There are ominous signs for what’s coming in 2015.
Hackers, despite their reputation, are not all bad. Many have used their knowledge and expertise to help improve online security. They’re experts at finding security flaws and suggesting how to repair them.
But not all hackers have such noble aims, as we saw in 2014. And the government-controlled media has made a point to highlight many of these hack attacks, along with the danger of significant future attacks that may even constitute cyberwarfare. While some of these attacks may have actually been perpetrated by independent hackers, others were probably perpetrated by the U.S. government — or some other international power. Whoever is responsible for these attacks, the media’s attention tells us we’re in the middle of a major propaganda campaign. And you can be sure there’s a reason for it.
Let’s look at several of these hack attacks before I offer some reasons why the propaganda machine has been forcing you to focus on them, and how it is going to affect you.
HACK ATTACKS from 2014
Note: I’m trying to list only one per month, although I break my rule a couple times.
January: On January 1, 2014, the supposed “Syrian Electronic Army” was hard at work doing what enemy hackers do: trolling Skype? That’s right. Syria’s military hackers supposedly took over Skype’s social media accounts, including their twitter account and blog. What important military operation were they conducting? This tweet may be an indication:
It is good to see that they included their hashtag — #SEA. If you’d like to see what other important hacks the Syrian trolls have been up to, just remember that hashtag — I’m sure they use it whenever they’re on a mission.
February: It was widely reported in February that there was a significant security breach at Kickstarter.com, where hackers stole usernames, passwords, mailing addresses, and phone numbers. Here’s an example of a mainstream report from CNN.
March: In March, RT.com (Russia Today news) was hacked as Russia was once again being accused of invading Ukraine. What did the hackers do? They substituted the word “Nazi” into headlines, like these:
“Russian senators vote to use stabilizing Nazi forces on Ukrainian territory”
“Putin: Nazi citizens, troops threatened in Ukraine, need armed forces’ protection”
“Thousands rally against ‘illegitimate govt’, raise Nazi flags in eastern Ukraine”
And so on.
Nothing like plastering “Nazi” all over Russia Today’s news site to get the Russia/Nazi concepts associated. Graham Cluley’s site has a nice screenshot of the vandalism.
April: You may have forgotten you had an AOL email account, but hackers didn’t. In April, your old account may have been spamming people everywhere. USA Today reported on this here. This is just another case of a major company being hacked, suggesting that no one is immune to this problem.
May: Pay up! That’s what many iPhone and iPad users in Australia and New Zealand woke up to one morning in May. A message told users that their devices had been hacked and locked. If they wanted them unlocked, they needed to pay a ransom. Even Apple can be hacked. (Story)
Other noteworthy May hacks and news include —
Kate Middleton, who was hacked over 100 times. You can read about that May news story at the Guardian’s site.
By May, it was reported that approximately half of U.S. adults had already been hacked in 2014.
And the FBI director James Comey accused China of hacking U.S. businesses, too.
“We’re not gonna stand for this conduct,” Comey said.
“The amount of theft that’s going on is simply staggering,” he later added.
June: Not even the Bush family and former high-level government officials are safe from hack attacks. The well-known hacker “Guccifer” was charged with wire fraud, unauthorized computer access, aggravated identity theft, and cyberstalking. He had hacked into email and Facebook accounts of a Bush relative, as well as three former high-ranking government officials.
As an aside, June was the month CNN told us why we’ll keep getting hacked: “Why You’ll Keep Getting Hacked.” Their advice? “Get used to it.”
July: The Syrian Electronic Army was back at it again in July — hashtag and all. This time, using their sophisticated Twitter hacking skills, they took over an Israeli Defence Force spokesperson’s account. Allegedly, they used the account to announce a “possible nuclear leak” as the result of a Palestinian strike:
Are we sure the Syrian Electronic Army did it? Absolutely. They told us, both through their own account and the IDF spokesman’s account. And the #SEA tag is a give-away. Here’s what they tweeted from their account:
The good news about Syria’s tech soldiers? If they ever do anything that the U.S. may need to retaliate for, the government just needs to check for the hashtag. Read the RT report on this here.
August: The Russian prime minister, Dmitry Medvedev, was hacked. The hacker tweeted that Medvedev was resigning because he was fed up with the government.
September: In September, the U.S. Senate accused China’s military of hacking U.S. military contractor networks. This AP story details the allegations:
“China’s military hacked into computer networks of civilian transportation companies hired by the Pentagon at least nine times, breaking into computers aboard a commercial ship, targeting logistics companies and uploading malicious software onto an airline’s computers, Senate investigators said Wednesday.”
Additionally, Home Depot was hit with one of the largest ever credit breaches. Nearly 60 million payment cards were affected.
October: Bank hack, anyone? JP Morgan, the largest bank in the U.S., had nearly 80 million customer accounts hacked in October. Ouch. Lucky for the poor folks who still have significant amounts of money in the bank, they didn’t lose anything — yet.
Also in October: The Wall Street Journal reported that Russia was responsible for malicious code at FireEye Inc., a security company that had U.S. military secrets on its network. The discovery was described as “a sophisticated cyberweapon, able to evade detection and hop between computers walled off from the Internet.”
“The spy tool was programmed on Russian-language machines,” the WSJ article reported, “and [was] built during working hours in Moscow.”
FireEye concluded that the cyberspying had a government sponsor “based in Moscow.”
