HIGHLY POTENT NEWS THAT MIGHT CHANGE YOUR VIEWS

internet

Japanese police catch Riddler-like Cyber Criminal and his cat. [video]

Ryan Dawson
February 10, 2013

WTF Japan


Egypt bans YouTube as ‘Brotherhood tries to restore autocratic rule’ [video]

Russia Today
February 9, 2013

Thousands of people, armed with stones and petrol bombs, have been unleashing their anger against Islamist President Mohammed Morsi. The political turmoil has also been fueled by the authorities’ decision to block the video-sharing website YouTube, for a month, for hosting a controversial anti-Islam film. Egyptian journalist and blogger Wael Eskandar says nothing’s changed since the revolution which overthrew the autocratic rule of President Mubarak two years ago. READ MORE: http://on.rt.com/ql1yyb

RT LIVE http://rt.com/on-air

Subscribe to RT! http://www.youtube.com/subscription_c…

Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Google+ http://plus.google.com/+RT


Cyber Warfare: US & Chinese Gov Use Hackers To Attack Digital Infrastructure [video included]

by Susanne Posel
Occupy Corporatism
February 6, 2013

According to intelligence expert David Wise, China and the US have been engaged in a cyber-espionage war behind closed doors. The Chinese government, Wise explains, will send spies to targeted locations to syphon data by the way of hackers and surveillance; whereas the US government “would target . . . with satellites and produce reams of data.”

Cyber warfare goes beyond surveillance of emails and cell phone calls and extends to the possible control over hardware such as missiles, aircraft, and radar systems. Wise states: “One reason is that only about 2 percent of the integrated circuits purchased every year by the military are manufactured in the United States. And even most American chip makers have moved offshore, where labor is cheaper. A computer chip made with a hidden, malicious flaw could sabotage a weapons system. And the compromised hardware is almost impossible to detect.”

Wise maintains that there is a possibility that a chip could be embedded with a kill-switch that would allow a foreign government to control the deployment of a weapon remotely. He states that the Israeli government already has this capability and has used it against Syrian air defenses in 2007.

James Woosley, acting director of the Central Intelligence Agency (CIA), told Wise: “Taking down the grid for months comes as close to a nuclear attack with many weapons on the United States as anything could. You’d have mass starvation and death from thirst and all the rest.”

Last month the Council on Foreign Relations claimed that hackers traced to China attacked their system last week. The “drive-by” hacking utilized a pirated computer. To compound the problem, the analysts said that the hackers removed their malware and traces of their presence from CFR computer systems.

Recognizing China as becoming a formidable replacement to the US as the world’s super power, the CFR has outlined specific responses to this crisis of supremacy. Citing Chinese internet policy, their disdain for freedom of speech in social media, and influence in global cyberspace, the CFR appreciates that this rising “foe” must be confronted indirectly with propaganda to distract from the obvious.

This attack marked a new level of attack by international hackers who aim to steal information from government websites and computers. The “drive-by” tactic covertly plants malware, then the website itself is used to attack visitors to the site. Visitors can be infected as hackers will them attempt to hack into other computers as visitors are passing by. The hackers use the main site as a “watering hole” that attacks users to it for the hackers to steal information from their computers.

Analysts recognized that the attack was to gain specific information from servers. As of now, the CFR cannot gage the extent of the damage – admitting that their internal data servers have been compromised by the hacking.

According to an anonymous White House official that spoke to mainstream media, yet acknowledged that they were not authorized to speak about the subject, referred to an attempt to hack into the executive branch’s computer system through an unclassified network. No data were removed, proving that this was not an actual hack. The nameless official said that the experiment was a “spear-phishing”.

The supposition is that China is behind these attacks because of a phishing expedition against Gmail accounts wherein several senior US government officials and military personnel were affected.

The US House Intelligence Committee (USHIC) is warning American corporations in a new report against conducting business with 2 Chinese firms because of national security threats. Both Huawei Technologies and ZTE, two of the world’s largest telecommunications corporations and suppliers of cellular phones and technology are being highlighted by the US government and blamed for cyber-attacks. It is also claimed by the USHIC that they are involved in digital espionage.

