Over 2,000 US banks are insolvent – Telegraph. The US banking sector has recently been hit by a major crisis, you money may not be safe! 電訊報: 超過 2,000 家美國銀行資不抵債. 美國銀行業最近遭遇重大危機,你在美國銀行的錢可能不安全!
Almost half of the 4,800 banks in the US are nearly insolvent, as they have burned through their capital buffers, The Telegraph reported earlier this week, citing a group of banking experts.
According to Professor Amit Seru, a banking expert at Stanford University, around half of US lenders are underwater.
“Let’s not pretend that this is just about Silicon Valley Bank and First Republic,” he said. “A lot of the US banking system is potentially insolvent.”
Last week, First Republic was seized by US financial regulators and acquired by JPMorgan, the country’s biggest bank. The San Francisco-based lender had previously received a $30-billion rescue shot from a group of Wall Street banks in the form of deposits. The sale of First Republic Bank followed massive deposit runs in March, which caused two regional lenders, Silicon Valley Bank and Signature Bank, to fail within days.
On Thursday, shares of Los Angeles-based PacWest and Arizona’s Western Alliance were suspended after their prices fell dramatically. Earlier in the week, shares of several regional US lenders plunged by at least 15%, triggering investor concerns about the financial health of other mid-sized banks.
Around 2,315 banks across the US are currently sitting on assets worth less than their liabilities, according to a Hoover Institution report by Professor Seru and a group of banking experts, as cited by the media.
The market value of the loan portfolios of these lenders is reportedly $2 trillion lower than the stated book value.
Professor Seru raised questions over the steps taken by US financial watchdogs to tackle the problems faced by crisis-hit mid-sized lenders. The regulators can contain the immediate liquidity crisis by guaranteeing all deposits temporarily, according to Seru, who said, however, that this would not address the greater solvency crisis.
If you want your children to become drug addicts send them to or raised them in America when 60% of the world’s produced illegal drugs are sold to US consumers 如果你想讓你的孩子成為吸毒者,請將他們送到美國或在美國撫養他們,因為全球60% 的非法毒品都賣給美國消費者
In life there are things we can control, there are things we cannot control. 生活中有我們可以控制的事情,也有我們無法控制的事情. 5-5-23
For things we cannot control, if we talk or write about it and get pay, that will be great.
But things like US war on China is beyond anyone of us’s control, not even the anti-war groups and 100s of talk shows or protests! People in power honest don’t pay a damn!
There are things we could control. It could be painful that could do good to yourself and family that everyone is avoiding with excuses like leaving USA. Especially for those has an estate of 3-10 millions (if you own a home in SF, couple of rental real estates and 401K) still talking, complaining but did absolutely nothing to save yourselves is just beyond me.
Don’t fall into the trap of some of my estate planning attorney friends who died without a will or living trust!
Or some of my doctor clients who are so good curing others but failed to monitor own health, including my cousin, a prominent doctor in HK, dead at age 46!
Stop, seat back and do something for yourself and family.
If you don’t, I do! I am taking steps. I hate to see any of you spending the rest of your life in concentration camps, US Gov’t confiscated everything you worked so hard for, while I am enjoying my retirement in HK or China.
Sure… you going to give me more excuses like your friends in SF, you are well known in SF etc etc…who pay a damn when you are in the concentration camp! Sure! Never going to happen! Are you dead sure?
The US Military Industrial Complex has won the defense commitments of Japan, South Korea and the Philippines to increase tensions in the Taiwan Strait and the South China Seas 美國軍工聯合體獲得日本、韓國和菲律賓的防禦承諾,加劇台海和南海緊張局勢
NYT: Four Proud Boys Convicted of Sedition in Key Jan. 6 Case. Same situation in Hong Kong by US foreign agents in 2019, US said it was for freedom democracy & human rights 紐約時報:四名驕傲的男孩在 1 月 6 日的關鍵案件中被判犯有煽動罪。 2019年美國駐港特工在香港遭遇同樣情況,美方稱是為了自由民主人權
Enrique Tarrio, the former Proud Boys leader, was among those convicted. The verdict was another milestone in the Justice Department’s prosecution of the pro-Trump rioters who stormed the Capitol in 2021.
Exclusive: New report unveils how CIA scheme color revolutions around the world 獨家:新報告揭示中央情報局如何策劃全球顏色革命 by Yuan Hong May 03 2023
For a long time, the US Central Intelligence Agency (CIA) has plotted “peaceful evolution” and “color revolutions” as well as spying activities around the world and a report released by China’s National Computer Virus Emergency Response Center and Chinese internet security company 360 on Thursday unveiled the main technical means that CIA has used to scheme and promote unrest around the world .
In its first part, the report provides background information and outlines that since the beginning of the 21st century, the rapid development of the internet has offered “new opportunity” for CIA’ infiltration activities and overturning in other countries and any institutions or individuals around the world that use US digital equipment or software could be turned into the CIA’s “puppet agent.”
