have the2013 legal case against Edward Snowden droppedand allow the former NSA threat analyst to return to the US.

However, the pardon requests may come at a bad time for Trump, recently embroiled in abribery-for-pardon scheme.

Read more here:
Edward Snowden asks Trump to pardon Wikileaks founder Julian Assange - ZDNet

Silencing dissent: WikiLeaks and the violation of human rights – Sydney Morning Herald

In many jurisdictions, whistleblowers have no legal protection, relying instead on the obligation journalists have to protect and maintain the confidentiality of their sources to prevent the identification of the whistleblower and hence protect them from prosecution. Unfortunately, however, journalists can face prosecution if they refuse to reveal their source in many places around the world.

WikiLeaks' model provides a practical solution: its anonymous submission system was specifically designed to provide protection to journalists and whistleblowers that the law does not provide. Together with its robust publication policy, WikiLeaks provides sources better protection and a promise that their material once verified will be published. And published with maximum global effect: WikiLeaks makes its information available to journalists, citizen journalists, activists and lawyers the world over.

This is why WikiLeaks is so dangerous to those in power with something to hide and why WikiLeaks must be defended and protected.

A supporter of WikiLeaks founder Julian Assange during a protest outside the Central Criminal Court in London on September 14.Credit:AP

So when I was approached to defend Julian Assange, I said yes without hesitation. It was September 2010: by then WikiLeaks had published "Collateral Murder", a video showing the US military killing two Reuters employees in Iraq, and the "Afghan War Diary", then "the most significant archive about the reality of war to have ever been released during the course of a war". Chelsea Manning was in a US military prison about to face espionage charges and a possible death penalty for allegedly releasing material to WikiLeaks. But even then, I did not anticipate just how big the story would become.

In Australia, the revelations increased pressure on the government to withdraw from the US coalition of occupation, and in June 2008 prime minister Kevin Rudd announced a drawdown of most Australian combat troops. However, it was a US State Department document later released by WikiLeaks that showed the truth hidden from the Australian public: fulfilling a campaign pledge, Rudd withdrew approximately 515 combat troops from Iraq in June 2008, leaving in place approximately 1000 defence personnel, including a 100-man security detachment for its diplomatic mission in Baghdad, and naval and air patrol assets based in neighbouring countries to support operations in both Iraq and Afghanistan.

Soon after, WikiLeaks published the "Iraq War Logs" the largest leak in US military history. The documents demonstrated there were many thousands more civilian deaths than reported or acknowledged by the US government, as well as the systemic failure to investigate reports of abuse, torture, rape and even murder by Iraqi forces and abuse in US detention facilities.

Days after, Assange told me there was more to come: he had over a quarter of a million US diplomatic cables and he was going to publish them: it would provide the public unprecedented insight into international diplomacy, US foreign policy and, as a result, Australian acquiescence to its ally's demands. Assange was acutely aware of the personal consequences and the persecution that would follow, but felt a duty to the source and to the public to publish the material: "They will chase me to the end of the earth, but I have to do it."

Soon his bank accounts were frozen, WikiLeaks would be cut off from public donations by Mastercard and Visa, the Australian government threatened to cancel his passport and he was wrongfully accused by then prime minister Julia Gillard of unlawful conduct, as part of what was reported to be a co-ordinated international campaign driven by a "WikiLeaks Task Force" in the US.

High-profile US politicians called for him to be killed by drone strike. Assange, busy working on the publication with mainstream media partners, was suddenly the subject of an international manhunt culminating in an Interpol Red Notice and a European Arrest Warrant for a Swedish accusation that had previously been dropped by the Chief Prosecutor in Stockholm because, she said, the evidence "did not disclose any evidence of rape" and that "no crime at all" had been committed.

Assange makes a statement from the Ecuador embassy in 2012.Credit:AP

There were also consequences for me as his lawyer. In the days before "Cablegate" was published, the US State Department leaked to the press a letter it had sent to "Ms Robinson and Mr Assange" accusing us both of putting at risk US national security, military and anti-terrorism operations around the world. The death threats directed at Assange also started being directed at me.

