Cyber Pandemic

Sometimes I wonder if this "cyberpandemic" thing isn't so much a planned event, but maybe more like a cover... Sort of like saying, "No, that wasn't a meteorite impact. It was Russia bombing us!"

There is even more chaos injected into the system because on the one hand, we're supposed to lockdown and watch Netflix and play video games and surf for porn, but on the other 'they' want to shut down and control everything. The left tentacle and the right tentacle can't agree on anything. Ya know, like:

1. Buy everything on Amazon!
2. Small businesses close.
3. Giant Cyberpandemic - "Um, where do I buy stuff now?!"
4. Chaos ensues

And then you can toss weather into the mix... Too cold or too hot, and power grids/pipelines/whatever collapse.

I agree Scottie that the idea they want to permanently shut the internet down is absurd; the worldwide web was built for total control as Julian Assange once said, and the entire control grid in the making simply cannot operate without it. In fact if anything they are working to make it even more central to people's lives (part of the 'New Reality' forced on people via lockdowns etc). Yes it may seem that the left tentacle and right can't agree on anything but without giving them the cohesion of some omnipotent, integrated, fully functioning plan, I think they all do agree on one single objective: total control. That's the glue and that's what drives them, consciously and unconsciously, for there may be many roads, but they all point towards Rome.

For as Corbett wrote in this excellent short distillation, everything is connected:

To some extent, my work over the past 18 months has been an attempt to articulate these connections:
All of the pieces of the puzzle are there, already laid out on the table. The public just has to be shown how to put them together.

I bring this up now in light of the recent double hit on Facebook of the Whistleblower testimony and the sudden outage that brought down Facebook, Instagram and WhatsApp.

A couple of observations:

1. There has been a long seeded narrative that has played out between Facebook, the MSM and politicians, whereby Facebook is set up as a very necessary evil, the media harps on about how powerful, undemocratic and unregulated it is, Facebook responds by saying that's down to government as our hands are tied, and government slowly but surely starts to step in as arbiter and inches ever closer to 'well if you all insist we'll just have to intervene - for the greater good of course'. Problem, reaction, solution.

2. I actually see this as a step towards an eventual reverse engineering whereby the likes of a merged super sized tech giant will eventually replace governments themselves. Reading between the lines, this article on the Atlantic quite clearly lays out the tyrannical roots of the likes of Facebook and its 'ambition' to absorb and supersede national and international state powers.

3. Against this background I would posit that the current outrage emerging from the Facebook Whistleblower may be a staged event i.e. she's a deliberate plant by Facebook to up the anti and give powerful credence to the need for governments to act and to regulate access to the internet (hence the very strong focus on young women's mental health, which plays right into the accepted agenda that anything concerning women is of high emotional and therefore political stakes). She comes across as way too prepared, way too eloquent and most importantly receiving way too much MSM prime-time focus, for this to be a genuine whistleblower event.


4. That controlled access and limitation is the goal not shutting down the net per-say. To get there, yes brief and painful shut downs (lockdowns) will be needed - but the end game is absolute immersion of everyone in the net, but only on their slyly implemented terms with the goal posts moved an inch and then a foot and then an inch at a time: so taking the road map of the past 18 months into account, and using the goal of mandated vaccinations as a model, we have mandated compliance to digital IDs for access to the net coming very soon (the link to being also necessarily double, triple, quadruple jabbed will be a given thanks to the deep mental programming around a 'virus' and another example of how the elites play 'If I scratch your back you must scratch mine' i.e. converging mutual self-interest). I have noticed that for example banks, (mine included), have effectively mandated that you have to sign up for and download an app to a smart phone to be able to use your account online. A cut off date for previous services is set and they warn that after you may not be able to shop online anymore (i.e. be involved in 'normal' society). I received about 5 stark warning emails ahead of this arbitrary date all of which were designed to make one feel that if you don't sign up you'll be effectively shut out from 'normal life'. I almost fell for it! I see this policy only increasing via all 'necessary' essential services).

