Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

Surveillance

ICE Wants to Build Out a 24/7 Social Media Surveillance Team
Product Reviews

ICE Wants to Build Out a 24/7 Social Media Surveillance Team

by admin October 3, 2025


United States immigration authorities are moving to dramatically expand their social media surveillance, with plans to hire nearly 30 contractors to sift through posts, photos, and messages—raw material to be transformed into intelligence for deportation arrests and raids.

Federal contracting records reviewed by WIRED show the agency is seeking private vendors to run a multi-year surveillance program out of two of its little-known targeting centers. The program envisions stationing nearly 30 private analysts at Immigration and Customs Enforcement facilities in Vermont and Southern California. Their job: Scour Facebook, TikTok, Instagram, YouTube, and other platforms, converting posts and profiles into fresh leads for enforcement raids.

The initiative is still at the request-for-information stage, a step agencies use to gauge interest from contractors before an official bidding process. But draft planning documents show the scheme is ambitious: ICE wants a contractor capable of staffing the centers around the clock, constantly processing cases on tight deadlines, and supplying the agency with the latest and greatest subscription-based surveillance software.

The facilities at the heart of this plan are two of ICE’s three targeting centers, responsible for producing leads that feed directly into the agency’s enforcement operations.The National Criminal Analysis and Targeting Center sits in Williston, Vermont. It handles cases across much of the eastern US. The Pacific Enforcement Response Center, based in Santa Ana, California, oversees the western region and is designed to run 24 hours a day, seven days a week.

Internal planning documents show each site would be staffed with a mix of senior analysts, shift leads, and rank-and-file researchers. Vermont would see a team of a dozen contractors, including a program manager and 10 analysts. California would host a larger, nonstop watch floor with 16 staff. At all times, at least one senior analyst and three researchers would be on duty at the Santa Ana site.

Together, these teams would operate as intelligence arms of ICE’s Enforcement and Removal Operations division. They will receive tips and incoming cases, research individuals online, and package the results into dossiers that could be used by field offices to plan arrests.



Source link

October 3, 2025 0 comments
0 FacebookTwitterPinterestEmail
Decrypt logo
GameFi Guides

Inside the IRS’s Expanding Surveillance of Crypto Investors

by admin September 14, 2025



In brief

  • David Klasing, dual-certified tax attorney and CPA, says the IRS has moved from targeting “narrower groups” to broader crypto compliance investigations across multiple exchanges.
  • The Treasury Inspector General reports a 75% potential non-compliance rate among crypto users identified through exchange data, feeding the audit pipeline.
  • Nick Waytula, attorney and head of tax at Crypto Tax Calculator, warns the enforcement shift creates a “turning point,” moving crypto taxation from “opt-in” to “opt-out” model for millions of users.

The Internal Revenue Service has steadily widened its crypto surveillance capabilities since 2017, moving from narrow probes of individual traders to sweeping requests for user records at major exchanges and crypto companies.

Armed with “John Doe summonses” and increasingly sophisticated blockchain analytics, the agency is now able to trace crypto transactions in real-time, according to legal experts and government filings.

“Initially, the IRS targeted a narrower group of individuals based on specific transaction thresholds,” David Klasing, a dual-certified tax attorney, and CPA specializing in crypto taxation, told Decrypt. “However, recent cases indicate a broader approach aimed at identifying tax non-compliance across multiple crypto exchanges.”

Major exchanges and platforms, including Coinbase, Kraken, Poloniex, and Circle, were among those targeted initially, before the enforcement spread across the sector.



Coinbase faced its first test when the IRS issued a summons in 2016 for 14,000 accounts, which was later pared back in court.

The enforcement push has generated $3.5 billion in crypto seizures during fiscal year 2021, constituting 93% of the IRS’s total asset seizures that year, according to the agency’s Criminal Investigation Division. 

In 2021, the agency secured court approval for similar John Doe summonses targeting Kraken users who transacted $20,000 or more between 2017 and 2020, Circle customers who traded similar amounts from 2016 to 2020,  and users of Poloniex, the exchange previously owned by Circle.

By June 2023, the IRS had opened 216 examinations and sent nearly 15,000 “soft letters” to crypto users identified through exchange data, Treasury Inspector General for Tax Administration (TIGTA) reported in July 2024, according to Klasing.

