Posted on 03/15/2016 10:19:32 AM PDT by SeekAndFind
It's just being held in escrow to help a Nigerian prince-in-exile reclaim his family wealth from their government.
We'll get it all back, plus a small helpers fee, any day now.
Promise...
-PJ
RE: You can pretty much guess who is doing the stealing.
According tot he article:
“Chinese hackers stole money from the Bangladesh Bank account with the Federal Reserve in New York.”
The Federal Reserve Bank was NOT hacked; Bangladesh’s ACCOUNT was hacked:
http://www.aljazeera.com/news/2016/03/bangladesh-bank-governor-resigns-81m-hack-160315084217775.html
And many more:
https://www.google.com/search?q=Bangladesh+federal+reserve+bank&ie=utf-8&oe=utf-8
If you got your bank account hacked because someone stole your password and then stole your money, one would not say the BANK got hacked but that YOU got hacked.
There is far more truth than poetry in your post.
Few people truly understand the inherent realities of cyberspace.
Unlike the physical domain:
Cyberspace allows for polyinstantiation: Anyone can be instantiated on multiple nodes in cyberspace, simultaneously. Think about being logged in to your computer, tablet, and smartphone at the same time. Then realize that there is no practical limit to the number of devices on which you can instantiate your presence, and that the devices do not need to be physically co-locatted or share the same domains and IP addresses. Note that the Advanced Persistent Threat (APT) discussed in the Mandiant report operated a “poisoned Domain Name Service (DNS) Command and Control (C&C) Network” that consisted of over 70,000 devices and IP addresses. More than a few harmless grandmothers had no clue that their Yahoo or Google account was an integral part of an international cyber espionage operation.
Cyberspace allows for polyvalence: Unlike a physical document, cyberspace allows for multiple “correct” values for a given datum.
Cyberspace allows for polysemes: A given “correct” data value can have multiple “valid” meanings.
Cyberspace is inherently flat: The threat is always at zero range with a direct fire weapon.
The net result is that the discipline and rules for double-entry book keeping in the physical world are meaningless and ineffective in cyberspace. In a very real sense, electronic voting is nothing more than electronic book keeping in cyberspace.
“Virtual goods” in cyberspace = fake = 100% gross margins.
The cost to accurately and completely replicate anything digital in cyberspace is decimal dust, approaching a mathematical limit of zero.
It is why intellectual property protection for electronic documents, videos, images, music, etc. in cyberspace is beyond difficult to the point of impossible.
When a stream of 1s and 0s representing a sum of fiat currency is transferred from one node to another in cyberspace, there is nothing that effectively prevents multiple copies of that stream of 1s and 0s being instantiated elsewhere as “valid” fiat currency. And because of polyinstantiation, polyvalence, and polysemes, you can “make the pot right” wherever, whenever, however, and as often as you need to satisfy the requirements of “double-entry book keeping.”
I am not aware of a single “hard” (physical) or “soft” (digital) “certificate” that has not already been repeatedly and remotely hacked.
Even “biometrics” must be turned into a digital file in order to be used for cybersecurity. Once it is digital, it can be compromised, replicated, and instantiated, as often as necessary.
If you place your faith in encrypting data in transit, recognize that the encrypted and unencrypted data must coexist simultaneously on a device for some finite period of time in order to send or receive the data. Think “scrape the hash” attacks against Active Directory.
The only reason that the Internet is functional, is that a combination of the economic benefits and efficiencies readily available to the vast majority of users coupled with the significant technical skills required to productively engage in criminal activity has kept the percentage of “bad actors” in the range of 0.06%, or perhaps 2M individuals, of whom “only” several hundred thousand have the sophistication to create the worst of the asymmetric effects.
For the most capable of these; compromise is truly failure: They don’t want anyone to know who they are, what they have done, who they work for, and what they are capable of. It would be bad for business if the 3.4 billion people with Internet access out of a world population of 7.3 billion (2015 data) were frightened away from using this wonderful thing known as the Internet.
U.S. Federal Reserve Bank Hacked
That’s contrary to the original story, and there isn’t anything in the excerpt that would support that conclusion (and no, I’m not going to give them a click).
Other reports have indicated that falsified wire instructions were sent to the Fed.
Has anyone checked inside the Clinton Foundation Account?
Hillary is accumulating funds for her POTUS pardon (if needed) in Jan 2017.
I’m not saying that the New York Fed couldn’t be hacked but if you’re after money then who do you think would be the easier target to break into? The New York Federal Reserve Bank or the Bank of Bangladesh?
It wasn't in gold. The New York Fed will maintain deposit accounts for foreign central banks. It isn't as well known as the gold vault but it's a service they do provide.
I was making a real money joke.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.