Regulator calls on Google to ban ads for binary options ...

Where’s the best place to live in light of collapse?

Ok we are 323 comments in on the collapse post and 98% didn’t bother to make even a slightly thoughtful answer. So... i guess i will be the change i want to see in the world
First off, If you are the fatalistic nihlistic type you can just go where you think it will be nice to die, maybe that is with friends and family, maybe it is on a beach in mexico, or feeding your body to the last polar bear. For everyone else that still has the instinct and drive for self-preservation….
What are the best places to be leading up to or during collapse?

First let's question the question.

What difference does it make to know "What are the best places to be leading up to or during collapse"?
The answer is dependent upon your own personal situation. Your personal situation has limiting factors.
Your personal Limiting Factors constrain you usually somewhere between those extremes, everyone has different options.
If we assume you are asking the question "What are the best places to be leading up to or during collapse" because you want to have the best standard of living available for as long as possible or simply survive the incoming population bottleneck, then the practical question becomes ...
"What are the best places to be, leading up to or during collapse, that i can get to, and establish myself in such a way that I can maintain the best standard of living possible for as long as I can or simply increase my probability of surviving the incoming population bottleneck."
It is important to ask this question to constrain the search space to the possible. It makes fuck-all difference if a somali goat herder knows about the ToP SeCret ElitE mULtibiLLioNaIre New ZEaLand sOUth IsLaNd ReDoUbt BuNkeR CoMmUnITy It is not going to help him and should not be in the search space as a survival strategy.
TL:DR Constrain your search space to what is realistically achievable for you.
  1. Start with your baseline probability of survival and increase it.
  2. Don't let a search for "best place" stop you from achieving "good enough place" or "better than where i was previously place".
  3. You are just trying to be an early adopter of increasing your survival probability stats before the non collapse-pilled masses.
  4. Think of surviving bottlenecks like surviving a charging bear attack, you don't need to be able to outrun the bear, you only need to be able to outrun the slowest people in the group up to the point the bear's appetite is satiated.
  5. Remember working with others can leverage group synergies and massively increase the realistic capabilities, but this requires you establish social cohesion with sane cooperative people that have a similar goal orientation. /greencommunes
What are the best places to be, leading up to or during collapse, that i can get to, and establish myself in such a way that I can maintain the best standard of living possible for as long as I can or simply increase my probability of surviving the incoming population bottleneck." 

Ok now lets question the new question some more...

In order to answer this we need to untangle some of the subjective and objective elements.
The objective elements of human survival are well known.
Optimizing location is a series of subjective trade-offs. There is no perfect place, they all have advantages and disadvantages.
So you must decide your personal preference of which goods and bads you most desire and what your scenario expectations are of the future.
Your personal preferences and collapse expectations mean the “best area” is specific to you.
What you can achieve and what do you desire, find the overlap between the two, then do research to find the place that gives you the most goods with the least bads and increases your probability of survival and standard of living.
One of the best strategies is to adapt yourself to your local circumstances to take advantage of the advantages, and plan ahead to mitigate the disadvantages, it is really all most people can do for themselves.
Do you like not living in unbearable heat, maybe moving to greenland is NOT a better option than just buying 400watts of solar panels and attaching it to a small efficient AC that keeps one room of your house cool even during summer electricity blackouts. Most problems have multiple solutions, it is worth it to take time and think about things from an economic perspective and different time horizon perspectives.
Increasing your optionality is better than narrowing it when it comes to survival, rather than the binary thinking, of “go way out into the northern mountains, farm and live in a bunker” versus “be a full time yuppie and ignore collapse issues”. Getting 2 acres you can put a cheap used rv camper on and go do permaculture on during weekends, near enough your place of employment/where you live, is probably a better plan. Indeed the small dacha’s and country gardens helped many people survive the collapse of the USSR. They would spend weekends and haul potatoes/veggies back to the city with them on the bus. Hedge your bets to cover the most scenarios including the most likely scenarios like losing your job or getting in a car accident. Survival and thriving always has and always will involve dynamic adaptation.
Here is a very short list of some of potential trade-offs that you may need to think about and some brief descriptions of how they can affect things. This is NOT meant to be a systematic or exhaustive analysis, this is just me stream-of-conscious flowing on strong coffee to help others start thinking about it for themselves. There are unlimited variables
Most of these maps are of the USA. If you have other maps please post them in the comments and i will edit this post to squeeze them in. From these maps and a little critical thinking you can figure out where is best for YOU. If you need to figure something out go to google images and search for maps it is easier than ever to find what you need. But remember the map is not the territory, there are great spots maps don't have the resolution to show.These are just some random things i pulled up real quick. mapporn is a good source
There are a lot of submaps,for example if you click california then it brings first and last frost date maps, heat maps etc…
On the left hand side there are lots of links to climate and biogeography maps
Firehazard map middle of nowhere
hdd+cdd= change in energy requirements for climate control Find out what your city will be like in 60 years
human development index solar and wind potential combined 1% of population lives here land quality Fig. 2 Spatial distributions of projected damages. County-level median values for average 2080 to 2099 RCP8.5 impacts. Impacts are changes relative to counterfactual “no additional climate change” trajectories. Color indicates magnitude of impact in median projection; outline color indicates level of agreement across projections (thin white outline, inner 66% of projections disagree in sign; no outline, ≥83% of projections agree in sign; black outline, ≥95% agree in sign; thick white outline, state borders; maps without outlines shown in fig. S2). Negative damages indicate economic gains. (A) Percent change in yields, area-weighted average for maize, wheat, soybeans, and cotton. (B) Change in all-cause mortality rates, across all age groups. (C) Change in electricity demand. (D) Change in labor supply of full-time-equivalent workers for low-risk jobs where workers are minimally exposed to outdoor temperature. (E) Same as (D), except for high-risk jobs where workers are heavily exposed to outdoor temperatures. (F) Change in damages from coastal storms. (G) Change in property-crime rates. (H) Change in violent-crime rates. (I) Median total direct economic damage across all sectors [(A) to (H)]. Nuclear targets Chernobyl fallout, demonstrates the nonlinear patterns of distribution Reliance on nuclear energy. Global solar potential Renewable electric supply
Power plants Red and orange have same populations Agricultural suitability how america uses its land Life expectancy by congressional district food for humansgreen versus animal feed purple line that separates wet and dry USA Is food a human right? See paupericide food self sufficiency[email protected]/Worlds-hybrid-PV-Wind-power-plant-cumulative-FLh-map.png combination wind+photovoltaic capacity human appropriated net primary productivity avoid the pink and orange unless your strategy is cannabilism in fast or hard crash. water shortage malnutrition
submitted by MakeTotalDestr0i to collapse [link] [comments]

Week 48; Experts in authoritarianism advise to keep a list of things subtly changing around you, so you’ll remember.