The attorney explained that the IRS must meet three specific legal thresholds before courts approve John Doe summonses, which demonstrates investigation of “an ascertainable group or class of persons,” establishing “reasonable basis for believing noncompliance with tax laws,” and proving that “information is not readily available from other sources.”

However, these requirements provide limited protection for crypto users, as courts require only “minimal” justification and “the statute does not require the IRS to show that each person in the ascertainable group violated the law,” Klasing added.

Widening the net

Since the Coinbase summons, Klasing said the IRS has “expanded” the Electronic Payment Systems Initiative, originally built for electronic transfers, to now target “virtual currencies.”

The agency now combines exchange data with blockchain analytics to create comprehensive financial profiles, using “digital currency exchange data in conjunction with other publicly available blockchain information” to examine tax compliance, according to IRS Agent Karen Cincotta’s findings in the Kraken investigation, Klasing said.

In 2024, the TIGTA reported that the IRS had achieved a 75% potential non-compliance rate among taxpayers identified through digital-asset exchanges, directly feeding cases into the audit pipeline through the early fiscal year 2024.

The Large Business and International Division has used John Doe summons information in its digital-asset compliance campaign to conduct outreach and open examinations, Klasing said.

Nick Waytula, attorney and head of tax at Crypto Tax Calculator, told Decrypt that “the broadened use of John Doe summonses “significantly raises the compliance bar for crypto firms,” while creating risks that “prior non-compliance, even if inadvertent, is more likely to surface, leading to penalties or, in extreme cases, criminal referrals.”

Waytula described the shift as “a turning point in crypto tax enforcement” where “crypto taxes will turn into an ‘opt-out’ model, increasing compliance across the board,” moving away from the previous “opt-in model, where taxpayers had to voluntarily report their data to the IRS.”

The upcoming 1099-DA reporting regime, requiring gross proceeds reporting for 2025 dispositions and basis reporting for covered securities beginning in 2026, seeks to reduce historical reporting mismatches that have triggered erroneous IRS notices, according to Klasing. 

However, Waytula said that “each exchange’s 1099-DA will not include information from other exchanges, wallets, or onchain protocols” and warned that if forms “oversimplify or fail to capture cost-basis properly, mismatches and confusion could actually increase.”

On notice

Klasing told Decrypt that his firm has handled multiple clients who received notices and “90-day letters” from the IRS regarding “massive misreporting by prominent crypto exchanges,” particularly during 2017-2019 when “several exchanges issued 1099-K with aggregates that neither our office nor the IRS could reconcile.”

The Government Accountability Office (GAO) found that 1099-K forms provided only aggregates with no basis, calling it “unhelpful or confusing.” The 1099-DA should address these flaws, Klasing said.

“In practice, errors can still occur,” Klasing added, noting IRS AI models for case selection were “trained on current return data” rather than John Doe summons datasets, according to TIGTA’s audit.

Dmitri Alexeev, CPA and Tax Partner at Aprio, told Decrypt that the developments “appear consistent with the trajectory of post-Coinbase enforcement, signaling heightened regulatory attention rather than a sudden policy shift,” while stressing that platforms must improve “AML/KYC processes and data collection, analytics and reporting.”

Alexeev explained that the IRS’s approach “reflects an increased focus on oversight of crypto platforms” and “highlights the importance for firms to maintain robust reporting, recordkeeping, and internal controls.”

Privacy advocates lost ground in July when the Supreme Court declined to hear James Harper’s claim that the IRS breached his Fourth Amendment rights by obtaining Coinbase trading data through a John Doe summons.

In April, Coinbase backed him with an amicus brief, joined by several states, privacy groups, and Elon Musk’s X. 

The filings asked the Court to reconsider the “third-party doctrine,” a 1970s-era rule that gives government access to data held by banks or service providers, and said the doctrine should not extend to crypto exchanges.

In its brief, Coinbase warned the IRS access amounts to “a real-time monitor” of blockchain activity, likening it to a “financial ankle monitor” that enables “near perfect surveillance” of users’ transactions. 