"Cablegate" became known as "the largest set of confidential documents ever to be released into the public domain" and there is no denying the overwhelming public interest in the material. From Tunisia to Tonga, Canberra to Cairo and the West Bank to West Papua, WikiLeaks disclosures revealed corruption, abuse of power and human rights abuse.

WikiLeaks documents were cited in human rights reports about Sri Lankan military operations against the Tamils and in the groundbreaking documentary No Fire Zone, which led to a UN investigation into war crimes. The "Iraq War Logs" were used by lawyers in filing a case against the UK before the International Criminal Court. And in a landmark judgment in early 2018, the UK Supreme Court held that WikiLeaks cables were admissible as evidence before the British courts. This development is likely to be followed in courts around the Commonwealth.

But what of WikiLeaks' founder and editor the person responsible for making all of this possible?

Assange sits in Belmarsh Prison in London, where he has been for over a year-and-a-half, facing US extradition. This, after spending almost seven years in London's Ecuadorian Embassy, to protect himself from US extradition. In 2017 Sweden dropped its criminal investigation, only to re-open and re-close it in 2019.

Women's allegations must always be taken seriously, but so too should due process protections which Assange was denied.

Assange was always willing to face Swedish and British justice, but not at the risk of facing American injustice for publishing information in the public interest.

Throughout that time, successive Australian governments refused to ask for the assurances against extradition he needed to be able to resolve the situation. To the contrary, then foreign minister Bob Carr wrote in Diary of a Foreign Minister that he had been deliberately misleading in his statements to the Australian public inventing his claim that Assange had more consular assistance than any other citizen in order to undermine the campaign that Assange's mother and supporters were trying to start to bring him home. (Carr has more recently written in support of Assange and the need for the Australian government to intervene.)

In 2016, we obtained a ruling from the UN that Assange was being arbitrarily detained and should be immediately permitted to leave the embassy and return home to Australia. Australia took no action.

By 2018, no one could credibly deny the threat of US extradition: US attorney-general Jeff Sessions had said that prosecuting Assange was a priority. Then director of the CIA (and now US Secretary of State) Mike Pompeo declared WikiLeaks a "hostile non-state intelligence agency" and claimed Assange should not benefit from the right to free speech under the US Constitution. Australia took no action.

In 2020, Assange faces 175 years in prison for the 2010 publications for which WikiLeaks won the Walkley Award for Most Outstanding Contribution to Journalism and for which Assange won the Sydney Peace Prize.

Assange's partner, Stella Moris, right, and his lawyer Jennifer Robinson, arrive at the Central Criminal Court, the Old Bailey on September 14.Credit:AP

He is now being held on remand, in a high-security prison in London, having not had a visitor since the outbreak of COVID-19. And still Australia takes no action.

The Australian government claims it is offering consular assistance. But this case requires more: it needs diplomatic and political action.

The treatment of Assange stands in stark contrast to assistance the Australian government has offered others, such as International Criminal Court lawyer Melinda Taylor, who was visited by Carr when he was still foreign minister, had a passport delivered and then was brought out of Libya.

The fact that Assange now faces prosecution under the Espionage Act puts at risk editors and journalists not just in the US but around the world.

Assange is an Australian citizen, not based in the US, who published truthful information about the US, but he is being sought for extradition and prosecution in the US. Imagine if Saudi Arabia was seeking the extradition and prosecution of an Australian journalist for having published the truth about the murder of Jamal Khashoggi, or if China was seeking the extradition of an Australian editor for publishing truthful information about the beginnings of COVID-19. Australia would definitely have something to say about that. Why not when it is about the US?

A Secret Australia: Revealed by the WikiLeaks Exposes (Monash University Publishing).

The US government is trying to claim in the extradition proceedings that Assange put lives at risk with these publications. But during the Chelsea Manning trial in 2013, a US brigadier-general in counter-intelligence was unable to identify one casualty. Pentagon spokesman Geoff Morrell had said in 2010 "there was no evidence that anyone had been killed because of the leaks".

