Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged credit-cards

Rss Feed Group items tagged

Gary Edwards

J.P. Morgan Chase's Ugly Family Secrets Revealed | Matt Taibbi | Rolling Stone - 0 views

  •  
    Socialist blogger and Rolling Stone Magazine journalist Matt Taibi has made a career out of exposing Banksters and their criminal activities causing the 2008 collapse of the global financial industry.  Here he sights a story in American Banker that fully demonstrates the depths of depravity and criminal activities that continues to characterize big Banksters. The mortgage-foreclosure-robo signing scandal is just the tip of the ice berg.  Matt recounts the story of Linda Almonte, a JP Morgan Chase employee in charge of Credit Card debt bundling.  It's horrific. Money shot: The financial crash wouldn't have happened if even a slim plurality of financial executives had done what Linda Almonte did, i.e. simply refuse to sign off on a bogus transaction. If companies had merely upheld their own stated policies and stayed within the ballpark of the law, none of these messes could have accumulated: fraudulent mortgages wouldn't have been sold, families wouldn't have been foreclosed upon based on robo-signed documentation, investors wouldn't have been duped into buying huge packets of "misrepresented assets." ............. excerpt: In a story that should be getting lots of attention, American Banker has released an excellent and disturbing exposé of J.P. Morgan Chase's credit card services division, relying on multiple current and former Chase employees. One of them, Linda Almonte, is a whistleblower whom I've known since last September; I'm working on a recount of her story for my next book. One of the things we were promised by the lawmakers who passed the Dodd-Frank reform bill a few years back is that this would be a new era for whistleblowers who come forward to tell the world about problems in our financial infrastructure. This story now looms as a test case for that proposition. American Banker reporter Jeff Horwitz did an outstanding job in this story detailing the sweeping irregularities in-house at Chase, but his very thoroughness means the news may have ram
Gary Edwards

Robosigning Credit Cards: The Next Major Bank Scandal? | The Reformed Broker - 0 views

  •  
    This article is definately a "must read".  The summary is that the credit card debt mess is far worse than the mortgage foreclosure mess.  The Banksters are guilty of massive illegal activities in foreclosure gate, including forging documents and signatures.  Apparently the same thing has happened with Credit Card Debt Collection!!!! excerpt:   From American Banker: "If sloppy record keeping and problems with false affidavits is a problem with mortgages, it's 100 times bigger in credit card accounts," says Michelle Weinberg of the Legal Assistance Foundation of Metropolitan Chicago. Worse than mortgages, even? Let's just review the mortgage situation: Robosigning consists of blatantly illegal practices in which banks and mortgage companies had their employees sign affidavits and other documents without verifying the information therein; forge signatures on documents; backdate documents; falsely notarize documents; create new documents to replace missing ones; or some combination of all the above. Did I mention that all of this is illegal? Contrary to what the banks would have you believe, robosigning was not a one-off - it happened on a systematic level. So much so that some of the nation's largest banks (including Bank of America Corp. and  JPMorgan Chase & Co., ) were forced to halt foreclosures to "review" these practices in late 2010. The companies that did this claimed that they had to cut corners because they couldn't keep up with all of the paperwork created by the housing boom last decade. But we now know that this is not true - there's evidence that robo-signing goes back all the way to at least 1998. This all means that thousands of Americans were foreclosed upon erroneously and that even homebuyers and sellers in good standing may be unable to prove their rightful ownership. The problem is so big that Sheila Bair, the former head of the FDIC, acknowledged that they don't even know how big it is. It's so big that the b
Paul Merrell

The Credit Card Gravy Train » CounterPunch: Tells the Facts, Names the Names - 0 views

  • You pay off your credit card balance every month, thinking you are taking advantage of the “interest-free grace period” and getting free credit. You may even use your credit card when you could have used cash, just to get the free frequent flier or cash-back rewards. But those popular features are misleading. Even when the balance is paid on time every month, credit card use imposes a huge hidden cost on users—hidden because the cost is deducted from what the merchant receives, then passed on to you in the form of higher prices. Visa and MasterCard charge merchants about 2% of the value of every credit card transaction, and American Express charges even more. That may not sound like much. But consider that for balances that are paid off monthly (meaning most of them), the banks make 2% or more on a loan averaging only about 25 days (depending on when in the month the charge was made and when in the grace period it was paid). Two percent interest for 25 days works out to a 33.5% return annually (1.02^(365/25) – 1), and that figure may be conservative. Merchant fees were originally designed as a way to avoid usury and Truth-in-Lending laws. Visa and MasterCard are independent entities, but they were set up by big Wall Street banks, and the card-issuing banks get about 80% of the fees. The annual returns not only fall in the usurious category, but they are returns on other people’s money – usually the borrower’s own money!  Here is how it works . . . .
Paul Merrell