The humanitarian crisis in Puerto Rico worsened with the inadequate response by the federal government. Amid criticism, Trump threatened to pull out, but later backed off. Although the death count officially stands at 45, reporting revealed possibly hundreds more preventable deaths related to the Hurricane Maria.
Trump remains silent on both California’s deadliest wildfires and the deadliest combat incident since he took office. He continues to focus on undoing Obama’s legacy, piece-by-piece. The Mueller investigation hit Trump’s inner-circle, and social media’s role in aiding Russia continues to unfold.
  1. On Saturday night, Richard Spencer led another white supremacist torch-lit rally at University of Virginia. The rally lasted 10 minutes and 40-50 people attended. Spencer vowed, “we will keep coming back.”
  2. On Sunday, Trump attacked former ally Sen. Bob Corker in a series of incendiary tweets, saying “Corker “begged” me to endorse him for re-election” and “wanted to be Secretary of State.” Trump claimed to have said no to both.
  3. Corker responded, tweeting it’s a shame the WH has become an “adult day care center,” and that someone “missed their shift this morning.”
  4. On Sunday, Pence left a Colts game after a protest during the national anthem. Pence later issued a full statement opposing the protests. The Colts were playing the 49ers, a team known to protest.
  5. Before the game, Pence tweeted a photo of him and the Second Lady wearing Colts gear. The photo was one he originally tweeted in 2014.
  6. Shortly after, Trump tweeted he had asked Pence to leave the game “if any players kneeled,” and said he was proud of Pence and the Second Lady.
  7. The pool of journalists covering Pence were not allowed into the stadium, and were told, “there may be an early departure from the game.” ABC estimated Pence’s flight cost taxpayers nearly $250k.
  8. Bowing to pressure from Trump, the Cowboys’ Jerry Jones, after kneeling with players in week 3 of the season, changed course saying any player who “disrespects the flag” by kneeling will not be allowed to play.
  9. On Tuesday, Trump threatened the NFL over protests saying the league is “getting massive tax breaks” and the law should be changed. This claim is false: the NFL gave up its 501(c)(6) tax-exempt status in 2015.
  10. On Tuesday, bowing to pressure from Trump and fans, NFL Commissioner Roger Goodell, who previously had said players had the right to voice their opinions, sided with owners opposed to letting players demonstrate.
  11. On Monday, Pence headlined a fundraiser in CA for Republicans including controversial, Kremlin-ally Rep. Dana Rohrabacher. Rohrabacher had a previously undisclosed meeting in Russia with Veselnitskaya described in Week 47.
  12. University of Wisconsin approved a policy which calls for suspending or expelling students who disrupt campus speeches and presentations. The policy mirrors Republican legislation passed by the state Assembly.
  13. On Columbus Day, unlike Obama, Trump celebrated the “arrival of Europeans,” but did not mention of the suffering of Native Americans.
  14. On Sunday, the Trump’s DHS allowed the Jones Act waiver, which helped speed relief to Puerto Rico, to expire. No explanation was given.
  15. Trump’s EPA announced it would repeal the Clean Power Plan, Obama’s signature policy to curb greenhouse gas emissions from power plants. The statement described the regulation as the “so-called Clean Power Plan.”
  16. On Friday, Trump addressed the Value Voters Summit hosted by the Family Research Council, which has been classified by SPLC as an anti-gay hate group. Trump is the first US leader to address the group.
  17. Reuters reported the Trump regime has been quietly cutting support for halfway houses for federal prisoners, severing contracts with as many as 16 facilities, necessitating some inmates stay behind bars longer.
  18. ABC reported the Treasury Dept’s inspector general is looking into allegations reported by BuzzFeed in Week 47 that agency officials have been illegally looking at private financial records of US citizens.
  19. A report compiled by the Government Accountability Office (GAO) at House and Senate Democrats’ request, found the Trump transition team ignored ethics officials and refused to cooperate with the GAO.
  20. Trump named Kathleen Hartnett White to the WH’s Council on Environmental Quality. Hartnett White, a climate science denier, once also said, “fossil fuels dissolved the economic justification for slavery.”
  21. In response to a filing by CREW, Trump’s DOJ told a court in DC that Trump can destroy records without judicial review, including tweets.
  22. Brian Brooks became the second candidate under consideration for deputy Treasury Secretary to withdraw from consideration. Mnuchin said he has no plans to fill the number two slot in his agency.
  23. WAPO reported at the Interior Dept, when Zinke enters the building a staffer takes the elevator to the seventh floor, climbs the stairs to the roof and puts up a special flag. The flag comes down when he leaves.
  24. On Wednesday, NBC reported Tillerson calling Trump a “moron” was provoked by Trump suggesting a tenfold increase in the US nuclear arsenal during a July 20 meeting with the high-ranking national security leaders.
  25. In response to the story which he called “Fake News,” Trump tweeted a threat to revoke the broadcasting licenses of “NBC and the Networks.”
  26. Later that afternoon, at a news conference, Trump again lashed out at the independent news media saying it’s “frankly disgusting the press is able to write whatever it wants to write.”
  27. In a statement Wednesday night, Republican Sen. Ben Sasse asked Trump if he was “recanting” his oath to protect the First Amendment.
  28. Indiana Republican lawmaker Jim Lucas drafted a bill that would require professional journalists to be licensed by state police.
  29. Under pressure to confirm Trump’s judicial nominees, McConnell will no longer allow “blue slips,” used by senators to deny a nominee from their state a Senate Judiciary Committee hearing and vote on confirmation.
  30. The Trump regime withdrew from United Nations Educational, Scientific and Cultural Organization (UNESCO), citing anti-Israel bias and a being in arrears on a $550 million payment. Israel remains part of UNESCO.
  31. NYT published an interview with Corker in which he said Trump is treating his office like a “reality show” with reckless threats at other country that could put our country “on the path to World War III.”
  32. Corker said he is concerned about Trump, and Trump’s behavior should concern “anyone who cares about our nation.” He added there is no ‘good cop, bad cop’ underway with Tillerson — Trump is undermining diplomacy.
  33. Corker said nearly all Senate Republican share his concerns: “the vast majority of our caucus understands what we’re dealing with here.”
  34. WAPO reported Trump is frustrated by his cabinet and that he is not getting enough credit for his handling of three hurricanes. Trump is lashing out and rupturing alliances with both Republicans and Democrats.
  35. One confidant said Trump is like a whistling teapot, saying when he does not blow off steam, he can turn into a pressure cooker and explode: “I think we are in pressure cooker territory.”
  36. Politico quoted 10 sources current and former WH aides who employed strategies like delays and distractions as “guardrails” in trying to manage Trump’s impulsivity.
  37. Vanity Fair reported sources say Trump is “unstable,” “losing a step,” and “unraveling.” They say the WH is in crisis as advisers struggle to contain Trump who is increasingly unfocused and consumed by dark moods.
  38. Trump allegedly told his former bodyguard Schiller, “I hate everyone in the White House!” Kelly is allegedly miserable in the job, and is staying on in a sense of duty and to keep Trump from making disastrous decisions.
  39. One former official speculated Kelly and Mattis have discussed what they would do if Trump ordered a nuclear strike — “would they tackle him?”
  40. According to sources, Bannon said the risk to Trump’s presidency wasn’t impeachment, but the 25th Amendment. Bannon thinks Trump has only a 30% chance of making it the full term.
  41. In a column “What Bob Corker Sees in Trump,” conservative columnist Peggy Noonan urged Republicans they have a duty to speak on the record about what they see happening with Trump.
  42. On Thursday, at a signing ceremony for his health care executive order, Trump nearly walked out of the room without signing the order. Pence pulled him back in.
  43. On Tuesday, Trump said in an interview with Forbes that he could beat Tillerson in an IQ test. Trump met with Tillerson later that day at the WH.
  44. On Friday, Corker called out Trump for his effort to disempower Tillerson saying: “You cannot publicly castrate your own secretary of state without giving yourself that binary choice.”
  45. CNN’s Fareed Zakaria said, “It’s very clear now that we essentially have no diplomacy going on in the United States,” adding the way Trump has treated Tillerson is “the most dramatic example of it.”
  46. On CBS’s 60 Minutes, Parscale claimed he fine-tuned ads on Facebook to directly reach voters with the exact messages they cared most about. He also claimed he handpicked Republican Facebook employees to help.
  47. Daily Beast reported the Kremlin recruited two black video bloggers, Williams and Kalvin Johnson, to produce incendiary YouTube videos calling Hillary a racist. The videos were spread on social media platforms.
  48. WAPO reported Google has uncovered evidence about $100k of ads purchased by Russian agents to spread disinformation on across the company’s many products, including YouTube, during the 2016 election.
  49. Google said the ads do not appear to be from the same Kremlin-linked troll farm that bought ads on Facebook. Some ads touted Trump, Bernie Sanders, and Jill Stein, while others aimed to fan the flames of divisive issues.
  50. Rep. Devin Nunes, who recused himself as Chair of the House Intel Committee’s Russia probe, unilaterally signed off on subpoenas to Fusion GPS, the research firm that produced the Steele dossier. Democrats were not consulted.
  51. Reuters reported Chuck Grassley, the Republican chair of the Senate Judiciary Committee, is also taking steps to discredit the dossier according to Democrats on the committee.
  52. Carter Page told the Senate Intel Committee that he will not cooperate with any requests to appear before the panel on Russia, and will plead the Fifth.
  53. Daily Beast reported the House Permanent Select Committee on Intelligence is looking at Cambridge Analytica’s work from the Trump campaign as part of its Russian probe.
  54. Cambridge Analytica, which has ownership ties to the Mercers and Bannon, was brought in to help the campaign by Kushner. The company is also under investigation in the UK watchdog for its role in Brexit.
  55. NYT reported Israel caught Kaspersky Lab working with the Russian government to search the world for US secrets, using Kaspersky software to scan for classified words. Kaspersky software is used by 400 million people.
  56. WSJ reported that Russia’s use of the Kaspersky program to spy on the US is broader and more pervasive than the operation against one individual in Week 47. Trump continues to deny Russian meddling in the US election.
  57. Politico reported as part their posture to cooperate, Trump’s attorneys may offer Mueller a meeting with Trump. If Mueller doesn’t ask by Thanksgiving, attorneys may force the issue by volunteering his time.
  58. Legal experts were surprised by Trump’s lawyers strategy noting Trump would be speaking under oath and he routinely distorts facts, and that Trump would be interviewed in connection with a criminal investigation.
  59. CNN reported Russian operatives used YouTube, Tumblr, and even Pokémon Go as part of their effort to interfere in the election, using a campaign titled “Don’t Shoot Us” to spread a divisive message.
  60. NBC reported Manafort had a previously undisclosed $26 million loan from Deripaska through a series of transactions. It is unclear if the $26 million is a loan or an indirect payment from the Russian oligarch.
  61. The loan brings the total financial relationship between Manafort and Deripaska to $60 million over the past decade, according to financial documents filed in Cyprus and the Cayman Islands.
  62. Manafort’s spokesman, Jason Maloni, initially responded to NBC with a statement including: “Mr. Manafort is not indebted to former clients today, nor was he at the time he began working for the Trump campaign.”
  63. Maloni’s statement was later revised and that sentence was removed. Both Manafort and Maloni have received subpoenas to supply documents and testimony in the Mueller probe.
  64. Yahoo reported Andrew Feinberg, former correspondent for Sputnik, provided a guide and emails to FBI investigators looking into possible violations of the law which requires agents of foreign nations to register with the DOJ.
  65. Further, the Senate Select Committee on Intelligence is investigating RT and Sputnik as possible parts of the Russian state-run propaganda machine in the broader probe into Russia’s election meddling.
  66. On Friday, Mueller’s team interviewed Trump’s former chief of staff, Priebus. Priebus’ lawyer said he voluntarily met with investigators and “was happy to answer all of their questions.”
  67. Priebus was present during Trump’s efforts to limit the Russia probe, and for discussions that led to the firing of Comey. He was also asked to leave the Oval Office before the infamous Trump-Comey conversation.
  68. Politico reported Twitter deleted tweets and other user data of potentially irreplaceable value to investigators in the Russia probe.
  69. Federal investigators believe Twitter was one of Russia’s most potent weapons. Bots and fake accounts launched recurring waves of pro-Trump, anti-Clinton story lines that were either false or greatly exaggerated.
  70. AP reported Twitter has turned over 201 accounts linked to Russian attempts at influencing the 2016 election to Senate investigators. It is unclear if the posts associated with these accounts have been deleted.
  71. CNN reported an attorney for Roger Stone said he has complied with the House Intel Committee request to provide the identity of his intermediary to WikiLeaks’ Assange.
  72. WSJ reported Congressional investigators are homing in on connections between the Trump campaign, and Facebook, and Twitter. Digital director Parscale was paid $88 million during the campaign, the highest paid vendor.
  73. Every vendor that worked with Parscale on the Trump campaign signed a nondisclosure agreement, and there are no federal disclosure requirements for online ads.
  74. Both Congress and Mueller are investigating the role activity on Facebook and Twitter played in the 2016 election, and whether the Russian social-media activity was in any connected to the Trump campaign.
  75. A Morning Consult poll found Trump’s approval has fallen in every state since he took office. The swings were as high as 30 percentage points in blue-states IL and CA, to 11 points in red-state LA.
  76. A Reuters/Ipsos poll found Trump’s popularity is eroding in small towns and rural communities: in September 47 approve/47 disapprove, down from 55/39 in his first four weeks in office.
  77. WAPO reported as of October 10, Trump’s first 263 days in office, he has made 1,318 false or misleading claims.
  78. The Brookings Institute released a 108-page report which concluded Trump “likely obstructed justice” in his firing of Comey. If Mueller agrees, there are legitimate articles of impeachment that could be drawn up.
  79. In a letter to Mattis, over 100 Democrats are demanding proof that Trump did indeed consult with the Pentagon as he claimed in a tweet, prior to announcing his ban of transgender individuals from military service.
  80. A Kaiser Foundation poll found 62% of Americans say Puerto Ricans aren’t getting the help they need. 76% were aware Puerto Ricans are US citizens.
  81. On Thursday, in a series of tweets, Trump threatened to abandon Puerto Rico’s recovery effort, blaming the island for its infrastructure problems and saying and relief workers would not stay “in P.R. forever.”
  82. The tweets follow harsh criticism from Puerto Rico of the Trump regime’s response to Hurricane Maria. One Puerto Rican said, “He doesn’t think of us as Americans.”
  83. Trump also quoted a Sharyl Attkisson, a television journalist with Sinclair Broadcasting, in saying that while Puerto Rico survived Hurricane Maria, now “a financial crisis looms largely of their own making.”
  84. Later Thursday, the WH issued a statement committing “the full force of the U.S. government” for now, but adding “successful recoveries do not last forever.”
  85. At a House Energy and Commerce hearing about efforts to rebuild the island’s energy grid, Sec. Rick Perry referred to Puerto Rico as a country.
  86. Next day, Trump referred to the Virgin Islands’ governor as a president.
  87. VOX reported although the official death count in Puerto Rico is 45, they found 81 death linked to Hurricane Maria, as well as 450 more reported deaths, most of causes still unknown, and 69 still missing.
  88. Puerto Rico’s governor said four deaths are being investigated as cases of leptospirosis, a disease spread by animals’ urine through contaminated water. A total of ten people have come down with the disease.
  89. Rachel Maddow reported a doctor resigned from the disaster response team in Puerto Rico after seeing medical workers getting manicures and pedicures from residents of the island in medical triage tents.
  90. NYT reported on Puerto Rico’s health care is in dire condition, and continues to suffer from mismanagement. The US Comfort ship with 800 medical personnel which can serve 250, has seen 82 patients in six days.
  91. CNN reported Puerto Ricans are drinking water from a hazardous-waste site, having no other options for water.
  92. A Politico/Morning Consult poll found just 32% of registered voters think the federal government has done enough to help Puerto Rico.
  93. Bloomberg revealed one of its reporters was inadvertently put on the Pentagon’s internal email list which detailed how to spin Hurricane Maria to convince the public that the government response was going well.
  94. On Thursday, Trump also signed an executive order ending Obamacare subsidies for the poor. Not paying the subsidies could boost premiums for millions and send the health insurance exchanges into turmoil.
  95. NPR estimated consumers who earn 400% of the federal poverty level — $48k for individuals or $98.4k for a family of four — will see their the cost of their plans rise by, on average, 20% nationwide.
  96. Doctors, hospitals, insurers, state insurance commissioners and patient advocates denounced Trump’s move. Trump actions puts pressure on Congress to protect consumers from soaring premiums.
  97. WSJ reported if Congress doesn’t succeed, WH aides said Trump “will claim victory” for ending the Iran deal, cutting billions in payments to health insurers, and deporting hundreds of thousands of immigrants.
  98. On Friday, a coalition of attorneys general from 18 states and DC filed a lawsuit to block Trump’s halt to subsidy payments under Obamacare.
  99. NYT reported as of Friday, Trump has taken 12 actions which could weaken Obamacare and curtail enrollment, including spreading negative news releases and posting infographics criticizing the health law.
  100. On Saturday, Trump boasted on Twitter that health insurance companies’ stocks “plunged yesterday” after his steps to dismantle Obamacare.
  101. A Kaiser Health poll found 71% of Americans say the Trump regime should work to improve Obamacare, while just 21% say make it fail.
  102. On Friday, Trump slammed Iran as a “menace” and called for “decertification” of the nuclear deal, Joint Comprehensive Plan of Action (JCPoA), saying Iran is “not living up to the spirit of the deal.”
  103. Trump sent the deal back to Congress with a 60-day window to address its “many serious flaws” or see it “terminated.”
  104. Top officials on Trump’s national security team, including Mattis and Tillerson, said Iran has technically complied with its restrictions. The International Atomic Energy Association also confirmed compliance.
  105. Daily Beast reported while McMaster also wanted to save the Iran Deal, Trump consulted Fox News’ Sean Hannity and former UN Ambassador John Bolton, two neoconservatives who pushed for decertification.
  106. The leaders of Britain, Germany and France declared their commitment to stand by JCPoA. They deal was the culmination of 16 years of diplomacy.
  107. After being added to Trump’s travel ban, Chad pulled its troops from the fight against Boko Haram in Niger. US officials had warned Trump his decision would have major consequences for the fight against terrorism.
  108. California’s deadliest wildfires charred more than 221,754 acres of land in Northern CA, and left at least 35 dead and hundreds more missing. Trump has yet to publicly comment or tweet about the wildfires.
  109. Nor has Trump publicly commented on the deadliest combat incident since he took office, which took place in Niger last Saturday while Trump was golfing. The ambush by ISIS left four soldiers dead and two wounded.
  110. As the week ended, 24 days after Hurricane Maria, just 64% of Puerto Ricans had access to drinking water, and only 14.6% had electricity.
  111. Trump spent his fourth weekend since Hurricane Maria golfing. On Saturday, he visited Trump National Golf Club in VA, his 72nd day of golf since taking office.
submitted by 1000000students to TheConstitution [link] [comments]