While the Trump administration removed the controversial Biden-era DeFi broker rule from the tax code in July, eliminating reporting requirements that would have forced decentralized platforms to collect user data like traditional brokerages, centralized exchanges remain subject to comprehensive reporting obligations.

“Enforcement-heavy approaches” risk alienating compliant users “overwhelmed by complexity,” Waytula said, while noting many crypto traders are “anti-government” and “pro-decentralization,” making overregulation likely to create “significant friction” with high-value taxpayers.

While no official reports show “systemically mistaken” targeting of crypto users due to inaccurate exchange records, Klasing noted that matching programs can generate notices “whenever third-party information returns don’t align with a return” even when tax amounts are correct.

The IRS did not immediately respond to Decrypt’s request for comment on this story.

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.



Source link

September 14, 2025 0 comments
0 FacebookTwitterPinterestEmail
How China’s Propaganda and Surveillance Systems Really Operate
Gaming Gear

How China’s Propaganda and Surveillance Systems Really Operate

by admin September 11, 2025


A trove of internal documents leaked from a little-known Chinese company has pulled back the curtain on how digital censorship tools are being marketed and exported globally. Geedge Networks sells what amounts to a commercialized “Great Firewall” to at least four countries, including Kazakhstan, Pakistan, Ethiopia, and Myanmar. The groundbreaking leak shows in granular detail the capabilities this company has to monitor, intercept, and hack internet traffic. Researchers who examined the files described it as “digital authoritarianism as a service.”

But I want to focus on another thing the documents demonstrate: While people often look at China’s Great Firewall as a single, all-powerful government system unique to China, the actual process of developing and maintaining it works the same way as surveillance technology in the West. Geedge collaborates with academic institutions on research and development, adapts its business strategy to fit different clients’ needs, and even repurposes leftover infrastructure from its competitors. In Pakistan, for example, Geedge landed a contract to work with and later replace gear made by the Canadian company Sandvine, the leaked files show.

Coincidentally, another leak from a different Chinese company published this week reinforces the same point. On Monday, researchers at Vanderbilt University made public a 399-page document from GoLaxy, a Chinese company that uses AI to analyze social media and generate propaganda materials. The leaked documents, which include internal pitch decks, business goals, and meeting notes, may have come from a disgruntled former employee—the last two pages accuse GoLaxy of mistreating workers by underpaying them and mandating long hours. The document had been sitting on the open internet for months before another researcher flagged it to Brett Goldstein, a research professor in the School of Engineering at Vanderbilt.

GoLaxy’s main business is different from Geedge’s: It collects open source information from social media, maps relationships among political figures and news organizations, and pushes targeted narratives online through synthetic social media profiles. In the leaked document, GoLaxy claims to be the “number one brand in intelligence big data analysis” in China, servicing three main customers: the Chinese Communist Party, the Chinese government, and the Chinese military. The included technology demos focus heavily on geopolitical issues like Taiwan, Hong Kong, and US elections. And unlike Geedge, GoLaxy seems to be targeting only domestic government entities as clients.

But there are also quite a few things that make the two companies comparable, particularly in terms of how their businesses function. Both Geedge and GoLaxy maintain close relationships with the Chinese Academy of Sciences (CAS), the top government-affiliated research institution in the world, according to the Nature Index. And they both market their services to Chinese provincial-level government agencies, who have localized issues they want to monitor and budgets to spend on surveillance and propaganda tools.

GoLaxy didn’t immediately respond to a request for comment from WIRED. In a previous response to The New York Times, the company denied collecting data targeting US officials and called the outlet’s reporting misinformation. Vanderbilt researchers say they witnessed the company remove pages from its website after the initial reporting.

Closer Than They Seem

In the West, when academic scholars see opportunities to commercialize their cutting-edge research, they often become startup founders or start side businesses. GoLaxy seems to be no exception. Many key researchers at the company, according to the leaked document, still occupy spots at CAS.

But there’s no guarantee that CAS researchers will get government grants—just like a public university professor in the US can’t bet on their startup winning federal contracts. Instead, they need to go after government agencies like any private company would go after clients. One document in the leak shows that GoLaxy assigned sales targets to five employees and was aiming to secure 42 million RMB (about $5.9 million) in contracts with Chinese government agencies in 2020. Another spreadsheet from around 2021 lists the company’s current clients, which include branches of the Chinese military, state security, and provincial police departments, as well as other potential customers it was targeting.