We must now recognise this case for what it is and has always been about: the persecution of a publisher for robustly publishing what the powerful do not want the public to see evidence of war crimes, human rights abuse and corruption.

As Bob Carr has written following his term as Australia's foreign minister: "Foreign Minister Payne is entitled to courteously remind Secretary of State Mike Pompeo that ... we are a good ally to the point of giddy excess ... We are entitled to one modest request: that in the spirit with which Barack Obama pardoned Chelsea Manning ... it would be better if the extradition of Assange were quietly dropped."

Assange has contributed much to human rights accountability through his work for WikiLeaks and yet he is persecuted for that work. It is time his human rights are respected.

This is an edited extract from A Secret Australia: Revealed by the WikiLeaks Exposs, edited by Felicity Ruby and Peter Cronau, Monash University Publishing.

Jennifer Robinson is an Australian barrister in London. She advises the United Liberation Movement for West Papua.

Read the original:

Silencing dissent: WikiLeaks and the violation of human rights - Sydney Morning Herald

Julian Assange’s father to speak at 3 Northern Rivers towns – Northern Star

JULIAN Assanges father, John Shipton, will visit Nimbin, Byron Bay and Mullumbimby this month, to discuss his sons situation.

He said coming to the Northern Rivers was like coming home to visit extended family.

The Australian man said each time he visits the area he connects with long-term friends and former schoolmates from his time at boarding school in Bathurst, plus other local acquaintances.

He confirmed Mr Assange went to school in different places in Northern NSW with his mother Christine Ann Hawkins, a visual artist, who still lives in the area.

Mr Shipton recently returned from his sons extradition hearing at the Old Bailey in London.

The Australian activist and builder has called for the Australian government to support his son and bring him to Australia.

Mr Shipton said he was trying to put pressure on the Australian Government to help his son.

It is a task we take on, fighting to bring our speaker of truth home to family and friends. We appeal for your help to Bring Julian Home, he said.

Julian Assange, is an Australian editor, publisher, and activist who founded WikiLeaks in 2006.

WikiLeaks came to international attention in 2010 when it published a series of leaks provided by U.S. Army intelligence analyst Chelsea Manning.

In November 2010, Sweden issued an international arrest warrant for Assange over allegations of sexual assault. Assange said the allegations were a pretext for him to be extradited from Sweden to the United States and took refuge in the Embassy of Ecuador in London in June 2012.

On April 11, 2019, Assanges asylum was withdrawn and he was arrested. He was found guilty of breaching the Bail Act and sentenced to 50 weeks in prison.

Assange is currently incarcerated in HM Prison Belmarsh.

On May 2, 2019, hearings began into the US governments request to extradite him. A decision on extradition is expected on January 4, 2021.

Mr Shipton will speak at the Nimbin Town Hall, 45 Cullen St, Nimbin, on December 8, from 7pm.

He will then appear at the Mullumbimby Civic Hall, 55 Dalley St, Mullumbimby, on December 11 from 7pm, and finally at Marvell Hall, 37 Marvell St, Byron Bay, on December 13 from 7pm.

Mr Shipton said entry to the events was free.

If too many people come along, well speak outside, he said.

More:

Julian Assange's father to speak at 3 Northern Rivers towns - Northern Star

Murder of 39 Afghans by Australian soldiers only ‘tip of the iceberg’: professor – Tehran Times

TEHRAN An Australian academic says that killing unlawfully 39 Afghan civilians and prisoners by Australian Special Forces is just the tip of the iceberg.