For decades, the CIA has overthrown or attempted to overthrow at least 50 legitimate governments abroad, while the CIA has only recognized seven of these instances, causing turmoil in related countries. Whether it is the “color revolution” in Ukraine in 2014, the “sunflower revolution” in Taiwan, China, or the “saffron revolution” in Myanmar in 2007, the “green revolution” in Iran in 2009, and other attempted “color revolutions” – all have the US intelligence agencies behind, according to the report.
The US’ leading position in technologies of telecommunication and on-site command in the world has provided unprecedented possibilities for the US intelligence departments to launch “color revolutions” abroad. The report released by the National Virus Emergency Response Center and 360 disclosed five methods commonly used by the CIA.
The first is to provide encrypted network communication services. In order to help protesters in some countries in the Middle-East keep in touch and avoid being tracked and arrested, an American company, which is reportedly with a US military background, has developed TOR technology that can access the internet and is untraceable – the Onion Router technology.
The servers encrypt all information that flows through them to help certain users to surf the web anonymously. After the project was launched by American companies, it was immediately provided free of charge to anti-government elements in Iran, Tunisia, Egypt and other countries and regions to ensure that those “dissident youth who want to shake their own government’s rule” can avoid the scrutiny and monitor of the government, according to the report.
The second method of the CIA is to provide offline communication services. For example, in order to ensure that anti-government personnel in Tunisia, Egypt and other countries can still keep in touch with the outside world, Google and Twitter quickly launched a special service called “Speak2Tweet,” which allows users to dial and upload voice for free to leave a message.
These messages are automatically converted into tweets and then uploaded to the internet, and publicly released through Twitter and other platforms to complete the “real-time report” of the incident scene, said the report.
The third method is to provide on-site command tools for rallies and parades based on the internet and wireless communications. The report released on Thursday noted that the US RAND Corporation has spent several years developing a non-traditional regime change technology called “swarming,” which is used to help a large number of young people connected through the internet join the “one shot for another place” mobile protest movement, greatly Improve the efficiency of on-site command of the event.
The fourth is an American developed software, called “Riot.” The software supports 100 percent independent broadband network, provides variable WiFi network, does not rely on any traditional physical access method, does not need telephone, cable or satellite connection, and can easily escape any form of government monitoring.
With the help of the above-mentioned powerful network technology and communication technology, the CIA planned, organized and implemented a large number of “color revolution” events around the world.
The last one is the “anti-censorship” information system. The US State Department developed it and regards the research and development of the system as an important task and has injected more than $30 million into the project.
Moreover, the National Virus Emergency Response Center and 360 company have spotted Trojan horse programs or plug-ins that related to the CIA in recent cyberattacks targeting China. The public security authorities have investigated these cases, the Global Times has learned.
Aside from the five methods CIA has used to incite unrest globally, through further technical analysis, the National Virus Emergency Response Center and 360 company also identified another nine methods used by the CIA as “weapons” for cyberattacks, including attack module delivery, remote control, information collection and stealing, and third-party open- source tools.
The response center and the 360 company also spotted an information-stealing tool used by the CIA, which is also one of the 48 advanced cyber weapons exposed in the confidential document of the US National Security Agency.
The discovery of these information-stealing tools shows that the CIA and the US National Security Agency will jointly attack the same victim, or share cyberattack weapons with each other, or provide relevant technical or human support, according to the report.
These new findings also offer important new evidence in tracing the identity of the APT-C-39 attackers. In 2020, the 360 company independently discovered an APT organization that had never been exposed to the outside world, and named it APT-C-39. The organization specifically targets China and its friendly countries to carry out cyberattack and stealing activities, and its victims are spread all over the world.
The Thursday report also noted that the danger of CIA attack weapons can be glimpsed from third-party open-source tools as it often uses these tools to carry out cyberattacks.
The initial attack of the CIA cyberattack operation will generally be carried out against the victim’s network equipment or server. After obtaining the target authority, it will further explore the network topology of the target organization and move to other networked devices in the internal network to steal more sensitive information and data.
The controlled target computer is monitored in real time for 24 hours, all information will be recorded. Once a USB device is connected, the private files in the victim’s USB device will be monitored and automatically stolen. When conditions permit, the camera, microphone and GPS positioning device on the user terminal will be remotely controlled and accessed, according to the report.
The report noted that these CIA cyber weapons use standardized espionage technical specifications and various attack methods echo and interlock and have now covered almost all internet and IoT assets in the world, and can control other countries’ networks anytime, anywhere to steal important and sensitive data from other countries.
The American-style cyber hegemony is evident, the report notes.
In response to the highly systematic, intelligent, and concealed cyberattacks launched by the CIA against China, it is important for domestic government agencies, scientific research institutions, industrial enterprises, and commercial organizations to quickly find out and deal with them in the first place, the report claims.
The report suggests that in order to effectively deal with imminent network and real-world threats, while adopting self-controllable localized equipment, China should organize self-inspection and self-inspection APT attacks as soon as possible, and gradually establish a long-term defense system to achieve comprehensive Systematic prevention and control against advanced threat attacks.