This Forum is Closed
June 06, 2023, 03:12:24 pm
Welcome, Guest. Please login or register.

Login with username, password and session length
News: GGF now has a permanent home:
  Home Help Search Links Staff List Login Register  

False Flag Cyber Attack Could Takedown The Internet

Pages: [1]   Go Down
Author Topic: False Flag Cyber Attack Could Takedown The Internet  (Read 3080 times)
Hero Member
Offline Offline

Posts: 1242

Routing out & defeating the globalist pigs

View Profile
« on: July 21, 2010, 12:18:46 pm »

False Flag Cyber Attack Could Takedown The Internet

Billion dollar cybersecurity industry at the forefront of ‘Top Secret America’ complex

Steve Watson
Wednesday, Jul 21st, 2010

An increasing clamour to restrict and control the internet on behalf of the government, the Pentagon, the intelligence community and their private corporate arms, could result in a staged cyber attack being used as justification.

Over recent months we have seen a great increase in media coverage of inflated fears over a possible “electronic Pearl Harbor” event, with reports claiming that the U.S. could be “felled within 15 minutes”.

Vastly over-hyped (and in some cases completely asinine) claims that the power grids and other key infrastructure such as rail networks and water sources are wired up to the public internet have permeated such coverage.

Threats against computer networks in the United States are grossly exaggerated. Dire reports issued by the Defense Science Board and the Center for Strategic and International Studies “are usually richer in vivid metaphor — with fears of ‘digital Pearl Harbors’ and ‘cyber-Katrinas’ — than in factual foundation,” writes Evgeny Morozov, a respected researcher and blogger who writes on the political effects of the internet.

Morozov notes that much of the data on the supposed cyber threat “are gathered by ultra-secretive government agencies — which need to justify their own existence — and cyber-security companies — which derive commercial benefits from popular anxiety.”

When the Cybersecurity Act was introduced by Senator John Rockefeller last year, he made similar claims about the threat of cyber attacks, adding “Would it have been better if we’d have never invented the Internet?”.

Rockefeller’s legislation gives the president the ability to “declare a cybersecurity emergency” and shut down or limit Internet traffic in any “critical” information network “in the interest of national security.” The bill does not define a critical information network or a cybersecurity emergency. That definition would be left to the president, according to a Mother Jones report.

Provisions in the bill would allow the federal government, via the DHS and the NSA, to tap into any digital aspect of every citizen’s information without a warrant. Banking, business and medical records would be wide open to inspection, as well as personal instant message and e mail communications – all in the name of heading off cyber attacks on the nation.

Enhancements of such provisions are contained in the more recent “Protecting Cyberspace as a National Asset Act”, which is being pushed hard by Senator Joe Lieberman. The bill would hand absolute power to the federal government to close down networks, and block incoming Internet traffic from certain countries under a declared national emergency.

An accompanying cybersecurity control grid would only create greater risk according to experts who note that it would essentially “establish a path for the bad guys to skip down.” Other countries, such as Australia and the UK are following suit.

The program dovetails with the Pentagon’s newly created Cyber Command, headed by Keith B Alexander, the acting head of the NSA and the man behind the massive program of illegal dragnet surveillance of domestic communications since at least 2001.

During the Senate Armed Services Committee confirmation hearing, Alexander said the Pentagon’s Cyber Command would enjoy “significant synergy” with the NSA. “We have to show what we’re doing to ensure that we comport, comply with the laws,” said Alexander, perversely claiming the agency is respecting and protecting the privacy of the American people.

The Pentagon considers cyberspace a warfighting domain equal to land, sea, air and space. In 2003, the Pentagon classified the internet as an enemy “weapons system” requiring a “robust offensive suite of capabilities to include full-range electronic and computer network attack.” It has spent Billions of dollars building a super secret “National Cyber Range” in order to prepare for “Dominant Cyber Offensive Engagement”, which translates as control over “any and all” computers. The program has been dubbed “The Electronic Manhattan Project”.

The enemy is never specifically named, it is merely whoever uses the net, because the enemy IS the net. The enemy is the freedom the net provides to billions around the globe and the threat to militaristic dominance of information and the ultimate power that affords.

These initiatives represent a continuation of the so called “Comprehensive National Cybersecurity Initiative”, created via a secret presidential order in 2008 under the Bush administration. former National Intelligence Director Mike McConnell announced that the NSA’s warrantless wiretaps would “be a walk in the park compared to this,”.

“This is going to be a goat rope on the Hill” McConnell said. My prediction is that we’re going to screw around with this until something horrendous happens.”

As we have previously reported, large corporations such as Google, AT&T, Facebook and Yahoo to name but a few are intimately involved in the overarching program. Those corporations have specific government arms that are supplying the software, hardware and tech support to US intelligence agencies in the process of creating a vast closed source database for global spy networks to share information.

Clearly the implications of this program for the open and free internet, and for liberty in general are very worrying, this has been reflected in the resistance and criticism from groups such as the Electronic Frontier Foundation.

