When an extremist group shuts down US infrastructure, it’s labeled a terrorist attack, but when the US does it to another country, it’s merely cybersecurity
Paul Joseph Watson
Monday, October 25, 2010
While proponents of cybersecurity continually emphasize the necessity of passing legislation that will hand the Obama administration the power to shut down the Internet in the name of defending critical infrastructure, every indication suggests that cybersecurity is nothing less than an offensive agenda to enable the US government to launch its own attacks against other groups and countries.
This fact is underscored again with a newly released Air Force manual that describes one aspect of the cybersecurity objective as “shutting down electrical power to key power grids of enemy leadership.”
So if an extremist group shuts down the US power grid, it’s a terrorist attack. If another country does it, it’s an act of war. But when the Air Force does it to someone else, it’s merely part of cybersecurity.
“Noah Shachtman, a contributing editor to Wired magazine and a fellow at the Brookings Institute think tank, said even the limited mention of offensive operations in the manual surprised him,” reports the Washington Post.
“That’s usually not the kind of thing we talk about doing to others,” Shachtman said. “The offensive stuff is supersecret.”
We’re constantly being told that the threat of cyber warfare is so grave that the government needs to be empowered to close down parts of the world wide web on a whim with no congressional approval.
And yet every notable act of cyber warfare has been launched by the United States government or its allies.
(ARTICLE CONTINUES BELOW)
Take the Stuxnet malware attack for example – which was specifically crafted to attack Iran’s Iran’s Bushehr nuclear reactor – we’re told that this is an ominous sign that deadly cyber warfare has begun and that cybersecurity legislation must be urgently passed to defend the US and its allies against such threats.
And yet every indication suggests that Israel itself launched the attack to derail Iran’s nuclear energy program.
After analyzing the coding behind Stuxnet in detail, Symantec’s Liam O’Murchu concluded that the most likely culprit behind the attack was Israel.
“As for suggestions that Israeli intelligence may have authored the virus, O’Murchu noted that researchers had uncovered the reference to an obscure date in the worm’s code, May 9, 1979, which, he noted, was the date on which a prominent Iranian Jew, Habib Elghanian, who was executed by the new Islamic government shortly after the revolution,” reports Threat Post.
In addition, the recent attacks on Tea Party websites that were simultaneously running fundraising campaigns for anti-incumbant candidates have all the hallmarks of a politically-driven hack launched by the White House or Democrat operatives.
So while the federal government and its sycophantic parrots in the media ceaselessly bang on about cybersecurity being necessary to defend against cyber-attacks, the United States and its allies are launching cyber-attacks and then invoking them as a justification to prove that the threat is real.
This would be akin to someone making a point about the dangers of rising gun crime by shooting everybody in the head and then saying, “see I told you so!”
Given the fact that the feds are already engaged in cyber attacks as a means of moving their Internet takeover plans forward, it seems only a matter of time before we see key infrastructure in the United States targeted for similar false flag attacks that will swiftly be exploited politically to ram through the entire cybersecurity agenda.
Paul Joseph Watson is the editor and writer for Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a fill-in host for The Alex Jones Show. Watson has been interviewed by many publications and radio shows, including Vanity Fair and Coast to Coast AM, America’s most listened to late night talk show.
This article was posted: Monday, October 25, 2010 at 3:53 am