Let’s Talk Bitcoin! #220 The Blockchain Is Everything

Former JP Morgan Chase banking executive, Blythe Masters, offers her valuable insight into how blockchain technology compares to our current (archaic) financial system. -LW 

On Todays Show

  • Adam talks about his concept of “Idealists and Entrepeneurs” and presents two selections from the recent Exponential Finance Conference
  • CNBC’s Bob Pisani shares his enthusiasm for the Blockchain
  • Blythe Masters, formerly of JPMorgan Chase shares her perspective on the Blockchain and its potential.



Benjamin Fulford: Was World War Three Called Off?

Ben talks about the banking and government changes that are becoming more and more visible, each and every day. This is exciting! -LW



Nomura Bank Trial: Finally a Bank Goes to Court for Mortgage Fraud

Is the lid about to come off the entire US-based banking system? Could this be precursor to rolling out the new banking system? This case went to court on Monday and is expected to be completed within one month. Could it be? -LW


The trial of the century—a long-awaited determination of the damage perpetrated by Wall Street institutions in the financial crisis—began Monday in New York. But it’s only happening because one bank—unlike Goldman Sachs, JP Morgan, Citigroup, and Bank of America—refused to settle out of court. The Japanese firm Nomura stands accused of lying to mortgage giants Fannie Mae and Freddie Mac about the quality of mortgages pooled into securities during the housing bubble. The case will finally reveal hard data on just how much money Nomura, and the rest of the industry, made through fraud.

The Federal Housing Finance Agency (FHFA), conservator of Fannie Mae and Freddie Mac, sued 18 of the biggest banks in the world in 2011. As an investor, Fannie and Freddie purchased $196 billion in mortgage-backed securities from 2005 to 2007, filled with loans that did not meet specific underwriting guidelines. Sixteen of the 18 banks settled with FHFA, netting the agency $18.2 billion. One suit with the Royal Bank of Scotland remains in limbo. Only Nomura pushed FHFA into trial.1

FHFA purchased seven mortgage-backed security deals worth about $2 billion from Nomura, just 1 percent of the total mortgage-backed securities it purchased. But the trial will force the agency to actually show its work. Unlike in the settlements, which offered no details beyond the names of the securities, FHFA must explain why they’re asking for $1.1 billion in damages, over half of what it spent.

In its opening statement, FHFA alleged Nomura prospectuses about the quality of the mortgage pools were materially false. It stated that 68 percent of a sample of loans in Nomura securities had underwriting standards below what the bank advertised. That resembles the findings of Clayton Holdings, a third-party reviewer of mortgage pools for Wall Street banks (FHFA used Clayton estimates in their complaint). FHFA also charged that home appraisals were inflated by an average of 11 percent. Tellingly, Nomura tried to block John Kilpatrick, the FHFA’s expert witness on appraisals, from testifying.

This small set of facts brings sharper focus to the securitization scheme. For context, banks proffered over 1,800 mortgage-backed securities deals during the housing bubble. But all the securitizations were structurally, more or less, the same as Nomura’s; that’s why FHFA sued 18 banks. Under representation and warranty agreements, if the underwriting did not match the securities issuers’ claims, investors like Fannie and Freddie could demand that the bank repurchase the bad loans. That means that FHFA could have stuffed over two-thirds of its securities back into Nomura’s pockets. Federal judge Jed Rakoff made a similar determination in the Countrywide “Hustle” case last year when he ordered damages of $1.3 billion on defective mortgage sales to Fannie and Freddie, based on the percentage of loans that were poorly underwritten.

How much money are we talking about overall? Let’s just look at 2005 and 2006, the two years at issue in the FHFA case, and the biggest years for mortgage-backed securitizations. Banks sold over $1 trillion in mortgage-backed securities each of those years. So, if Nomura’s behavior was typical, then banks would be legally liable to repurchase over $680 billion in securities per year. And if appraisals were inflated by 11 percent on loans in securitization pools in 2005 and 2006, that means that the banks issuing the securities stole over $100 billion a year from investors who purchased the puffed-up mortgage bonds.

This gives a sense of the magnitude of the deception during this period. And if the contractual obligations and relevant laws around mortgage-backed securities were adhered to, the result would have been a complete overhaul of the financial industry. Instead, the Justice Department settled for pennies on the dollar over these same securities violations with banks like with Bank of AmericaCitigroup and JPMorgan Chase.

