Know More News Premiered May 22, 2019 Know More News with Adam Green
https://www.KnowMoreNews.org/ Support Know More News! Paypal Donations - https://www.paypal.me/KnowMoreNews Patreon
- https://www.patreon.com/AdamGreen Venmo - @Know-More-News
Solutions: Physical Media | The Corbett Report Official LBRY Channel
SHOW NOTES AND MP3: https://www.corbettreport.com/?p=38802
The Grand Leader of The Technofascist Great Reset Klaus Schwab has issued his pronouncement: our digital
infrastructure and even the power grid that enables it is at great risk of global disruption from cyberattack. And
you know what? He's right. It's just that the most likely cyberterrorists are the criminals in government and in
organizations connected to the World Economic Forum. In any case, we shouldn't rely on the idea of important
information being forever and always available at the click of a button. So what ever can we do to safeguard the
books, music and media that we hold dear? What people have always done: keep a physical copy of it. Today James and
his guests extol the virtues of physical media in an increasingly digital age.
The Cyberpandemic Has Begun: SolarWinds + FireEye - Anything can happen now
ice.age.farmer | First published at 01:06 UTC on December 15th, 2020.
The WEF's proclaimed Cyberpandemic has begun: defense, power, water, finance, and our supply
chain are all vulnerable to massive disruptions after FireEye & SolarWind have unleashed weapons of mass
digital destruction AND unlocked the back doors of governments, militaries, and nearly the entire Fortune 500.
Christian breaks it down, and asks: "Who stands to benefits from this Cyberpandemic?" in this Ice Age Farmer
broadcast.
"Next Crisis Bigger than COVID" - Power Grid/Finance Down - WEF's Cyber Polygon
ice.age.farmer | First published at 18:46 UTC on November 15th, 2020.
The World Economic Forum warns of a new crisis of "even more significant economic and social implications than
COVID19." What threat could possibly be more impactful? Christian breaks down the WEF's "Cyber Polygon" tabletop
exercise, its participants, and predictive programming around a looming large scale cyberattack on critical
infrastructure that would unleash a Dark Winter and help to usher in the Great Reset.
Jeremy Jurgens, WEF Managing Director ( https://youtu.be/5ZRg5kiH9Is ):
"I believe that there will be another crisis. It will be more significant. It will be faster than what we've seen
with COVID. The impact will be greater, and as a result the economic and social implications will be even more
significant."
Klaus Schwab ( https://youtu.be/0DKRvS-C04o )
:
"We all know, but still pay insufficient attention, to the frightening scenario of a comprehensive cyber attack
could bring a complete halt to the power supply, transportation, hospital services, our society as a whole. The
COVID-19 crisis would be seen in this respect as a small disturbance in comparison to a major cyberattack.
To use the COVID19 crisis as a timely opportunity to reflect on the lessons the cybersecurity
community can draw and improve our unpreparedness for a potential cyber-pandemic."
Over a month ago we featured an article
titled The NWO Agenda Would Move Forward with This One Simple Act, which stated the one event that could accomplish all of the agenda’s goals in one shot
would be “a false flag cyber attack on Western banking institutions that they can pin on Iran.”
Please watch this exact
scenario unfold in this short
ABC news clip from a few days ago:
Who Will be Blamed for Cyber Pearl
Harbor?
Published on Jan 10, 2015
As the world is on high alert with the terror attack in France, government officials are hinting
at a coming cyber attack. Snowden warns cyber war will be more damaging to the U.S. than any other nation. While a
curious website has popped up claiming to be part of the official #OpCharlieHebdo movement. However, Anonymous, who
today declared war against all terrorists by shutting down jihadist websites, denies the connection.
Most Extensive Cyber Attack On American
Banks Ever! Launched From The Middle East & Happening Now!
With President Obama ready
to sign an
executive order to control the Internet in the name of cyber
security, could it be more obvious that this “cyber attack” is a total set up? Especially since all versions
of Internet control legislation have failed to pass in normal government channels bothdomestically and internationally.
Are we expected to believe that sophisticated Muslim hacktivists attacked US banks
because they were angry about a movie that was produced in America? That’d be like attacking Afghanistan or
Iraq after 15 Saudis supposedly attacked us, ohh wait…that did happen.