The White House, covertly tying the alleged cyber-attack to China is more diabolical than it appears. In July, Obama imposed stricter sanctions against Iran after they accepted gold as currency for petrol to China.

According to the report, “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes. . . . The investigation concludes that the risks associated with Huawei’s and ZTE’s provision of equipment to U.S. critical infrastructure could undermine core U.S. national-security interests.”

It is claimed that former industry insiders provided intelligence to the US concerning Huawei’s violations of US laws such as immigration, bribery and corruption as well as an alleged “pattern and practice” using pirated software in its US satellites.

It was cited in the report that the Chinese corporations were employing intelligence sources as well as private sector companies and other unnamed entities that could and assumedly did steal trade secrets, sensitive information and prehistory data while simultaneously shipped infected hard ware and software to the US with the intent to cause disruptions in national security during war time.

The recent allegations of Chinese cyber-attacks stem from their involvement with Iran to purchase petrol using gold as currency and not the US dollar as the global reserve currency.

The Chinese also began trading and bartering with the African nations for resources while Obama sent in troops under cover of AFRICOM during the Kony2012 debacle.

Vice Admiral Robert T. Moeller openly declared AFRICOM’s guiding principle as protecting “the free flow of natural resources from Africa to the global market.”

Moeller also mentioned China’s presence in the region as a “challenge” to American interests. He was referring to the deals China was making with the African nations in exchange and boarder for their resources. Where the US chose to invade a sovereign nation with the intention of stealing their resources, the Chinese used diplomacy; and as Moeller explained, this was a disruption to their scheme.

The movement in the mainstream media to further demonize China at this time is not arbitrary. Considering the plans and schemes of the Zionist regime through their puppet President Obama to involve not only Iran, but also China in their WW III, the claims of cyber-attacks are designed to force support from the populace for the pending death and destruction instigated by our own government.


Obama Declares Global Cyberwar

by Stephen Lendman
Global Research
February 6, 2013

Throughout his tenure, Obama governed lawlessly for the monied interests that own him. He’s waged no-holds-barred war on humanity.

Strategy includes homeland tyranny, fear-mongering, saber rattling, hot wars, proxy ones, drone ones, domestic political ones, geopolitical ones, financial ones, anti-populist ones, sanctions, subversion, sabotage, targeted assassinations, mass murder, cyberwar, and more.

In May 2009, Obama prioritized cybersecurity. He called cyber-threats “one of the most serious economic and national security challenges we face as a nation.”

“America’s economic prosperity in the 21st century will depend on cybersecurity.”

He ordered a top-to-bottom review. A Cyberspace Policy Review report followed. He waged cyberwar on Iran. He did so cooperatively with Israel.

In spring 2010, Iranian intelligence discovered Stuxnet malware contamination. The computer virus infected its Bushehr nuclear facility. At the time, operations were halted indefinitely.

Israel was blamed. Washington was involved. Had the facility gone online infected, Iran’s entire electrical power grid could have been shut down.

A more destructive virus called Flame malware is known. Internet security experts say it’s 20 times more harmful than Stuxnet. Iran’s military-industrial complex is targeted. So is its nuclear program. Maximum disruption is planned.

Obama supports draconian cybersecurity bills. Passage threatens constitutional freedoms.

Targeted assassinations eliminate America’s enemies. Lawless domestic spying is policy. So is warrantless wiretapping. Americans are as vulnerable as others.

Obama’s waging war on humanity. He’s doing it multiple ways. Last October, he signed an executive order. It expanded military authority. It authorized cyberattacks. It redefined defense. Doing so lawlessly legitimizes aggression.

In November, Presidential Policy Directive 20 followed. It’s secret. It set guidelines for confronting cyberspace threats.

Last fall, Defense Secretary Leon Panetta warned of a “cyber Pearl Harbor.” It could “cause physical destruction and loss of life,” he said. It could “paralyze and shock the nation and create a new profound sense of vulnerability.”