Nomura, for its part, has a ready defense. The bank argues that falling housing prices, not its actions, caused the diminished value of mortgage-backed securities, ignoring how the shoddy underwriting pumped up prices before they collapsed. The bank also argues that Fannie and Freddie were highly sophisticated investors that could not be duped into purchasing mortgage bonds. The Wall Street Journal editorial page went further, saying Fannie and Freddie received loan-level data to ensure the mortgage bonds satisfied affordable housing requirements. But this misses FHFA’s point: The loan-level data was untrue, regardless of why Fannie and Freddie made the purchase.

U.S. District Court Judge Denise Cote, whose rulings in FHFA cases have so angered banks that they tried to sue her in an appeals court for “gravely prejudicial” rulings, will decide this case. And her verdict will set precedent on how to deal with banks that rip off investors.

If FHFA wins, it will at long last confirm the scale of the fraud, something we’ve only known through anecdote. And it will show that regulators and law enforcement extracted a tiny price for bank misconduct. In the future, it allows investors to use the court system as a deterrent against future swindles. That could make the securities arena safer.

If Nomura succeeds, banks will likely be emboldened to make more misrepresentations in their sales presentations, and investors will find themselves virtually powerless to stop it. Government regulators will probably feel like they cannot enforce securities laws against financial institutions. We could easily see another round of fraud, with banks secure that they can make clever enough arguments in court to get off the hook.

The trial should last a month, and we’ll know shortly thereafter. But it’s positive that we’re finally asking the question, after so many years: How much did the banks make from their securitization frenzy, and how much do they owe those who they wronged?



Hackers Hit 100 Banks in ‘Unprecedented’ $1 Billion Cyber Heist: Kaspersky Lab

Here is an almost unbelievable story about a HUGE bank robbery that took place over a period of several months. If TPTB wanted to give the sheep a reason to ditch the old banking system, this is it. (Take special note of the name, Anunak Hackers Group) -LW

By Mike Lennon on February 15, 2015

A multinational gang of cybercriminals infiltrated more than 100 banks across 30 countries and made off with up to one billion dollars over a period of roughly two years, Kaspersky Lab said on Saturday.

Kaspersky Lab, INTERPOL, Europol and authorities from different countries joined forces to to uncover the plot, which is being called an “unprecedented cyber robbery.”

In a report obtained by SecurityWeek that is scheduled to be released Monday at Kaspersky Lab’s Security Analyst Summit (SAS) in Cancun, Mexico, researchers described a Hollywood style scheme where attackers used an arsenal of attack tools and techniques to siphon massive amounts of money directly from banks rather than targeting end user banking customers. (Update: the report (PDF) has now been released)

Bank Cyber TheftThrough its investigations to date, the security company said it has evidence of roughly $300 million being stolen by the cybercriminals, but believes the total could be upwards of $1 billion.

The criminal gang, dubbed “Carbanak” by the Moscow-based security firm, appears to be a group of cybercriminals from Russia, Ukraine and other parts of Europe and China.

According to Dutch security firm Fox-IT, Carbanak is the same group that was uncovered by Group-IB and Fox-IT in a Dec. 2014 report which referenced the attackers as the “Anunak hackers group”.

Anunak is the name the malware author gave to the main malware used in these attacks, while Carbanak is the name the AV industry gave to the malware, which is a combination of the words “Anunak” and “Carberp”, as the Anunak malware has used code from Carberp, Fox-IT said.

While early versions of Carbanak were based partially on code from Carberp, the latest versions do not appear to use any Carberp source code, according Kaspersky’s report. Source code for the Carberp Trojan was found for sale in the cybercrime underground back in 2013.

The attacks, which are still active according to Kaspersky, focused mainly on banks in Russia, but were also successful against banks in Japan, the Netherlands, Switzerland, United States and other countries.

In most cases, networks were compromised for between two to four months before the attackers made off with stolen funds, the 39-page report said, adding that during that period of time, attackers were able to get access to the right victims and critical systems and learn how to operate their tools and systems to execute the cyber heists.

The security firm estimated that the largest sums were grabbed by hacking into banks and stealing up to ten million dollars in each raid.

According to the report, one victim lost roughly $7.3 million due to ATM fraud, and another lost $10 million as a result of attackers exploiting its online banking platform.

The attackers were very familiar with financial services software and networks, according to Kaspersky researchers, and even programmed the malware to check victim systems for the presence of specialized and specific banking software.

“Only after the presence of banking systems was confirmed, were victims further exploited,” the report said.

So far, attacks against approximately 300 IP addresses around the world have been observed on command and control servers analyzed by Kaspersky Lab.