Noting that Brereton Report did not touch on any of the earlier reported crimes, Professor Tim Anderson tells the Tehran Times that the 39 murders identified by the Australian Brereton Report are certainly only the tip of the iceberg.The Brereton inquiry is a long-running investigation into alleged war crimes committed by Australian Special Forces in Afghanistan. The investigation was led by Paul Brereton, who is both a New South Wales Supreme Court judge and a major general in the army reserve.Anderson, the distinguished author and senior lecturer of political economy at the University of Sydney, predicts the Australian government will try to maintain the war crime scandal under secrecy.The government will further hide any trial process on national security, he adds.The following is the text of the interview:

Q: How do you assess the repercussions of the Brereton Report revealing that Australian military forces in Afghanistan murdered and tortured prisoners, farmers, or civilians between 2009 to 2013?

A: When it comes to the U.S., British and Australian crimes in Afghanistan we should look at the full 19 years from 2001 to 2020. Remember, a war of aggression is the mother of all war crimes. The imperial soldier is necessarily programmed to commit atrocities, against people he does not understand, as he is not defending his country. He requires a fundamentally different mentality to the patriot who defends his country. Imperial commanders understand this, and train their troops accordingly, in notorious desensitization techniques.

The 39 murders identified by the Australian Brereton Report are certainly only the tip of the iceberg, so far as Australian crimes in Afghanistan are concerned, and before we get to the crimes in Iraq and Syria. Details of what are said to be the worst crimes in the Brereton Report have not yet been made public and, so far as I can see, the report did not touch on any of the earlier reported crimes, such as Australian complicity in the murder of ten Sabri tribespeople (mostly teenagers) on 16 May 2002, and the massacre of between one thousand and three thousand prisoners, people who were suffocated in shipping containers, after U.S. operation Anaconda operation at Shah-i-Kot, in March 2002.I mention just these two incidents from the early part of the war and occupation. They were not addressed by the Brereton report.

Q: Australian Federal Police (AFP) raided the offices of the Australian Broadcasting Corporation (ABC) over a 2017 investigative report based on leaked military documents. How do you measure the Australian Judiciary and polices treatment of possible war crimes committed by Australian forces in Afghanistan?

A: Initially the AFP moved to prosecute journalists, including Daniel Oakes, who had published material provided to them by Australian army whistleblower Major David McBride. (In this sense McBride was our Bradley Manning and Oakes was our Julian Assange) However, the AFP has since decided to not proceed against Oakes but to maintain criminal charges against McBride. Charges against the soldiers have yet to be laid and are already subject to secrecy, with the suspicion that the government will further hide any trial process on national security grounds. The Australian government has already undermined the recommendation to withdraw an honorable citation from one army group and has become obsessed with defending itself from criticism that has come from China. As with the Australian Air Force slaughter of 126 Syrian soldiers in September 2016 (in support of an ISIS operation), this government seems to think it can dispose of its responsibility for shocking war crimes by simply saying sorry, mistake, and forgetting the whole thing.

Q: Afghanistan Independent Human Rights Commission called for the UK "to open an independent public inquiry to review and investigate the allegations of unlawful killings by UK Special Forces". It seems that there are more possible instances of a war crime. What do you think?

A: It is very important that Afghan institutions assume responsibility for such things, however much we might doubt the capacity of the current regime in Kabul, dependent as it is on the U.S. and other occupation forces. Local authorities will certainly be aware of other crimes reported by Afghan citizens, who can only seek accountability through Afghan institutions. They will never find accountability through U.S., British, Australian, or any other sort of occupation force.

Q: Do you think Australian authorities will urgently investigate war crime allegations? The Australian prime minister has stated that the issue is complicated, which means there are efforts to prolong the investigation process.

A: Public and private obstruction of the Australian processes is already underway. The government has shown it is keen to keep control of the process and not allow it to be internationalized. No charges have yet been laid and we have reason to fear a cover-up.

They will prolong and obfuscate but it is hard for them to totally bury some of the hideous and now public details. For example, the Brereton report (p.120) says Australian soldiers slit Afghan children's throats: "members from the SASR ... saw two 14-year-old boys whom they decided might be Taliban sympathizers. They stopped, searched the boys, and slit their throats. The rest of the Troop then had to clean up the mess, which involved bagging the bodies and throwing them into a nearby river". (https://afghanistaninquiry.defence.gov.au/sites/default/files/2020-11/IGADF-Afghanistan-Inquiry-Public-Release-Version.pdf)

Q: How was the Afghans reaction to the possible war crimes by Australian Special Forces in their territory?

