Susanne Posel: Janet Napolitano, Secretary of the Department of Homeland Security, spoke to
the Senate Homeland Security and Governmental Affairs Committee meeting
this week and confirmed that the Obama administration is circumventing
Congress and drafting an “inter-agency process” which is “close to
completion depending on a few issues that need to be resolved at the
highest levels.”
John Brennan, assistant to the President for Homeland Security and Counterterrorism and chairman of the Senate Committee on Commerce, Science and Transportation has planted the concept that a cybersecurity executive order will give the Obama administration power over the future of the internet in ways the passage of legislation would never be able to provide. In a letter to Senator Jay Rockefeller, Brennan said that Obama is “exploring issuing an executive order to direct federal agencies to secure the nation’s critical infrastructure by working with the private sector to develop security standards.”
Last week, a draft of an executive order was floated across the internet. This version gives the executive branch over-reaching power over the internet, regardless of Congressional approval. Federal agencies will be given new responsibilities concerning protecting infrastructure while the Department of Homeland Security will be empowered to investigate all cyber security issues; yet the language is extremely vague and open to interpretation for the purposes of application.
Earlier this month the CIA-sponsored hacker group called Anonymous claimed responsibility for the taking down of hosting provider GoDaddy and several websites hosted by this corporation. This nameless, faceless group took down the Domain Name System (DNS) while a currently undetermined number of customers were affected. This attack served to increase influence in favor of the idea and necessity of a cybersecurity legislation that would ensure that these nameless, faceless hackers could not be as successful in another attempt to control American commerce on the internet.
Using the Hegelian Dialectic, the Obama administration have employed malware and viruses like Flame and Stuxnet against other nations and corporations to create the illusion that there is a problem on the internet that needs a cybersecurity bill to control.
The code of Flame is nearly identical to Stuxnet which was used by the former George W. Bush administration. In the mainstream media, cyber warfare is touted as dangerous weapons that can cripple geopolitical diplomacy and facilitate conflict in ways that could never manifest in the physical world.
Whether it is called Stuxnet, Duqu or Flame, the outcome is expected to be the same. Sabotaging the internet in order to fix it under new control measures that restrict freedoms serves multiple purposes.
The US Cybersecurity Response Team states that there is no evidence that Flame is related to Stuxnet or Duqu. Yet the Kapersky Lab found that this is not only a lie, but there are so many likenesses that these viruses could only have been written by the same developers.
To distract the American public from the hacking and cyber-destruction committed by the US government, there is a national call for stricter cybersecurity by the Obama administration. It is the federal government agencies that are empowered to commit cyber-espionage against other nations, while claiming that multi-national corporations, and US infrastructure with assistance of security firms Symantec and McAfee who are facilitating the lie.
More viruses are cropping up as “US government is using cyber technology more widely than previously believed to further its interests in the Middle East.” This serves the Zionist agendas as Obama and Netanyahu collaborate “develop a destructive computer worm to sabotage Iran’s efforts to make a nuclear bomb.”
t has been the goal of these two controlled-puppets that the use of malware and viruses cause Iran’s nuclear power plants to crash while extracting sensitive digital information.
Copyright trolls are adding to the battle over free speech on the internet by submitting a fraudulent DMCA notice of takedown for copyright infringement to a hosting company and force the website owner to remove content without proof of claim.
These fake DMCA notices of takedown documents are created by the copyright troll who is intending to remove information with prejudice. Templates for these fake notices can be found on the web. However, the US patent and copyright office has actual federal forms that are legal and binding.
Copyright trolls do not file legitimate claims and choose to falsify federal documents because their claims (in most instances) do not hold up in court. They are allegations without proof of claim because there is no legitimate claim to be made. Intellectual property and copyright laws are abused quite regularly by professional trolls by making wild accusations without substantial claim or proof.
Copyright trolls litter the court system with frivolous lawsuits based on wild accusations of copyright infringement in order to wear down the victim as well as hoping to squeeze monetary restitution for fraudulent claims. The members of the alternative media as well as readers need to be aware of these individuals who are cloaked in truth yet rife with disinformation. Their intention is to cut off the free flow of information on the internet and stifle voices that are exposing truth for their own selfish gains.
The EFF have reported on copyright trolls that experiment with claiming copyright infringement to “extract settlements from individuals.” These trolls “try to grow businesses out of suing Internet users.”
Globalist-inspired Microsoft corporation have announced that through their Digital Crimes Unit, they have discovered that contrary to reports, malware is not created in “factories” and that even though they were responsible for manufacturing hard drives with malware already installed, they physical facts can be reasoned away by the findings of their own internal investigations. This is just another example of how ludicrous the information coming from the propaganda-filled mainstream media is.