Source link

September 11, 2025 0 comments
0 FacebookTwitterPinterestEmail
Put your neighbours under surveillance in automation horror game Beyond The Doors
Game Updates

Put your neighbours under surveillance in automation horror game Beyond The Doors

by admin September 4, 2025


“Horror” and “automation” are concepts I’m used to seeing together in fiery/weepy essays about late capitalism. I’m less used to seeing them together in videogame marketing blurbs. Horror, in an automation-based game? Why, games with automation are supposed to deliver the finest and most methodical of chemical highs. They are supposed to feel like building yourself a better brain out of candy-coloured conveyor belts and smelters. They are not supposed to make you afraid.

The game that inspires these ruminations is Beyond the Doors, out this year, which has an alpha demo on Steam. It casts you as a lonely greasemonkey working in the basement of a dour, weed-hung apartment building. Your job is to bug your neighbours, in the sense of placing them under surveillance. Every night, somebody emails you to request that you set up a listening device near somebody else’s door, then send them a recording of any activity within.

Watch on YouTube

Gathering these recordings is a ponderous challenge, partly thanks to cumbersome, MicroProsaic interface design, but also because Beyond The Doors wants to be ponderous. You have to daisy-chain devices, copying and pasting codes to synch them together. Then you have to select and save the file using DOS commands on your server computer, before wiring it to your desktop for analysis.

The fiddliness of all this is intensified, of course, by the nape-tickling awareness that Something Is Wrong. The apartment block is all greyspace and neglect, built around a central chasm with a webbed glass ceiling. You fear to turn your back on any particular door, any particular corner.

There are boulders of trash that sort of multiply like amoeba when you pick them up, but may have useful objects beneath them. The worst part, possibly, is that I can’t find a way to listen to the files I’m recording. I have no idea whether this is deliberate, or a limitation of the demo, but I think Beyond The Doors is more powerful for refusing to satisfy the very voyeurism it kindles.

I didn’t get far enough to experience this in the demo, but going by the above header image and the trailer, it all gets a bit freaky later on. I’m intrigued to see how that freakiness gels with the absorbed tinkering that defines most automation-based games. In this case, you’ll be overhauling your surveillance network with cash from each job – merging chains and installing upgrades.

“This alpha version includes the core gameplay loop: placing recorders, building receiver networks, collecting sounds, and sending reports,” write developers Dream Error on Steam. “There’s much more to come, this is just the beginning.” There’s a development roadmap, if you’re into that kind of thing, but Beyond The Doors is probably more fun if you preserve your ignorance before taking the plunge.



Source link

September 4, 2025 0 comments
0 FacebookTwitterPinterestEmail
Supreme Court Opened Crypto Wallets To Surveillance
Crypto Trends

Supreme Court Opened Crypto Wallets To Surveillance

by admin August 30, 2025



Opinion by: Vikrant Sharma, CEO of Cake Labs

When the United States Supreme Court refused to hear Harper v. Faulkender on June 30, 2025, the court essentially endorsed the Internal Revenue Service’s sweeping “John Doe” summonses for cryptocurrency records.

By letting a lower court ruling stand, the court confirmed that the century-old third-party doctrine stands for public ledgers just as it does for bank statements. Under the third-party doctrine, information voluntarily shared with another party, like a bank or blockchain, is no longer protected by the Fourth Amendment. When data leaves a person’s direct control, constitutional privacy protections vanish.

For onchain transactions, whether permanently etched into any blockchain network, virtually every payment is now fair game for warrant-free scrutiny. Prosecutors, tax agents and, by extension, any adversary with the time to sift through open data can now peruse at their leisure anyone’s financial information.

Analytics profiteers weaponize “radical transparency”

No entity has cashed in faster than blockchain forensics vendors. The global analytics market is projected to hit $41 billion this year, nearly double 2024’s total. Their clustering heuristics already flag over 60% of illicit stablecoin transfers, which — on the surface — is a remarkable statistic, but it also demonstrates how little pseudonymity remains.

The pitch to regulators becomes irresistible: “Pay us, and every wallet becomes a glass bank.” 