New federal database will track Americans' credit scores, financial history | Police St... - 0 views

  • The Federal Housing Finance Agency (FHFA) has given notice of its intent to database a large number of very personal data points on every American who possesses a mortgage — which may include as many as 227 million Americans.   These points include things like financial histories, credit card balances, credit scores, personal demographics, lists of assets and property, family information, and more. Assembled with the help of the the Consumer Finance Protection Bureau, the database’s stated purpose is for research and modeling.  The agencies have been collecting data for modeling for years, but the addition of many new pieces of personally identifiable information is a reversal of previously stated policy.
  • The database will include very specific and personal information on the borrowers and co-borrowers.  According to the Federal Register Notice on April 16, 2014, the database includes: Individual’s name, address, and phone number; Individual’s Social Security Number; Individual’s gender, race, ethnicity, and religion; Individual’s marital status; Individual’s household composition (number and ages of males, females, children); Individual’s household income; Individual’s credit score; Individual’s education records; Individual’s military status/records; Individual’s employment status/records; Individual’s bank account numbers; List of individual’s “financial events in the last few years”; List of individual’s “life events in the last few years”;
  • List of individual’s other assets/wealth; Individual’s current mortgage balance; Individual’s current monthly mortgage payment; Individual’s payment delinquency records; Individual’s bankruptcy records; Individual’s credit card numbers; Individual’s credit card balances; Individual’s credit card charge limit and the highest balance charged; Individual’s minimum payments due on all loans; Attributes of the property (square footage, number of rooms, lot size…); Sale price and down payment of the property; Mortgage information (dates, interest rate, amount, loan servicer…);
  • ...1 more annotation...
  • As one could imagine, a trove of information like this would be an identity thief’s paradise.  As Rep. Randy Neugebauer said to the Washington Examiner, “If someone were to breach that system, they could very easily steal somebody’s identity.” Like so many parts of the federal government, the National Mortgage Database was never authorized by Congress and was certainly not authorized by the constitution.
  •  
    More government Big Data madness.
Paul Merrell

PayPal to Pay $25 Million to Settle CFPB Case - 0 views

  • By Editor Filed in News May 19th, 2015 @ 11:50 am The Consumer Financial Protection Bureau (CFPB) filed a complaint and proposed consent order in federal court against PayPal, Inc. for illegally signing up consumers for its online credit product, PayPal Credit, formerly known as Bill Me Later. The CFPB alleges that PayPal deceptively advertised promotional benefits that it failed to honor, signed consumers up for credit without their permission, made them use PayPal Credit instead of their preferred payment method, and then mishandled billing disputes.
  • Under the proposed order, PayPal would pay $15 million in consumer redress and a $10 million penalty, and it would be required to improve its disclosures and procedures. “PayPal illegally signed up consumers for its online credit product without their permission and failed to address disputes when they complained,” said CFPB Director Richard Cordray. “Online shopping has become a way of life for many Americans and it’s important that they are treated fairly. The CFPB’s action should send a signal that consumers are protected whether they are opening their wallets or clicking online to make a purchase.”
  • As with credit cards and other forms of credit, consumers using PayPal Credit may incur interest, late fees, and other charges. Consumers often enroll in PayPal Credit while purchasing a good or service online or while creating a PayPal account. Since 2008, PayPal has offered PayPal Credit to consumers across the country making purchases from thousands of online merchants, including eBay. The CFPB alleges that many consumers who were attempting to enroll in a regular PayPal account, or make an online purchase, were signed up for the credit product without realizing it. The company also failed to post payments properly, lost payment checks, and mishandled billing disputes that consumers had with merchants or the company. Tens of thousands of consumers experienced these issues.
Gary Edwards

ACTA Open Must Read Analysis: Why Markets Are Still Falling . . . The Shadow Financial ... - 0 views