Map of Carbanak Malware Infections

In some cases involving ATMs, the hackers had direct remote access to the internal ATM networks which they used to remotely withdraw cash. The criminals did not infect the ATMs with malware, but instead used standard utilities to control and test ATM equipment, the report said.

Not surprisingly, in all cases observed by Kaspersky Lab, the attackers used spear phishing attacks to infect systems with the Carbanak malware.

According to the report, the spear phishing emails contained attachments with weaponized Microsoft Word 97 – 2003 (.doc) and Control Panel Applet (.CPL) files. The malicious files exploit Microsoft Office (CVE- 2012-0158 and CVE-2013-3906) and Microsoft Word (CVE- 2014-1761) to execute shellcode, which decrypts and executes the Carbanak backdoor.

After compromising a system, the attackers install additional software such as the Ammyy Remote Administration Tool, or breach SSH servers.

Ammyy was a preferred tool for the attackers abecause it is white listed by many organizations for use by systems administrators.

According to the report, the attackers were able to navigate internal networks and track down administrators’ computers for video surveillance, allowing them to see and record everything that happened on the screens of staff who serviced the cash transfer systems.

“In this way the cyber criminals got to know every last detail of the bank clerks’ work and were able to mimic staff activity in order to transfer money and cash out,” the company said.

Kaspersky researchers said that such video files were found on Command and Control servers. Sensitive bank documents were also found on servers controlling Carbanak, including classified emails, manuals, crypto keys, passwords and more. One file included key verification codes that are used by ATMs to check the integrity of the PIN numbers of its users.

“Once the attackers successfully compromise the victim’s network, the primary internal destinations are money processing services, Automated Teller Machines (ATM) and financial accounts,” the report explained. “In some cases, the attackers used the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network to transfer money to their accounts. In others, Oracle databases were manipulated to open payment or debit card accounts at the same bank or to transfer money between accounts using the online banking system. The ATM network was also used to dispense cash from certain ATMs at certain times where money mules were ready to collect it.”

“These bank heists were surprising because it made no difference to the criminals what software the banks were using. So, even if its software is unique, a bank cannot get complacent. The attackers didn’t even need to hack into the banks’ services: once they got into the network, they learned how to hide their malicious plot behind legitimate actions. It was a very slick and professional cyber-robbery,” said Sergey Golovanov, Principal Security Researcher at Kaspersky Lab’s Global Research and Analysis Team.

While the report goes into much greater detail, Kaspersky summarized how the money was stolen as follows:

  1. When the time came to cash in on their activities, the criminals used online banking or international e-payment systems to transfer money from the banks’ accounts to their own. In the second case the stolen money was deposited with banks in China or the United States. The experts do not rule out the possibility that other banks in other countries were used as receivers.
  2. In other cases cybercriminals penetrated right into the very heart of the accounting systems, inflating account balances before pocketing the extra funds via a fraudulent transaction. For example: if an account has $1,000, the criminals change its value so it has $10,000 and then transfer $9,000 to themselves. The account holder doesn’t suspect a problem because the original $1,000 is still there.
  3. In addition, the cyber thieves seized control of banks’ ATMs and ordered them to dispense cash at a pre-determined time. When the payment was due, one of the gang’s henchmen was waiting beside the machine to collect the ‘voluntary’ payment.

Kaspersky Lab said that based on their analysis, the Carbanak attackers are trying to expand operations to other Baltic and Central Europe countries, the Middle East, Asia and Africa. The company advised financial institutions to have a close look at their networks for the presence of Carbanak immediately.

The report does include an extensive list of Indicators of Compromise and additional details on how to scan and mitigate the attack.

According to the security firm, one of the best methods for detecting Carbanak is to look for “.bin” files in the folder:

..\All users\%AppData%\Mozilla\

Kaspersky also provided a .BAT script for detecting infections in its report.

Carbanak Malware Infects Global Banks

“This is a jarring reminder of how easy it is for even sophisticated enterprises to overlook damaging changes to their cyber infrastructure,” commented Dwayne Melancon, CTO at Tripwire. “Malware leaves a trace when it compromises a system – even custom malware. Unfortunately, most of the times, that mark goes unnoticed because enterprises haven’t established a baseline, or known good state, and aren’t continuously monitoring for changes to that baseline.”

“Not only does this lack of awareness make it easier for criminals to gain a foothold, it makes it difficult, time-consuming, and very expensive to determine which systems can be trusted after-the-fact, and to determine how to remove the contaminated systems from the network,” Melancon added.

