{"id":189032,"date":"2017-04-23T00:29:27","date_gmt":"2017-04-23T04:29:27","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/us-government-hacks-global-bank-system-neccesity-of-bitcoin-the-merkle\/"},"modified":"2017-04-23T00:29:27","modified_gmt":"2017-04-23T04:29:27","slug":"us-government-hacks-global-bank-system-neccesity-of-bitcoin-the-merkle","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/bitcoin-2\/us-government-hacks-global-bank-system-neccesity-of-bitcoin-the-merkle\/","title":{"rendered":"US Government Hacks Global Bank System, Neccesity of Bitcoin &#8211; The Merkle"},"content":{"rendered":"<p><p>    The US governments ongoing extensive surveillance on    the global banking system and payment transfers is    demonstrating an urgent necessity of a decentralized financial    network such as bitcoin.  <\/p>\n<p>    Over the past few months, various organizations including    Wikileaks and Shadow Brokers have exploited most of the    malpractices of the National Security Agency of the US. One of    the recent tools of the NSA that was leaked and exploited on    the dark web was the NSAs surveillance tool on the Swift    global banking system.  <\/p>\n<p>    Government agencies and law enforcement are required to    undergo a lengthy process of filing a complaint and request to    the Society for Worldwide Interbank Financial    Telecommunications (Swift) in order to gain necessary financial    information of certain bank accounts of businesses and    individuals.  <\/p>\n<p>    With a surveillance and hacking tool however, the NSA can    surpass the above mentioned process by simply gaining access to    the actual Swift network without alarming its system and    infrastructure. According to representatives of Shadow Brokers,    a hacking group that has leaked many pieces of malware in the    past, the hacking tool of the NSA allows the US government to    surveil financial transactions settled within the Swift network    with full transparency.  <\/p>\n<p>    Matt Suiche, founder of the United Arab Emirates-based    cybersecurity firm Comae Technologies, said in an interview    with Reuters:  <\/p>\n<p>      If you hack the service bureau, it means that you also      have access to all of their clients, all of the      banks.    <\/p>\n<p>    While some security analysts and firms including EastNets    denied the claims of Shadow Brokers, prominent whistleblowers    and security experts including Edward Snowden explained that if    the exploitation of the NSA hacking tool by the security firm    Shadow Brokers is in fact true, it could be described as the    Mother of All Exploits.  <\/p>\n<p>    In the meantime, Swift announced that its cyber security    and research team were not able to find any evidences to    conclusively determine the surveillance allegation against the    US government.  <\/p>\n<p>      We have no evidence to suggest that there has ever      been any unauthorized access to our network or messaging      services, said      the representatives of Swift.    <\/p>\n<p>    Whether the US government actually utilized the NSAs    hacking tool to surveil the Swift network without permission    from Swift and its clients is not the major issue. The main    problem is that such hacking tools exist and they are capable    of unraveling transactions settled across the world.  <\/p>\n<p>    Any centralized financial networks such as Swift impose    such vulnerability, as any network, server or database    connected to the Internet is vulnerable to hacking attacks,    surveillance and data breaches, if it is not designed to be    immutable or decentralized, unlike bitcoin and other    cryptocurrencies.  <\/p>\n<p>    Each transaction on the bitcoin blockchain is identified    with cryptographic proof and it can be accessed on the bitcoin    blockchain. Most importantly, because the bitcoin blockchain is    public, it cannot be manipulated by a government agency like    the NSA with sophisticated hacking tools.  <\/p>\n<p>    Although there exists strict Anti-Money Laundering (AML)    and Know Your Customer systems in place on the majority of the    worlds bitcoin and cryptocurrency exchanges, government    agencies and law enforcement agents must go through proper    channels to obtain the data.  <\/p>\n<p>    If you liked this article, follow us on Twitter    @themerklenews and make sure to subscribe to our newsletter to    receive the latest bitcoin, cryptocurrency, and technology    news.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/themerkle.com\/us-government-hacks-global-bank-system-neccesity-of-bitcoin\/\" title=\"US Government Hacks Global Bank System, Neccesity of Bitcoin - The Merkle\">US Government Hacks Global Bank System, Neccesity of Bitcoin - The Merkle<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The US governments ongoing extensive surveillance on the global banking system and payment transfers is demonstrating an urgent necessity of a decentralized financial network such as bitcoin. Over the past few months, various organizations including Wikileaks and Shadow Brokers have exploited most of the malpractices of the National Security Agency of the US. One of the recent tools of the NSA that was leaked and exploited on the dark web was the NSAs surveillance tool on the Swift global banking system <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/bitcoin-2\/us-government-hacks-global-bank-system-neccesity-of-bitcoin-the-merkle\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94873],"tags":[],"class_list":["post-189032","post","type-post","status-publish","format-standard","hentry","category-bitcoin-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/189032"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=189032"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/189032\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=189032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=189032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=189032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}