Wednesday, July 21, 2010

False Flag Cyber Attack 2010

Increased noise limit and control the Internet on behalf of the government, the Pentagon, the intelligence community and the private corporate weapons would pose a cyber-attack is used as an excuse.  In recent months we have witnessed a significant increase in reporting inflated fears of a possible "electronic Pearl Harbor" that the reports claiming that the U.S. could be "cut-down within 15 minutes."  Much-hyped (and in some cases completely asinine) argues that power and other key infrastructure such as rail networks and water sources are connected to the Internet have penetrated such coverage.
The threats against computer networks in the United States are greatly exaggerated. Dire reports prepared by the Defense Science Board and the Center for Strategic and International Studies, as a rule, richer in vivid metaphor - with fears of "digital Pearl Harbors" and "cyber-Katrinas - than in the factual basis," says Evgeny Morozov, a respected researcher and blogger, who wrote about the political implications of the Internet.  Morozov said that most of the data on the alleged cyber-threats "came the ultra-secretive government agencies which have to justify its existence - and cyber-security firms - which derive commercial benefits from the popular concern."  When cyber law was introduced by Senator John Rockefeller, the last year, he made similar statements about the threat of cyber-attacks, adding: "Would it be better if we had never invented the Internet?".
Rockefeller legislation gives the president an opportunity to "declare cyber security emergency" and to close or restrict the Internet traffic in a "critical" information network "in the interests of national security." the bill does not define the critical information network and cyber security emergency. This definition will be left to the discretion of the president, according to the report, Mother Jones.
The provisions of the bill would allow the federal government, according to DHS and the NSA, to connect to any aspect of digital information every citizen without a warrant. Banks, business and medical records will be open for inspection, as well as personal instant messages and e-mail - all in the name to go cyber-attacks on the state.
Accessories such provisions are contained in the latest "cyber-security as a national heritage law, which persistently Senator Joe Lieberman. The bill hands the absolute power of the federal government to close the network, and block incoming Internet traffic from certain countries under the declared state of emergency.
Accompanying the grid control cybersecurity will only create a greater risk in the opinion of experts, who note that it essentially "set the path for the bad guys to go down." Other countries such as Australia and the UK, followed suit.
The program is coordinated with the Pentagon's newly created Cyber Command, headed by Keith B Alexander, Acting Chief, National Security Agency and the man behind the massive program of illegal dragnet surveillance of domestic communications since at least 2001.
In the Senate Armed Services Committee confirmation hearing, Alexander said the Pentagon's Cyber Command will use the "significant interaction" with the NSA. "We have to show that we do, that we behave, obey the laws," said Alexander, claiming perversely agency respect and protect the privacy of the American people.
The Pentagon believes cyberspace is a domain of military land, sea, air and space. In 2003, the Pentagon classified the Internet as an enemy "weapon system", requiring "reliable offensive set of features includes a full range of electronic and computer network attack." They spent billions of dollars building a super secret "National Cyber Range" in order to prepare for "Dominant Cyber Offensive Engagement", which translates to control over any "computers. The program is called "electronic Manhattan Project".
The enemy is never specifically named, it is only one who uses the Internet, because the enemy in the network. The enemy of freedom net provides billions around the world and the threat of militaristic domination of information and ultimately the power that gives.
These initiatives represent a continuation of the so-called "comprehensive national cybersecurity initiative" created with the help of secret presidential decree in 2008 under the Bush administration. Former Director of National Intelligence Mike McConnell said that the NSA wiretaps unauthorized will be "a walk in the park compared to this."
"This will be a goat rope on the mountain" McConnell said. My prediction is that we'll fuck with it until something terrible happens. "
As we have previously reported, large corporations, such as Google, AT & T, Facebook and Yahoo to name but a few of them are deeply involved in the overall program. These corporations have specific weapons to the Government, which supplies software, hardware and technical support for U.S. intelligence agencies in the process of creating a huge database of open source for the global spy network to exchange information.

Obviously, the impact of this program for the open and free internet access, and freedom in general are very concerned, as reflected in the resistance and criticism from groups such as the Electronic Frontier Foundation.
In light of this, there is a real danger of inflated or fully staged cyber attack is distributed in order to bring the matter to the attention of the public and combat critics who have identified it as part of the agenda to restrict Internet access.
In 2008, Stanford Law professor Lawrence Lessig details of the current government's plans to overhaul and limitations.
 

Lessig told participants of a high-profile technology conference that "There is going to be i-9/11 event, which will act as a catalyst for radical treatment of law relating to the Internet.
Lessig said that he came to this conclusion after a conversation with the former Government counter-terrorism tsar Richard Clarke, who told him that there already exists a cyber equivalent of the Patriot Act, "" I-Patriot Act ", if you want, and that the Ministry of Justice simply waiting for the event terrorism, cyber to implement its provisions.
Lessig is the founder of the Center of Stanford Law School Internet and Society. He is a founder member of the board of the Foundation and board member of the Software Freedom Law Center. He is known as an advocate of reducing the legal restrictions on copyright, trademark and radio frequency spectrum, in particular in application technology.
This is clearly not some paranoid delusion cyber computers.
Although Richard Clarke supporters to strengthen cybersecurity, and he said that it would be a terrible idea to allow the government to regulate and filter the Internet.
We have also recently seen numerous mock attacks conducted by the Government, with the help of private outsourcing of its own systems infrastructure. In such an event, entitled "We've been warned: Cyber Shockwave", involved the former Department of Homeland Security Michael Chertoff, a former deputy CIA director John McLaughlin, taking the role of government leaders.