In light of this, there is a real danger of a hyped or completely staged cyber attack being propagated in order to bring the issue to public attention and counter the critics who have exposed it as a part of the agenda to restrict the Internet.

In 2008 Stanford Law professor Lawrence Lessig detailed such ongoing government plans for overhaul and restriction.

Lessig told attendees of a high profile Tech conference that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.

Lessig said that he came to that conclusion following a conversation with former government Counter Terrorism Czar Richard Clarke, who informed him that there is already in existence a cyber equivalent of the Patriot Act, an “i-Patriot Act” if you will, and that the Justice Department is just waiting for a cyber terrorism event in order to implement its provisions.

Lessig is the founder of Stanford Law School’s Center for Internet and Society. He is founding board member of Creative Commons and is a board member of the Software Freedom Law Center. He is best known as a proponent of reduced legal restrictions on copyright, trademark and radio frequency spectrum, particularly in technology applications.

These are clearly not the ravings of some paranoid cyber geek.

Though Richard Clarke advocates an enhancement of cyber security, even he has stated that it would be a terrible idea to allow the government to regulate and filter the internet.

We have also recently seen multiple mock attacks conducted by the government, via private outsourcing, on it’s own infrastructure systems. On such exercise, called “We Were Warned: Cyber Shockwave”, involved Former Department of Homeland Security secretary Michael Chertoff and former CIA deputy director John McLaughlin taking the roles of government leaders. CNN broadcast the entire simulation on prime time television.

Alex Jones recently discussed this issue on Russia Today news programming:

Journalist Webster Tarpley also lays out the hyping of cyber threats as a pretext to takedown the internet:

Report Spam   Logged

Share on Facebook Share on Twitter

Hero Member
Offline Offline

Posts: 1242

Routing out & defeating the globalist pigs

View Profile
« Reply #1 on: July 21, 2010, 12:22:25 pm »

U.S. Officials Pondering Options to Police Cyberspace

Policies to deter cyberattacks and to protect U.S. computers from infected software are the subject of ongoing discussions taking place at the Pentagon and in Congress.

“We have lots of decisions to make in the cyber domain,” said Vice Adm. Carl Mauney, deputy commander for U.S. Strategic Command. “Our work is cut out for us,” he told representatives from the information technology industry last week at a conference hosted by the Armed Forces Communications and Electronics Association.

How to keep criminals from operating in cyberspace with impunity is the intent, officials said. The federal government will practice its response to a large-scale cyberoffensive in September during Cyber Storm III, a simulated exercise that will target government computer networks and national infrastructure control systems.

Hackers today can launch sophisticated cyberattacks with little chance of getting caught and even less chance of being punished, officials complained during panel discussions at the conference.

The risk involved with executing a complex attack is “less than or equal to zero,” said Bruce Held, intelligence and counterintelligence director at the Energy Department.

“A static cyberdefense can never win against an agile cyberoffense,” Held said.

“If you on the defense beat me 99 times, I will come at you 100. If you beat me 999 times, I will come at you 1,000. But I will beat you,” he said.

The United States must impose risk and consequences in cyberspace and work to secure the information technology supply chain, said Held, who used to work as a clandestine officer in the Central Intelligence Agency.

In February, the Bipartisan Policy Center conducted CyberShockWave, a simulated act of cyberwar on the United States. The scenario consisted of a malware program being delivered to people’s phones through a popular “March Madness” basketball bracket application. The pretend attack cut service to more than 20 million smart phones and left the eastern seaboard without power. The exercise, broadcast on CNN, showed the country to be unprepared should a similar attack actually take place.

In July 2009, a serious of real-life cyberstrikes shut down government and media websites in South Korea and the United States. To date, no one knows exactly who orchestrated the barrage. And that’s one of the problems with trying to hand down punishments in cyberspace — many times, it’s virtually impossible to trace an action back to a specific computer.

Cyberattacks against networks in the United States often can be dealt with diplomatically, military leaders at last week’s conference said. They stopped short of discussing any offensive cyberoperations the recently launched Cyber Command might employ.

“We don’t need to know the specific computer [an attack] is coming from,” Held said, “but we do need to know what country it’s coming from.” The same goes for the hardware and software that the American government, companies and citizens use to conduct business and exchange sensitive information. “As a result of irreversible globalization in the economy, we are losing control of our software and hardware supply chain,” Held said.

Many products are bought not from the original manufacturers, but on the “gray” market, said Guy Copeland, who chairs the Cross-Sector Cybersecurity Working Group. Items bought on the cheap in this unauthorized manner avoid the normal testing and regulation. If the United States cannot manage a secure supply chain, it at least needs a more diverse one, Held said. Acquiring products from a variety of countries limits the possibility of becoming dependent on a nation that could become an adversary, he explained.

« Last Edit: July 21, 2010, 12:29:29 pm by Route24 » Report Spam   Logged

Pages: [1]   Go Up
Jump to:  

Powered by EzPortal
Bookmark this site! | Upgrade This Forum
Free SMF Hosting - Create your own Forum

Powered by SMF | SMF © 2016, Simple Machines
Privacy Policy
Page created in 0.068 seconds with 20 queries.