State Capitalism

The text below is an exchange had between Sire_26 and the BSA chat group about State Capitalism. This record exists for the sake of education and does not necessarily reflect the positions of BSA as a whole.
Please feel free to leave your thoughts in the comments below.
Sire_26: Lenin [identified as] an orthodox Marxist, so he felt that the USSR needed to be in a holding pattern until a revolution took place in Germany or another more developed country; the thing is, Russia never left that holding pattern until the collapse of the USSR.
Anon #1: yeah
Sire_26: When “capitalism” as we understand it took full control. Trotsky predicted this would happen.
Anon #1: now russia is just as capitalist as anywhere else, and considerably smaller.
Sire_26: Mikhail Bakunin is the real ☕️, tho. PLEASE read him.
Anon #2: What are your thoughts on Luxemburgism?
Sire_26: The only “ism” and “ist” labels you should be entertaining is “Marxist” and various forms of “Socialist” lol everything else is dogma.
Luxemburg is super important, and everyone should read her works on “reform” and the role that it should play. But she should be someone we’re studying just like everyone else (including Lenin, Mao, Trotsky... they all have thoughts to contribute to this conversation).
We have to stay true to the science (dialectics), though.
Anon #3: Wait are we saying that Soviet Russia was capitalist?
Anon #2: It was lol It had capitalistic aspects at some points but they definitely tried socialism. At least in my research.
Anon #3: I think that’s a bit intellectually dishonest lol of course Czarist Russia was capitalist and imperialist, but after the Russian revolution and the formation of the Soviet Union I think it would be more than misleading to call Russia/Soviet Union “capitalist.”
Just because there is a socialist revolution, does not mean that the bourgeoisie and remnants of capitalism just are wiped away like with the brush of a stroke.
The dictatorship of the proletariat has to be installed to suppress bourgeoisie/capitalist counter revolution.
According to Stalin/Lenin there has to be an entire historical epoch of socialism to transition society into communism.
Sire_26: It was state capitalist.
Anon #4: Czarist Russia was more of a mix a capitalism and feudalism than actual capitalism
Anon #3: Czarist Russia represented all of the ills of rising imperialism.
Sire_26: Internally, it was never socialist to begin with. From the infrastructure of the Bolshevik Party, to the later formation of the USSR. Vladimir Lenin advocated for and acknowledged this (including state capitalism). The problem is that because of things like democratic centralism and the overall adherence to orthodox Marxist principles, the conditions were set for the totalitarian state to come to fruition under Stalin, and ultimately, as Trotsky predicted, for the USSR to collapse.
If you read Lenin, you’ll see exactly what I’m referring to.
Anon #2: I find this very interesting lol
Sire_26: Lenin not only acknowledged, but desired & promoted the State Capitalist nature of the Soviet Union, & this can be seen through his intra-party debates & private letters.
See here:
See here:
Please read:'%20control.pdf
The Bolsheviks inherited an economy that was underdeveloped (coming from feudalism). Lenin’s solution was “State Capitalism,” which would allow the economy to develop. This required capitalist policy, but with specific sectors of the economy controlled by the state.
Lenin rationalized this approach with Marxist theory, pulling on the idea of capitalist development being necessary before Socialism can truly succeed. [Marx actually rejected stagism at the end of his life, for the record.]
Lenin also believed that a socialist revolution in Germany would provide the developing Soviet economy with resources and support.
Regardless of what his intentions were, what Lenin and his party advocated for in a move towards Socialism set the conditions for the catastrophes that would later transpire, and U.S. government propaganda will continue to cite this in arguing that “Socialism” should be avoided.
We mustn’t fetishize the leaders of the past, or be apologists for the errors in their rationales. We must learn from the mistakes in their methods in an effort to develop realistic approaches that stay true to the socialistic principles we all claim to embody.
This is not a discussion about Lenin’s “intent,” but rather what did and did not exist in the USSR.
Please see here:
Marx and Lenin's views contrasted | By Richard Montague … via @OfficialSPGB
Please scroll down to number five (“Current Tasks of the Trade Unions”) to see where Lenin makes a demand for “one-man” management:
“On the Question of the Trade Unions and their Organization” | From the 9th Congress of the Bolshevik Party (1 April 1920)
Lenin in 1919 demanding one-man management:
“Introduction of One-Man Management in Lieu of Board Management in Centrotextil: Draft Decision for the Council of People’s Commissars” | By Vladimir Lenin
Given the circumstances, one could find many arguments for why a “one-man management” policy (amongst other things) could’ve theoretically worked for the time, but policies like this were inherently antithetical to socialist principles, and set the stage for later catastrophe.
Anon #3:
Sire_26: Obviously they tried it. It wasn’t what feudal Russia was. But this doesn’t mean that it was actually socialist or communist. So many of Lenin’s positions were completely antithetical to Marxist principles, and many self-identifying Marxist-Leninists excuse this by saying those who take issue are “utopian,” when really it’s just Marxism. It’s actually not that complicated.
Some Marxist-Leninists acknowledge this, but most don’t.
This is one of those topics where, if you haven’t read deep into the history, or read Marx or Lenin or Trotsky or Stalin (and I mean actually read them, or at the very least thorough summaries of their positions), then we’re just going to keep talking in circles.
The crux of the conversation is State Capitalism vs. Socialism. A Communist State vs. a Communist Society (as outlined by Marx). You can call any of it whatever you want (the semantics aren’t what’s important here); what matters is that we understand the characteristics of each potential existence and/or theory, as well as what really happened in the past.
This is why we have to be vigilant in combating dogmatism. It tries to shortcut digging into the reality of the history, and this is dangerous, because – as the cliche goes – those who fail to understand history are doomed to repeat it.
“Scientific Socialism” as an idea and concept is what we should be collectively adhering to; not the philosophy of only one person or revolutionary leader, but dialectics (the science).
I highly recommend Anton Pannekoek’s writing on State Capitalism:
Anton Pannekoek - State Capitalism and Dictatorship
This is one of those difficult things, because many of our Black revolutionaries of the past identified with Marxism-Leninism and Maoism. But, again, if you read Fred Hampton’s speeches, he talked about the dialectics – the objective reality of our situation. The reality of our situation now is not the same as what it was in 1969 America, or 1917 Russia. Malcolm X also spoke about this in “The Ballot or the Bullet” too. We can’t look at their words in a static way and try to format them to now; it won’t work.
Lenin and Trotsky’s methods may have held more weight in the past (on paper), and strictly in a theoretical sense for their time (and there’s a lot to learn from their strategy when it comes to direct action and propaganda campaigns), but we’re dealing with a different situation/reality right now, and we need REAL socialism. We need REAL communism (as outlined by Marx).
We don’t need centralized power and more* state capitalism. Our state is already working off of fiat currency. We have already accumulated enough wealth ... for shit to change on a widespread level under socialist representation. We just need to break through the liberal and conservative propaganda, as well as the voter suppression.
In 1969, when Hampton was advocating for the collectivization of arms and weaponry in Cook County, there may* have been more weight and logic to that strategy. In 2018, where the military power of the state is even wider and enforced, this approach is not only not logical; it’s not possible (at the degree to which he spoke of). It just isn’t.
We have to be looking at how poor and working-class people are to actually take control of the state apparatus, as well as the private sector (this means in the workplace). This requires a certain degree of gradualism (please read Luxemburg for more on this, though).
Anon #5: I think looking at one as impossible and the other as possible through gradualism is a mistake. The only thing that any of us agree on is the idea that that revolution, through ballot or bullet, is going to be unfathomably difficult.
Sire_26: Looking at what as impossible?
Anon #5: Collectivization of arms and weaponry. If the idea of a gradual victory is possible in your mind for taking control of state apparatus, there has to be room in your mind for the other option. Dismissing either entirely is a mistake.
Anon #6: It's a false dichotomy to my mind.
Sire_26: Did you listen to Malcolm X’s “The Ballot or the Bullet”? Genuinely asking (not being insincere). The entire point X was making is that despite the fact that every revolution throughout history has been bloody, we’re in a unique position here in America. Even though we don’t have a true “democracy,” we still have democratic processes in front of us that we need to take advantage of as Black American people.
If you’re entertaining the idea of insurrection (that is, an armed uprising against the state) in 2018, then you’re simply not thinking about the practical points of such an effort.
We need to be on the road to real revolution; not destabilization. We are stabilized, despite the fact that we’re ideologically fragmented and have institutions rotted to the core by capitalism. We are stabilized compared to many war-torn countries around this world.
Inviting insurrectionist planning is not rational for more reasons than I could list in this group chat. If you’d like to speak with some socialist combat veterans I know about this topic, I can put you in touch.
Anon #6: Gradualism isn't a rejection of the revolutionary option, just the understanding that it has to be put off, and that survival has to take priority.
Sire_26: And yes, that is a false dichotomy that was just created.
Anon #5: Sire_26 and I aren't talking about the same thing when we say the words "revolutionary option."
Sire_26, I feel like you're narrowing what I'm saying in a way I'm not doing to you x_x if you were to tell me we're going to be able to vote in/write into law socialism "in 2018", I'd say it isn't possible. As far as insurrection goes, it wouldn't be possible in 2018 either.
Neither are. Both are huge projects that would take years to get anywhere.
[And] btw yes, I did listen to Malcolm X's ballot or bullet. Just so happens that the guy advocates for black capitalism a lot in order to take better control of black communities. There's a lot to be said for historical context, and that thing you mentioned earlier about taking some things to heart, while leaving other things in the past.
Anon #3: I wouldn’t say Malcolm advocated capitalism, but rather black self determination.
Sire_26: Exactly. Malcolm X was anti-capitalism (there are quotes from him on this).
@[Anon #5], you’re kind of creating false dichotomies in your responses, and begging the question (a logical fallacy). We’re not talking about anything happening right this second. We’re talking about quite the opposite; gradualism.
There’s a stark difference between revolutionary changes to systems and a coup.
You’re entertaining the idea of a coup being a viable option in America. I’m saying it’s not an option right now, while many insurrectionists would insist on the contrary.
Anon #5: I'm not talking about a coup, personally. Coup implies like, "kill the president, and senators/legislators, take power from above" which isn't my point. It wasn't Fred Hampton's point, either, when he was advocating for collectivization of arms and weaponry. At the time, it was about defense. Defense of community, protecting self determination, that sort of thing.
Listen, this topic is complex and i'd rather talk about it than go point by point in writing, which i feel would take a long while. Plus, to be honest, reading back i feel like i kind of derailed the original point.
Conversations about amassing weapons vs. "how to revolution" are definitely not the same thing.
Anon #7: This topic is gonna properly get fleshed out on here.
Sire_26: I’m with you on the point about Fred Hampton (although it’s debatable), but even with the size of the police state now, “defense” has to take on an entirely different meaning when it comes to us protecting ourselves. I think we should be advocating for that on an individual/personal level, ya dig? But I’m not an idiot. I see what the BIE classification does. We saw what COINTELPRO did. We know the state has even more power now.
A coup is much more complicated, but it is violent uprising. Insurrection. Armed struggle. These are all aimed to achieve successful coups, or control of the state apparatus. When many use the word “revolution,” that is what they’re associating with it (in a practical sense). I’m saying the dynamics have changed; gradual revolution is real, but this does not mean we should be limiting ourselves – rather, reading the climate and accelerating the process whenever we can.
Again, this is “The Ballot or the Bullet” conversation.
We can def explore this via phone or Discord or whatever at another time. It’s an important conversation to have.
Sorry for the massive walls of text lmfao we might as well share these conversations at some point, they’re so long.
I would definitely say for everyone (myself included) that we all gotta sit with perspectives sometimes instead of jumping to respond so quickly. What’s most important is not winning a debate or argument or making someone think like you do, but rather figuring out what the truth (not “your” or “my” truth, but the objective* truth) is, and making the truth known.
Anon #5: yeah, agreed.
Sire_26: 💯💯💯
Anon #5: i don't mind walls XD i do a lot of reading in my free time
Sire_26: Ayyyeee you’re like me then lol I don’t mind either.
Quick correction, by the way. I had a typo in one of my earlier messages lol
“Internally, it was never socialist to begin with. From the infrastructure of the Bolshevik Party, to the later formation of the USSR. Vladimir Lenin advocated for and acknowledged* this (including state capitalism). The problem is that because of things like democratic CENTRALISM and the overall adherence to orthodox Marxist principles, the conditions were set for the totalitarian state to come to fruition under Stalin.”
HUGE typo/mistake lol
Here’s what I was referring to:
Anon #5: That does make more sense in context Democratic centralism sounds hugely problematic x_x
Sire_26: Very very. Actually read Lenin’s views on it, though. And peep what he did to the unions – 110% not true to Marxist ideology whatsoever (that’s why some people say Marxism-Leninism is an oxymoron).
Again, though, and this is the nuance – THEORETICALLY his method could’ve* made sense FOR THE TIME. That does NOT mean that it 1) applies today or 2) is actually Marxism/Socialism.
Anon #2: Can you explain the term Marxist-Leninism is they have conflicting views?
Sire_26: That’s a dense one, Tommy. If you hit the or @libcomorg primers on Marxism and Leninism separately, though (hell, even the Wikipedias), you’ll be able to start forming your own views on Marxist-Leninism. You cannot just take my word for it.
Lenin based his theories and strategies on the works of Marx, however in his practice (actions), he advocated for policies that were directly antithetical to Marx’s outlining of real* socialism. Does that make sense? Now for you or anyone else to see how that is, you have to really* dig into the history, as well as his writings. I’ve shared some good sources on it right now, but there’s much more to it all.
Anon #5: what about the idea of marxism that places the material realities of each circumstance within the context of relations of capital? I.E. We need to go from feudalism to capitalism, so we'll do state capitalism until we can get to socialism, because Lenin recognized that trying to jump from feudalism to socialism was unrealistic and wouldn't have functioned.
There was a bourgeoise consolidation of power, sure, but it might still be marxism in the context of trying to eventually get to socialism...?
Sire_26: Absolutely. If you see the string of tweets I shared earlier in our convo, this is me speaking to this as briefly as I can. [Marx rejected stagism towards the end of his life, so according to the logic of the "Marxist" dogmatist, this wouldn't be "Marxism."]
Also, please see Anton Pannekoek’s brief essay on this.
When we use the word “Marxism,” we’re talking about adhering [to] or working through Marxist theory. Someone can claim to be a Marxist, but we have to be looking at whether or not they’re being true to the theory in practice.
State Capitalism as a concept is not something limited to states like the USSR or PRC.
America is theoretically State Capitalist. It’s a shining example of State Capitalism. We just make the distinction with the USSR and PRC because under the guise of a “worker’s state,” there is really just a bloated bureaucracy of bourgeois who are enforcing capitalist principles (there’s still wage labor, etc etc etc – it’s not Socialism as explained by Marx – you can call it whatever you want, but it isn’t Socialism).
Lenin was an orthodox Marxist, which is why he used this argument you just outlined to advocate for rapid industrialization and the “holding pattern” until revolution took place elsewhere. But because of this, some people feel he was an opportunist (they’re pairing this approach with the fact that he advocated for highly centralized authoritarian state policies, and never enacted truly socialist policy internally from his position of power).
Check the sources out and keep reading if you can! We’ll be here all night if y’all are just going off of my word lol you have to verify everything I’m saying for yourselves in order to challenge it and/or reach your own conclusions.
Anon #3: I think while discussing Marxism/Leninism we shouldn’t recognize that Lenin applied Marxism to Russia’s specific conditions. Nobody even thought that Russia would be the country where revolution would occur, they thought the countries that were most industrialized with the largest proletariat (i.e Germany) would break the chain of capitalism.
