How NATO is committing Cyber Warfare against the global masses

Guest Post by Dan Fournier

Depiction of nefarious cyber warfare. Image source.   

In a previous articlewhich was republished in ActivistPost, and The Burning Platform – readers were introduced on how the North Atlantic Treaty Organization, better known as NATO, have created a fifth operational domain (the first four being air, land, sea, space) called cyber which they use with great success to propagandise and brainwash the masses around the globe, particularly on social media, as an instrument to gain support for their war follies.

This article will provide a more detailed assessment of this important form of covert warfare, as it is, stealthily yet effectively, being perpetrated on ordinary people without them even knowing they are its targeted subjects.

Continue reading “How NATO is committing Cyber Warfare against the global masses”

US Engaged In “Offensive” Cyber Ops Against Russia In Ukraine: NSA Director

Via ZeroHedge

The US military has issued a stunning but perhaps not entirely unexpected admission that it has been conducting offensive cyber operations in support of Ukraine. It marks the first ever such acknowledgement, and suggests – as many observers have long suspected – a deeper Pentagon and US intelligence role in Ukraine against the Russian military than previously thought.

National Security Agency (NSA) and US Cyber Command Director Gen. Paul Nakasone told the UK’s Sky News on Wednesday, “We’ve conducted a series of operations across the full spectrum: offensive, defensive, [and] information operations.” This includes “offensive hacking operations” he said.

The director of the National Security Agency, Gen. Paul Nakasone, via AP

Without offering specific details, he continued, “My job is to provide a series of options to the secretary of Defense and the president, and so that’s what I do.” Importantly, Gen. Nakasone gave the interview from allied Baltic country Estonia, from which other supporting operations including weapons transfers for Ukraine have come.

Continue reading “US Engaged In “Offensive” Cyber Ops Against Russia In Ukraine: NSA Director”

WILL THERE BE A 2024 PRESIDENTIAL ELECTION?

“All tyrannies rule through fraud and force, but once the fraud is exposed, they must rely exclusively on force.” George Orwell

Vanessa E. Thompson on Twitter: "Just a reminder..." / TwitterEvil Assad, Evil Gaddafi, Now Evil Putin: How the West Sells War (and Makes a Killing) | Groupe Gaulliste Sceaux

“Every war when it comes, or before it comes, is represented not as a war but as an act of self-defense against a homicidal maniac.” George Orwell

The smell of tyranny is in the air. The level of propaganda, disinformation, and mistruth has reached astounding heights, as the ruling oligarchy/Deep State/globalist cabal are thrashing about violently because their frauds are being exposed on a daily basis. This shift to the tyranny of force has massive implications for everyone on the planet. When every quote from Orwell’s 1984 applies every day to everything swirling around us, you begin to realize we are in the midst of a dystopian nightmare which gets more ghoulish by the day.

The last two years have been a fraud of epic proportions, conducted by a cadre of evil money titans, their financial, media, and medical apparatchiks, with the objective of tearing down our existing social and economic structure and “resetting” the world where they own everything and you own nothing, eat bugs, and provide the slave labor needed to keep society functioning. Of course, this will be after they dispose of tens of millions of useless eaters through their Covid/Vaxx scheme, global war, and mass starvation.

Continue reading “WILL THERE BE A 2024 PRESIDENTIAL ELECTION?”

Hackers Join the Ukraine War

Guest Post by Martin Armstrong

Russia’s media has promoted the “military action” in Ukraine as a necessary measure in an attempt to mislead the people from seeing this as an all-out invasion. Russia’s communications regulator (Roskomnadzor) has banned media outlets from using the words “assault, invasion, or declaration of war” to describe the attack on Ukraine. Disobeying could be punishable by a fine of five million rubles ($60,000). Roskomnadzor said that “official Russian information outlets” are the only source for “reliable information.” Numerous social media platforms are now restricted or disabled in Russia in an attempt to shield citizens from the truth.

Continue reading “Hackers Join the Ukraine War”

Internet – Doorway to Cyber Warfare

Guest Post by Martin Armstrong

The new world of cyber warfare is upon us. Today, enemies send out malware through the Internet. They send instructions to external computers, often in email attachments. This is their way to steal passwords, email correspondence and documents, mostly unnoticed; this is how they gain access to the computers of generals and ministers to record conversations; this is how hackers manipulate elections or paralyze government authorities and power stations. These are attacks meant to damage what keeps countries together at their very core: their economy, their internal security, everyday life.

Continue reading “Internet – Doorway to Cyber Warfare”

Joe Byte ‘Em

Guest post by Stilton Jarlsberg

Sometimes, a news story is so ripe that we can’t make up our minds about what comedic direction to take – especially if it involves Joe Biden. So here’s a Monday twofer!

obama, obama jokes, political, humor, cartoon, conservative, hope n' change, hope and change, stilton jarlsberg, wikileaks, biden, cyber, attack, russia
obama, obama jokes, political, humor, cartoon, conservative, hope n' change, hope and change, stilton jarlsberg, wikileaks, biden, cyber, attack, russia

In case you’re lucky enough not to know the convoluted tale that we’re referring to, the Obama administration has accused Russia of hacking the email accounts of Hillary, her campaign manager, and Democrats in general and giving the information to Wikileaks in order to criminally influence our sacred national election by revealing the truth about how despicable everyone on the left is.