Additional details on Carbanak will be disclosed during a presentation by Kaspersky Lab researchers Sergey Golovanov and Sergey Lozhkin, and Peter Zinn, Senior Cybercrime Advisor for the Dutch National High Tech Crime Unit (NHTCU) at the Security Analyst Summit on Monday.

*Updated with reference to Fox-IT report


The Canadian Banking System Exposed

Bill Abrams tells us that one of the major differences between the US and Canadian banking systems is that the Bank of Canada is accountable to the people, under the Bank of Canada Act, 1934. The COMERS case against the Bank of Canada merely seeks to restore what is already Canadian law. -LW

Great overview of Canadian banking and a clear explanation of how the international private banking cartel hijacked Canada in 1974 by taking control of the issuance of money. This private banking cartel has been robbing Canada blind ever since, and has currently put Canadians into over $600 billion dollars of debt, growing at a rate of $7 million per day ($330,000 an hour).


The debt is actually the compound interest accumulated by borrowing this printed money from the private central banking cartel. Canada, like any other country, does NOT need private banks to issue it’s nation’s currency … countries can print their own money interest free.

The Case to “Reinstate” the Bank of Canada

D has done a good job of pulling together the details of this HUGE lawsuit against the Bank of Canada. It amazes me that we ever allowed this to happen… Canada was a relatively debt-free nation until we joined the G7 in 1974, and the Bank of Canada was placed under Bilderberg control. Did you know that every Prime Minister since Pierre Elliott Trudeau has been a Bilderberg member?

In some circles, Canada is actually considered to be the 13th district of the US Federal Reserve System. It seems that the Federal Reserve Bank of New York purchased voting interest in the Bank of Canada, back in 1933/34. -LW

This is the background information to the COMER vs Bank of Canada et al  that I discussed on Transpicuous News Midweek report on Wed.  

I will say that from the information given in the videos, I’m not entirely certain I agree with the basis of the law suit-  There are pieces missing in the background, which may derail the final court case.   In my opinion, to come at this suit from this direction, there needs to be brought into the evidence the basic fact of what money is, how it is created, the “strawman” aspect of the value of the people and the “corporatization” of the birth certificates, and most importantly, the inherent fraud of all perceived “Debt”.

…Having said that, In my opinion this is a positive step forward, even if only as a NOTICE to the Government of Canada, England, and the Central Banks of the world, that we are onto their fraud and schemes.   I will continue to follow this story and will update everyone as soon as we have more information. 


The Case to “Reinstate” the Bank of Canada

Posted on: February 03, 2015 by M. Oliver Heydorn
Category: Social Credit News

The Case to "Reinstate" the Bank of Canada
There is a very interesting legal case that is playing out in Canada at the moment. William Krehm, Anne Emmett, and Comer (The Committee for Monetary and Economic Reform: http://www.comer.org/) filed a lawsuit on December 12th, 2011, in Federal Court to try to force a restoration of the Bank of Canada to its mandated purposes. In essence, they want the Bank of Canada to provide interest-free loans to the federal, provincial, and municipal governments, as provided for in the Bank of Canada Act. This money would be used to finance public expenditures whenever there is a budgetary deficit. Apparently, the federal government used to borrow interest-free (to at least some extent) from the Bank of Canada up until 1974. At present, governments borrow all of the necessary money (apart from any bonds they may sell to the public) from private banks at the going rate of interest. Canadians are economically burdened with the resultant debt-servicing charges because the Bank of Canada does not make use of its prerogatives in the interests of the Canadian public. The case is being prosecuted by Rocco Galati, who is widely considered to be Canada’s top constitutional lawyer.

The nature of the lawsuit has been explained on www.pressfortruth.ca in the following terms:


Canadian constitutional lawyer, Rocco Galati, on behalf of Canadians William Krehm, and Ann Emmett, and COMER (Committee for Monetary and Economic Reform) on December 12th, 2011 filed an action in Federal Court, to restore the use of the Bank of Canada to its original purpose, by exercising its public statutory duty and responsibility. That purpose includes making interest free loans to municipal/provincial/federal governments for “human capital” expenditures (education, health, other social services) and /or infrastructure expenditures.The action also constitutionally challenges the government’s fallacious accounting methods in its tabling of the budget by not calculating nor revealing the true and total revenues of the nation before transferring back “tax credits” to corporations and other taxpayers. The Plaintiffs state that since 1974 there has been a gradual but sure slide into the reality that the Bank of Canada and Canada’s monetary and financial policy are dictated by private foreign banks and financial interests contrary to the Bank of Canada Act.