But as I stated before, socialism represents an entire epoch of history, so to say that a state is not socialist because it has remnants of capitalism, aka wage labor, I think is false. Lenin and Stalin admit that for a period of time the Bourgeoisie is still more powerful than the proletariat. That’s why the state and dictatorship of the proletariat is so important, to suppress the bourgeoisie. Socialism is complex and looks different in different countries because of differ condition.
Cuba still has wage labor, but are we saying that Cuba isn’t socialist because of it?
Anon #5: whether or not we call countries "in the process of socialism" may or may not depend on whether or not we think those in power are currently sincere about attempting to move towards socialism, which is more belief based than anything else, even when we do have actions to point to that signify one way or the other.
Anon #3: A period of time after revolution the bourgeoisie is more powerful than the proletariat*
Sire_26: [Anon #3,] I addressed what you said in your first paragraph in my response earlier in this discussion, as well as tweets sent out a bit ago.
Cuba isn’t socialist. Maybe it is closer to real socialism than America, but it isn’t socialist. This isn’t even really something to debate. It’s a fact, if you call yourself a Marxist or at least go by Marxist theory. Whether you agree with Marxist theory or not is up to you.
There are no real examples of socialism that we can look back to within the last century (on a national level – we have tiny pockets of it in places like Spain, but again, not what Marx was talking about to scale). It just hasn’t existed yet.
Just because a state has parts of it that are socialist ... doesn’t mean that they have reached a truly socialist society, nor does it mean those in power actually intend on getting everyone to a socialist society (as [Anon #5] is hitting on right now).
Again, this comes right back to Marx. I’m not saying you all should read all 800+ page volumes of Das Kapital or something, but we have to have a grip on what he was talking about before we speak on Lenin. That’s the only way you get to see what’s true and what’s false. I study the economists and professors who have read Das Kapital front to back MULTIPLE times (personally); of course I read Marx excerpts and analyses myself as well. You have to at least try at some point to dig into this stuff, or else it’s just rhetoric and not facts.
"Critique of Gotha Program" is considered a “required reading” amongst hard left elitists lol I’m not gonna go that far with it, but I will say that it’s a great place to start.
We can speculate all day long about what all of these revolutionaries actually intended; the facts are the facts, though. We can see what did and did not happen. What has and has not happened. We can look at our challenges and the reality, and try to come up with realistic approaches that help us reach ... a communist society.
Anon #3: Bruh, Cuba is socialist lol I’ve been to Cuba, I’ve been to international conferences there, I’ve spoken to people. Ive been to lectures in Cuba BY Cubans about the economy, politics, etc.
Again, socialism is a PROCESS not a conclusion. To imply that Cuba isn’t socialist ludicrous to me.
Also, Cuba bring a socialist state 90 miles away from the the imperialist beast needs to be taken into context. To me, to imply that Cuba isn’t socialist is an ultra leftist argument. If it’s not socialist, then what is it?
You keep saying “reached true socialist society” implies that socialism is a process.
Sire_26: You could literally apply that same logic to America, and then argue that it is socialist, but to a lesser degree. Cuba is closer to true socialism as defined by Marx, but it just isn’t true socialism. I honestly don’t know what else to say. I’ve been as clear as I can be.
Is there no longer wage labor there? Do workers control the means of production there? If the answer to both of those questions is “no,” then it isn’t socialism as Marx explained it.
I definitely get where you’re coming from. You can call it whatever else you want and try to defend it and say it’s good, but it isn’t an example of a socialist territory on planet earth.
“It's in an awkward transitional phase between a state-driven socialism and state capitalism. There are already petite bourgeoisie in Cuba, such as taxi company owners, who make over $1,000 USD a month which is absolutely massive in Cuban terms where the average monthly salary is $25. There are still strong socialist and Marxist currents in the Cuban Communist Party, but Cuba has hinted towards a Chinese model of state capitalism with Raul frequently praising China. Like some social scientists on Cuba have commented, I suspect Cuba migrating fully to state capitalism to motivate the lifting of the embargo in exchange for American investments. The country is still very laudable and pretty pro-proletarian, but I don't think this will last.”
That’s the top comment in the thread I linked to. Explains it very simply and clearly.
I think places like Cuba need to be supported, of course. But we need real socialism. [People, not "places," need to be supported.]
Sire_26: And “state-driven socialism,” as that person put it, just means the state apparatus is being used to push for socialist programs or socioeconomic policy, but it’s not actually socialist in its structure because the workers don’t control the means of production lol
Anon #3: The reason that cab drivers make so much is because they have access to American dollars and tourism.
Sire_26: I gotta bounce for the day. I’ve said all I possibly can on this topic for now. I hope y’all get a chance to check out the resources and get back to me.
Anon #3: I think that we can critique any society, and Cuba isn’t exempt from this, but to say that Cuba ISN’T socialist is again, ultra leftist, and a bit misleading to me.
Also, ask the Cubans about their revolution and is their country socialist, and how they view themselves. They will tell you otherwise, despite what an online forum says.
The strides that the Cuban revolution made in nationalization of industry, land reform, social justice, economic justice, giving workers power, internationalism, etc etc speaks to their socialist revolution, despite how much we intellectualize it.
Sire_26: You’re saying a lot of things, but the key is in defining what “Socialist” is. Calling me or anyone else an “ultra leftist” for adhering to Marxist theory and over a century’s worth of development on this doesn’t speak to the root of the conversation.
Anon #3: Cuba did this in the face of constant imperialist aggression, sanctions, military aggression, etc etc etc, so to denounce them as not socialist because they don’t meet all of Karl Marx qualifications seems dogmatic and doesn’t take into account Cuba’s specific conditions. Not to mention Karl Marx was philosophizing about European society.
Sire_26: You’re acting like I’m coming at Cuba! I’m not trying to take away from their achievements. We’re talking about what is and isn’t socialism. If you want to take the word “socialism” and turn it into something else, then by all means go ahead. Marx isn’t god. He codified a foundation for socialism that Castro and countless others stated they wanted to stay true to. That’s the reality. So the convo is about whether they’ve stayed true to it or not. It’s really that simple.
Anon #8: socialism isn't defined by how much imperialist agression a country goes through
Anon #1: Word. Cant blame the USSR for being antagonized by America for an entire century. Who knows what might have manifested had that not happened.
Cant blame Cuba for Batista.
These are their material conditions.
Anon #3: But these are theoretical definitions, we’re talking about the struggle for socialism AGAINST imperialism and capitalism and their material conditions. I think it’s a lot more nuanced than some definition on paper, and as binary as “this is socialism, this is not.”
Anon #1: I agree. Its bigger than labels at the end of the day. Its war over resources.
Anon #3: Also, we should beware of the people/sources we read when it comes to socialism/communism or whatever. A lot of academics just intellectualize phenomena from the ivory towers of academia, and not even revolutionaries or involved in struggle.
They come a dime a dozen lol
Sire_26: But you’re talking as if we don’t have the written texts and communications of the actual revolutionaries, though. Their views and their experiences. We have all of it, so what are you really trying to say?
That’s a logical fallacy to start making generalizations about where potential* or perceived* sources of information are coming from instead of delving into what we’re actually speaking about. I perceive that as a diversion from the real crux of the conversation, which is actually defining “socialism.”
What you’re doing is revisionism, and the “ultraleft” argument is literally rhetoric. Let’s talk about the theory and the history here.
If you want to discredit Marx and go at Marx, then go at Marx, but that means you also have to reconsider your thoughts on what the actual revolutionaries claim, because all of them (for the most part) claimed to abide by Marx (as do most of the people here in this group chat). Fidel Castro is not exempt from this. That means his base and foundation was Marxism.
You have yet to address the points about socialism. You’ve just reiterated the sentiment that socialism is a “process” and that “ultra leftists” say that Cuba isn’t socialism; and you keep bringing up the challenges Cuba faced as if to imply that I think, because they haven’t achieved real socialism yet, the validity of their gains should come into question. I repeat: these are all logical fallacies.
I implore all who haven’t already done so to check out this guide to logical fallacies, so that you’re more familiarized with how they’re used to “win” arguments in the court of public opinion:
There’s more in-depth Wikipedia articles and YouTube videos on logical fallacies that we can find as well. Understanding these can help everyone in conversing constructively with others here.
Everything is a process. No one put anything into “binaries” by stating that Cuba isn’t socialist. It’s just assessing the conditions and seeing whether they, on a very fundamental level, fit the definition of socialism.
We have to know where we’re going and what it looks like in order to carve out the right path; this is the fundamental reality of the situation. We are assessing the reality of the situation.
Saying that Cuba isn’t a socialist country says nothing about whether or not they’re on the right path, or if the intentions of their leaders are in the right place. It’s just saying that they aren’t socialist.
Again, just because there are socialist institutions* and programs* in a country doesn’t make the country as a whole socialist. Because there is wage labor in Cuba, and because the government (state) – not the workers – control the means of production directly, it is state capitalism. It is not real socialism. This is something Lenin wrote and gave speeches about. This is something Trotsky wrote and gave speeches about.
The irony of the situation is – just as Trotsky predicted would happen with the USSR – Cuba is becoming more and more capitalist by the year, and it’s all connected to the nature of state capitalism.
Cuba identifies as a “Unitary Marxist–Leninist one-party socialist republic.” Of course, if you refuse to challenge that notion on any level, then you’re not going to find any value in this discussion in the first place, except in reaffirming what you already believe to be true. The base assumption of this dialogue is that you’re open to the other perspective; I’m doing my best to try and present that to you from a variety of sources here.
I seriously implore all of you to check out the Reddit threads I linked to in here, or Google search “Is Cuba Socialist? Reddit” and read all of these threads of people arguing about exactly this (for years). It goes on and on and on. I’ve read these discussions. I’ve studied the revolutionaries. I’ve moved through identifying with Marxism-Leninism, and then through identifying with Trotskyism, and on and on; to come to the understanding that I have now. It only came from educating myself and reading others’ countless arguments online, and studying the history from a variety of perspectives, constantly challenging what I knew to be true. This is dialectical materialism; not confirmation bias.
This is why I recommended Reddit to everyone the other day; if you want to visit this conversation with more people and debate it out, then feel free to head on over to /Socialism, and you’ll see the same exact arguments I’m raising brought up there, but probably without* sources. It’s a better forum than a Twitter group chat. Perhaps we could have these kinds of discussions on there; everyone can introduce conversation topics, and we can all comment in threads along with sources to our arguments.
I’ve at least tried to give you sources and proof for all of my claims. It’s all there in the writing; from to LibCom. At some point, we get to a place where we’re not addressing the core arguments anymore, and instead we’re resorting to ad hominem labeling, and begging the question.
If you keep reading, you will find the truth. The exploration can’t stop here in this group chat. We have to go on and keep learning. If scholars and people who have actually studied all of this stuff for longer than we’ve been alive and who can explain all of their views to you STILL can’t convince you off of verbal communication alone, then clearly there’s a misunderstanding on someone’s part.
For anyone who doesn’t believe me, here’s a Wikipedia page on the politics of Fidel Castro:
Here’s a Jacobin article on Cuba and Socialism and where they are headed:
Please excuse any typos.
Anon #3: You’re giving us jacobin and wiki articles about Cuba. I’ve read the history of Cuba, I’ve read Marx, I’ve been to Cuba and got educated by the Cubans on their political process and conditions. I can assure you that actually going to a country and seeing/studying things for yourself is more insightful than online discussion boards and articles from outsiders. I retain that you can criticize Cuba, but to say it ain’t socialist is wild. But as I stated before, Marx was philosophizing about Europe, not an island slave colony, so to say it’s not socialist cuz it doesn’t adhere to all of MARX’s credentials is a stretch. Gotta strongly disagree here.
Anon #1: This is good.
Hash it out.
Anon #5: Honestly, the more i think about the question "is cuba socialist?", the more i wonder what the value of the answer is. The answer definitely isn't the determining question of whether or not we're going to support the state as socialists. I don't think it's socialist per marx, for reasons that go from restaurants and taxis to reactions to capitalist embargoes. But, as a leftist, i'm definitely going to support their state and endeavors to move further left. I think dividing it in yes/no answers is reductive of a frankly complicated question.
Anon #1: As a human, i am proud of the legacy of both the ussr and cuba
Anon #8: i don't think one party states are compatible with any democratic notion of socialism. that's the main flaw of 20th century socialism.
Anon #9: [Twitter user was a philosophy professor who said something along the lines of, "You're being condescending, and telling people 'You're wrong because you haven't seen things as I have.' Also, you're making baseless statements, claiming that people are using logical fallacies when it's just your opinion." The Twitter user deleted their account, and so the record of their responses is no longer with us - this is a rough recall of what they stated, and is more likely than not partially inaccurate.]
Sire_26: Am I really saying “as I have”? And a logical fallacy is a logical fallacy. It’s a matter of fact; not opinion. My statements aren’t baseless. They’re right here for everyone to read and judge for themselves.
And I also second what [Anon #8] and [Anon #5] are saying.
Anon #1: also, through which institution would workers own resources if not the state or some form of state?
Sire_26: My biggest point is that there is no way this exchange alone is going to end with us agreeing on this. All I ask is that there are facts and sources brought behind your arguments that everyone here can also explore. And everyone should actually be exploring these sources before responding.
Anon #9: [Twitter user then said something along the lines of, "I'm a philosophy professor, bro; I teach people about logical fallacies for a living. I think I'd know what I'm talking about on this one lol"]
Anon #3: lol ^ honestly bro
Sire_26: You literally just used one:
I’m not trying to be disrespectful or discredit; I’m just about getting to the crux of an actual argument.
Anon #9: [Twitter user said something along the lines of, "LOL damn, you got it, you got it. I think I'm just gonna leave y'all to it then lol"]
Anon #8: the thing is workers don't control the cuban state. if they did then fine. i mean some anarchists don't want a state at all, but even by the classical marxist definition of socialism which Cuba claims a lineage to there is inconsistency.
And it's not just about definitions but if cuba is a capitalist state it changes our entire analysis. if there is resistance to the cuban state we need not to get into the stale "anti imperialist" analysis of it must be a cia plot
Anon #3: Workers control the state in Cuba.
Anon #1: Sounds socialist
Sire_26: Juridically, and on the surface, yes. But what about the bureaucracy that Trotsky spoke about? The bureaucracy that forms around that state apparatus? What of wage labor? What of the distribution of wealth? These are things you’re not addressing.
It’s like saying that America is a democracy. Juridically, yes. But there is that reality of capitalism that constantly encroaches upon and corrupts the legal processes we establish.
Everything you’re saying is argued against in that Anton Pannekoek article I linked to in here twice. Please, feel free to read it and respond to all of his points. He’s written extensively on this (in the early 20th century, mind you). That would be way more productive than us going back and forth here.
I challenge you to it. You can craft a Reddit post on it, and we can all respond in the comments. If you’re open to that.
Anon #3: I have addressed them. The first thing Cuba did when competing the revolution was land redistribution to the peasants, expropriated housed, land, property, nationalized industry. Free education, free health care, 95% of Cubans own their home, etc
I don’t have that much of an interest in proving if Cuba is actually a socialist state lol
Sire_26: Alright, cool.
Anon #10: Just read that whole argument. Lol
Sire_26: Hit dem links tho, fam. Dig into it! Let us know your thoughts.
submitted by Sire_26 to BlackSocialists [link] [comments]