One last October hacking story is worth mentioning now. Although the story had been ongoing already, the “celebrity nude photo” hacks that garnered attention in 2014 were major news. This was another Apple iCloud hack, and several ‘stars’ had revealing pictures released onto the web. Because celebrities were involved, this was a great way to make everyone aware of the danger of hacking — even dolts who sit around following celebrity gossip news.
November: Judging by the hashtag, the Syrian Electronic Army was at it again in November, hacking media and other types of websites.
“Companies including Dell, Microsoft, Ferrari and humanitarian organization Unicef were among those targeted, according to screenshots on Twitter and a website claiming to be from the SEA. Media organizations such as Forbes, The Chicago Tribune, The Telegraph and Italy’s La Repubblica were also affected. The error message appeared to some users of CNBC.com.” (from CNBC)
And, of course, around the same time, Sony was hacked. Despite the Obama administration’s claim that North Korea was responsible, the experts don’t agree. Unfortunately, North Korea didn’t tweet us about it.
December: This month, it was reported that Russian criminal hackers stole millions in a bank hack.
And, of course, a South Korean nuclear power plant was hacked, allegedly (slanderously?) by North Korea.
Propaganda, Awareness, and a Plan
The examples above are just a small sample of what was reported about hack attacks. The news related to hacking wasn’t exclusively about hacks that already happened, either. There was a lot of news about potential hacks, cyber-terrorism, risks to the financial system, cyberwarfare, and on and on.
We know the mainstream media is controlled by the same globalists who are waging wars, creating financial crises, and incrementally rolling out a police state in the U.S. So this news has a purpose — and it is vitally important for us to know what that purpose is.
So, what are they up to?
There are two major possibilities, and each of them demands our attention and action. They are:
1. The government is going to continue the push to crack down on Internet freedom. When people are afraid, they more readily give up their liberty than when they aren’t afraid. Regular news reports about successful hacks accustom people to the idea that hackers are everywhere, capable of hacking any site. Once people believe that, all the media needs to do to make everyone afraid is announce that they’ve uncovered a serious threat. At that point, people are likely to ask for more Internet regulation and greater restrictions on what people can and cannot do freely. In this respect, the threat of hackers really does function like the threat of terrorism.
To confirm that Obama is planning to use these attacks as a way to increase regulations, we only need to look at his comments after the Sony hack. He said the Internet today resembles “the Wild West.”
“We need more rules about how the Internet should operate,” he continued.
This is not good news, considering the source. (Here’s what happens when a tyrant makes rules for the Internet in a time of crisis.)
2. Another possibility is that the U.S. government has been paving the way to use a cyberattack to ’cause’ a collapse of America’s financial systems. Why would they do this?
It gives them a cover for the collapse.
A collapse is coming. It’s inevitable. But the government and Fed have been lying, saying that we’re in the middle of an amazing recovery. If the collapse happens on its own, their lies will be found out. But if a cyberattack comes along, and undermines the markets and banking system, then it is someone else’s fault — probably Syria’s, Iran’s, Russia’s, China’s, or North Korea’s. (The U.S. will decide who they want to blame when the time comes.)
In fact, they’ve been explicitly laying the groundwork for this already. For example, the Guardian tells us that one way we may be hacked in 2015 is through cyberwarfare from countries like Syria, Iran, or North Korea, merging with ‘cybercriminal gangs’ responsible for hacks, such as the hack at JP Morgan. In fact, they call a “serious” attack by these countries in 2015 a “high risk.”
“‘North Korea, Syria, and Iran are among the countries that have developed great capabilities that pose a serious threat to major Western states. The risk of a serious attack on the critical infrastructure of a Western government is high, and its attribution will be even more difficult.’
The boundaries between cybercriminal gangs and governments may also blur. ‘Criminal groups will increasingly adopt nation-state tactics,’ predicts Kaspersky.
‘State-sponsored, advanced persistent threat hacking groups, like we’ve seen in cases such as DarkHotel, Regin and Crouching Yeti/Energetic Bear, will begin to merge with hacking campaigns perpetrated by criminals, like those targeting JP Morgan Chase, Target and others.'”
Of course, if something like this were to occur, we know now that it would be considered an act of war. After all, North Korea was blamed for hacking an international company, Sony, and the U.S. government said they would respond. Shortly after that, it was reported that North Korea spent a day without Internet. So the precedent has been set. If critical infrastructure were hit, the U.S. would respond in kind — even if they couldn’t prove who was responsible.
Realistically, there is little you can do to stop the government from carrying out its plans. An economic war is already on-going. I discussed this at length in this article: “What did Putin Say? Will Russia Win WW3 before 2017?” We’re beyond the point where we can fight back effectively. God’s wrath is on the world. All we can do is repent for our contributions to the world’s problems, and make preparations for whatever is coming.
The preparations I recommend are relocating to a safe spot, if at all possible. Acquiring some basic survival knowledge, skills, and resources. And protecting your assets through the purchase of physical gold and silver before the dollar starts to slide — something that can happen at any minute, especially given the threat of cyberwarfare.
If you think this news is important, please share it with the people you know and care about. You can do that by clicking the share buttons on the left, or by simply emailing the link.
And please subscribe below if you want to receive email notices when future AllNose.com articles are posted. Just enter your email address in the field below, click ‘Subscribe Now!’, and check your inbox for a confirmation email.