The Plaintiffs state that the Bank of International Settlements (BIS), the Financial Stability Forum (FSF) and the International Monetary Fund (IMF) were all created with the cognizant intent of keeping poorer nations in their place which has now expanded to all nations in that these financial institutions largely succeed in over-riding governments and constitutional orders in countries such as Canada over which they exert financial control.The Plaintiffs state that the meetings of the BIS and Financial Stability Board (FSB) (successor of FSF), their minutes, their discussions and deliberations are secret and not available nor accountable to Parliament, the executive, nor the Canadian public notwithstanding that the Bank of Canada policies directly emanate from these meetings. These organizations are essentially private, foreign entities controlling Canada’s banking system and socio-economic policies.

The Plaintiffs state that the defendants (officials) are unwittingly and /or wittingly, in varying degrees, knowledge and intent engaged in a conspiracy, along with the BIS, FSB, IMF to render impotent the Bank of Canada Act as well as Canadian sovereignty over financial, monetary, and socio-economic policy, and bypass the sovereign rule of Canada through its Parliament by means of banking and financial systems.” http://pressfortruth.ca/top-stories/case-reinstate-bank-canada/

On the 26th of January, 2015, the latest appeal on behalf of the Crown to have the case dismissed was rejected by three judges in Federal Court in Toronto. The Federal government now has 60 days to appeal the decision to the Supreme Court. Cf. http://pressfortruth.ca/top-stories/update-bank-canada-vs-comer/. Interestingly enough, both the case itself and the various developments that have occured are not being covered at all by the mainstream media. While Mr. Galati’s other cases have regularly received wall-to-wall coverage across the country, this particular case, which he believes is probably his most important case to date, has so far been ignored. When questioned about this, Mr. Galati said that he has a firm basis for believing that the Canadian government has requested or ordered that the mainstream media not cover the case (he could not divulge his sources), and that, in his opinion, the government does control the media to a certain extent and on certain limited issues. He also added that he does not believe that we in Canada are living in a democracy. In fact, as far back as 1999, he has been on record as claiming that we have entered a ‘quiet dictatorship.’

As far as its merits are concerned, Mr. Galati said that the case is on solid legal and constitutional grounds and his clients should win. Whether they will win or not is another question. As Mr. Galati has acknowledged: “Not all meritorious cases in our judicial system win”.

Continue Reading HERE:  http://www.socred.org/blogs/view/the-case-to-reinstate-the-bank-of-canada

Additional info from constitutional lawyer Rocco Galati
update COMER VS BOC Jan 2015

Published on 27 Jan 2015

Breaking News, Update on the COMER VS. Bank of Canada law suit,
Jan 26 2015 Today COMER (Committee on Monetary and Economic Reform EST. 1986) and constitutional lawyer Rocco Galati won yet another round of appeals. Galati the most prominent constitutional lawyer in the country says he does not believe Canada is a democracy any longer and that the media is controlled by the government.

News & Politics

Published on Jan 27, 2015
Breaking News, Update on the COMER VS. Bank of Canada law suit,
Jan 26 2015 Today COMER (Committee on Monetary and Economic Reform EST. 1986) and constitutional lawyer Rocco Galati won yet another round of appeals. Galati the most prominent constitutional lawyer in the country says he does not believe Canada is a democracy any longer and that the media is controlled by the government.
Published on Feb 1, 2015

Canadians sued the Bank of Canada and won.

Federal Court of Appeal Decisions

Case name Committee for Monetary and Economic Reform (COMER) v. The Queen
Court (s) Database Federal Court of Appeal Decisions
Date 2015-01-26
Neutral citation 2015 FCA 20
File numbers A-228-14
Date: 20150126


Docket: A-228-14
Citation: 2015 FCA 20
Respondents in the Cross-Appeal
Appellants in the Cross-Appeal
Heard at Toronto, Ontario, on Monday, January 26, 2015.
Judgment delivered at Toronto, Ontario, on January 26, 2015.


Date: 20150126


Docket: A-228-14
Citation: 2015 FCA 20
Respondents in the Cross-Appeal
Appellants in the Cross-Appeal
(Delivered from the Bench at Toronto, Ontario, on January 26, 2015).

FULL record on Federal Court of Appeals:  http://decisions.fca-caf.gc.ca/fca-caf/decisions/en/item/100762/index.do.