Blindspot Whitepaper: Specialized Threat Assessment and Protection (STAP) for the Blockchain

Stop attacks before ”zero day” and stop the Advanced Persistent Threat (APT)
We live in a dangerous world — our information technology systems face that danger every single day. Hackers are constantly attempting to infiltrate systems, steal information, damage government and corporate reputations, and take control of systems and processes.
Hackers share and use a variety of tools and techniques to gain access to, and
maintain access to, IT systems, including groups and techniques so dangerous
they have their own category - the Advanced Persistent Threat (APT). At the
center of the APT are sophisticated techniques using malware to exploit vulnerabilities in systems. Traditional cyber security technologies use file signatures to locate these tools and hacker malware, but hackers are now actively camouflaging their tools by changing, customizing, and “morphing” them into new files that do not match any known signatures (‘Polymorphic Malware’). This introduces a massive gap in malicious file detection which leaves the enterprise open to exploitation — and it’s just not possible for traditional signature-based systems to keep up. In fact, signature-based anti-virus and anti-malware systems are only around 25% effective today. BlindSpot™ sees through it all, even as the files morph and change in a futile attempt to remain camouflaged.
Digital File Fingerprints
Any File Type, Any Language, Partial Matches, Exact Matches
BlindSpot™, the adaptive security solution from BlindSpot™, can see through the
Polymorphic camouflage used by the worlds most advanced hackers by utilizing
digital file fingerprints and our proprietary adaptive BlindSpot™ ‘brain’ that constantly analyzes the fingerprints of known malicious files and tools to locate partial matches within the files on your systems - servers, laptops, desktops, USB drives, and even mobile devices. BlindSpot™ can cut right through the Polymorphic files, revealing the true hacking tools underneath, even if they are only fragments or pieces of a more complete set of hacking tools and technologies.
Most cyber attacks happen weeks or even months after their initial penetration and access to a network or system, and even the simplest attacks tend to have a fuse that is typically several days. It takes them time to map out a system, probe for the information they want, and obtain or forge credentials with the type of access they need. But from the moment their tools first land on your network and systems, BlindSpot™ sees them. If fact, BlindSpot™ can see them sitting on a newly inserted USB drive even if the files are not copied to your systems. This means BlindSpot™ can identify and alert you to malicious files and potential illicit activities before the attack happens - before zero day!
How does BlindSpot™ work? BlindSpot™ sits on the endpoint and continuously monitors file activity. Digital fingerprints, which can be used to find partial matches of any file type in any language, are reported back where they are kept forever in a temporal repository.
BlindSpot™ looks through all of the digital fingerprints — both those from files on your systems and those in a constantly updated database of known malicious files and hacking tools, to locate and alert you to any indication of hacking, malicious files, or illicit activity. BlindSpot™ is a disruptive technology that can see polymorphic malware and stop attacks before zero day.
Digital File Fingerprints are created from a file or a piece of digital data/information by using advanced mathematics to look at all of the small pieces of data that make up the file to create a very small, unique piece of mathematical data — a digital file fingerprint. Files may be of any file type and in any language - digital fingerprints can find partial and exact matches regardless of what is in the file itself.
Just like with humans, once a fingerprint has been taken, you no longer need the
person to identify them. The fingerprint is enough. Even a partial fingerprint is
enough, and sometimes a smudge will do. Digital fingerprints work on the same
principle. Once BlindSpot™ has taken a digital fingerprint of a file, the file is no longer needed to identify it or to compare it with other files. And because digital fingerprints are tiny, they are easy to store. Even a multi-gigabyte file has a digital fingerprint that is no larger than 10k bytes.
Once you have two sets of digital fingerprints, you can compare them. Because BlindSpot™ starts with full fingerprints of known malicious files, it can identify matching files even when the digital fingerprint is only partially there. And with BlindSpot™’s advanced processing capabilities, file fragments, recovered data from a hard drive, partially downloaded documents, damaged files (both intentional and accidental) and other incomplete file structures can be properly fingerprinted in a way that still allows matches to be found.
Other technologies and software use static signatures, which do not work if any part of a file, regardless of how small, is different from another, or if the file is damaged in any way. BlindSpot™ and digital fingerprints enable partial matching, and can see through the camouflage that has become the industry standard for hackers across the globe. Static signature based solutions simply cannot do this.
Imagine your favorite detective drama on TV. The prosecutor says “This partial
fingerprint was found at the crime scene and the video camera across the
street recorded a perfect image of the person’s face.” The jury deliberates and
compares the picture and fingerprints of the defendant that were taken the day
before. They conclude, because the fingerprint was not all there and was not 100% identical, and because one picture showed a mustache that looked identical but was one millimeter longer than the other picture, that the two people were not identical - and set the criminal free. Well, that show wouldn’t be on TV long because crime would run rampant. Now imagine they had BlindSpot™. Criminals would be caught, the town would be a much safer place, and the show would be on for years to come.
Now imagine your network and systems without BlindSpot™, where traditional
exact match signature software is on your front line of defense. All kinds of
malicious files could walk right through and sit down on your hard drives, just
waiting for hackers to activate them. But you don’t have to imagine what your
systems would be like with BlindSpot™ — instead, simply contact us, get BlindSpot™ in place, and we’ll work with you to show you what’s really on your systems and help you keep those systems safe.
Ensuring System Compliance
Take the guesswork out of compliance assessment
All Government systems go through Certification and Accreditation. BlindSpot™ can help you with malicious code protection, for both security considerations and required compliance. Guidelines found in NIST 800-53 Revisions 3+ Security Requirements for System Integrity, SI-3 Malicious Code Protection, state that malicious code protection mechanisms must be employed at information system entry and exit points, including workstations, notebook computers, and mobile devices, to detect and eradicate malicious code.
BlindSpot™, with its continuous monitoring of the files on your endpoints and its
continuous updating of its known malicious file repository, will provide the
required real-time and full monthly re-scans of your files, will alert your
administrative staff when malicious code is found, will provide reports on
potential malicious files, illicit activity, and follow-up with very short false positive reports. BlindSpot™’s false positive rate is less than 0.01%. BlindSpot™ helps organizations meet the security requirements set forth and ensure compliance.
Intellectual Property Protection
Track sensitive information as it changes and moves around the enterprise
BlindSpot™ uses digital file fingerprints to identify partial and exact matches between files, regardless of file type or language. This ability can be used to track movements of and changes to files on a network of computers.
Government entities and corporations need to addresses the issue of monitoring
documents and files that contain sensitive information intellectual property, and it
is no longer sufficient to simply store them on a secure server and require specific credentials to access the information. People, both unintentionally and sometimes with malicious intent, copy and paste parts of documents, move files to USB drives, and otherwise edit and transfer files in order to get them on to a laptop, share them with a co-worker, or exfiltrate confidential information to outside networks and systems. BlindSpot™ carefully watches all of the files on your network, including what’s going with USB drives. If someone copies part of a file that has sensitive data to another file, BlindSpot™ sees it. Furthermore, BlindSpot™ can alert you when it sees questionable activity with certain documents/files or with specific computers/individuals.
Your sensitive files now have a watchdog that catches both unintentional and
malicious exposure to non-secure systems. Use BlindSpot™ to set up a custom
database of the locations where your sensitive files are stored, and BlindSpot™ will create a set of digital file fingerprints that can be used to track those files across your network and systems. This ensures that an organization can know where its proprietary and sensitive information is 365/7/24, in real-time.
Supervisory Control and Data Acquisition (SCADA) Systems
Supervisory Control and Data Acquisition (SCADA) is a system for remote monitoring and control that operates with coded signals over communication channels (using typically one communication channel per remote station).
SCADA networks contain computers and applications that perform key functions in providing essential services and commodities (e.g. electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. They are part of the nation’s critical infrastructure, provide great efficiency, are widely used, and require protection from a variety of cyber threats.
One of the most significant threats is benign files residing on the computers on
the network that morph into tools that hackers can use to gain access to the
network and the equipment it monitors and/or controls. These files might be part
of the operating system (binary files), might be a normal file that includes
scripting, or can even be a general data file moved onto the computer through a
network or a USB drive. By morphing, these files circumvent detection and
countermeasures. This is just one example of how a hacker can compromise and
exploit the system and the worst part is that you will never know until it is too late!
The recent Department of Justice announcement charging Iranian hackers
believed to be tied to the 2013 hacking of a New York dam illustrates this threat
Enter BlindSpot™’s BlindSpot™ Adaptive Security — BlindSpot™ monitors all files of all types (any format or language) without the requirement of a translator or human operator. BlindSpot™ can see right through the hacker’s camouflage of
morphing files to quickly identify problems and threats before hackers have the
opportunity to active and use their tools. For U.S. and foreign based systems,
BlindSpot™ is a must have cyber security solution.
The BlindSpot™ team has extensive experience with SCADA systems and critical infrastructure. Our BlindSpot™ solution is critical to the overall security framework of such systems as it was designed to find the morphing, malicious files and associated illicit file activity that can lead to compromise of the integrity, confidentiality and/or availability of the system. Threats loom on both the inside and outside, and the dynamic nature of these systems require continuous, temporal monitoring to stop cyber attacks before they happen.
Stop Ransomware
Identify and remove Ransomware before it encrypts your files
Ransomware attacks are on the rise and affect Fortune 500 companies, Federal
organizations, and consumers. This vicious type of attack affects your user’s ability to get their work done and prevents users from accessing files on a device or network by making the device or network unusable, by encrypting the files your users need to access, and/or by stopping certain applications from running (e.g. the web browser). A ransom is then demanded (an electronic payment of currency or bitcoins) with the promise that your data will be unencrypted and accessible again following the payment.
If the ransom payment is made, there is no guarantee that the data will be
unencrypted or returned to a state of integrity and/or availability. Furthermore,
there is also no guarantee that the people behind the ransom will not re-infect
your systems again with a variant of what was initially used. Payment encourages future attacks because they know you cannot detect it and will pay again next time. Surprisingly, there are only a handful of known ransomware files in use today (e.g. Crowti, Fakebsod). Safeguards exist that use static signatures to find exact matches for these known files, but the moment these files morph or are changed in any way they become undetectable by these solutions. BlindSpot™ digs deeper with digital file fingerprints and can find the new files, enabling you to analyze, quarantine, or delete them before they activate. This pro-active approach can be the difference between a system being protected and a system being made completely unavailable with encrypted data being held hostage for a ransom. The image below is an actual Fakebsod notification message.
BlindSpot™ uses digital file fingerprints to detect the ransomware by looking at
both partial and exact matches and can report the problem before it happens.
Ransomeware of the past attacked your personal computer and today’s variant
attacks the servers — BlindSpot™ can detect both.
Case Study: March 2016 - Two more healthcare networks are hit by ransomware targeting servers. Advice from law enforcement — pay the ransom! (They did). File backups are insufficient. Paying ransoms is costly and only encourages repeat attacks.
BlindSpot™ is the most comprehensive solution available to detect and root out
ransomware. Take charge of the situation and put BlindSpot™ to work continuously monitoring your systems.
Get BlindSpot™ Now
Commercial or Government, with multiple contract vehicles available
How Can I Get BlindSpot™?
CYBR develops and sells its adaptive enterprise cyber security software product, BlindSpot™, and provides professional services and support for BlindSpot™ implementations.
BlindSpot™ Adaptive Security is a continuous monitoring enterprise solution that tracks file-based activity on the endpoint using digital file fingerprints, can identify problems and cyber threats before zero day, and can see through morphing, camouflaged (polymorphic) files to make accurate determinations of malicious files and illicit activity.
Deployment Options
BlindSpot™ can deployed as a secure cloud application for maximum flexibility, a standalone Enterprise implementation for maximum security, or the two combined in an Enterprise implementation augmented through a secure cloud gateway.
Professional Services and Training
BlindSpot™’s team of cyber security experts have the expertise to support
you by creating a holistic, enterprise security framework that consists of people,
policy, procedures and technology that will ensure a security posture that implements the best risk management strategies, tactics and operations available.
Email us at [[email protected]](mailto:[email protected]) for more information.
BlindSpot Solution Brief
June 29, 2018
POC: Shawn R. Key CEO, President
[[email protected]](mailto:[email protected])
Executive Summary and Estimated Pricing
CYBR’s BlindSpot is an enterprise cyber security solution that pro-actively identifies unknown and known malicious files and circumventive activity on endpoint devices. It is designed to interact with the CYBR Ecosystem and associated Web Portal. Distributed clients serve as the connection to the various BlindSpot server tiers.
BlindSpot identifies Illicit File Activity (IFA) and associated hacker activity via perceptive, industry standard algorithms. BlindSpot identifies exact AND similar files regardless of file type and/or language. This applies to ALL file types (e.g. documents, images, audio and video, carrier, etc.). Currently implemented safeguards and counter measures (such as anti-virus (AV), content filters and malware analysis tools) cannot address polymorphic/adaptive files and emerging threats. This introduces a massive gap in illicit file detection and leaves the enterprise open to exploitation. BlindSpot fills that void.
Additionally, corporations and government entities have a need to address known files and associated activity with regards to content and data management. The uncertainty of Intellectual Property (IP) location and propagation poses significant risk to the organization. The ability to identify the life cycle of a file (origin, source, destination, attributes and proliferation) ensures an organization knows where its proprietary, sensitive and privacy information is 365/24/7, in near real-time.