Hope n’ Change isn’t buying the whole “Russian plot” scenario for several reasons: it’s of no obvious benefit to Putin, the theory is being advanced by congenital liars who are in full fanny-covering mode, and so far zero evidence of Russian involvement has been offered. Frankly, we think this is all an orchestrated con game intended to soften up Americans for government seizure of the election process in the name of “security.”

But that hasn’t stopped Joe Biden (apparently taking time off from his extra-special presidential “moonshot” assignment to cure cancer) from declaring that the U.S. is about to engage in a full-blown cyber attack on Russia. Although the odds of our pulling off a sneak cyber attack just got a helluva lot worse thanks to the motor-mouthed veep.


The Wolf Is Guarding the Hen House: The Government’s War on Cyberterrorism

Guest Post by John W. Whitehead

 

The game is rigged, the network is bugged, the government talks double-speak, the courts are complicit and there’s nothing you can do about it.”—David Kravets, reporting for Wired

Nothing you write, say, text, tweet or share via phone or computer is private anymore. As constitutional law professor Garrett Epps points out, “Big Brother is watching…. Big Brother may be watching you right now, and you may never know. Since 9/11, our national life has changed forever. Surveillance is the new normal.”

This is the reality of the internet-dependent, plugged-in life of most Americans today.

A process which started shortly after 9/11 with programs such as Total Information Awareness (the predecessor to the government’s present surveillance programs) has grown into a full-fledged campaign of warrantless surveillance, electronic tracking and data mining, thanks to federal agents who have been given carte blanche access to the vast majority of electronic communications in America. Their methods completely undermine constitution safeguards, and yet no federal agency, president, court or legislature has stepped up to halt this assault on our rights.

For the most part, surveillance, data mining, etc., is a technological, jargon-laden swamp through which the average American would prefer not to wander. Consequently, most Americans remain relatively oblivious to the government’s ever-expanding surveillance powers, appear unconcerned about the fact that the government is spying on them, and seem untroubled that there is no way of opting out of this system. This state of delirium lasts only until those same individuals find themselves arrested or detained for something they did, said or bought that runs afoul of the government’s lowering threshold for what constitutes criminal activity.

All the while, Congress, the courts, and the president (starting with George W. Bush and expanding exponentially under Barack Obama) continue to erect an electronic concentration camp the likes of which have never been seen before.

A good case in point is the Cybersecurity Information Sharing Act (CISA), formerly known as CISPA (Cyber Intelligence Sharing and Protection Act). Sold to the public as necessary for protecting us against cyber attacks or internet threats such as hacking, this Orwellian exercise in tyranny-masquerading-as-security actually makes it easier for the government to spy on Americans, while officially turning Big Business into a government snitch.

Be warned: this cybersecurity bill is little more than a wolf in sheep’s clothing or, as longtime critic Senator Ron Wyden labeled it, “a surveillance bill by another name.”

Continue reading “The Wolf Is Guarding the Hen House: The Government’s War on Cyberterrorism”

NSA CYBER WAR ACCELERATES

 Know Your Enemy


Via PC World

Destroying your hard drive is the only way to stop this super-advanced malware

A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it’s infected your PC.Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency.The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.

Countries hit the most by Equation include Iran, Russia, Pakistan, Afghanistan, India and China. Targets in those countries included the military, telecommunications, embassies, government, research institutions and Islamic scholars, Kaspersky said.

Infirm firmware

Kaspersky’s most striking finding is Equation’s ability to infect the firmware of a hard drive, or the low-level code that acts as an interface between hardware and software.

The malware reprograms the hard drive’s firmware, creating hidden sectors on the drive that can only be accessed through a secret API (application programming interface). Once installed, the malware is impossible to remove: disk formatting and reinstalling the OS doesn’t affect it, and the hidden storage sector remains.

“Theoretically, we were aware of this possibility, but as far as I know this is the only case ever that we have seen of an attacker having such an incredibly advanced capability,” said Costin Raiu, director of Kaspersky Lab’s global research and analysis team, in a phone interview Monday.

equation 1
A group of cyberspies called Equation that uses similar techniques as the NSA has struck at least 30 countries using never-before-seen malware that infects hard disk drives. 

Drives made by Seagate Technology, Western Digital Technologies, Hitachi, Samsung Electronics and Toshiba can be modified by two of Equation’s hard disk drive malware platforms, “Equationdrug” and “Grayfish.”

Continue reading “NSA CYBER WAR ACCELERATES”