Is this really the best story they can come up with? It was so predictable
that it makes it that much more laughable. But the motive being pinned on the pathetic anti-Muslim movie is the
real kicker.
It’s sad to see Richard Clark in the video above actually take this seriously.
Talk about an establishment sellout.
I call major bullshit on this story. It stinks to high heaven. What do
you think?
Go Here To Learn About The Slipper Slope Of Executive Orders:Executive Orders
America and Israel Created a Monster
Computer Virus Which Now Threatens Nuclear Reactors Worldwide
The virus appears to have spread to other countries.
One of the world’s top computer security experts – Eugene Kaspersky – said this week that the virus has attacked
a Russian nuclear reactor. As The Register notes:
The infamous Stuxnet malware thought to have been developed by the US and Israel to disrupt Iran’s nuclear
facilities, also managed to cause chaos at a Russian nuclear plant, according to Eugene Kaspersky.
The revelation came during a Q&A session after a speech at Australia’s National Press Club last week, in
which he argued that those spooks responsible for “offensive technologies” don’t realise the unintended
consequences of releasing malware into the wild.
“Everything you do is a boomerang,” he added. “It will get back to you.”
***
“Unfortunately, it’s very possible that other nations which are not in a conflict will be victims of cyber
attacks on critical infrastructure,” said Kaspersky.
“It’s cyber space. [There are] no borders, [and many facilities share the] same systems.”
Not finished there, Kaspersky also claimed to have heard from “Russian space guys” in the know that even
machines on the International Space Station had been infected “from time to time” after scientists arrived
aboard with infected USBs.
Watch for yourself:
Other security experts agree.
As British security website V3 – in an article entitled “Stuxnet: UK and US nuclear plants at risk as malware
spreads outside Russia” – reports:
Experts from FireEye [background] and F-Secure [background] told V3 the nature of Stuxnet means it is likely many power
plants have fallen victim to the malware ….
F-Secure security analyst Sean Sullivan told V3 Stuxnet’s unpredictable nature means it has likely spread to
other facilities outside of the plant mentioned by Kaspersky.
“It didn’t spread via the internet. It spread outside of its target due to a bug and so it started traveling
via USB. Given the community targeted, I would not be surprised if other countries had nuclear plants with
infected PCs,” he said.
Director of security strategy at FireEye, Jason Steer, mirrored Sullivan’s sentiment, adding the insecure
nature of most critical infrastructure systems would make them an ideal breeding ground for Stuxnet.
***
Steer added the atypical way Stuxnet spreads and behaves, means traditional defences are ill equipped to
stop, or even accurately track the malware’s movements.
“It’s highly likely that other plants globally are infected and will continue to be infected as it’s
in the wild and we will see on a weekly basis businesses trying to figure out how to secure the
risk of infected USB flash drives,” he said.
Know More News Premiered May 22, 2019 Know More News with Adam Green
https://www.KnowMoreNews.org/ Support Know More News! Paypal Donations - https://www.paypal.me/KnowMoreNews Patreon
- https://www.patreon.com/AdamGreen Venmo - @Know-More-News
Computer Experts Discover Flame and Stuxnet Related
If research conducted
byKaspersky Labs is correct, the Flame
virus is related to a previous malware virus developed by Israel and the United
States.
Kurt Nimmo Infowars.com June 112, 2012
Alexander Gostev, an expert
at Kaspersky Labs, said in an email that the Russian cyber security software company discovered a similarity
between a subset of the code used in Flame and code used in the Stuxnet virus.
Stuxnet was developed collaboratively between Israel and the United States for the
explicit purpose of disabling computer networks in Iran, although Israeli intelligence denies this, according
toMossad agents who
say they created the malware and Obama is taking credit for unleashing it against Iran’s fledgling nuclear
program as propaganda in his re-election bid.
According to authorDavid E. Sanger, Obama
decided to accelerate cyberattacks initiated during the Bush administration. Sanger says the project’s codename
was Olympic Games and it began in 2006.
Flame is described as the mostsophisticated malware to date. After it infecting a Microsoft Windows computer, it can record audio and keyboard activity,
take screenshots and monitor network traffic. Flame can record Skype conversations and grab data via Bluetooth
from nearby devices like cellphones.
