NSA has history of covert hacking for political gain
June 16, 2015
On Monday the White House ordered federal agencies to implement cybersecurity fixes “without delay” after a reported breach of government employee records.
The Obama administration used the reported breach to announce its desire to “dramatically accelerate implementation” of multi-factor authentication for network access. This is White House speak for personal identity verification, i.e., a smart card, possibly a biometric one.
In early 2014 the Obama administration rolled out its “National Strategy for Trusted Identities in Cyberspace,” a system that would replace passwords and other internet login procedures with “a smart identity card, a digital certificate on their cell phone,” and other schemes.
“The original proposal was quick to point out that this isn’t a federally mandated national ID. But if successful, it could pave the way for an interoperable authentication protocol that works for any website, from your Facebook account to your health insurance company,” writes Meghan Neal, warning that the proposal is “a scary can of worms to open.”
“The scope of the program could eventually be expanded into an ID card to access the Internet itself, greasing the skids for every citizen to require government permission to use the world wide web, a privilege that could be denied to criminals, accused terrorists and other undesirables, which according to federal government literature includes people who hold certain anti-establishment political beliefs,” Paul Joseph Watson wrote for Infowars.com last April.
Earlier this month Obama placed the blame for one of the largest breaches of federal employees’ data on China. Compromised data held by the Office of Personnel Management appeared to be Social Security numbers and other “personal identifying information.” The administration did not provide an explanation why China would be interested in the Social Security numbers of government employees.
“The announcement of the intrusion came on the same day The New York Times reported that the National Security Agency had expanded warrantless surveillance of foreign hackers, an effort that could sweep up the information of innocent Americans,” reported The New York Times.
NSA Responsible for Hacking
In March the Moscow-based Kaspersky Lab, an international software security group operating in almost 200 countries and territories worldwide, said it had evidence at least some of the hacking activity cited by the government to push cybersecurity measures is linked the NSA.
The NSA refused to comment on the claim. NSA spokeswoman Vanee Vines said that “broadly speaking, any time these kinds of allegations are made publicly, there is always a risk of harm to our national security.”
The NSA has long had the ability to hack computers. Its Tailored Access Operations (TAO) steals data and inserts invisible “back door” spying devices into computer systems, according to a report by the German magazine Der Spiegel.
“TAO specialists have directly accessed the protected networks of democratically elected leaders of countries. They infiltrated networks of European telecommunications companies and gained access to and read mails sent over Blackberry’s BES email servers, which until then were believed to be securely encrypted,” the magazine reported on December 29, 2013.
TAO may in fact be the culprit for security breaches pinned on the Chinese.
“The unit bears a striking resemblance to a Chinese hacking group described in a report released by cybersecurity company Mandiant earlier this year,” The Washington Post reported on August 30, 2013.
Cui bono — who benefits — comes to mind, considering the frenzied push by the United States government to ram draconian cybersecurity legislation through Congress and the deluge of accompanying propaganda relayed by the corporate media conjuring up phantom North Korean hackers taking down the power grid and other apocalyptic scenarios.
The surveillance and control grid now going into place requires a biometric ID scheme and the ability of the government to track people on and off the internet.
Considering the history of government false flag attacks and other covert activities designed to provide a pretext for further erosion of liberty and to drum up consensus for war and other initiatives by the global elite, the prospect that NSA and other government hackers are behind many of the cybersecurity breaches over the last few years is a distinct possibility.
This article was posted: Tuesday, June 16, 2015 at 10:12 am