5. Its also worth remembering that a Patriot Act style wedge of legislation regarding regulation of access to the net has been only awaiting a 9-11 type cyber event since at least 2008 (and yes that 'cyber event' could indeed be caused by natural forces but blamed on Russia! Or Aliens! Or Hackers! Or Iran! Or Santa Claus, or whoever).

US Government has prepared a "Patriot Act" for the Internet

Aug 7, 2008


5. In light of all this, below is a recent conversation between Irish rebel, Dave Cullen and founder/ CEO of Bitchute.com, Ray Vahey. Well worth a watch as it digs down into a number of technical and strategic issues relating to this accelerating process of the convergence between outages, cyber-attacks, 'security', censorship and the ever expanding pandemic.

The Facebook Outage, Internet Censorship, Freedom & The Future


Untitledrrr.jpg

'Oh what a tangled web we weave, when first we practice to deceive'
 
Just to note that after 4 years, Trumps Executive order from 2017 ordering the strengthening of the Cybersecurity of Federal Networks and Critical Infrastructure has very recently disappeared off the White House Website.

Untitled.jpg


This could be quite 'innocent' (i.e. Biden team vindictiveness against anything Trump related) but I do find the timing intriguing considering:

- The US Marine Corps has recently changed their training plans so that Marine units can operate with zero logistical support whatsoever. In short, this is training for how to operate with no incoming food, ammo, water, gear – anything.

- The US Army, Air Force, and Navy have recently started a crash course on learning how to navigate without GPS capability.

- China has recently urged its citizens to begin stockpiling food for this winter. Allegedly due to supply chain issues.

- China has recently accumulated more than half of the world’s grain supply.


Cyber-polgon to go live soon...?

Incoming EMP?

Both?

Its late. I've clealy lost my marbles after a long day. Time to:cool2: :zzz:
 
This article has just been posted to SOTT:


EU to stage large-scale cyberattack exercise on supply chains

Alberto Nardelli
BNN Bloomberg
Tue, 11 Jan 2022 11:22 UTC


European Union governments will launch later this week a large-scale simulation of cyberattacks against multiple member states.

Participants will be confronted with attacks on their supply chains and some spillover socio-economic effects in other member states, before having to coordinate public communications and a diplomatic response, according to people familiar with the matter and documents seen by Bloomberg.

The aim of the six-week exercise is to stress-test Europe's resilience, strengthen preparedness and cooperation among member states, and improve the effectiveness of a joint response.

The EU simulation comes amid concerns that Russia could couple any aggressive act toward Ukraine with cyberattacks directed at the West.

One of the EU documents cites the recent hack against the software company SolarWinds Corp., which according to U.S. and U.K. intelligence assessments was carried out by Russian intelligence and affected companies on both sides of the Atlantic.

Comment: The vast majority of these cyberattacks - of which, following a 'warning' from the WEF, we've seen a surge of recently - bear all the hallmarks of Western-allied intel agencies: Toshiba hacked by DarkSide, Kaspersky founder suggests CIA may be behind group's Colonial Pipeline attack

Though the EU has various tools at its disposal to counter and sanction acts of cyber aggression, it doesn't currently have a framework for effectively coordinating a joint response to a major crisis, the document says.

The exercise will be structured around a gradual escalation toward a major crisis that culminates in an attack that could qualify as an armed aggression under the United Nations Charter, according to one of the documents. In order to be as realistic as possible and better prepare the bloc for a real-world attack, it will be modeled on incidents that have taken place or could occur in the near future.

The simulation, which is being proposed by the French presidency of the EU, is expected to begin this month and conclude during a meeting of the bloc's foreign ministers at the end of next month.

A French spokesperson didn't immediately respond to a request for comment.

All very telling as NATO and Russia currently face off over make-or-break negotiations.

Has all the hallmarks of an 'exercise' that will have every chance of going live should Russia refuse to bow to bully-and-bluff (which it wont).

The sentences in red says it all.

So I would say the next 6 weeks are going to be interesting to say the least... with the Feb meeting of bloc foreign ministers a perfect time for it to peak.