BlindSpot, is significantly different from solutions in the emerging Specialized Threat Assessment and Protection (STAP) marketplace, as it scales to meet the needs of enterprise organizations and the commercial marketplace. BlindSpot’s proprietary database consists of millions of unique, digital identifiers (hash values) that identify exact AND similar, modified files. This ensures that files existing in their original state or those which have been intentionally modified, do not circumvent detection. Our algorithms ensure near zero false positive return rates. The combinatory effect and the rare expertise of our executives and development thwarts potential competition as BlindSpot is an enterprise solution; not a tool.
The enterprise solution is provide as a license per IP address with associated appliance and/or server hardware requirements.
CYBR BlindSpot Technical Deep Dive
CYBR’s BlindSpot product is currently available as a Software as a Service) (SaaS) deployment blockchain solution and will be available as a full enterprise-install by Q2 2019. In both implementations, end-point agent software monitors the hard drive(s) of a computer or server, analyses any files that change, and reports [multiple] file hashes back to the main system. This enables the main system to effectively monitor which files could be malicious or represent intellectual property on the computers and servers within the customer’s network. By using fuzzy hashing algorithms, the system can detect polymorphic malware and intellectual property that has been partially hidden or obfuscated.
End-point (client) agent: native to each major OS as a fat client. Currently we have end-point agents for Microsoft Windows-based systems using MS .NET c# 2.0/4.5 and C++, although the c# portion will be replaced with all c++ code to increase scalability, efficiency, and security, in Q1 2016. End-point agents for Mac OS (written in Objective-C) and popular Linux platforms (written in c++) will ship in Q1/Q2 2016. Development work on the CentOS linux agent will begin in December 2015.
The Control Application enables system administrators to configure each end-point agent, the system itself, and to actively monitor and access reports on files that have been identified by the system as problematic or of interest. At this time the Control Application is able to provide configuration and monitoring services but is not yet ready for customer on-site deployment and is therefore only available in a SaaS model.
The middle-tier of the system, the Portal sever, currently runs in MS .NET and is written in c#. This tier will be upgraded to a full c++ implementation to increase scalability, efficiency, and security, in Q1 2016, and will run as a standard web server extension on a Linux platform (CentOS/Apache).
The data-tier of the system currently is running in MS SQL Server 2008/2012 and uses transact-SQL tables, but does not use any stored procedures or transactions. Although this tier is sufficient for scalability through mid to late 2016, a no-SQL version of the data tier will be developed in 2016.
The Crush server (hashing services) currently runs on MS Server 2008/2012, is written in c#/c++ and is a) being ported to run as a (c++) daemon on a standard Linux (CentOS) server, and b) being re-engineered to function as a massively parallel application (c/c++) running on NVIDIA Tesla GPU accelerated systems. The Crush server communicates with the data-tier directly and the C2 server indirectly. Multiple Crush servers can run simultaneously and are horizontally scalable and fault-tolerant.
The C2 (Command and Control) server, written in c# and being moved to c++, communicates with the data-tier directly and the Crush server and Control Application indirectly to provide scheduling, system health and integrity, and prioritization services, as well redirecting jobs to maintain fault tolerance of the back-end server components. Multiple C2 servers can run simultaneously and are horizontally scalable.
Hardware and Network:
The basic architecture of the system has two different stacks of software. First, a typical 3-tier approach isolates data storage from end-point and Control Application access with a middle-man protocol altering Portal server. In the SaaS model, the end-point and Control Application software reside on-site with the customer, and the remaining stack components reside at the SaaS hosting datacenter. The second stack consists of multiple horizontally-scalable server components that run entirely in the backend as daemons and interact primarily through the data area to provide the services that are being marketed and sold to the customers. The two stacks are kept somewhat separate from each other in order to buffer one against the other in times of extreme load and for enhanced security.
Following is a description of each software module in the system and how it relates to the others:
The system has one component for data collection (the end-point agent software, which resides on the desktop computers and servers within a deployed customer site), one component for system administration (the Control Application, which resides on a desktop computer that the customer has access to or that an analyst can access through the SaaS system), and a collection of software processes/daemons and a data storage area that comprise the back-end.
The end-point agent collects data from the end-point computer, passes it to the Portal server, which in turn stores it in the data area.
The C2 server monitors the in-flow of data from the end-points, and tasks the Crush server(s) to analyze the data and compare it to databases of known good, known bad, and watch list files, in an efficient manner.
The C2 server also provides notification to the customer of any problematic or watch-list files following the completion of the Crush server tasks.
The Crush server monitors the data area, and performs batch or real-time processing of data as instructed to by the C2 server.
CYBR’s BlindSpot software is a commercially available product that combines a small footprint end-point agent with a centralized monitoring and management system to track files and file changes on the end-point using partial-match digital fingerprints rather than rigid full-match-only file signatures. As files and data buffers are created, edited/altered, and moved either through the network or via removable media devices including USB drives, the product uses its unique and proprietary technologies in combination with industry standard technologies to identify and locate both known malware and unknown [polymorphic] malware on end-points that are continuously monitored by the product. Staff is notified, depending on the urgency or type of digital fingerprint identified, through integrations with 3rd party SIEM solutions, email/SMS transmissions, and reports that are available using the central management system. A false positive rate of partial digital fingerprint matching of ~1 in 10-12 means staff will not be bombarded with unnecessary alerts, maintaining staff efficiency.
Overview: Traditional anti-malware products use static file signatures to locate known malware but have no means of detecting unknown malware, CYBR’s product uses digital file fingerprints that can identify both partial file matches as well as full file signature matches and in doing so can locate and identify both known and unknown malware within the deployed enterprise. A combination of industry standard and publicly available algorithms and CYBR’s own proprietary algorithms, trade secrets, methods, optimizations, and intellectual property for which a patent is currently pending (which is owned solely by CYBR) are combined to form a comprehensive anti-malware platform and continuous end-point monitoring product that is completely unique in the marketplace. Through the use of our proprietary algorithms and optimizations, the product has the ability to scale to the enterprise level and can track desktops/servers as well as mobile/phone/tablet/Internet of Things (IoTs) devices.
Project Implementation: The implementation of this product would include both the commercially available BlindSpot product as well as prototypes of integration packages to connect with the on-site Security Information and Event Management (SIEM) and other systems and prototypes of end-point agents running on operating systems that are not yet available in the currently available version of the product. Both the integration and end-point agent prototypes would be based on existing modular code/functionality and would extend functionality past the currently available modules to ensure the full needs and requirements of the project are met. A full version of BlindSpot would be deployed on servers at/on the enterprise site, and prototypes of both SIEM integrations and new end-point agents would be deployed to augment the full production system. Information flow between all areas of the full system and prototypes would be tested and verified with increasing scale to ensure the level of performance required is available prior to the completion of the project.
End-point Agents: Each end-point is installed with native low-profile proprietary agent software that minimizes both its file system footprint and CPU use. The current product has a native end-point available for Microsoft Windows OSs (both desktops/tablets and servers) in production, and has native end-point agents in development/prototype stage for iOS, Android, MacOS, and RHEL/CentOS, with additional popular Linux derivatives to follow. The main job of the end-point agent is to communicate with the OS and monitor the file system for any changes in files that occur. When changes are detected, a digital file fingerprint of the file is taken and reported to the centralized data store, or cached until a later time if the centralized data store is unreachable (e,g, no cell coverage, laptop not connected to internet). The agent normally runs in “stealth-mode” and uses minimal CPU, RAM, and file system footprint so as not to disrupt the end-user’s workflow or impact system performance. Taking a digital fingerprint of a file and reporting it is very fast and thus the main job of the end-point agent is not system resource intensive. The “heavy lifting” is done on the back-end and does not burden the users or the end-point devices. Configuration of each end-point agent is conducted through the centralized management system, and changes in configuration are transmitted to the end-point agent within a few seconds (provided there is network connectivity).
Central Data Store: A collection of databases on the back end store file watch lists, known good and known bad digital file fingerprints (whitelists and blacklists containing digital file fingerprints of known malware), priority lists and configurations, end-point configurations, last-seen lists, and the full temporal accounting of all digital file fingerprints reported by end-point agents. As new threats are identified they are added to the central data store. As files on end-points change or are edited, their new digital fingerprints are added to the central data store as well. As new threats are identified though polymorphic partial matching, they are added to the known bad list as well.
Identification of Known and Unknown Malware: By comparing the databases of digital file fingerprints of known malware and digital file fingerprints of files on end-points, the product’s Crush server(s) use sophisticated algorithms to compare the partial digital file fingerprints, regardless of content of the files themselves. The product looks at the raw data (bytes) in the files when creating the digital file fingerprints and as such all file types/formats/languages are handled. This means that all file types and data in any and all languages can be compared with similar files. Binary DLLs, MS Word documents and spreadsheets (MS Excel, csv, …), JPEG images, Javascript, HTML, Executable files (.exe) — all of these files are handled by the product and known/unknown malware within them can be located using the digital file fingerprints in the centralized data store and Crush server’s analysis.
Scale, System Throughput, and Priority: A single Crush server can serve a small enterprise (100s or 1,000s of end-points), and a horizontally scalable array of Crush servers can be used to provide identification of malware for large enterprises. Similarly, databases in the central data store can be split and maintained/mirrored on several servers or run in a monolithic configuration. This makes the system highly scalable and able to be adapted to enterprises of varying sizes/scales while maintaining a good price/performance ratio. Priority lists can be designated for Crush servers such that high-priority end-points and/or high-priority malware fingerprints can be compared and identified in real-time, and similarly, low-priority lists (e.g. malware fingerprints that have not been seen in months or years) can be run in the evenings or when the system is running below normal load to ensure both immediate analysis of high-priority threats and comprehensive analysis of low-priority threats.
Integration: Several modular integration points within the product enable the straight-forward integration with 3rd party SIEM software and other reporting/management tools and systems. Distinct “notification channels” within the product are used based on the type of threat detected, the priority level of the specific threat detected, the confidence of the match (low percentage match of digital fingerprint vs high), and the location of the match (specific end-point list). Each notification channel has integration points that can be linked in with 3rd party systems so that staff are notified using software and procedures they are already familiar with and trained on (i.e., through a SIEM solution that is already begin monitored by dedicated, trained staff). Prototypes of each specific integration would need to be developed as a part of this project to match/communicate with the exact SIEM (or other) system that is in use at the deployment site in the mannemethod desired. Such a prototype would be developed for the purpose of evaluating the technical interconnectivity between systems to meet the requirements of the deployment, and following the prototype testing period, would be load-tested and stress-tested to ensure it’s performance meets the demands of a highly scalable environment, leading to a mature integration over a period of 3-6 months following the initial prototype period of 1-3 months.
Technology Section Summary: With end-points being continuously monitored by the product, both known and unknown malware threats delivered by the network and removable media will be detected and reported through SIEM system integration and direct email/SMS messages with minimal impact to the end-point (on all major OSs, including desktop and mobile). Centralized management and temporal monitoring of digital fingerprints enables the system to proactively locate and identify malware threats before zero day as well as enabling the staff to conduct their own investigations of systems either in the present or the past for forensic investigations. This makes CYBR’s BlindSpot a complete product that reaches all of the end-point devices to ensure safety and security from all types of malware threats.
Defense Utility
The blockchain’s cyber security posture will be greatly enhanced by BlindSpot. CYBR’s executive team works with various military and federal organizations and has a deep understanding of the cyber security challenges that face the enterprise today including advanced persistent threat (APT), polymorphic and pleomorphic malware, zero day attacks and the need to locate white and black files in real time. These threats have now permeated to the blockchain and must be secured.
Company and Customers
The proposed team includes CYBR, Inc. executive management and staff. The company is a works closely with its sister company, 21st Century Technologies, Inc. (21CT), which is a HUBZone certified, Small Business entity. 21CT serves as a value added reseller (VAR) for CYBR, Inc. and is currently a teammate on the DOMino classified DHS contract as a subcontractor to Raytheon.
Existing, paying customers include Stratford University, Test Pros and Devitas. The company also has integrator and VAR partner relationships with Anomali (formerly Threatstream), Lockheed Martin (Cyber and Space) and various commercial entities, which the company believes will become paying customers in 2019.
Transition and Commercialization
Our technology is a commercially available product and commercial sales have been made. The company is actively working to scale this solution to hundreds of thousands of users, which the company has deemed do-able and is in the process of horizontally scaling.
Data Rights Assertions
CYBR, Inc. currently holds a provisional patent and incorporates other trade secrets into the solution. No unreasonable restrictions (including ITAR) are placed upon the use of this intellectual property with regards to global sales.
submitted by CYBRToken to u/CYBRToken [link] [comments]