US officials never lack for hyperbole. Fear-mongering is longstanding policy. So are Big Lies, false flags, and other pretexts for wars, other military actions, and disruptive ones.

Cyberwar capability adds to America’s arsenal. Preemption adds another dirty tactic.

In early February, US media reports headlined stepped-up cyberwar. Preemption is prioritized. Nation states, organizations, and individuals are fair game.

US Cyber Command (USCYBERCOM) has full operational control. It’s a cyber hit squad. It’s part of the US Strategic Command.

It’s based at Fort Meade, MD. General Keith Alexander serves as National Security Agency (NSA) director and US Cyber Command head.

The New York Times cited a secret legal review. It affords Obama sweeping preemptive cyberattack powers.

It permits him “to order a preemptive strike if the United States detects (allegedly) credible evidence of a major digital attack looming from abroad.”

His word alone is policy. Corroborating evidence isn’t needed. Efforts to protect classified and proprietary information are increasing.

The Washington Post said wireless and technology giants are battling over a plan to create super Wi-Fi networks.

The Wall Street Journal said Google, Microsoft and Amazon are competing to control cloud computing business.

The Christian Science Monitor said preemptive cyberwar entered America’s arsenal. It “nugded up along side other” approved tactics and techniques.

New policies govern how intelligence agencies work. They’ve been unrestrained before. They’ll have greater powers now.

The New York Times said they’ll be able to “carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code – even if there is no declared war.”

Rules of engagement are classified. Effectively there are none. Cyber-warriors are freewheeling. They’re unrestrained.

They’ll operate anywhere globally. China is a target of choice. It’s America’s main economic and geopolitical competitor.

An unnamed US official said new cyberwar strategy is “far more aggressive than anything” used or recommended before. The gloves are off. Anything goes.

Major disruptions can occur without firing a shot. Military and/or civilian power grids can be crippled. So can financial systems and communications networks.

Another unnamed US official said cyberweapons are so powerful that “they should be unleashed only by” presidential order. Exceptions would be tactical strikes.

Examples include disabling command and control as well as ground radar ahead of conventional strikes. At the same time, most cyberoperations are presidential prerogatives.

Expect Obama to take full advantage. Extrajudicial operations are prioritized. Rule of law principles are spurned. Operational procedures have been in development for over two years.

They’re headlined now. They coming out when cyberattacks more often target US companies and critical infrastructure. An unnamed US power station was crippled for weeks.

The New York Times, Washington Post, and Wall Street Journal reported cyberattacks. Obama prioritizes preemption. Doing so has no legal standing. Self-defense alone is justified. Acting on suspicions without evidence is aggression.

New rules serve Washington. Lawyers get marching orders. They’re well paid to subvert accepted legal standards. Doing so doesn’t change them.

What constitutes “reasonable and proportionate force” resides in the eye of the aggressor. New guidelines exclude the Pentagon from defending US companies or individuals without presidential authority.

Doing so is Homeland Security’s prerogative. The FBI has investigatory authority. Cybersecurity legislation remains stalled in Congress. Expect stepped up efforts for passage.

Doing so will more greatly comprise freedom. Full-blown tyranny approaches. It’s a hair’s breadth away. Whistleblowers are targeted. Dissent is endangered.

There’s no place to hide. Big Brother’s expanding exponentially. Cyber-preemption adds greater police state power.

On February 3, a Washington Post editorial headlined “Cyberwar, out of the shadows,” saying:

US Cyber Command is expanding exponentially. Doing so “is indicative of how conflict is moving toward center stage for the military, a domain similar to land, sea, air and outer space.”

It’s heading America toward unchallenged dominance.

In May 2000, the Pentagon’s Joint Vision 2020 called for “full spectrum dominance” over all land, surface and sub-surface sea, air, space, electromagnetic spectrum and information systems with enough overwhelming power to fight and win global wars against any adversary.

Doing so includes nuclear weapons use preemptively. Non-nuclear countries and adversaries are fair game.

Cyber Command includes:

(1) “Combat mission forces” cooperatively with military units.

(2) “Protection forces” to defend Pentagon networks.