Hold on to your hats and be prepared for anything.
 
I would like to share with the following news about a cyber attack via a ransomware trojan virus that it seems has infected thousands of servers worldwide in the last few days.

But first I would like share with you an experience at my workplace. Basically a couple of days ago we've received a reservation through booking.com from presumably a US client. The credit card provided to secure the reservation wasn't valid. A few minutes later, after receiving the reservation we've received a mail from the above client asking us to click on the link he provided in order to check if the itinerary of how to reach our hotel, that he drew on Google maps was correct. We didn't took the bait and canceled the reservation from booking.com.

Tonight, while at work, we've received another reservation from booking.com from a different US client. Afterwards she sent us a mail asking to be contacted via Whatsapp or via her personal email address because she would like to ask us some questions. I didn't took the bait and warned right away my supervisors.

The reason i've mentioned the above story is because for a couple of days now many italian companies have been under a cyber attack, including my energy supplier Acea. I can't access their website, nor use their app for a few days now. And then yesterday the national telecommunications company Tim had experienced technical difficulties around whole Italy, from early morning till late afternoon. Though, according to the company's statements, the experienced technical issues weren't related to the ongoing cyber attacks.

Here below you can read the article I've found on La Repubblica newspaper (machine translation), concerning the cyber attack. Maybe it will reveal itself a nothing burger threat eventually. But still, for the sake of tracking and monitoring the follow-ups i thought to share it here:

Massive hacker attack in Italy and around the world. Thousands of servers blocked. The Cybersecurity Agency: "Update them now." A "massive attack via ransomware already in circulation" has been detected by the Computer security incident response team Italy of the National Cybersecurity Agency. Acn technicians have already surveyed "several dozen national systems likely compromised and alerted numerous entities whose systems are exposed but not yet compromised." However, it is explained, "there still remain some exposed, uncompromised systems of which the subject owner could not be traced. These are called upon immediately to update their systems." Summit at Palazzo Chigi tomorrow
The government is closely following developments in the attack. Tomorrow morning at 9 a.m. Undersecretary Alfredo Mantovano, the delegated authority for cybersecurity, will meet with ACN Director Roberto Baldoni and DIS-Department of Information and Security Director Elisabetta Belloni at Palazzo Chigi to take an initial stock of the damage caused by the attacks and to confirm the promotion of the appropriate protection strategy, which has, moreover, already been in place for some time. The ransom demand.
The ransomware is targeting VMware ESXi servers. The Cybersecurity Agency recalls how "the vulnerability exploited by attackers to distribute ransomware has already been fixed in the past by the manufacturer, but not everyone using the currently affected systems has fixed it." By exploiting the vulnerability in operating systems, hackers can carry out ransomware attacks that "encrypt affected systems rendering them unusable until a ransom is paid to get the decryption key."

The first to notice the attack were the French, probably because of the large number of infections recorded on the systems of some ISPs. Later the wave of attacks moved to other nations including Italy. Right now there are a few thousand compromised servers worldwide, from European countries such as France, Finland and Italy, to North America, Canada and the United States. In Italy, there are dozens that have encountered the malicious activity against them, but - according to analysts - they are bound to increase.

How the attack occurs
Ransomware is malware, that is, "malicious software" that encrypts files on the victim's computer, making them unreadable and no longer usable without a decryption key that is given by hackers only upon payment of a ransom. Usually for individuals, these are not impossible amounts, between tens and hundreds of euros, which victims usually pay in order not to lose data; in the case of large organizations, companies or public bodies, the amounts, on the other hand, can be very high.

Ransomware are, in most cases, Trojans spread via malicious or compromised websites, i.e., through e-mail. They usually appear as seemingly harmless attachments (such as, for example, Pdf files) from legitimate senders (institutional or private entities). Their verisimilitude induces users to open the attachment, the subject of which carries wording recalling invoices, bills, payment orders, and other similar objects: once the file is opened, the ransomware enters the victim's pc or phone and encrypts it.
 
Back
Top Bottom