Susanne Posel is the Chief Editor of Occupy Corporatism. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media.
Source
John Brennan, assistant to the President for Homeland Security and Counterterrorism and chairman of the Senate Committee on Commerce, Science and Transportation has planted the concept that a cybersecurity executive order will give the Obama administration power over the future of the internet in ways the passage of legislation would never be able to provide. In a letter to Senator Jay Rockefeller, Brennan said that Obama is “exploring issuing an executive order to direct federal agencies to secure the nation’s critical infrastructure by working with the private sector to develop security standards.”
Last week, a draft of an executive order was floated across the internet. This version gives the executive branch over-reaching power over the internet, regardless of Congressional approval. Federal agencies will be given new responsibilities concerning protecting infrastructure while the Department of Homeland Security will be empowered to investigate all cyber security issues; yet the language is extremely vague and open to interpretation for the purposes of application.
Earlier this month the CIA-sponsored hacker group called Anonymous claimed responsibility for the taking down of hosting provider GoDaddy and several websites hosted by this corporation. This nameless, faceless group took down the Domain Name System (DNS) while a currently undetermined number of customers were affected. This attack served to increase influence in favor of the idea and necessity of a cybersecurity legislation that would ensure that these nameless, faceless hackers could not be as successful in another attempt to control American commerce on the internet.
Using the Hegelian Dialectic, the Obama administration have employed malware and viruses like Flame and Stuxnet against other nations and corporations to create the illusion that there is a problem on the internet that needs a cybersecurity bill to control.
The code of Flame is nearly identical to Stuxnet which was used by the former George W. Bush administration. In the mainstream media, cyber warfare is touted as dangerous weapons that can cripple geopolitical diplomacy and facilitate conflict in ways that could never manifest in the physical world.
Whether it is called Stuxnet, Duqu or Flame, the outcome is expected to be the same. Sabotaging the internet in order to fix it under new control measures that restrict freedoms serves multiple purposes.
The US Cybersecurity Response Team states that there is no evidence that Flame is related to Stuxnet or Duqu. Yet the Kapersky Lab found that this is not only a lie, but there are so many likenesses that these viruses could only have been written by the same developers.
To distract the American public from the hacking and cyber-destruction committed by the US government, there is a national call for stricter cybersecurity by the Obama administration. It is the federal government agencies that are empowered to commit cyber-espionage against other nations, while claiming that multi-national corporations, and US infrastructure with assistance of security firms Symantec and McAfee who are facilitating the lie.
More viruses are cropping up as “US government is using cyber technology more widely than previously believed to further its interests in the Middle East.” This serves the Zionist agendas as Obama and Netanyahu collaborate “develop a destructive computer worm to sabotage Iran’s efforts to make a nuclear bomb.”
t has been the goal of these two controlled-puppets that the use of malware and viruses cause Iran’s nuclear power plants to crash while extracting sensitive digital information.
Copyright trolls are adding to the battle over free speech on the internet by submitting a fraudulent DMCA notice of takedown for copyright infringement to a hosting company and force the website owner to remove content without proof of claim.
These fake DMCA notices of takedown documents are created by the copyright troll who is intending to remove information with prejudice. Templates for these fake notices can be found on the web. However, the US patent and copyright office has actual federal forms that are legal and binding.
Copyright trolls do not file legitimate claims and choose to falsify federal documents because their claims (in most instances) do not hold up in court. They are allegations without proof of claim because there is no legitimate claim to be made. Intellectual property and copyright laws are abused quite regularly by professional trolls by making wild accusations without substantial claim or proof.
Copyright trolls litter the court system with frivolous lawsuits based on wild accusations of copyright infringement in order to wear down the victim as well as hoping to squeeze monetary restitution for fraudulent claims. The members of the alternative media as well as readers need to be aware of these individuals who are cloaked in truth yet rife with disinformation. Their intention is to cut off the free flow of information on the internet and stifle voices that are exposing truth for their own selfish gains.
The EFF have reported on copyright trolls that experiment with claiming copyright infringement to “extract settlements from individuals.” These trolls “try to grow businesses out of suing Internet users.”
Globalist-inspired Microsoft corporation have announced that through their Digital Crimes Unit, they have discovered that contrary to reports, malware is not created in “factories” and that even though they were responsible for manufacturing hard drives with malware already installed, they physical facts can be reasoned away by the findings of their own internal investigations. This is just another example of how ludicrous the information coming from the propaganda-filled mainstream media is.
Susanne Posel is the Chief Editor of Occupy Corporatism. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media.
Source
No comments:
Post a Comment