  • evidence suggests more credit default swaps are traded in London than in the United States according to the US Federal Reserve, so US action alone cannot address perceived problems.
  • As corporations, home owners and credit card holders go into default -- stop making payments -- many financial institutions are being hit twice on their balance sheet -- once by the bad loan and then by the associated CDS default or obligation.
  • CDS trading has expanded 100-fold since 2001 as financial institutions including insurance companies and hedge funds as well as investors have used the contracts to protect against bond losses and speculate on companies' ability to repay debt.
  • ...4 more annotations...
  • Chicago Mercantile Exchange
  • Lawmakers are also considering the introduction of new regulations to curb CDS abuse as engines of speculation, but many financial experts are also encouraging the creation of public exchanges for these shadow markets. An exchange would establish an arms length price. As that price was transparent and moved, the market would see that a credit was deteriorating. A centralised clearing market would help shine a clear light on these transactions and since every trade would be backed up by the members of the clearing house, chances of default would greatly be reduced.
  • Unlike most financial markets, credit default swaps are unregulated and at USD 54.6 trillion, they are one of the largest unregulated markets in the world.
  • In response to the coming derivatives and deleveraging Tsunami, which has already begun, the world GDP may have to shrink drastically -- some estimates suggest between 30% and 50% -- over the coming years of The Great Unwind. This is the severe recession the markets fear as they go into free fall.
  •  
    Why are Markets still Falling? The Tsunami caused by Derivatives and Deleveraging The invisible elephant in the room causing continuous falls in global financial markets is the link to the privately traded Credit Default Swaps (CDS) and the financial uncertainty they have created whilst synchronised deleveraging takes place across the world. ... Credit default swaps are unregulated financial derivatives which act as debt insurance on risky assets like mortgages, corporate and government bonds. But unlike a normal insurance policy, financial institutions that sell credit default swaps are not required to have enough funds in reserve should those risky loans turn bad. Since the US Congress in 2000 declined to regulate these contracts as it does insurance, the companies that guarantee the assets are not required by law to keep enough capital on hand to pay them off in the event of a default.
Paul Merrell

Maldives denies US kidnapped Russian credit card fraudster - The Rakyat Post - The Raky... - 0 views

  • The Maldives has said it acted alone to expel a Russian national suspected by the US of being one of the world’s most prolific traffickers of stolen credit cards. President Abdulla Yameen denied a claim by Moscow that the United States had abducted Roman Seleznev from the Maldives and taken him to the American territory of Guam. Yameen told reporters that Maldives police, acting on an Interpol arrest warrant, had moved against 30-year-old Seleznev during the weekend.
  • he US Justice Department said on Monday that Seleznev was arrested and taken to Guam, although the details of his seizure were not known. He is charged with hacking into retail computer systems and installing malicious software to steal credit card numbers in a scheme that operated between October 2009 and February 2011. Seleznev and his partners stole over 200,000 credit card numbers, with bank losses from the scheme estimated at over US$1.1 million, according to a 2011 indictment.
  • The Russian foreign ministry said Seleznev’s detention was a “hostile step”, adding that Russian diplomatic missions had not been notified of his arrest.
  • ...1 more annotation...
  • The Maldivian Home Ministry, in a brief statement, said the suspect was “sent from the Maldives” in response to an Interpol red notice for his arrest. “Since the Maldives is a member state of Interpol… the Maldives attaches the utmost importance to the ‘red notices’ issued by the organisation,” it said.
Gary Edwards

The Bailout So Far - WSJ.com Holman W. Jenkins Jr.: - 0 views

  •  
    Washington a few months ago might have bought the entire stock of subprime mortgages for about half the money committed by the Fed and Treasury last week to prop up Citigroup and spur consumer and mortgage lending. Buying up bad mortgages would at least have left the private sector in charge of issuing new credit, which -- however bad its performance during the housing bubble -- would likely produce better results than government directing credit allocation in the economy. They (Federal Reserve-Treasury-FDIC-Congress) failed to douse the confidence/systemic-risk fire and now have moved on to fighting recession by turning credit allocation into a public utility. Vikram Pandit of Citigroup says: "We have gone from arm's length, free market, just-in-time availability" of funding to a system where big credit-reliant businesses now have only one place to turn, government.
  •  
    Maybe Washington will succeed in forestalling a deep and prolonged recession. Maybe all the money ($8 trillion by one count) being printed to acquire or insure mortgages, student loans, credit card receivables, commercial paper and banking shares will be seamlessly withdrawn once those assets are sold back to willing parties in the private sector when the panic has passed. Maybe taxpayers will even make a profit on the deal.
Paul Merrell

Am. Express Co. v. Italian Colors Rest. :: Justia US Supreme Court Center - 0 views

