IS A GEOPOLITICAL CYBER-WAR RATCHETING UP?
There are two separate stories in today's blog which, when considered together, have me wondering. The was shared by W.G., and the second by B., and a thank you to both for taking the time to pass them along. The first concerns a recent hack of the Pentagon's Microsoft servers, and the second a recent policy decision by the Bidenenko regime:
Pentagon ‘assessing systems’ after TENS OF THOUSANDS of servers compromised in global Microsoft hack… blamed on ‘Chinese hackers’
Biden preparing to launch series of ‘clandestine’ cyberattacks against Russia – NYT
Not surprisingly, the Microsoft--Pentagon hack is being attributed to corporate fronts for Communist China:
The US military is reviewing its networks following a hacking spree linked to a vulnerability that gave backdoor access to tens of thousands of Microsoft Exchange servers, in a massive attack the company has blamed on China.
“We are aware of the Microsoft threat intelligence center’s report. We are currently assessing our networks right now for any evidence of impact,” Pentagon press secretary John Kirby told reporters at a Friday presser. “We’re also taking all necessary steps to identify and remedy any possible issues related to the situation.”
Joint Force headquarters… is coordinating with the National Security Agency and the Cybersecurity and Infrastructure Security Agency on guidance and directives to make sure we can protect DoD networks and IT systems.
Microsoft announced the massive cyber breach on its Exchange email platform earlier this week, noting a vulnerability in its servers had given “long-term access” to hackers while attributing the attack to a group named Hafnium – an allegedly “state-sponsored” outfit operating out of China – with “high confidence."
Now, whether or not Communist China actually did hack Microsoft's Pentagon servers - and I have no doubt that they can and would and probably did - is beside the point here. What I find intriguing is that a narrative seems to be being prepared, when one turns to these statements in the second article:
The Biden administration is gearing up to carry out cyberattacks aimed at Russian networks, the New York Times has reported, describing the provocation as a retaliatory measure designed to send Moscow a message.
Citing officials familiar with the operation, the Times said that a “series of clandestine actions” aimed at Russia is expected to begin over the next three weeks and that the cyberattacks are intended to be “evident” to President Vladimir Putin and Russia’s intelligence services, but not to the “wider world.”
The allegedly imminent cyberattack has been framed as a retaliatory measure in response to the high-profile SolarWinds breach. The hack, first reported in December, provided backdoor access to a widely used network-management program distributed by the Texas-based SolarWinds company. The hackers were able to use the exploit to compromise the systems of more than 100 commercial firms around the world, as well as nine US government agencies. Described as one of the largest and most sophisticated cyberattacks to date, it took eight months before the breach was discovered.
Washington has argued that the attack could have only been carried out with the assistance of a foreign government. US intelligence agencies have alleged that the hack was “likely Russian in origin,” but has not provided evidence for the claim. Moscow has denied any involvement in the incident, calling the accusation “yet another unsubstantiated attempt” by the US to smear Russia.
Again, I have no difficulty believing that Russia can, and would hack a foreign nation's networks, and again, whether it did in the instance cited is really beside the point here, for again, a narrative seems to be being prepared; we'll get back to that in a moment. Let's face it, any major power probably has such cyber warfare divisions in most of its intelligence agencies; Britain has admitted as much, and the USA just did by the Bidenenko regime's announcement.
Needless to say, these two articles have my high octane suspicion motor running in overdrive, for as I've often stated in blogs having to do with cyber warfare and other covert intelligence operations, those types of things are games two people can play. Bidenenko has announced it plans some sort of "message" to Mr. Putin to get him to crawl back to the table, but that won't be evident to the general public. Yea... good luck with that. More probably it will simply provoke a measure of like retaliation.
There's something much deeper bothering me about the context for all this. Firstly, were the alleged Chinese and Russian hacks coordinated? Possibly, But digging deeper, I recall those strange attacks in California in recent years, one on an electrical substation at the southern end of Silicon Valley, and the other, a physical attack on internet cabling in San Franfreakshow. In both instances (and particularly the first), the attackers were in and out in a matter of minutes, and were assessed as being "professional jobs," just the sort of things that specops in intelligence might do. (I've blogged about these attacks on this website. Simply search on the website for "California substation attack" and various articles and blogs will come up.)
Then there was a similar incident in Arizona a few years ago, where the internet cable between Flagstaff and Phoenix was physically severed. (See https://gizadeathstar.com/2015/07/you-tell-us-vandals-sever-another-internet-cable-in-california-so-whats-going-on/ and https://gizadeathstar.com/2015/03/internet-service-cut-between-phoenix-and-flagstaff/).