Yet the same dragnet slurps up innocent data into eternal spreadsheets bursting at the seams with payroll, medical care and political tithe data. 

That data becomes constantly ripe for leaks or subpoenas. Congress will not ride to the rescue. Only cryptographic engineering can close the breach until lawmakers reinvent privacy for the digital century. 

Some Bitcoin privacy methods let you publish a static receiving identifier while generating distinct, unlinkable onchain outputs that frustrate common analytical heuristics.

Related: US Supreme Court will not review IRS case involving Coinbase user data

Other approaches coordinate inputs from multiple parties in a way that blurs the usual “sender vs. change” patterns analysts look for.

Because these methods avoid custodial mixing pools, applying sanctions levied against Tornado Cash in 2022 is less straightforward.

If wallets and payment services enabled such protections by default, rather than burying them as opt-ins, baseline privacy could become more widely available as encrypted web connections gradually became standard.

Ignore privacy, suffer market fallout

Investors tend to ignore the warning signs until it’s too late, and dismissing protocol-level privacy will have harsh consequences. Emarketer projects consumer payment adoption to surge 82% from 2024 to 2026, but the overlooked fact in that report is that only 2.6% of Americans are expected to pay with crypto by 2026.

Mass uptake remains hostage to perceptions of security and confidentiality, and if coffee shop clerks can link tips to home addresses, mainstream wallets will stall. While that reality sends morality chills down the spines of consumers, institutional allocators look down at the compliance minefields they face.

Under the court’s reading, portfolio managers who custody onchain must assume continuous regulator visibility into strategies and counterparties. Funds transacting via privacy-enhanced rails will enjoy a cloak of trade secrecy unavailable to rivals who ignore the already available toolings.

Silence is complicity

History suggests that markets reward early movers who cement civil liberty safeguards into the infrastructure that holds them up. For example, email encryption was once a niche, but now it is the standard for enterprise software-as-a-service. 

The same arc can unfold for blockchain if developers, custodians and layer-2 networks elevate privacy from just a feature to table stakes. Failure to act now will leave the ecosystem dependent on fickle judicial moods and ever-shifting stability. 

The Supreme Court has shown the world where it stands; the burden now shifts to engineers building meaningful and purpose-driven privacy tools. 

Either blockchains evolve to protect users by default, or the dream of decentralized finance becomes a fantasy that ossifies into the most transparent and surveilled payment system ever created.

Opinion by: Vikrant Sharma, CEO of Cake Labs.

This article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.



Source link

August 30, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (1,098)
  • Esports (800)
  • Game Reviews (772)
  • Game Updates (906)
  • GameFi Guides (1,058)
  • Gaming Gear (960)
  • NFT Gaming (1,079)
  • Product Reviews (960)

Recent Posts

  • This 5-Star Dell Laptop Bundle (64GB RAM, 2TB SSD) Sees 72% Cut, From Above MacBook Pricing to Practically a Steal
  • Blue Protocol: Star Resonance is finally out in the west and off to a strong start on Steam, but was the MMORPG worth the wait?
  • How to Unblock OpenAI’s Sora 2 If You’re Outside the US and Canada
  • Final Fantasy 7 Remake and Rebirth finally available as physical double pack on PS5
  • The 10 Most Valuable Cards

Recent Posts

  • This 5-Star Dell Laptop Bundle (64GB RAM, 2TB SSD) Sees 72% Cut, From Above MacBook Pricing to Practically a Steal

    October 10, 2025
  • Blue Protocol: Star Resonance is finally out in the west and off to a strong start on Steam, but was the MMORPG worth the wait?

    October 10, 2025
  • How to Unblock OpenAI’s Sora 2 If You’re Outside the US and Canada

    October 10, 2025
  • Final Fantasy 7 Remake and Rebirth finally available as physical double pack on PS5

    October 10, 2025
  • The 10 Most Valuable Cards

    October 10, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • This 5-Star Dell Laptop Bundle (64GB RAM, 2TB SSD) Sees 72% Cut, From Above MacBook Pricing to Practically a Steal

    October 10, 2025
  • Blue Protocol: Star Resonance is finally out in the west and off to a strong start on Steam, but was the MMORPG worth the wait?

    October 10, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close