Like Stuxnet, Flame was specifically deployed on computer systems in the Middle
East. Kaspersky’s research reveals that “a huge majority of targets” were within Iran.
New Computer Virus "Flame" Most Sophisticated
& Complex Cyber Weapon to Date
The discovery of a malicious computer program
that appears to be collecting sensitive information from Iran and others indicates the global cyberwar has moved to
a new level, warn security experts.
Kaspersky Labs, the Russian internet security company that discovered the malware, codenamed Flame, said it was
more complex and sophisticated than any of the cyberweapons it has seen to date. "The Flame malware looks to be
another phase in this war," said Eugene Kaspersky, co-founder of Kaspersky Lab.
At the end of April, computers at Iran's oil ministry were reported to have been attacked by hackers, and experts
at Symantec, the US IT security company, said on Monday that parts of the Flame program were identical to the
malware used in that attack. The incident was played down by the government at the time and it was unclear if any
data was lost.
Earlier this year the head of Iran's Civil Defence Organisation had also said that the country's energy sector had
been subject to an increasing number of cyberattacks over the past two years. Flame is thought to have been in
operation since 2010.
The Stuxnet virus raised widespread panic when it was discovered in 2010, because it was believed to have caused
physical damage at Iran's nuclear facilities, the first known computer worm to target industrial controls. While
Flame is not thought to have caused this kind of damage, it appears to be able to spy on organisations in a number
of ways, including switching on microphones attached to a computer to record conversations and sounds.
Orla Cox, senior security operations manager at Symantec, said the code was likely to have been written by a nation
state. "It is very professionally written and does not even look like a piece of malware. We suspect there is some
nation state involvement because of the funding you would need to have behind this."
Apart from anything else, she said, the amount of information being collected by the program was so vast, it would
require large resources to sift through it all. "This is a fully-featured spying program that is grabbing anything
it can," Ms Cox said.
Only a few hundred individuals appear to have been affected by the malware, Ms Cox said, and security experts were
still trying to see whether there was any link or pattern to those affected.
Stuxnet and Duqu, another malware program, are widely believed to have been created by the US and Israeli
governments, although neither country has confirmed their involvement.
Iran's armed forces have created a special unit to defend the country against computer attacks, which works closely
with the defence, telecommunications and intelligence organisations.
“Currently there are three known classes of players who develop malware and
spyware: hacktivists, cybercriminals and nation states,” Kaspersky’s chief malware expertVitaly Kamluk told
the BBC in late May.
“Flame is not designed to steal money from bank accounts. It is also different
from rather simple hack tools and malware used by the hacktivists. So by excluding cybercriminals and hacktivists,
we come to conclusion that it most likely belongs to the third group… The geography of the targets and also the
complexity of the threat leaves no doubt about it being a nation-state that sponsored the research that went into
it.”
Over the last few years, the U.S. government has hyped an emerging cyber threat in
near apocalyptic terms and the establishment media has echoed the supposed threat incessantly. The so-called
defense industry – the military-industrial complex president Eisenhower warned about as he left office – has
exploited the cyber threat and turned it into a multi-billion dollar industry.
ISRAEL CYBER ATTACK - STUXNET COMPUTER VIRUS - Chertoff
Group
Israel and the
United States have emerged as the prime suspects behind the Stuxnet worm attack, which has infected the Iranian
nuclear plant at Bushehr, following the discovery that a "wealthy group or nation" must have been responsible for
the malware assault.
On Sunday, Infowars speculated that Stuxnet was a false flag intended to both target Iran and provide a pretext for
the implementation of draconian cybersecurity legislation.
That suspicion has been greatly enhanced by new evidence which proves the virus was "created by experts working for
a country or a well-funded private group," according to Liam O Murchu, manager of security response operations at
Symantec Corp.
"A number of governments with sophisticated computer skills would have the ability to create such a code. They
include China, Russia, Israel, Britain, Germany and the United States," states the Associated Press report, clearly
indicating that the US, Israel, Great Britain, or a combination of the three were behind the attack.
The Stuxnet worm is now "rampaging through Iran," causing havoc to the country's industrial infrastructure, having
already infected at least 30,000 IP addresses.