My point in raising these stories is to point out that (1) hacking is only one way to conduct cyber-warfare, and (2) that it appears to have been going on for some time. And that's what disturbs me, because now such incidents - given the narrative "preparation" we are seeing - can be presented as "foreign interference". Electrical power grid hacked and shutdown? It was Russia. Internet servers down? Blame it on China. Again, not that they wouldn't have the capability of doing such things, but such things could be done by anyone with boots on the ground and hackers in a bunker. One could cloak such actions done by oneself, by blaming it on someone else. One could accomplish several "stacked operations and agendas" all at once: interfere with a segment of the population one doesn't like, or which is not on board with the agenda, while blaming it on foreign interference, which might be construed as an act of war. Indeed, policy pronouncements on this score have already been made (See this story from 2011: https://www.wsj.com/articles/SB10001424052702304563104576355623135782718)
Add to this technologies that can mimic and cloak action as "acts of God" or as "acts of nature" - the inconvenient tornado or earthquake or systems of rain that seem stuck in places that feed the Yangtze River - and you get the picture...
See you on the flip side...
Help the Community Grow
Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.
The Biden administration will hold its first high-level talks with Chinese officials in Alaska next week.
Discussions between top officials are likely to focus on China’s policies toward Hong Kong, its pressure on Taiwan, its treatment of Uighurs, and what Washington sees as economic coercion against Australia.
Prepping for a cyber pandemic: Cyber Polygon 2021 to stage supply chain attack simulation
Will Cyber Polygon 2021 be as prophetic as Event 201 in simulating a pandemic response?
I wouldn’t rule it out. Not by a long shot.
There’s no question that there’s cyber-warfare in progress from this side of the monitor. Never mind the semantics, it’s part of the larger information warfare of “Unrestricted Warfare.” It’s most significant manifestations, at least, three decades old now and building with real physical losses.
There were trials and many errors in the late 1980’s and well into the 2000’s. They were quite buggy because of newness to communications as they worked out priorities. Keeping a T1 line in the 90’s was a real pain. Audio-visual-data/text didn’t always play together. Each with different network demands. Phone company didn’t hesitate to bump you off. Dedicated military lines were helpful but not what they were cracked up to be as well as limited for obvious security reasons.
The hacks of Hack’s incorporated (they know who they are), a talented bunch actually, who’s numbers have grown causing white hats to groan and with newer chipsets, higher computing horsepower, and, especially, mobility know their machine contrivances will do much more than play the latest HD game with ease.
Big money operations (state and private) have their special interests and know that that pie has been baked into kilometer sized sections that cross borders – national and international. One’s guess, like STUXNET, most likely well compartmentalized for accumulative effects (when *clicked*) with mutated software and piece meal hardware. Got to love those “Raspberry Pi 4’s” that pack neatly in a knapsack. They certainly have a handle on the terrain and assets. In many instances, the distinction between basement hacks and fully funded corporate and state level hacks have been blurred unless you’re in their loop. Over the last year with a lot of time to play more than games for quick payouts.
Hardening from mobile wireless threats are ongoing.
You forgot the fire in Strasbourg Joseph just wondering what the torches were coving up. You tell me situation. It seems like our elites are addicted to WWII or the Indian Wars with both China and Russia being the newest hostile tribes the USA is fighting.
Could all this “naming each other” out IN the “open” US,RUSSIA,CHINA … be each other “talking” to as John Lennon said …there’s nazis in the bathroom. just below the stairs? (Nobody Told Me ) & an bit off topic …. trucking companies are HIRING big time !?! I mean big #’s ALL LTL’s freight is just blowing out our docks !?! Humm ? trucking industry is the canary in the mines folks ?
Pyongyang and Tehran cannot be left out of the name calling. They might feel insulted.
Mike Adams, The Health Ranger guy, sells organic products and supplements from his warehouses in the Austin TX area, remarked the other day his customers are calling two weeks after the packages are picked up by the carrier to say they have not received it yet.
All we can be sure of is that the China and Russia stories, as well as the story about the U.S. planning a “clandestine” (publicly announced!) retaliation, are fairy tales. I’d guess somebody else’s spec ops or maybe corporate competitors sabotaging one another.
To clarify, the “somebody else” could be somebody close to, or identical to, the ones putting out these stories…
Think the movie Moon 44 FiatLux
Da! The ducks are flying. Have been on over drive and in overtime for some time. Dezinformatsiya of press, social media, and major networks is rampant with later day operatives pulling threads of a tapestry they haven’t a clue but for profit.
The mainstream feeds are now deciding
it’s time to let the useless eaters know about the cyberwarfare.