Weekly Roundup | Random Chat | Notifications

News roundup for the previous week.
In International news
  1. Thai PM Set to Speed Up #Thailand China Railway Project: -speed train project between Bangkok and Nakhon Ratchasima province is part of the rail project primarily designed to link southwest China's Yunnan province with northeastern Thailand via northern Laos
  2. It's unfair to single out Chinese-Australians on political donations | Jieh-Yung Lo | Australia news
  3. It is believed the commander of the Fitzgerald and people found liable will be punished. We hope all US warships in the West Pacific should draw a lesson from the incident, not only for their own safety, but also for the peace of the sea passages in the region.
  4. Chinese citizen shot dead in Laos: The Chinese embassy has asked the Lao side to break the case as soon as possible, punish the assailants while taking effective measures to ensure safety of Chinese citizens and institutions in Laos
  5. China travel agencies and Crimea
  6. Presidential Political and Media Advisor Bouthaina Shaaban discussed on Saturday with China’s Special Envoy to Syria Xie Xiaoyan and the accompanying delegation enhancing the relations between the two countries.
  7. Chinese National Games invites overseas Chinese athletes for first time
  8. "While I greatly appreciate the efforts of President Xi & China to help with North Korea, it has not worked out. At least I know China tried!" - Donald Trump (lmao)
  9. Trump Announces He's Cancelling Obama's 'Completely One-Sided Deal With Cuba' (How can China trust any agreement with the U.S. if every change in government there is this possibility?)
  10. US says China should contribute more to fight against terror
  11. AIIB approves Argentina, Madagascar and Tonga as new members
  12. Germany Warns U.S. Against Ceding Lead Role to China, Russia: Wolfgang Schaeuble, Germany’s veteran finance minister, urged the U.S. to limit Russian and Chinese influence or risk bringing about “the end of our liberal world order.”
  13. Paris climate deal would have given India and China free pass: Mike Pence
  14. Spotlight: China, U.S. hold "constructive and fruitful" dialogue on diplomatic, security issues
  15. Ex-CIA officer charged with spying for China
  16. China's Growing Influence On Middle East Shouldn't Be Lost On An Impulsive Trump Administration. If Washington resorts to simplified, binary decision making regarding complex, multifaceted issues, it will be out maneuvered by Beijing
  17. Russia-China rivalry in Central Asia overblown: view of a "lingering rivalry between Russia and China" often overlooks the transparent dialogue. Russia's rather bilateral relationship with Central Asia, with a focus on security-related issues, does not conflict with China's trade projects
  18. China’s encroachment into Latin America: The Beijing regime seeks to undercut traditional American influence in the hemisphere. China places a priority on strengthening Latin America’s anti-democrats and is using its growing economic power in the region to expand its strategic options
  19. Chinese community reacts to ABC-Fairfax political donations series
  20. U.S. navy (w/ congress' support) strives to maintain dominance over China
  21. Panamanian President, Juan Carlos Varela, discusses renewed relations with China
  22. China Pushes U.S. Aside in Pakistan: “The Chinese are winning the perceptions game, whatever the reality. That then leads to political outcomes, because people see the inevitability of China’s rise and China’s power,” said Ely Ratner of the Council on Foreign Relations
In Domestic news
  1. China’s PLA ‘to play bigger role in boosting Hong Kong patriotism’
  2. From pig farmer to one of China’s highest-paid online authors: Li Zhi
  3. Increasingly Affluent Chinese Want Healthier Food and that Has Big Implications for Meat Producers
  4. Hong Kong youths turn their backs on Chinese identity: survey - Only 3.1 percent of Hong Kong youths identify themselves as "Chinese", a historic low, as the former British colony prepares to celebrate the 20th anniversary of its return to Chinese rule, a poll released on Tuesday suggests.
  5. Toothpick crossbow craze has China quivering
  6. Green finance to help reduce pollution, boost industrial upgrading
  7. China to levy 100% tax on overseas football transfers - China will effectively double the cost for its clubs to buy foreign football players in a move aimed at slowing the influx of pricey overseas stars and encouraging homegrown talent
  8. Chinese public criticizes calls from UN to take refugees
  9. Hong Kong leader Carrie Lam on claims China is tightening its grip: "Give us the evidence"
  10. China's Xi visit to Hong Kong confirmed: report
  11. More than 140 missing after landslide engulfs mountain village in China
  12. earthrise - China's Transport Revolution
  13. Chinese Bankers Flock to Hong Kong as Expats Retreat: scores of mainland professionals are filling the elite financial ranks of Hong Kong, while a series of lay-offs at Western banks has led to an exodus of expatriates
In SciTech news
  1. Quantum internet: China smashes record for beaming entangled particles
  2. China's two supercomputers still world's fastest as U.S. squeezed out of 3rd place
  3. Chinese scientists to grow potatoes on the moon: will be sealed inside a "mini ecosystem" as part the Chang'e-4 mission due to launch next year
  4. Traditional Chinese medicine might be effective as a complement or alternative to traditional Western medicine for primary and secondary prevention of heart disease, according to a state of the art review paper published in the Journal of the American College of Cardiology
  5. China successfully launches x-ray satellite: will search the sky for black holes, neutron stars, and other extremely energetic phenomena. Last of four missions covered under China’s 12th 5-year plan. Other three are a dark matter probe, microgravity experiments, and long-range quantum entanglement
  6. China's first cargo spacecraft, Tianzhou-1, has successfully completed its second refuelling of the Tiangong-2 space lab in orbit, further proving a process being tested as part of plans for a large, modular space station
  7. China's Three Major Telecom Operators Will Start #5G Pre-Commercial Deployment Within Two Years: China Unicom will consider selecting two to four cities to carry out technology and network verification of 5G in the second half of this year
  8. China now ranks as the most influential country in 4 of 8 core scientific fields, tying with the U.S., according to the Japan Science and Technology Agency. Computer science, mathematics, materials science and engineering. "I was not expecting China to overtake the U.S. in many fields" said Yuko Ito
  9. Tech giants in China convene for one day to share their plans
  10. China propels rise of electric ultra-high-performance cars
  11. Meet the Chinese Finance Giant That’s Secretly an AI Company: The smartphone payments business Ant Financial is using computer vision, natural language processing, and mountains of data to reimagine banking, insurance, and more
  12. China's big investment, "brain gains" lead to scientific breakthroughs: From world's largest radio telescope, collecting samples of combustible ice, to the successful transmission of "entangled" photon pairs from space, achievements made by Chinese scientists have been drawing worldwide attention
  13. In China, a robot has started delivering packages to people
  14. China cracks down on fake peer reviews - Funding agencies announce harsh penalties and stronger policing efforts.
  15. In 2015, China's biomedical research teams ranked No. 4 on the top 10 list for the total number of new discoveries published in six top-tier journals. In 2000, China didn't even make the top 10 - JCI Insight. China spent 75% of what the U.S. spent on total R&D in 2015. In 2000, China spent 12%
  16. Piezoelectric nanogenerators for self-powered flexible sensors: small size factor, simple structure, and long-term stability make them favorable for use in powering micro/nanosystems, various small power consumer devices, remote and mobile sensors, and even wearable wireless electronics
  17. Hyundai partners with Baidu in car navigation system: Navigation systems equipped in Hyundai cars sold in China will feature the Baidu MapAuto and Duer OS Auto systems
  18. Scientists from several U.S. and Chinese universities say new findings about microbes and their interaction with other species show that Darwin's theory of evolution needs an update
In Economic news
  1. Tesla nearing deal to build factory in China, but will need to partner with local producer to do so. Is this a way for China to acquire IP? China is not keen to easily give away key markets, especially electric cars. is this a trojan horse strategy?
  2. Foreign investors bet billions on China blue-chips joining MSCI index
  3. Multinationals losing battle for Chinese consumers
  4. Chinese theme parks dominate top 20 in Asia-Pacific ranking: Although Japanese parks took the top three spots, Chinese destinations filled out 11 of the top 20 in the Asia-Pacific ranking
  5. US President Donald Trump has forced the American car giant Ford to shift production from Mexico, to China.
  6. China applying for more patents than ever before as companies push to innovate, protect brands: Enforcement via litigation can only occur if a patent is in force. Although around a quarter of all patents in force in 2015 were in the US, China’s share is growing fast, almost 1.5m from 600,000 in 2010
  7. Building stronger brands will boost China's image
  8. Ford's Signal to the Auto World: Here Comes China
  9. Chinese factories are eagerly enlisting robots to address worker shortages and automation needs, prompting Japanese manufacturers to scramble to boost output
  10. Russia offers China joint development of engines for civil aviation: “We proposed to the Chinese that we jointly create an engine for a long-haul aircraft based on the Russian PD-14 engine," Rostec spokesperson Viktor Kladov told RIA Novosti
  11. Is China the Most Protectionist Country? No, Not By a Long Shot
  12. Inevitable Chinese slowdown 'a myth'
  13. West should be more concerned with its debts than China’s
  14. Western brands risk alienating China’s young consumers with campaigns that play to Western clichés. If you compare metro systems, China’s is not only more modern, it is cleaner, faster and on time. That’s why Chinese milleninals find it frustrating to see China painted only with a prism of the past
  15. Jack Ma: This is what to study if you want a high-paying job in the future
  16. Chinese salaries has increased a lot duing the last decade
  17. Chinese electric bus firm staying out of North America
In Military news
  1. Chinese military is officially recognizing the existence of the new Chinese ZTQ and has even given it a name; Xinqingtan. The ZTQ was designed for rough, mountainous terrain as found in Tibet and the mountainous jungles on Vietnamese border
  2. A more loyal PLA rebuffs the heresy of separating the Party and military
  3. China to set up military bases in Pakistan - Pentagon report
  4. China, #Finland willing to advance military cooperation: Niinisto said Finland highly values the collaboration with China in various areas including national defense and military, and is willing to work with Chinese partners to further develop the relations between the armies of the two sides