  • Justia.com Opinion Summary: An agreement between American Express and merchants who accept American Express cards, requires that all of their disputes be resolved by arbitration and provides that there “shall be no right or authority for any Claims to be arbitrated on a class action basis.” The merchants filed a class action, claiming that American Express violated section 1 of the Sherman Act and seeking treble damages under section 4 of the Clayton Act. The district court dismissed. The Second Circuit reversed, holding that the class action waiver was unenforceable and that arbitration could not proceed because of prohibitive costs. The Circuit upheld its reversal on remand in light of a Supreme Court holding that a party may not be compelled to submit to class arbitration absent an agreement to do so. The Supreme Court reversed. The FAA reflects an overarching principle that arbitration is a matter of contract and does not permit courts to invalidate a contractual waiver of class arbitration on the ground that the plaintiff’s cost of individually arbitrating a federal statutory claim exceeds the potential recovery. Courts must rigorously enforce arbitration agreements even for claims alleging violation of a federal statute, unless the FAA mandate has been overridden by a contrary congressional command. No contrary congressional command requires rejection of this waiver. Federal antitrust laws do not guarantee an affordable procedural path to the vindication of every claim or indicate an intention to preclude waiver of class-action procedures. The fact that it is not worth the expense involved in proving a statutory remedy does not constitute the elimination of the right to pursue that remedy.
  •  
    Remarkable 5-3 Supreme Court decision in favor of the banksters, in effect overruling a line of prior decisions nearly 30 years old. At issue, whether a credit card monopolists' form contract with merchants containing a mandatory arbitration clause could lawfully bar judicial review under the antitrust laws when the arbitration clause barred class arbitration and the amount merchants could hope to recover was less than a tenth of the expense of litigating claims individually. (Antitrust cases are unusually expensive to prosecute.) For nearly three decades, the Court had implied an exception to the Federal Arbitration Act that allowed plaintiffs to litigate claims subject to arbitration clauses in court to vindicate rights under federal law when arbitration would not provide an effective remedy for the violation of federal law. No more. Upholding the "right" of American Express to insist on a 30 percent share of the price of each sale transacted with an American Express card. Read Justice Kagan's dissent, joined by two other justices, to learn what's wrong with the majority's decision. Her nushell version: "here is the nutshell version of today's opinion, admirably flaunted rather than camoflaged: Too darn bad." The majority did, however, leave it open for Congress to amend the Arbitration Act to resolve the issue. But with corporate and bankster influence in Congress, good luck with that. This decision, unfortunately, has major implications for software developers, as well as other merchants. For example, the current crop of "app store" restrictions on competition enforced by technical measures on app developers by monopolists such as Apple and Microsoft, insisting on a 30 per cent cut of each sale. One can rest assured that such contracts contain similar arbitration clauses
Gary Edwards

The Golden Calf of Increased Tax Rates | RedState - 0 views

  • Economics and a degree of common sense also tells us that we will always be more cautious in spending our money than a third party will be.
  • Milton Friedman used this brief explanation to drive home the point. There are four ways to spend money.
  • You can spend your money on yourself, and when you do both the cost of the product and the quality matters.
  • ...7 more annotations...
  • Finally, the most inefficient method to spend money of the four is other people, spending other people’s money, on other people. Cost doesn’t matter because it is not your money and quality doesn’t matter because it is not your product or service either.
  • Other people can spend other people’s money on themselves, in this case cost doesn’t matter, as it is not your money, but quality does as you are buying the product or service for yourself.
  • You can spend your money on someone else, in this case cost matters but quality is not as important.
  • In the final case, I just described to you government spending. And, to be clear, government spending is
  • taxation, while deficit spending is future taxation plus interest. It cannot be any other way.
  • Finally, we are frequently rhetorically assaulted by the “fair share” moralists on the left.
  • The paradoxical truth is that the tax rates are too high today and tax revenues are too low and the soundest way to raise revenues in the long run is to cut rates now.
  •  
    Good argument explaining the relationship between tax rates and tax receipts. excerpt: Economics and a degree of common sense also tells us that we will always be more cautious in spending our money than a third party will be. Milton Friedman used this brief explanation to drive home the point. There are four ways to spend money. You can spend your money on yourself, and when you do both the cost of the product and the quality matters. You can spend your money on someone else, in this case cost matters but quality is not as important. Other people can spend other people's money on themselves, in this case cost doesn't matter, as it is not your money, but quality does as you are buying the product or service for yourself. Finally, the most inefficient method to spend money of the four is other people, spending other people's money, on other people. Cost doesn't matter because it is not your money and quality doesn't matter because it is not your product or service either. In the final case, I just described to you government spending. And, to be clear, government spending is taxation, while deficit spending is future taxation plus interest. It cannot be any other way. Arguing that accumulating debt on your personal credit card is not going to require you to take money from your account in the future to pay the debt is foolish, therefore, why would you think that the national credit card would obey a different set of economic rules? Finally, we are frequently rhetorically assaulted by the "fair share" moralists on the left. ....................... This is an argument where they are correct on principle and completely devoid of substance regarding evidence...........
Paul Merrell

