CIA-Sponsored Cyber Attacks to Legitimize DHS Big Brother Control Grid.
September 30, 2012
The US government-sponsored surveillance system is being built with the assistance of federal agencies, state and local law enforcement, telecommunications technology, websites, search engines, private sector corporations and data collection software. To justify the need for a cybersecurity legislation that will enable the US government to spy on every American citizen without purpose other than to create a totalitarian control grid, false flag attacks are incorrectly portrayed by the Obama administration in order to scare Congress into following tail behind this globalist puppet.
Back in March, DHS, the FBI and Obama administration officials demonstrated for Senators a fake take-down of US infrastructure to coerce them into supporting the Cybersecurity Act of 2012. The focus of the fake attacks were US banks, power grids and telecommunications systems.
When creating a corporate-surveillance grid, the work of the military-industrial complex, mainly the Department of Defense (DoD), who created the internet we know today and controls its direction with orders coming from the executive branch.
The Obama administration is circumventing the Congress with an executive order to create his own law concerning internet lockdown after the Cybersecurity Act of 2012 was voted down last month.
Obama is elevating the power of the Department of Homeland Security (DHS) with his executive order in draft form that will establish cybersecurity standards because the US power grids will be protected from attacks.
In 2011, the DHS claimed that American industry and power grids are vulnerable to attacks from hackers. They explained that foreign governments will infiltrate industrial infrastructure and cause havoc. Yet, it is the US and Israeli governments who have used cyber-attacks to terrorize Middle Eastern nations and their power grid infrastructure with Flame and Stuxnet.
According to Jay Carney, White House Press Secretary, Obama may just write an executive order to ensure his cybersecurity agenda is implemented. “In the wake of Congressional inaction and Republican stall tactics, unfortunately, we will continue to be hamstrung by outdated and inadequate statutory authorities that the legislation would have fixed. Moving forward, the President is determined to do absolutely everything we can to better protects our nation against today’s cyber threats and we will do that.”
Caitlin Hayden, White House spokesperson, in regard to Obama writing an executive order to make sure that his designs for the internet are realized, said: “An executive order is one of a number of measures we’re considering as we look to implement the president’s direction to do absolutely everything we can to better protect our nation against today’s cyberthreats. We are not going to comment on ongoing internal deliberations.”
A leaked version of the executive order on cybersecurity reveals the creation of an “infrastructure cybersecurity council manned by the US Department of Homeland Security that will be staffed by members of the departments of defense, justice and commerce, and national intelligence office.”
Experts agree that the US power grids are rarely attacked or hacked into, yet the US government is using the general public’s ignorance against them for the sake of gaining social support for their ultimate Big Brother surveillance system. It is understood that “To start, these systems are rarely connected directly to the public internet. And that makes gaining access to grid-controlling networks a challenge for all but the most dedicated, motivated and skilled — nation-states, in other words.”
The National Security Agency (NSA) would have us believe that hackers are becoming “disruptive and destructive” which causes the ever present possibility of security breaches directed by nameless, faceless groups like Anonymous. The US government purveys the false flag of hackers somewhere out there, waiting in the shadows to attack and bring down our digital mediums.
On September 12th, the House of Representatives passed an extension of the Foreign Intelligence Surveillance Act (FISA) that give the US government allowance to spy on American communications in the name of discerning terrorist activity. This passage gives the NSA over-reaching power to conduct encompassing digital surveillance. According to Robert Litt, General Counsel of the Office of the Director of NSA, this capability is an “incredibly valuable source of foreign intelligence information that I think it’s fair to say has been critical to protecting our country over the last few years. I know of specific incidences both involving terrorist acts and involving other kinds of threats where we have been able to thwart them or gain significant insight into them as a result of this collection activity.”
FISA has allowed the US government to collect massive amounts of data on unsuspecting Americans. Opposition came from Senator Ron Wyden who explained: “My concern has long been that the challenge is to ensure that we are protecting the well-being of our people – and there are certainly threats overseas – while at the same time standing up for those extraordinarily important values of liberty, and that we strike the balance…And my concern is that there is a substantial amount of evidence that that balance is not being struck.”
Justification for the continued use of FISA is that these intrusions into American’s private communications are searching for the US government-sponsored terrorist faction known as al-Qaeda. David Kris, former top anti-terrorism attorney at the Justice Department, asserts that: “. . . an authorization targeting ‘al Qaeda’ – which is a non-U.S. person located abroad – could allow the government to wiretap any telephone that it believes will yield information from or about al Qaeda, either because the telephone is registered to a person whom the government believes is affiliated with al Qaeda, or because the government believes that the person communicates with others who are affiliated with al Qaeda, regardless of the location of the telephone.”