  5. American and Chinese aircraft could be flying 4,000 miles per hour by 2030: CASIC debuted the Teng Yun spacecraft design during the Global Space Exploration 2017. CASC's hypersonic spaceplane, announced in August 2016. Its engine and other critical technology are slated for completion by 2020
  6. China 'deploys submarine-hunting aircraft to South China Sea' in defiance of US warnings
  7. China may have the world’s most powerful submarine detector
Other Notables
  1. Does the current Chinese leadership make offerings at the Mausoleum of the Yellow Emperor? (as Qin Shi Huang to Mao Ze Dong did)
  2. Cultural confidence plays vital role in China’s further development
  3. Dress show combining traditional and contemporary styles held at princely mansion
  4. The Glory of Daming Palace
  5. A total of 73.7 percent of people support providing Good Samaritans with rewards when they take a stand against injustice, according to a survey conducted by the Social Survey Center of China Youth Daily and online survey platform
  6. Western hypocrisy and historical revisionism regarding Hong Kong
  7. Lin Shan Ju – Homophobic Taiwanese White Supremacist and Ex-Candidate of the One Nation Party
  8. Master Jiang and the Six Kingdoms (Release 2018)
  9. Contact Fairfax Directly and Protest at their mistreatment of the Australian Chinese Community
  10. Pamela Anderson promised to write a love letter to the nation of China and visit the country if the Chinese government and people supported Assange’s release (we have to get this most important of news to President Xi)
  11. Little Hong Kong girl with a big voice handles pressure and critics with aplomb, father says: Family support behind why nine-year-old Celine Tam Tsz-kwan has the confidence of an adult superstar. “We as parents are just trying hard to give her the best of what she has always wanted,” Steve Tam
  12. Beijing strengthens protection of historical buildings: This year, Xicheng and Dongcheng districts in the center of the city will take measures to relocate current residents from 26 historical buildings, such as ancient guild halls, temples, and former residences of historical figures
  13. Zeus can throw lightning bolts, Yahweh (the Christian God) causes mega floods, but what does the Jade Emperor have in terms of supernatural powers?
  14. Making the OnePus 5
  15. Is there someone who will always hold your hand, regardless of old age or disease, until death do you apart?
  16. Samples of sea cucumbers collected by China's manned submersible Jiaolong after its dive in Yap Trench
  17. Little Orphan Island on the Yangtze River, 1870s
  18. Voice of China: US should look in the mirror before lecturing the world on human rights
  19. The Swiss Witnesses to China’s Cultural Revolution
  20. Forever Chang’an
  21. Voice of China: US should look in the mirror before lecturing the world on human rights
  22. Determined actions to frustrate the imperial machinations of the US on the ground should be matched with strong words. The China-Russia nexus must not only articulate their vision for a new international order but also expose the hurdles that stand in its way without mincing any words.
  23. Review: Wait, Was That Confucius? PBS’s Rushed ‘Story of China’
  24. Butt hurt writer is angry at Europeans for observing Chinese sovereignty
  25. Chinese - The Sinitic Languages
  26. Newsweek Ponders: how separate is hong kong to china?
  27. How Russians succeed in Chinese Kung fu
  28. Biography of Yellow Turban leader Bo Cai
  29. He Was Bullied as a Kid For Being Chinese, Now He's the Black Power Ranger
  30. Good books on Chinese politics?
  31. Warning: Graphic Images Whales massacred by locals on beach in Faroe Islands (I sure hope Chinese media reported this story for the reasons I think they should)
  32. Today: Sino-Soviet split, June 22 Remember: every day is history.
  33. The Forbidden City
  34. Father and daughter run for challenge: Running together has allowed Tian and his daughter to spend time with each other, as well as enable them to stay physically fit, while inspiring family and friends to do the same
  35. How China’s fearsome Tiger Dads found their way back into fashion: Strict fathers are winning support as society resists rising Western influence to embrace traditional Chinese parenting style
  36. 30 Story Building In China Built In 15 Days Time Lapse
  37. How Western Fake News Took Over China’s Social Media
  38. Where Stories of Peaceful Coexistence Are Written in Stone
  39. Body Folding Kung Fu With a Master
  40. Panama's Diplomatic Switch from ROC to PRC has everything to do with PRC's previous plan to fund and build the "Nicaragua Canal", which was announced in May 2017 to be either "paralyzed, or nonexistent" (I.e. PRC Threatened to end Panama Canal's monopoly in the region, and Panama caved)
  41. Spouts of Fury: When Tea and Kung Fu Collide
  42. The Art of Making 9-Foot Noodles by Hand
  43. Shaolin Temple Kung Fu Academy, Mount Song, Henan
  44. Translation of Cheng Pu's official SGZ biography
  45. What do you guys think about the Tui Bei Tu? (prophecy in China)
  46. DJI - SkyPixel - A New Way Up
  47. Someone spent 2 years painstakingly replicating China's Forbidden City in 'Minecraft': The team was led by 22-year-old Su Yijun from Guangzhou, who orchestrated the plan from scratch in 2014
  48. Fairy Footsteps in Green land
  49. So what is the Chinese Equivalent of 4chan/8chan?
  50. China’s old Silk Road revival: hi-speed trains, massive skyscrapers and free-trade zones
  51. Classic Chinese Music II [不裝飾你的夢]
  52. Female pilots fly JH-7 fighter bombers
  53. Qing Dynasty vase breaks Irish record at auction: was sold for $825,000 at Sheppard's auction in Ireland. The item is believed to date from the reign of the Qianlong Emperor, the fourth emperor of the dynasty, who lived between 1711 and 1799
  54. GT editorial: Dialogue may lead to better ties if Trump can ignore US media criticism
  55. Mongols/Yuan should be considered Chinese or not...?
  56. A 7-year-old Romanian girl named Nana wows Chinese judges with fluent Chinese song
  57. California looks to build high-speed rail in cooperation with China
submitted by AutoModerator to Sino [link] [comments]

60 Second Strategy 2016 - Learn How To Trade Binary ... Binary Options Product 2016 Reviews - YouTube BINARY OPTONS STRATEGY 2016 : BEST BINARY OPTIONS STRATEGY (IQ OPTION TRADING TUTORIAL 2016) Binary Options Strategy 2016 for MT4 - No Indicator Needed Binary Options Strategy - YouTube Binary Options Strategy : MM for Binary Options -2016 a Must Binary Options Trader to Do Accurate binary options strategy, 80% - 100%

Fat Diminisher System Reviews is Fat Diminisher Program Really Work Or Scam? Read Fat Diminisher System Reviews book And Get $1K BONUS NOW... Now Access the News Reported Latest Breakthrough Fat Loss System Researched Reviews Reports Their Latest Findings: (Fat Diminisher System) There is a new fat loss system making waves across the fitness and weight… I am selling a real Binary Options Trading Strategy that you can use to win 80% or more trades. You have to win 80% or more trades in order to make good profits and to do this, you need a strategy that really works. I will show how you can win almost every trade that you execute in 60 seconds platform. I will NOT tell you to use RSI, MACD, ROC, Moving Average or any other indicators. I am not ... Some advisers were so concerned about President Trump’s unpredictability that they were wary of presenting him with military options. Veuer’s Justin Kircher has the story. Report. Browse more videos. Playing next. 1:31. This is how England's mystery beavers have been bringing ecosystems back to life. Explainer Channel. 1:27. Worried About His Unpredictability, Trump Advisers Reportedly ... Sep 1, 2016, Registered user . Warning!!! Scam Broker of a different type!! Subtle fraud, dangerous and very unprofessional after deposit. Warning!!! Scam Broker of a different type!! claimed to have a safe CCI martingale (or hedge as they call it) strategy which the account manager claimed has only gone to the 8th level once in 11 years when used right and that he had see ... Jan 24, 2017 - Best Binary Options Trading Strategy 2017 - LET'S START Binary Options Trading Guide. On this page, we will go through the basics of binary options trading. When trading with a binary option robot, you do not necessarily need to know anything about binary options investing, but it is useful to be aware of the mechanism by which option robot operates. Plus, if you are interested in binary options trading so much that you do not want to use the robot ... European Union bans binary options, strictly regulates CFDs Vise tightens around Israeli online scammers; Israeli banks close forex companies’ accounts, and Twitter follows Google and Facebook ... Watch 60 Second Binary Options Strategy - Best 60 Second Binary Options Trading Strategy - technical analysis on Dailymotion I am a trader with 16 years of experience, and I write analytical reviews for companies related to Forex. During the year I have been engaged in successful trade on my trade account with Approximately since last March the balance of my account has been growing steadily due to my chosen trading strategy with tick options, while the starting amount was quite small. Regulator calls on Google to ban ads for binary options, cryptocurrencies Canadian and US law enforcement have explained to Google how the advertising enables scammers to find victims, asked it to ...

[index] [24940] [14018] [29797] [12523] [10632] [26926] [25925] [4472] [989] [11619]

60 Second Strategy 2016 - Learn How To Trade Binary ...

Binary Options Strategy : Money Management for Binary Options -2016 a Must Binary Options Trader to Do =In this Binary Options Strategy Tutorial i have given my Best Idea about Binary Options ... 5 minutes Binary Options Strategy in 2016 uts great chance to earn real money at Binary Options Strategy 2016. Just a 5 min and you will take your cash! Use 5 minutes Binary Options Strategy 2016 ... Binary options: Best binary options strategy 2016. Full information about binary option broker - iq option. Only profitable trading strategies. What is Binary - Binary Options Trading Strategy for Beginners 2016. Binary options are a simple and rewarding financial trading product. Binary options deliver a fixed return on every trade which ... IQ Option Best Strategy - Binary Options Strategy 2016 (IQ Options Trading Tutorial 2016) IQ OPTION STRATEGY - IT'S EASY I want to immediately dispel the myth that binary options (iq option) are a ... Sign up via my partnership link to use the broker I use to trade with Forex & Crypto - (Thank you) ----- CLICK HERE: ----- The benefits of 60 Second Binary Opti... Binary Options Strategies 63,433 views 17:33 Bill Poulos Presents: Call Options & Put Options Explained In 8 Minutes (Options For Beginners) - Duration: 7:56. During the session we get the UK GDP numbers, so its possible that the British trade quite a bit, but in general there is going to be a bit of a lull, as the Non-Farm Payroll numbers come out tomor... E-mail me if you would like to join our private trading group, education, strategies, signals and full support given! [email protected]