(3) “National mission forces” to head off threats to critical infrastructure. They’ll operate outside America. They’ll function anywhere if authorized. They’ll strike US adversaries preemptively.

Targeting cuts both ways. Incoming attacks can precede or follow US ones. Secrecy is prioritized but compromised. Spies have clever ways of doing it.

Rules of engagement aren’t clear. Public information is limited. Sunlight is the best disinfectant. Policy need generous doses.

“If conflict in cyberspace is underway,” said the Post, “then it is important to sustain support for the resources and decisions to fight it, and that will require more candor.”

Expect little forthcoming from the most secretive administration in US history. Obama’s first term prioritized homeland repression and lawless aggression. Imagine what he has in mind for term two.

Stephen Lendman lives in Chicago and can be reached at lendmanstephen@sbcglobal.net. 

His new book is titled “Banker Occupation: Waging Financial War on Humanity.”

http://www.claritypress.com/LendmanII.html

Visit his blog site at sjlendman.blogspot.com and listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network Thursdays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.

http://www.progressiveradionetwork.com/the-progressive-news-hour

http://www.dailycensored.com/obama-declares-global-cyberwar/

Articles by: Stephen Lendman

Related content:

Disclaimer: The contents of this article are of sole responsibility of the author(s). The Centre for Research on Globalization will not be responsible for any inaccurate or incorrect statement in this article. The Center of Research on Globalization grants permission to cross-post original Global Research articles on community internet sites as long as the text & title are not modified. The source and the author’s copyright must be displayed. For publication of Global Research articles in print or other forms including commercial internet sites, contact: publications@globalresearch.ca

www.globalresearch.ca contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of “fair use” in an effort to advance a better understanding of political, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than “fair use” you must request permission from the copyright owner.

For media inquiries: publications@globalresearch.ca


Washington State’s Anti-NDAA Bill Introduced with Viral Support

P.A.N.D.A. People Against The NDAA
February 4, 2013

Emilie Rensink

OLYMPIA, Wash. — The “Washington State Preservation of Liberty Act” introduced on Wednesday condemns and criminalizes the use of the 2012 NDAA‘s provision purportedly authorizing the indefinite detainment of U.S. citizens.

After news of H.B. 1581’s introduction caught wind, an Internet campaign went viral asking activists to contact their Washington state representatives to co-sponsor the legislation.

It worked.

In less than 24 hours the number of the bill’s co-sponsors tripled.

Many believe the bill’s success hinges on bipartisanship. While only one of the original sponsors of the bill is a Democrat, Rep. Sharon Tomiko Santos, eight of the later co-sponsors are also House Democrats, making for a fairly even split of nine to 12.

The sister bill in the State Senate S.B. 5511 was also introduced on Wednesday by Sen. Bob Hosegawa (D) with one co-sponsor, Sen. Maralyn Chase (D).

With this legislation, lawmakers strive to make Washington the fourth state to pass a law in response to the National Defense Authorization Act for Fiscal Year 2012.

This state’s legislation focuses primarily on Sec. 1021 of the 2012 NDAA to make its case.

The bill points out the ability of the president to use armed forces to detain terror suspects at his discretion.

H.B. 1581, Sec. 2. (7):

Section 1021 of the 2012 NDAA purports to authorize, but does not require, the president of the United States to utilize the armed forces of the United States to detain persons the president suspects were part of [terrorist organizations.]

The bill continues, outlining what the 2012 NDAA grants the president to do with such captured individuals:

(a) Indefinite detention without charge or trial until the end of hostilities authorized by the 2001 authorization for use of military force against terrorists, 2001 P.L. 107-40, (b) prosecution through a military commission, or (c) transfer to a foreign country or foreign entity;

While U.S. citizens aren’t mentioned in this language, what makes Section 1021 a problem for U.S. citizens is not what it says, it’s what it doesn’t say, according to Sec. 2. (9):

Section 1021, unlike section 1022 of the 2012 NDAA, makes no specific exclusion for United States citizens and lawful resident aliens for conduct occurring within the United States;

Some would argue this omission does not imply permission. However, Sens. John McCain and Lindsey Graham disagree, asserting that 2012 NDAA’s indefinite detention provision applies to U.S. citizens.