After all; when the fail-by-design globalized-food-chains go down,
blame Russia[first post modern state
and definitely not Red/USSA-CCP.
to the post…
First off, Microsoft is heavenly designed for penetration; by the score. It’s laughably simple. In fact, the internet, is very hackable by design. Why, one would think the internet was first designed[ARPA], and birthed by the U.S. military; all the while, the Democrats were furiously painting said U.S. military, as red(USSA/CCP) as can be.
The press should start closing every reports out; by saying, “Well John, I wonder what Russians will be blamed for; in our news cast tomorrow?
Of course, all this purposed cyberwarfare coverage is NWO scripted.
Expect a false flag attack[USSA attacks itself, to engineer a crisis?];
What’s mass starvation?
A primary communist[WEF/CCP/USSA] tool to shape
useless eaters into produce and flowers?
The attack will use many cyber tools; including those it used to steal the USA election from Trump, and gift it to a clueless CCP Joe, Democratic Party sock puppet. And yes, the Democratic Party has been, virtually a foreign government[think of the color RED all over]; especially, of late.
There’s the NWO; the Red vs Blue States; the oligarchs, using Acts of God[including, for example, the military for fast track bases of operation, literally bases in California fire zones]; the Nazi International, to create friction between oligarchs; the hidden hand of Cosmic War players; and others, of script?
Either way; a wicked false-flag cyber-storm, comes this way.
. . .Some 80 plus patches last update. . .
Which reminds me.
Microsoft got the global monopoly on computer operating systems.
That’s a heel of a lot of power/money.
and NOW, “they” want You to be injecting their operating systems.
The above, is a prime example of the black magick of power
when alchemically twisted, in a Twentieth-Worst Century witches brew of technological power structures & technologies
I hate to push that fast forward button again;
to see what wicked brew the coming future brings;
if that black magick cauldron of witches brew
being crafted NOW; is not stopped by mankind, in toto?
Stop the madness!
Economy is running kind of slow except for government handouts. Kind of reminds me of the computer viruses scam run by tech companies wanting to sell protection from such. First they create a bunch of software for the hackers to use as they promote hacking through media to get various scape goats into it for cover of their own hacking activities. (I suspect many hackers are not as sophisticated as we are led to believe by the propaganda movies. Years ago I saw where you could down load a bunch of hacking software.) Then they could use hacking for intelligence purposes and criminal enterprises and use the scapegoats they also encouraged and created to take the blame. With government hand outs made possible only by government regulated infinite money printing presses now available I’m sure there are companies that want new contracts to get their hands on as much of that newly printed money as they can by creating an urgent need for their product .
There has been much coverage in the UK media about cyber vulnerabilities / backdoors in many social media apps and mobile phones. It is widely acknowledged and reported that Israel is a world leader in cyber warfare, cyber hacking and cyber security.
See following articles:
I would imagine most Governments practice cyber warfare to varying degrees.
Based on what we know of history, you can’t believe anything the US Govt. says.
If computer / internet data theft, alteration of systems, emplacement of false data is occurring, it’s because the systems are being left vulnerable due to incompetence or by intention.
I suppose could computer programs like long underwear can’t be made or sold without a “back door”.
Otherwise they would be useless for nefarious uses and data dumping.
I say intention but as Robert Heinlein said never underestimate human stupidity Ragiza
Fire destroys big server complex in Strasbourg… well accidents do happen…
It seems odd that an attack would be published in the NYT along with the proposed time frame — what purpose does that serve? There is a race to dominate the suborbital platform, and implement wide-scale social monitoring and digital currencies — all requiring power (computing and electricity). It could be any type of entity – a software company, military or nation-state – hacking one another, like moves on a chessboard to nudge opponents in the desired direction or cause distraction or delays. Eventually, we’ll be looking at Ender’s Game.
Exactly. “The Times said that a ‘series of clandestine actions’ aimed at Russia is expected”? Uh… If it has been announced to the public, it is, by definition, no longer clandestine. Just how stupid do the propagandists think we are? Or how stupid has the general public become? It’s mind-boggling!
Completely agree with your ‘speculation’.
It is widely acknowledged that Israel is the world leader in cyber warfare, cyber hacking and cyber security.
See following articles:
VATICAN CASUS BELLI
Pope Satan wants sabre to rattle,
so he can gaslight his cattle,
for him to stay afloat
by luring fodder into battle.
When the monarchs of Europe step out of their picture, and become political activists, that is always prelude to war.
That is so, because, they are facade for mafia, and, as secret protectors of special interests, they normally work hidden.
Today, all monarchs are in a nervous gamble, because honor is off the table, when it becomes popular to burn your own flag.
That is called Russian roulette.