There would be no motivation whatsoever for Russia to be behind the attack because they have helped fuel the
Bushehr reactor. China has backed US calls for sanctions in response to the nuclear plant, but it can hardly be
claimed that the Chinese have aggressively opposed its construction and fueling. Indeed, China has been a regular
exporter of nuclear technology and assistance to Iran in recent years.
That leaves three prime suspects, all of whom have followed identical foreign policies in vehemently opposing
Iran's self-proclaimed goal of developing peaceful nuclear energy.
Top globalists such as Richard Falkenrath, a principal at Chertoff Group and a Bloomberg Television contributing
editor, already blamed Israel for the attack before evidence emerged that the virus was the work of a sophisticated
nation state.
If the United States' involvement in the attack was to be confirmed, it would completely discredit the foundation
of cybersecurity legislation, which is being promoted as a means of defending against cyber attacks launched by
terrorists and other nation states.
However, if any US involvement remains concealed, Stuxnet will be hyped as a primary reason for rushing the passage
of the amalgamation of the Lieberman and Rockefeller bills, which as we have documented, have little to do with
security and everything to do with shutting down free speech on the Internet, despite the fact that Stuxnet was
distributed through a physical USB device and not via the public Internet.
Lieberman's version of the original bill includes language that would hand President Obama the power to shut down
parts of the world wide web for at least four months with no congressional oversight. The combined version appears
to shift that responsibility to DHS, who under the pretext of a national emergency could block all Internet traffic
to the U.S. from certain countries, and close down specific hubs and networks, creating an ominous precedent for
government regulation and control over the Internet.
Cybersecurity legislation is being promoted as a vital tool to defend the nation's critical infrastructure against
cyber- terrorism. However, as we have highlighted, the threat from cyber-terrorists to the U.S. power grid or water
supply is minimal. The perpetrators of an attack on such infrastructure would have to have direct physical access
to the systems that operate these plants to cause any damage. Any perceived threat from the public Internet to
these systems is therefore completely contrived and strips bare what many fear is the real agenda behind
cybersecurity -- to enable the government to regulate free speech on the Internet.
Fears that cybersecurity legislation could be used to stifle free speech were heightened when Senator Lieberman
told CNN's Candy Crowley that the real motivation behind the bill was to mimic the Communist Chinese system of
Internet policing.
"Right now China, the government, can disconnect parts of its Internet in case of war and we need to have that here
too," said Lieberman.
Lockheed Martin, Boeing,
Northrop Grumman and related defense and tech companies have vigorously lobbied the federal government about
“growing cyberthreats to national security and corporate America, but they also make millions of dollars each year
selling a variety of cybersecurity programs, tools and solutions to government and
business,”Politico reported on
May 30.
Israel and the United States – the CIA and Mossad – represent the vanguard of the
emerging cyber security threat. Considering the history of government and its array of clandestine and self-serving
false flag attacks, this reality is hardly surprising. It demonstrates that like al-Qaeda, the cyber threat is
designed to create a crisis that can only be addressed by government and the military industrial
complex.
Stuxnet: Another “Conspiracy Theory”
Turns Out To Be True
Paul Joseph Watson Infowars.com January 18, 2011
Despite numerous establishment
blogs and websites at the time debunking the claim that Israel and the United States were behind the Stuxnet virus
attack, that fact has now been admitted, leaving many with egg on their faces and proving once again that the
“conspiracy theorists” were right all along.
Stuxnet False Flag Launched For Web Takeover! - Alex Jones
Tv 1/3
The Alex Jones Show from
September 27, 2010, in which Israel and the United States were identified as being behind the Stuxnet
attack.
After months of speculation, our original hypothesis that the US and Israel were
responsible for the computer worm attack on Iran’s nuclear facilitieswas confirmed on Sunday.
US and Israeli intelligence services collaborated to develop a destructive
computer worm to sabotage Iran’s efforts to make a nuclear bomb, The New York Times reported Sunday.
The newspaper quoted intelligence and military experts as saying Israel has
tested the effectiveness of the Stuxnet computer worm, which apparently shut down a fifth of Iran’s nuclear
centrifuges in November and helped delay its ability to make its first nuclear weapons.
Back in September,
we wrote several articles in which we identified “Israel and the
United States….as the prime suspects behind the Stuxnet worm attack,” following the revelation that the virus was
“created by experts working for a country or a well-funded private group.”