A: I cannot really say, I have just heard that there is the outrage, I imagine not so much at the fact that horrific crimes have been committed they know that - but that there has been yet another exposure of these crimes and they fear that, once again, they will be denied justice and accountability.

Q: What is the Australian motive in participating in the wars that the United States start once in a while? Does it serve Australian security or the economy?

A: Canberra turned to Washington in 1942, when Britain abandoned its colony in Singapore in face of a Japanese advance. Australia swapped one big brother for another and we have paid a heavy process for this protection by participating in every war since, from Korea through Vietnam to the multiple New Middle East wars. Our ferocious pro-war media (run by a few giant investment cartels) has normalized war to the point where Australian people are either numbed or intimidated and fearful to speak out. This has seriously undermined our democracy. Former Prime Minister Kevin Rudd (with support from another former PM, Malcolm Turnbull) recently created a petition which calls for an inquiry into the impact of the Murdoch media on Australian democracy. The Murdoch media has backed every U.S. war in living memory. Engagement with U.S. driven wars now has Australia at odds with its major trade partner China. U.S. dependence is a truly toxic relationship.

Go here to see the original:

Murder of 39 Afghans by Australian soldiers only 'tip of the iceberg': professor - Tehran Times

The Collapse of Cryptography? Considering the quantum threat to blockchain – Lexology

In our 2019 paper March of the Blocks we commented on the substantial compliance hurdles that the General Data Protection Regulation (GDPR) presents to the ongoing development of blockchain solutions that involve storing (and transacting with) data. There, we concluded that blockchain solutions that respect the fundamental principles of data protection and privacy are achievable. But does our conclusion hold firm in light of the threat posed by quantum technology to the integrity of data recorded on a blockchain?

In this article, with help from the team at our Quantum Computing Hub, we revisit our thinking and interrogate whether quantum computers herald the end of data security in the context of blockchain solutions, or whether the reality is in fact more nuanced.

Simply put, quantum computers are computers that make use of two laws of quantum mechanics: superposition and entanglement. They do so via quantum bits or qubits. This is easiest to explain by reference to classical computers (the computers we currently use) which make use of bits, units of information which can only exist in one of two states: off or on, 0 or 1.

Because of superpositionwhich refers to the ability of individual units to exist in several possible states at the same timea qubit in a quantum computer can be on, off, or on and off in a variety of combined states at a single point in time.

Entanglementwhich describes the phenomenon whereby particles interact with each other and share their states even if separatedmeans that the state of a series of qubits can become linked.

These properties enable quantum computers to perform certain tasks with greater efficiency than even the most powerful classical computers. These tasks include searching through an unordered list for a specific item, identifying causal relationships, and finding the prime factors of large numbers.

Identifying the quantum threat to blockchain

A blockchain is a series of blocks of data, linked together by a cryptographic hash to form a chain. A cryptographic hash is a function that turns a block of data of any length into a fixed length output. The hash stored in each block of the chain operates like a fingerprint of the previous block, and it is possible to run a hash-checking process over the previous block to confirm that it generates the correct hash. If the previous block is changed in any way, it will not generate the correct hash and the chain will be broken. Therefore, the data of any block in the chain cannot be modified without changing the hash of every block that comes after it in the chain.

Many blockchain solutions also deploy public-key cryptography, where both public and private keys are made up of a string of alphanumeric characters. If a user wants to send encrypted data to a recipient, it must utilise that recipients public key (which is broadcast to the network). The sender can encrypt their data with this public key, and send the data to the recipient. Only the recipients private key (which the recipient keeps secret) can then be used to decrypt the data. Where blockchain solutions facilitate transactions, private keys are often used to sign and authenticate transactions.