H.B. 1581, Sec. 2. (13) (e):

United States Senators John McCain and Lindsey Graham declared in colloquies on the floor of the United States senate that section 1021 of the 2012 NDAA authorized the indefinite detention of United States citizens captured within the United States by the armed forces of the United States;

The Preservation of Liberty Act has now been referred to the House’s Committee on Public Safety chaired by Rep. Roger Goodman (D) and the Senate’s Committee on Law & Justice chaired by Sen. Mike Padden (R).

Both await the appointment of a hearing which rests in the hands of the respective committees’ chairmen.

Last year’s version of the bill died in committee, so supporters are urged by activists to pressure the chairmen of the committees to act while the tide is high.

*Originally posted at Examiner.com, permission granted by Author to repost.


Aaron Swartz – Demand Progress! [video]

Press For Truth
January 14, 2013

Aaron Swartz was considered by many to be a computer prodigy and online activist who sought to maintain a free and open internet. He was instrumental in launching the initiative to block SOPA (the Stop Online Piracy Act) and he was very outspoken about a number of controversial political issues. In the wake of his untimely death we must remember the example that he set and we must continue what he started by doing everything in our power to maintain a free and open internet.

Obama’s ‘kill list’ critic found dead in New York City:
http://www.presstv.ir/detail/2013/01/13/283254/us-kill-list-critic-found-dead…

Aaron Swartz keynote – “How we stopped SOPA”
http://www.youtube.com/watch?v=Fgh2dFngFsg

Aaron Swartz – The Network Transformation:
http://www.youtube.com/watch?v=CzNXDdjtXQI

Demand Progress:
http://demandprogress.org/

Get updates like this everyday and support independent media by joining Press For Truth TV: http://pressfortruth.tv/register/
We rely on you the viewer to help us continue to do this work. With your help I can continue to make videos and documentary films for youtube in an effort to raise awareness all over the world. Please support independent media by joining Press For Truth TV!

As a Press For Truth TV subscriber you’ll have full access to the site’s features and content including Daily Video Blogs on current news from the PFT perspective and High Quality Downloads of all Press For Truth Films, Music and Special Reports! Subscribe to Press For Truth TV:
http://pressfortruth.tv/register/

For more information visit:
http://pressfortruth.tv/

You can also support Press For Truth and help us continue to do this work by donating or becoming a sponsor at pressfortruth.ca
http://www.pressfortruth.ca/donatebecome-a-sponsor/

http://www.facebook.com/PressForTruth
http://www.youtube.com/weavingspider
https://twitter.com/PressForTruth
http://twitter.com/#!/DanDicksPFT

http://pressfortruth.ca/


Reddit Co-Founder Aaron Swartz ‘Suicided’? [video]

The Truther Girls
January 16, 2013

Reddit co-founder and co-creator of RSS feed Aaron Swartz died two days ago at the age of 26. The official cause was suicide, but is there more to the story? History shows us that dozens of activists and scientists whose deaths have been attributed to suicide have died under highly suspicious circumstances. This includes Rik Clay, Andrew Breitbart, Hunter S Thompson, many other politicians and activists and about 100 scientists, especially microbiologists.


http://www.naturalnews.com/038650_Aaron_Swartz_suicide_assassination.html
http://www.thestar.com/news/world/article/1314645–reddit-co-founder-aaron-sw…
https://cannabis.community.forums.ozstoners.com/topic/22512-rik-clay-age-26-c…
http://www.theultimateconspiracyguide.com/rik-clay-2012-exposed.html
http://www.saveamericafoundation.com/2012/04/29/what-or-who-killed-andrew-bre…
http://www.wnd.com/2012/05/now-a-witness-to-breitbarts-death-disappears/
http://fellowshipofminds.wordpress.com/2012/04/29/andrew-breitbarts-coroner-d…
http://www.prisonplanet.com/articles/march2005/020305storychanges.htm
http://rense.com/general62/list.htm