While the US government and the compliant, castrated corporate media were
dutifully regurgitating the claim that Russia or China were behind the attack, we pointed out that neither country
had any motivation to launch an assault that primarily affected an Iranian nuclear campaign that both nations had
largely supported.
Following our columns in late September pointing to the US and Israel as the
culprits, a number of establishment websites and blogs put out hit pieces that attempted to debunk the notion that
Stuxnet was a false flag.
- In an article entitledDebunking the Bunk of Stuxnet, the popular
About.com website claimed that “none of the evidence” had “any direct connection” to Israel being behind the
attack.
-The Economist
reported that there was “no specific evidence” Stuxnet was an Israeli
cyber-missile aimed at Iran.
- In an October 5 piece entitledStuxnet: Fact vs.
theory, CNet’s Elinor Mills wrote that there was “no hard evidence”
behind the claim that, “The malware was distributed by Israel or the United States in an attempt to interfere with
Iran’s nuclear program.”
Don’t expect to see retractions or apologies from any of the debunkers who
dismissed the obvious evidence that the United States and Israel were behind the cyber-attack, which has now been
confirmed.
Exploiting the threat of cyber-attacks launched by their own cybersecurity
departments, the US and Israel are not only placing in peril the Internet as a free and open forum, they are also
heightening the risk of devastating environmental catastrophes and global instability.
The Stuxnet virus has caused extensive damage to the Bushehr reactor, leading to
the risk of a new Chernobyl-style nuclear disaster, according to Russian officials.
“The Russian scientists’ report to the Kremlin, a copy of which has been seen by
The Daily Telegraph, concludes that, despite “performing simple, basic tests” on the Bushehr reactor, the Russian
team “cannot guarantee safe activation of the reactor,”writes Con Coughlin.
As we wrote back in September, “If the United States’ involvement in the attack
was to be confirmed, it would completely discredit the foundation of cybersecurity legislation, which is being
promoted as a means of defending against cyber attacks launched by terrorists and other nation states.”
Now that this has been confirmed, the National Cyber Security Division unit of
Homeland Security has lost all credibility and should be disbanded immediately. We have the very culprits behind
devastating cyber-attacks that could spark nuclear meltdowns or global warfare hyping the threat of cyber-attacks
as a justification to give themselves more power and control over the Internet.
This is a clear example of how the US and Israel stage crises that allow them to
pose as the saviors while continuing to insist that cybersecurity threats are the work of external hackers and
rogue states.
It also underscores how the establishment media is routinely complicit in deriding
any wrongdoing involving the United States or Israel as a “conspiracy theory,” and attacking the character of those
who make such claims.
So next time the corporate press calls something a baseless “conspiracy
theory,” remember that Stuxnet was yet another example of the “conspiracy theorists” getting it right, by merely
having a basic grasp of geopolitical maneuverings and understanding how the US and Israel stage false flag events
to advance their own political agendas.
—
Paul Joseph Watson is the editor and writer forPrison Planet.com. He is the author of Order Out Of Chaos. Watson is also a fill-in host for The Alex Jones Show.
Watson has been interviewed by many publications and radio shows, including Vanity Fair and Coast to Coast AM,
America’s most listened to late night talk show.
U.S. Caught Creating Three New
Computer Viruses
Obama administration touts cybersecurity while conducting
cyber warfare
Paul Joseph Watson Infowars.com Tuesday, September 18, 2012
While routinely
touting the necessity for tighter controls over the Internet in the name of cybersecurity, the U.S. government has
again been caught creating computer viruses to wage cyber warfare in the Middle East.
Researchers working for both Kaspersky and Symantec have separately discovered that
the United States is almost certainly responsible for three new viruses that are being used in Lebanon and
Iran to conduct espionage, having already been identified as the culprits behind the 2010 Stuxnet virus and
this year’s closely related Flame virus.
Kaspersky and Symantec experts are still unsure as to what the newly
discovered viruses are designed to do, but have confirmed that they are operating in the Middle East, including
Iran and Lebanon, and that the, “approach to uploading packages and downloading data fits the profile of military
and/or intelligence operations.”
The new viruses, programs code-named SP, SPE and IP, use malware
packages that try to “communicate with command and control servers.” The new viruses could be offshoots of the
Flame virus or completely different pieces of software.