The fly in the ointment (and a chink in the blockchains armour) is that many popular public-key cryptographic algorithms, including RSA encryption, are vulnerable to attack from quantum computers. This is because those cryptographic algorithms rely on mathematical calculations which break down large numbers into their prime factors (the prime numbers that, when multiplied, equal the original large number), something which is hugely time consuming for conventional computing circuits to compute. As we have already observed, this is a task that quantum computers are poised to perform with relative ease as compared to classical computers.

It has also been suggested that quantum computers increase the risk of a 51% or majority attack, whereby a bad actor seeks to take control of a majority of the nodes in a blockchain network and thereby acquires the ability to interrupt the recording of new blocks, as well as reversing records of blocks that had been completed while they were in control of the network.

What does this mean from a legal perspective?

A number of legal risks arise in a UK context, and similar obligations may well apply in other jurisdictions. In particular, the GDPR requires controllers and processors to ensure that personal data is processed in a manner that protects against unauthorised or unlawful processing and, accordingly, to implement appropriate technical and organisational security measures. Data protection should, moreover, be baked in to processing activities and business practices from the design state right through the lifecycle. Should quantum computers be able to compromise data stored on a blockchain, compliance with these requirements will similarly be compromised.

Legal liability does not stop at the GDPR, however, and may vary depending on the type of entity that is storing data on a blockchain solution. For example, organisations that fall within scope of the Network and Information Security (NIS) Directivewhich include operators of essential servicesare subject to further requirements to manage the risks posed to the security of networks and information systems which they use in their operations.

UK financial services firms should also be mindful of proposed PRA and FCA rules to improve the operational resilience of firms, expected to be published in Q1 2021, in addition to requirements relating to appropriate systems and controls and adequate risk management systems. Senior managers within regulated firms who are responsible for data security could, moreover, come under regulatory scrutiny in the event that any data was compromised.

In addition, interference with the integrity of data recorded on a blockchain could constitute an infringement of directors duties under the Companies Act 2006, as well as a breach of the UK Corporate Governance Code.

As this survey of the legal position demonstrates, the implications of quantum computers rendering vulnerable data stored on a blockchain are significant. But, in practice, how real is this threat?

Commentators appear confident that cryptography will be able to keep pace with developments in quantum computers, which are expected to be in use by governments and companies in the 2030s. As such, current cryptographic techniques can be transitioned to cryptography that is resistant to quantum attacks (sometimes referred to as post-quantum cryptography). There is, however, no proof that any of the currently recognised post-quantum methods are secure against a quantum computer.

The degree of vulnerability of incumbent blockchain systems is, moreover, subject to debate. To take one example, the blockchain solution underlying Bitcoin (which utilises a number of cryptographic techniques in addition to public-key cryptography) is considered by some to be quantum-resistant in its current incarnation, although this appears to be a minority view.

Where incumbent systems are vulnerable to quantum computers, it is certainly the case that a bad actor could steal data now and wait until advances in quantum computing enable access, irrespective of subsequent precautions put in place.

While the degree of the threat remains subject to debate, it is clear that quantum computing has the potential to undermine the integrity of data stored on blockchain solutions. As we have explored, this could give rise to a number of negative legal consequences, in particular under the GDPR.

Various measures can, however, be taken in order to mitigate such consequences. We have already highlighted the need to bring current cryptographic techniques up to date with post-quantum cryptography. In addition, as flagged in our March of the Blocks paper, the storing of personal data on a blockchain should be avoided as far as it is possible to do so.

This could potentially be achieved via middleware applications (software that sits on top of one or more underlying blockchain networks, enabling the application of those blockchain networks to particular use cases) by avoiding, for example, any free form data fields for names and contact details. These applications could also employ more advanced techniques to recognise and remove personal data from information submitted to the blockchain network.

To conclude, we remain optimistic that the GPDR and other legislation relating to data security need not stymy the development of blockchain solutions. The limitations presented by blockchain must, however, be recognised and a pragmatic approach adopted, particularly in light of the threat to data integrity posed by quantum computers.

The rest is here:
The Collapse of Cryptography? Considering the quantum threat to blockchain - Lexology