fbpx
Connect with us

The Daily Sheeple

Simulated Cybersecurity Threats Pave the Way for Internet Restrictions

Janet Napolitano, Secretary of the Department of Homeland Security spoke to the Senate Homeland Security and Governmental Affairs Committee meeting this week and confirmed that the Obama administration is circumventing Congress and drafting an “inter-agency process” which is “close to completion depending on a few issues that need to be resolved at the highest levels.”

Controlling the Herd

Simulated Cybersecurity Threats Pave the Way for Internet Restrictions



Janet Napolitano, Secretary of the Department of Homeland Security spoke to the Senate Homeland Security and Governmental Affairs Committee meeting this week and confirmed that the Obama administration is circumventing Congress and drafting an “inter-agency process” which is “close to completion depending on a few issues that need to be resolved at the highest levels.”

John Brennan, assistant to the President for Homeland Security and Counterterrorism and chairman of the Senate Committee on Commerce, Science and Transportation has planted the concept that a cybersecurity executive order will give the Obama administration power over the future of the internet in ways the passage of legislation would never be able to provide. In a letter to Senator Jay Rockefeller, Brennan said that Obama is “exploring issuing an executive order to direct federal agencies to secure the nation’s critical infrastructure by working with the private sector to develop security standards.”

Last week, a draft of an executive order was floated across the internet. This version gives the executive branch over-reaching power over the internet, regardless of Congressional approval. Federal agencies will be given new responsibilities concerning protecting infrastructure while the Department of Homeland Security will be empowered to investigate all cyber security issues; yet the language is extremely vague and open to interpretation for the purposes of application.

Earlier this month the CIA-sponsored hacker group called Anonymous claimed responsibility for the taking down of hosting provider GoDaddy and several websites hosted by this corporation. This nameless, faceless group took down the Domain Name System (DNS) while a currently undetermined number of customers were affected. This attack served to increase influence in favor of the idea and necessity of a cybersecurity legislation that would ensure that these nameless, faceless hackers could not be as successful in another attempt to control American commerce on the internet.

Using the Hegelian Dialectic, the Obama administration have employed malware and viruses like Flame and Stuxnet against other nations and corporations to create the illusion that there is a problem on the internet that needs a cybersecurity bill to control.

The code of Flame is nearly identical to Stuxnet which was used by the former George W. Bush administration. In the mainstream media, cyber warfare is touted as dangerous weapons that can cripple geopolitical diplomacy and facilitate conflict in ways that could never manifest in the physical world.

Whether it is called Stuxnet, Duqu or Flame, the outcome is expected to be the same. Sabotaging the internet in order to fix it under new control measures that restrict freedoms serves multiple purposes.

The US Cybersecurity Response Team states that there is no evidence that Flame is related to Stuxnet or Duqu. Yet the Kapersky Lab found that this is not only a lie, but there are so many likenesses that these viruses could only have been written by the same developers.

To distract the American public from the hacking and cyber-destruction committed by the US government, there is a national call for stricter cybersecurity by the Obama administration. It is the federal government agencies that are empowered to commit cyber-espionage against other nations, while claiming that multi-national corporations, and US infrastructure with assistance of security firms Symantec and McAfee who are facilitating the lie.

More viruses are cropping up as “US government is using cyber technology more widely than previously believed to further its interests in the Middle East.” This serves the Zionist agendas as Obama and Netanyahu collaborate “develop a destructive computer worm to sabotage Iran’s efforts to make a nuclear bomb.”

It has been the goal of these two controlled-puppets that the use of malware and viruses cause Iran’s nuclear power plants to crash while extracting sensitive digital information.

Copyright trolls are adding to the battle over free speech on the internet by submitting a fraudulent DMCA notice of takedown for copyright infringement to a hosting company and force the website owner to remove content without proof of claim.

These fake DMCA notices of takedown documents are created by the copyright troll who is intending to remove information with prejudice. Templates for these fake notices can be found on the web. However, the US patent and copyright office has actual federal forms that are legal and binding.

Copyright trolls do not file legitimate claims and choose to falsify federal documents because their claims (in most instances) do not hold up in court. They are allegations without proof of claim because there is no legitimate claim to be made. Intellectual property and copyright laws are abused quite regularly by professional trolls by making wild accusations without substantial claim or proof.

Copyright trolls litter the court system with frivolous lawsuits based on wild accusations of copyright infringement in order to wear down the victim as well as hoping to squeeze monetary restitution for fraudulent claims. The members of the alternative media as well as readers need to be aware of these individuals who are cloaked in truth yet rife with disinformation. Their intention is to cut off the free flow of information on the internet and stifle voices that are exposing truth for their own selfish gains.

The EFF have reported on copyright trolls that experiment with claiming copyright infringement to “extract settlements from individuals.” These trolls “try to grow businesses out of suing Internet users.”

Globalist-inspired Microsoft corporation have announced that through their Digital Crimes Unit, they have discovered that contrary to reports, malware is not created in “factories” and that even though they were responsible for manufacturing hard drives with malware already installed, the physical facts can be reasoned away by the findings of their own internal investigations. This is just another example of how ludicrous the information coming from the propaganda-filled mainstream media is.

Delivered by The Daily Sheeple

We encourage you to share and republish our reports, analyses, breaking news and videos (Click for details).


Contributed by Susanne Posel of Occupy Corporatism.

Susanne Posel is the Chief Editor of Occupy Corporatism, an alternative news site dedicated to reporting the news as it actually happens; not as it is spun by the corporate-funded mainstream media. You can find Occupy Corporatism on their Facebook page .

Susanne Posel is the Chief Editor of Occupy Corporatism, an alternative news site dedicated to reporting the news as it actually happens; not as it is spun by the corporate-funded mainstream media. You can find Occupy Corporatism on their Facebook page .

Click to comment

More in Controlling the Herd

Advertisement
Top Tier Gear USA
To Top