SPIEGEL Exclusive: NSA Spies on International Bank Transactions - SPIEGEL ONLINE - 0 views

  • The National Security Agency (NSA) widely monitors international payments, banking and credit card transactions, according to documents seen by SPIEGEL. The information from the American foreign intelligence agency, acquired by former NSA contractor and whistleblower Edward Snowden, show that the spying is conducted by a branch called "Follow the Money" (FTM). The collected information then flows into the NSA's own financial databank, called "Tracfin," which in 2011 contained 180 million records. Some 84 percent of the data is from credit card transactions. Further NSA documents from 2010 show that the NSA also targets the transactions of customers of large credit card companies like VISA for surveillance. NSA analysts at an internal conference that year described in detail how they had apparently successfully searched through the US company's complex transaction network for tapping possibilities.
  • Their aim was to gain access to transactions by VISA customers in Europe, the Middle East and Africa, according to one presentation. The goal was to "collect, parse and ingest transactional data for priority credit card associations, focusing on priority geographic regions." In response to a SPIEGEL inquiry, however, VISA issued a statement in which it said, "We are not aware of any unauthorized access to our network. Visa takes data security seriously and, in response to any attempted intrusion, we would pursue all available remedies to the fullest extent of the law. Further, its Visa's policy to only provide transaction information in response to a subpoena or other valid legal process." The NSA's Tracfin data bank also contained data from the Brussels-based Society for Worldwide Interbank Financial Telecommunication (SWIFT), a network used by thousands of banks to send transaction information securely. SWIFT was named as a "target," according to the documents, which also show that the NSA spied on the organization on several levels, involving, among others, the agency's "tailored access operations" division. One of the ways the agency accessed the data included reading "SWIFT printer traffic from numerous banks," the documents show.
  • But even intelligence agency employees are somewhat concerned about spying on the world finance system, according to one document from the UK's intelligence agency GCHQ concerning the legal perspectives on "financial data" and the agency's own cooperations with the NSA in this area. The collection, storage and sharing of politically sensitive data is a deep invasion of privacy, and involved "bulk data" full of "rich personal information," much of which "is not about our targets," the document says.
  •  
    NSA and GCHQ spying on banksters' transactions? I'll bet that comes to a screeching halt soon. Isn't it unwritten law in the Obama Administration that no government agencies mess with the banksters?
Gary Edwards

ZYWICKI: Why aren't banks lending? - Washington Times - 0 views

  •  
    Despite constant urging by Washington for banks to increase their lending, credit conditions remain tight. Small-business lending continues to lag, and credit card issuers have slashed credit lines and canceled thousands of accounts. Just before Memorial Day, the Obama administration unveiled its latest effort to jump-start lending, a new Small Business Lending Fund (SBLF), which will make available $30 billion to community banks to promote small-business lending. The proposal already has cleared the House Financial Services Committee. But is there any reason to believe that this modest investment will do what the hundreds of billions of Troubled Asset Relief Program (TARP) dollars failed to do - namely, encourage banks to start lending? Not likely. As with previous efforts, the new fund fails to address the most important reason banks aren't lending: Washington bureaucrats and politicians are making it impossible for them do so. Every loan bears some risk that it will not be repaid. In making a loan, a lender has two considerations: First, it must be able to price the risk of the loan accurately or, second, it must reduce its risk exposure by reducing the number of loans it makes, the amount it lends or the risk profile of those to whom it lends. Regulations that interfere with the ability to price risk accurately thus inevitably produce efforts to reduce risk exposure by curtailing lending.
Paul Merrell

No Slap On The Wrist: Wells Fargo Plunges After Federal Reserve Bars Lender's Growth - 0 views

