Recent Attack on GoDaddy is False Flag Justifying Need for Cybersecurity EO
September 12th, 2012
Earlier this week, theÂ CIA-sponsoredÂ hacker group called AnonymousÂ claimedÂ responsibility for the taking down of hosting provider GoDaddy and several websites hosted by this corporation. This nameless, faceless group took down the Domain Name System (DNS) while a currently undetermined number of customers were affected.
Some of the websites taken down belonged to towns, cities, private businesses, and real estate agencies. The branch of the fake-hacker group calling themselvesÂ AnonymousOwn3r, claimed the attack, yet did notÂ discloseÂ their motive other than stating that this was a test of GoDaddyâ€™s security systems.
AnonymousOwn3rÂ saidÂ he is the â€śsecurity leader of #Anonymous.â€ť He goes on to say in an earlier tweet that he was â€śbehind many things such like irc, ops, attacks [sic].â€ť
Customers of GoDaddy have reacted with anger. On aÂ blog, there is a call for a class-action lawsuit against the hosting company for monetary loss due to the hackerâ€™s success.
The mainstream media is suggesting that Anonymous is retailiating against the SOPA and PIPA bills that were shelved months ago. GoDaddy was in support of the SOPA legislation. Yet, the truth about the agenda behind the takedown was admitted by AnonymousOwn3r whoÂ stated: â€śIâ€™m taking godaddy down [because] well iâ€™d like to test how the cyber security is safe and for more reasons that i can not talk now.â€ť
In late July, a compromised version of the Cybersecurity Act of 2012 was introduced to the Senate was introduced. The CongressÂ voted downÂ the legislation despite the Obama administrationâ€™s coercion to have it passed.
At the time no threat had manifested. In response, President ObamaÂ statedÂ that: â€ś. . . foreign governments, criminal syndicates and lone individuals are probing our financial, energy and public safety systems every day. It would be the height of irresponsibility to leave a digital backdoor wide open to our cyber adversaries.â€ť
According to Jay Carney, White House Press Secretary, Obama may just write anÂ executive orderÂ to ensure his cybersecurity agenda is implemented. â€śIn the wake of Congressional inaction and Republican stall tactics, unfortunately, we will continue to be hamstrung by outdated and inadequate statutory authorities that the legislation would have fixed. Moving forward, the President is determined to do absolutely everything we can to better protects our nation against todayâ€™s cyber threats and we will do that.â€ť
Carney emphasized that Obama is focused on â€śprotecting vital computer systemsâ€ť. Since Obamaâ€™s coercion did not work on Congress, he could bypass Congress (as he has done several times before in this administration). Claiming â€śwe canâ€™t waitâ€ť, Obama could enact any or all of the provisions in the Cybersecurity Act of 2012 by EO. And this would enable federal agencies to regulate any authorities needed to take-over the free flow of information on the internet in the name of protecting the private corporate sector.
Obamaâ€™s infamous actions to circumvent the Congress by signing a plethora of executive orders would be consideredÂ business as usualÂ when forcing a cybersecurity control through after being voted down by Capitol Hill.
The Obama administration wants to create aÂ government programÂ that â€śprotectsâ€ť the US digital infrastructure while empowering the Department of Homeland Security (DHS) to define standards that corporations would â€śvoluntarily adopt to better protect banks, telecommunication networks and the U.S. power grid from electronic attacks.â€ť
TheÂ Cybersecurity CouncilÂ will be established to mitigate risks to corporations.
Under presidential declaration, the â€ścyber threat is one of the most serious economic and national security challenges we face as a nationâ€ť and â€śAmericaâ€™s economic prosperity in the 21st century will depend on cybersecurity.â€ť
In an executive inspired report entitled theÂ Cyberspace Policy Review, Obama has created the Cybersecurity office that works within the National Security Staff oversees the control over broadband networks that collaborate with all forms of infrastructure; including classified military intelligence, the internet, local schools and hospitals and domestic businesses.
ByÂ seizing controlÂ over our digital communications, under the guise of protecting America against cyber threats, information must be shared between â€śnetwork operators and defenders, law enforcement and intelligence agencies, and emergency management officials in the Federal, State, local, and tribal governments, private industry, and allied governments.â€ť
Under Obamaâ€™s watchful eye, all digital communications will be syphoned through the Cybersecurity office where it will be monitored for national security threats. A pre-determined â€ścybersecurity incident responseâ€ť will be disseminated to facilitate public-private partnerships. Technological advances within the private sector will be used for federal enhancement of strategic management to ensure cybersecurity threats are established and properly dealt with.
However, power grids, public water systems and other critical infrastructure areÂ not connectedÂ to the internet. Yet the DHS would have propaganda abound thatÂ claimsÂ the governmentâ€™s exposure to cyber-attacks will allow for the possible hijacking of our power grids, water filtration facilities and nuclear power plants.
Back in March, DHS, the FBI and Obama administration officials demonstrated for Senators a fake take-down of US infrastructure toÂ coerceÂ them into supporting the Cybersecurity Act of 2012. The focus of the fake attacks were US banks, power grids and telecommunications systems.
Edward Amoroso, chief security officer for Dallas-based AT&T, said in testimony at the hearing, â€śSuch requirements could have an unintended stifling effect on making real cyber security improvements. Cyber adversaries are dynamic and increasingly sophisticated, and do not operate under a laboriously defined set of rules or processes.â€ť
When committing a false flag operation, the concept of a cyber-attack is the perfect way toÂ causeÂ pandemonium from oil spills, destroying generators, derailing trains, causing commercial plane crashes, and wiping out financial data.
In response the US government will spend an estimated $10.5 billion annually on intelligence on citizens within the domestic US; while the international cost to taxpayers would be $140 billion a year.
Not only is this about control over the internet through false flag attacks by the government-controlled hacker group Anonymous to justify the need for a cybersecurity bill, this new control system will restrict the free flow of information on the Web as well as give the US government the over-reaching power to infiltrate our private lives.
When Americaâ€™s ability to share information and expose the US governmentâ€™s tyrannical destruction of our Constitutional freedoms is cut from us, they will have no other threat to speak of . . . other than to maintain their control with the inception of encompassing Big Brother controls that rival anything imagined by Orwellâ€™s 1984.
Delivered by The Daily Sheeple
Contributed by Susanne Posel of Occupy Corporatism.
Susanne Posel is the Chief Editor of Occupy Corporatism, anÂ alternative news site dedicated to reporting the news as it actually happens; not as it is spun by the corporate-funded mainstream media. You can find Occupy Corporatism on theirÂ Facebook page .
Please share: Spread the word to sheeple far and wide
Leave A Comment...
The Daily Sheeple Home Page