“The findings are likely to bolster a growing view that the U.S.
government is using cyber technology more widely than previously believed to further its interests in the Middle
East,” reports Haaretz.
“The United States has already been linked to the Stuxnet Trojan that attacked
Iran’s nuclear program in 2010 and the sophisticated Flame cyber surveillance tool that was uncovered in
May.”
As the Washington Post reported earlier this year,
the United States and Israel were also responsible for jointly developing the Flame virus, a huge malware assault
that monitored Iran’s computer networks.
Despite months of inaccurate speculation blaming Russia or China for the outbreak
of the 2010 Stuxnet virus, it was eventually admitted by the New York Times that, “US and
Israeli intelligence services collaborated to develop a destructive computer worm to sabotage Iran’s efforts to
make a nuclear bomb.”
The U.S. government’s continual efforts to develop computer viruses as a tool of
cyber warfare might be more palatable were it not for the constant push by the executive and legislative branches
to censor and regulate the Internet domestically in the name of cybersecurity.
Urging President Obama last month to pass an executive order
that critics have denounced as another federal power
grab over the Internet, Senator Jay Rockefeller justified the
EO by claiming it was needed “to protect this country from the cyber threat,” even as the U.S. simultaneously
launches aggressive cyber warfare campaigns against other countries.
Indeed, viruses created by the United States and Israel have even been cited as
proof that restrictive cyber security legislation needs to be rubber stamped – by the very same government allied
with the intelligence networks creating the viruses.
As we reported back in 2011, despite initial evidence
clearly indicating the U.S. and Israel were behind the Stuxnet attack, a fact that was subsequently confirmed,
major news websites still parroted the official narrative that Russia or China were to blame, even going to the
lengths of ridiculing anyone who suggested otherwise as paranoid conspiracy theorists.
While claiming that it needs more power over the world wide web to prevent the
spread of hostile computer viruses that could cripple U.S. infrastructure and sensitive networks, the U.S.
government itself is creating those very same computer viruses to spy on and attack infrastructure and sensitive
networks in other countries.
*********************
Paul Joseph Watson is the editor and writer
for Prison
Planet.com. He is the author of Order Out Of Chaos. Watson is also a
regular fill-in host for The Alex Jones Show and Infowars Nightly News.
Obama Launches False Flag on Internet to Take it
Over
Inventor and scientist Danny Hillis warns that the Internet has "expanded it way beyond its
limits," and is set for a "disaster," calling for an 'Internet Plan B' that would operate in times of
emergency.
Hillis is the founder of Thinking Machines Corporation, which developed the Connection Machine, a series of
supercomputers designed by Hillis while he was working at MIT. http://www.infowars.com/tech-guru-war...
Former NSA Head Promotes Chinese Style Internet
Takeover
During a speech at St. John's Episcopal Church yesterday, former NSA and CIA director Michael
Hayden advocated a move towards a Chinese-style world wide web where users are forced to identify themselves before
posting online content. http://www.infowars.com/former-nsa-di...
FBI: Cyber Attacks Justify Internet Kill
Switch
Paul Joseph Watson explains why the real agenda behind cybersecurity is political
oppression and the death of free speech on the Internet, and how the entire globe is now implementing Chinese style
censorship policies to change the nature of the world wide web as we know it forever.
The model Senator Joe Lieberman has identified as the goal of cybersecurity for America is centered around keeping
people oppressed by eliminating any means of widespread dissent and preventing people from organizing politically.
It has nothing to do with providing security against foreign hackers and terrorists and everything to do with
strangling free speech critical of the state.
How to Defeat CISPA Once And For
All!
From SOPA and PIPA to ACTA to CISPA to the TPP and now back to CISPA, internet activists have
been caught up in a deliberately bewildering game of whack-a-mole with freedom-crushing legislation. Now, ISPs are
doing an end run around the whole legislative process altogether and voluntarily collaborating with the
entertainment industry to spy on their own customers. All of this is enough to leave concerned netizens
demoralized, and in the war of attrition that is exactly the goal. Join us today on The Corbett Report as we
explore a real, grassroots, alternative solution to the problem of internet censorhip that can help to end this
government/corporate control over our communication once and for all.