  • Wells Fargo WFC -9.22%Wells FargoWFC$58.16$-5.91(-9.22%)As of 02/06/2018, 01:01am EST is facing far more than a fine for its fake accounts scandal, in which employees at the lender's branches across the country opened over a million fraudulent checking and credit card accounts to hit their numbers. Late on Friday, the Federal Reserve decided to restrict growth at America's third-largest bank by assets until its risk and governance is improved. The order, which also called for a revamp of Wells Fargo's board of directors, sent the bank reeling in early trading Monday. Wells Fargo shares plunged 9% lower in Monday trading, erasing most of its gains over the past 12 months. For its top shareholder, Warren Buffett's Berkshire Hathaway, the Fed-inspired stock slide meant its Wells Fargo holdings lost over $2.7 billion in value. "We cannot tolerate pervasive and persistent misconduct at any bank and the consumers harmed by Wells Fargo expect that robust and comprehensive reforms will be put in place to make certain that the abuses do not occur again," said chair Janet L. Yellen on Friday. The order was her last as head of the Federal Reserve. On Monday, successor Jerome Powell was sworn in. Added Yellen, "the enforcement action we are taking today will ensure that Wells Fargo will not expand until it is able to do so safely and with the protections needed to manage all of its risks and protect its customers." In September 2016, Wells Fargo paid a $185 million fine to the Consumer Financial Protection Bureau after the agency found branch bankers had opened well over a million fake accounts, which generated millions of dollars in fees to the lender. When the scandal, which occurred over almost a decade, was first revealed, Wells Fargo and its board didn't immediately overhaul their leadership, or sanction top executives in the divisions where fake accounts were created. Only after significant public outcry, in addition to a widening scope of the scandal, did Wells Fargo begin a revamp, firing CEO John Stumpf and clawing back bonuses for numerous executives. Backer Warren Buffett later said in an appearance on CNBC the bank and its leadership had misjudged the severity of the problem.
  • In addition to harsh words, the Fed is ordering a sanction of almost unprecedented severity. It will restrict the bank's growth until its governance and risk management improve, though it will allow Wells to continue current operations from taking deposits to offering loans.
  • Three Wells Fargo long-standing board directors, John Chen, Lloyd Dean and Enrique Hernandez, will likely retire at the firm's annual meeting as part of the Fed's additional order for a refreshment of four board directors. Analysts did not brush off the Fed's move, as they have large fines coming out of the crisis.
  • ...1 more annotation...
  • The bottom line is that the consent and decree order will mean Wells will have a harder time maintaining market share and will have to compete more on price or credit terms versus peers, in our view. Wells will also have to maintain the balance sheet while other banks are growing, and we view this as defensive versus peers," Kleinhanzl added.
Gary Edwards

How Government Failure Caused the Great Recession - The American, A Magazine of Ideas - 0 views

  •  
    The banking crisis that began in August 2007 shocked markets and precipitated the Great Recession. To fully explain the banking crisis, one must account for its timing, severity, and global impact. One must also confront a startling historical contrast. If we define "banking crisis" to mean bank failures and system losses exceeding 1 percent of a country's gross domestic product (GDP), we find that in the period 1875-1913, a period of marked expansion in international trade and capital flows comparable to the last three decades, there were only four banking crises worldwide.1 By contrast, in the period 1978-2009, a period of much more extensive bank regulation, central bank intervention, government protection of depositors and other bank creditors, and government control of mortgage markets, about 140 banking crises occurred worldwide. Of these, 20 were more severe than any crisis from the earlier period of 1875-1913, in terms of total bank losses as a percent of GDP. Leading financial economists such as Charles Calomiris have argued that a necessary condition for a banking crisis is government policy that distorts the micro-incentives of banks. Likewise, University of Chicago scholar Richard Posner has argued the banks that got into trouble during the recent crisis were simply taking "risks that seemed appropriate in the environment in which they found themselves."2 In the period 1978-2009, about 140 banking crises occurred worldwide. But then why didn't a banking crisis erupt sooner-say, in the recession years of 1990-1991 or 2001-2002? What changed in recent years that led to business risk-taking capable of wrecking the U.S. housing market and the U.S. banking system and other banking systems throughout the world? Further, why were prudent credit practices reasonably maintained in credit card and commercial mortgage securitization in recent years, but wholly abandoned in residential mortgage securitization?
Paul Merrell

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle - 0 views

  • AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
  • With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  • Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
  • ...2 more annotations...
  • According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
  • The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
  •  
    Remember all those NSA claims that no evidence of their misbehavior has emerged? That one should never take wing again. Monitoring call content without the involvement of any court? Without a warrant? Without probable cause?  Was there even any Congressional authorization?  Wiretapping unequivocally requires a judicially-approved search warrant. It's going to be very interesting to learn the government's argument for this misconduct's legality. 
Paul Merrell

NSA collects millions of text messages daily in 'untargeted' global sweep | World news ... - 0 views

  • The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The untargeted collection and storage of SMS messages – including their contacts – is revealed in a joint investigation between the Guardian and the UK’s Channel 4 News based on material provided by NSA whistleblower Edward Snowden. The documents also reveal the UK spy agency GCHQ has made use of the NSA database to search the metadata of “untargeted and unwarranted” communications belonging to people in the UK.
  • The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. An agency presentation from 2011 – subtitled “SMS Text Messages: A Goldmine to Exploit” – reveals the program collected an average of 194 million text messages a day in April of that year. In addition to storing the messages themselves, a further program known as “Prefer” conducted automated analysis on the untargeted communications.
  • • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”. Other travel information was obtained from itinerary texts sent by travel companies, even including cancellations and delays to travel plans.
  • ...6 more annotations...
  • • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images.
  • The Prefer program uses automated text messages such as missed call alerts or texts sent with international roaming charges to extract information, which the agency describes as “content-derived metadata”, and explains that “such gems are not in current metadata stores and would enhance current analytics”. On average, each day the NSA was able to extract:
  • Communications from US phone numbers, the documents suggest, were removed (or “minimized”) from the database – but those of other countries, including the UK, were retained. The revelation the NSA is collecting and extracting personal information from hundreds of millions of global text messages a day is likely to intensify international pressure on US president Barack Obama, who on Friday is set to give his response to the report of his NSA review panel.
  • While US attention has focused on whether the NSA’s controversial phone metadata program will be discontinued, the panel also suggested US spy agencies should pay more consideration to the privacy rights of foreigners, and reconsider spying efforts against allied heads of state and diplomats. In a statement to the Guardian, a spokeswoman for the NSA said any implication that the agency’s collection was “arbitrary and unconstrained is false”. The agency’s capabilities were directed only against “valid foreign intelligence targets” and were subject to stringent legal safeguards, she said.
  • “In contrast to [most] GCHQ equivalents, DISHFIRE contains a large volume of unselected SMS traffic,” it states (emphasis original). “This makes it particularly useful for the development of new targets, since it is possible to examine the content of messages sent months or even years before the target was known to be of interest.” It later explains in plain terms how useful this capability can be. Comparing Dishfire favourably to a GCHQ counterpart which only collects against phone numbers that have specifically been targeted, it states “Dishfire collects pretty much everything it can, so you can see SMS from a selector which is not targeted”.
  • The document also states the database allows for broad, bulk searches of keywords which could result in a high number of hits, rather than just narrow searches against particular phone numbers: “It is also possible to search against the content in bulk (e.g. for a name or home telephone number) if the target’s mobile phone number is not known.” Analysts are warned to be careful when searching content for terms relating to UK citizens or people currently residing in the UK, as these searches could be successful but would not be legal without a warrant or similar targeting authority. However, a note from GCHQ’s operational legalities team, dated May 2008, states agents can search Dishfire for “events” data relating to UK numbers – who is contacting who, and when.
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

Wells Fargo Fined Over Secret Sales Policy to Open Fake Customer Accounts - nsnbc inter... - 0 views

  • The Consumer Financial Protection Bureau (CFPB) has fined Wells Fargo for $100 million based on fraudulent customer account practices. An additional $85 million is to be paid to the city of Los Angeles in California, along with the Office of the Comptroller of the Currency.
  • Last year Wells Fargo was sued by employees (current and former) and customers all across the nation for setting up “unwanted accounts, unwarranted fees”. According to the lawsuit, this was “the largest California-based bank violated state and federal laws by misusing confidential information and failing to notify customers when personal information was breached.” Using “aggressive tactics” to coerce new customers, Wells Fargo made it “difficult to correct the mistakes” made by Wells Fargo and return fees to customers because of “high-pressure sales culture set unrealistic quotas, spurring employees to engage in fraudulent conduct to keep their jobs and boost the company’s profits.” Over the course of an extended period of time, “Wells Fargo employees secretly opened unauthorized accounts to hit sales targets and receive bonuses.” There were 1.5 million accounts opened without the authorization of customers and 500,000 credit cards accounts to boot. Wells Fargo has consistently blames “a few rogue employees. Five hundred employees were terminated, according to a Wells Fargo spokesperson. There was no mention of rescinding of bonuses paid to those employees, and there is no clear evidence that executive’s payouts totaling $155 million for “performance based compensation” for 2012 through 2013 was returned to the bank.
  • Those bonuses were administered based on the fraudulent accounts opened without customer approval. In a statement, Wells Fargo expressed belated regret and a sudden desire to “take responsibility for any instances where customers may have received a product that they did not request.” The training that caused this problem in the first place was a cross-selling strategy called “Going For Gr-Eight” which is a brochure for employees to push banking products onto households of existing customers to increase fee potential and overall profitability. Wells Fargo “staffers, fearing disciplinary action from managers, begged friends and family members to open ghost accounts” and forged signatures “and falsified phone numbers” of customers who did not want to open an account. This practice drove Wells Fargo’s financial success with an estimated “26% of the company’s revenue was from fee income, including those from credit and debit card accounts, trusts and investments.” The bank not only stole money from customers but “also damage their credit scores” and put some into collections to garner fees “for unauthorized accounts went unpaid”. In case of a complaining customer, Wells Fargo would “sandbag” their customers; meaning “failing to open accounts when requested by customers, and instead accumulating a number of account applications to be opened at a later date.”
  • ...1 more annotation...
  • Another devious tactic Wells Fargo employed was “bundling” or “incorrectly informing customers that certain products are available only in packages with other products such as additional accounts, insurance, annuities, and retirement plans.” This is not an isolated incident. Wells Fargo has fired 5,300 employees for this same “illegal behavior”. Beyond this questionable business practice, Wells Fargo was previously recognized by the CFPB for misapplying student loan payments in order to increase fee income. In this case, Wells Fargo was fined $3.6 million and forced to pay $410,000 to student loan borrowers for restitution.
Gary Edwards

Doug Casey: All Banks Are Bankrupt - Casey Research - 1 views

  •  
    This interview should be must reading for every citizen of this world.  Doug Casey lays it out, explaining in the simplest of terms the problem of corrupt governments and banksters.  Put this RSS feed right next to Sir Charles' Priced In Gold" blog as essential to start your day with reading. excerpt: "Anyone with any sense should withdraw whatever cash they have in European banks, whether in euros or any other currency, immediately. Cyprus demonstrated that governments are quite willing and able to confiscate money sitting in a bank account in order to preserve the banking system. We live in Bizarro World. L: Why would it spread? Cyprus was said to be particularly vulnerable because of its strong Greek connections; Cypriot banks had bought of lot Greek debt. Would people in Luxembourg be as exposed? Doug: All banks are in effect creatures of the state at this point. They all own a lot of government bonds, which are considered the most secure form of capital. Of course, that's the opposite of the truth; all these governments are bankrupt as well. The Greek government is just more overtly bankrupt than most. Actually, we should take a minute here to discuss what a properly run banking system looks like. Historically, banks offered two types of accounts: demand deposits and time deposits. Demand deposits are what we call checking accounts today, but the original idea was that you'd pay your bank to store your money securely, and you had the right to "demand" your deposit back immediately, and to transfer funds via check. The idea of time deposits, which became savings accounts, was that the bank would pay you interest when you deposited your money with them for a specific period of time. That's why it's called a "time" deposit; you lent the bank your money for a given time, as did other depositors, and the banks would always know how much money they could lend out - at higher interest rates. Furthermore, loans made against time deposits were always short term
Gary Edwards

Do You Want To Be RFID Chipped? Another Hidden Secret in Obama-Care | Pakalert Press - 0 views

  •  
    "Modern technology is growing by leaps and bounds. The corporate-controlled media extolls its virtues, but does not cover the known harm of its dark side. Most of this technology goes unchecked for human safety. The following is a short synopsis of the hazards of several invisible technologies that are already an unreported and grave danger to all of us." Article covers these emerging technology threats: ... Nano-Technology This technology is also in the highly toxic Chemtrails aerosols, as nano-coated fiber Aluminum, that, for the past 15 years, are poisoning us daily.  The coating includes nano particalized BARIUM and Fluoride.  The Air Force has admitted to using them. Documents have been published on the Internet, over many years, listing various patents for these covert and criminal programs. And most recently, a former Air Force Industrial Hygienist has confirmed this stealth geo-engineering program from first-hand knowledge. ... RFID Chips RFID [Radio Frequency Identification] chips. They are made of a two-way radio antenna, and some encasement or support, such as small glass vial implanted under the skin. The origins of this technology go back to 1948 when the idea was first conceived. They are now found in ATM and credit cards, and some "enhanced" driver's licenses, highway toll systems, and inventory tracking systems. The latest direction in chipping the human population comes from the hidden part of the Obama "health care" reform. Who reads more than 1,000 pages of mostly incomprehensible "doublethink" drivel? The Senate Healthcare bill HR3200 was passed in 2010, and requires the implant of an RFID chip in every American. This chip will be inserted into our skin and linked to all our banking, medical, and other personal documents. Here is a short quote: "The Secretary shall establish a national medical device registry (in this subsection referred to as the 'registry') to facilitate analysis of postmarket safety and outcomes d
1 - 20 of 53 Next › Last »
Showing 20 items per page