1. Cyber Terror & Aircraft
2. Cyber Terror Attacks
3. Cyber Terror Conferences
4. Cyber Terror & China
5. Cyber Terror Doomsday
6. Cyber Terror Doomsday
7. Cyber Terror Drills
8. Cyber Terror & Elections
9. Cyber Terror & Energy
10. Cyber Terror Hotline
11. Cyber Terror Legislation
12. Cyber Terror Plots & Patsies
13. Cyber Terror Propaganda
14. Cyber Terror Response
15. Cyber Thefts
16. State-Sponsored Cyber Terror
TRUTHER.ORG: Cyber-attacks theoretically have the power to
destroy almost every facet of American life, including but not limited to:
airplanes, banks, cars, communication, election results, government
functionality, electricity, military defense, nuclear power plants, oil pipelines
and refineries, prison systems, trains, satellites and the water supply
stations. While China has been publicly scapegoated for
cyber-terror, the U.S. and Israel are by far the greatest provocateurs of
cyber-terrorism. In a 2007 CRS Report
for Congress entitled "Terrorist Capabilities for Cyberattack:
Overview and Policy Issues”, the U.S. government states that, "If
terrorists were to launch a widespread cyberattack against the
United States, the economy would be the intended target for disruption” and
that “Many security experts also agree that a cyberattack would be most
effective if it were used to amplify a conventional bombing or CBRN (chemical,
biological, radiological and nuclear attack).
China & Cyber Terrorism
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on news and events surrounding, China more than any other nation is sure to be scapegoated in the aftermath of cyber-terror attacks against the United States. On October 5, 2011, U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its "pervasive" cyber-espionage campaign and cybercrime against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China's strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a "potential vector" for the People's Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyberwar political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta, has publically stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyberattacks against American companies and the government. October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that "China has the means, opportunity, and motive to use telecommunications companies for malicious purposes".
Just as the United States and the Soviet Union had a nuclear hotline to avoid potential nuclear misunderstandings during the Cold War, a new “cyberwar hotline” is being speculated about in order to avoid future misunderstandings in the wake of major cyber-terror attacks. Security expert Bruce Schneier stated that a hotline between the world’s cyber commands would “at least allow governments to talk to each other, rather than guess where an attack came from.” On October 4, 2012, it was reported that Britain has begun tentative talks with China and Russia about setting up a hotline to help prevent cyber-emergencies from spiraling out of control. "At the moment, we don't really have sufficient information-sharing arrangements with some countries such as China and the Chinese computer emergency response team," said a senior Foreign Office official.
Since June of 2012, numerous propaganda articles have stated that a cyber-terror doomsday is imminent and when it happens all hell is going to break loose in America. Headlines such as “'End Of The World As We Know It': Kaspersky Warns Of Cyber-Terror Apocalypse”, “Former FBI Cyber Cop Worries About A Digital 9/11”, “Retiring Rep. Norm Dicks Warns Of 'Cyber 9/11'”, “Panetta: Cyber Threat Is Pre 9/11 Moment”, and “Defense Secretary Warns Of 'Cyber-Pearl Harbor'” all indicate that a major acts of state-sponsored cyber-terror are imminent.
U.S. & Israeli Sponsored Cyber Terror
When massive cyber-terror attack begin to occur, the prime suspects should be the U.S. and Israeli governments who openly brag about their offensive cyber-attack capabilities. According to Wikipedia, the Joint Functional Component Command – Network Warfare team (JFCCNW) is "responsible for coordinating offensive computer network operations for the United States Department of Defense" and that the JFCCNW is "the world's most formidable hacker posse: a super-secret, multimillion-dollar weapons program that may be ready to launch bloodless cyberwar against enemy networks". Aside from being implemented in both the "Stuxnet" virus and the "Duqu" virus, the Israeli government allegedly ranks #1 in cyber terrorism.
Cyber Terror Drills
Both the Israeli and U.S. government, namely the CIA and the U.S. Department of Homeland Security, have been drilling cyber-terror attacks on a routine basis. Past cyber-terror drills range in duration and targets, generally focus on the financial and infrastructure targets. According to reports, authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or "swarming" attacks."
Cyber Security Takeover
Under the guise of “cyber security”, the U.S. government has spent billions of dollars mapping and federalizing cyberspace and cyber security throughout America. According to the 2009 CRS Report for Congress entitled “Comprehensive National Cybersecurity Initiative”, the sudden change in policy is to ensure that “U.S. Government cyber security initiatives are appropriately integrated, resourced and coordinated with Congress and the private sector". This changes essentially ensures that the private sectors of the economy (banks, gas, oil, power, stock markets, etc.) are under the cyber thumb of the U.S. government so that they can be targeted, hijacked and ultimately destroyed in a future cyber terror attack.
Cyber-Terror Plots & Patsies
Since April of 2011, there has been at least 25 major cases in which individuals or groups were charged with committing acts hacking or cyber-terror, while in China, police allegedly arrested 10,000 people in an unprecedented cyber-terror sweep. In most of the cases, finance or bank related hacking or cyber-terror was the motive although major corporate, energy or government institutions such AT&T, Blackberry, British National Party CIA, English Defence League, Facebook, Federal Reserve Bank, NATO, NHI, Nintendo, Sega and Symantec have also been allegedly targeted.
Military Computer Thefts
Since 2006, thousands of military laptops have been stolen in the United States and the United Kingdom. Why these thefts are being allowed to occur is not yet clear, but it plays nicely into the narrative of impending cyber-terror attacks. These laptops will have likely made it onto the black market and into the waiting hands of "terrorists" who will allegedly launch cyber-terror attacks against the U.S. and U.K. militaries and governments.
Since 2011, there have been an epidemic of “cyber-attacks” targeting high-profile government entities such as the Vatican, United Nations, Interpol, NASA, Scotland Yard, FBI, DHS, CIA and the U.S. Federal Trade Commission. Less publicized however have been the cyber attacks on critical infrastructure such as water plants, nuclear power plants, oil refineries and banks. These alleged cyber-attacks, whether real or not, give the perception that any entity with an internet connection is vulnerable to a future cyber-attack.
Cyber-Terror Target: Airplanes
According to recent cyber-terror propaganda, drones and planes can be remotely hijacked and then used as weapons, similarly to what happened on September 11, 2001. On June 25, 2012, it was reported that with the right equipment, anyone could take control of a GPS-guided drone and easily turn it into a weapon. Professor Todd Humphreys of the University of Texas at Austin stated that “Each one of these [drones] could be a potential missile used against us.” A month later on July 27, 2012, it was reported that air traffic control software which is used around the world could be exploited by hackers to unleash squadrons of ghost planes. Interestingly, in October of 2012, American Airlines has pulled 47 planes due to malfunctioning seats and 17 flights were diverted from Manila's international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes will play in the wake of a cyber-terror attack is unknown, but there is a real possibility that these planes have been remotely “programmed” to lose all power at a future date.
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror and financial related crimes, financial cyber-terror is blinking red on every level. An April 24, 2012, report stated that Osama bin Laden was looking for a follow-up terror attack to doom the American economy, so there is a real possibility that cyber terror attack targeting U.S. banks and Wall Street could hijack trillions of dollars ultimately dooming the American economy. To date, individuals have been arrested for cyber-terror related crimes such as credit and debit card PIN theft, the theft of proprietary software code from the Federal Reserve Bank of New York, the illegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, the malware SpyEye used to steal and use personal banking and credit card data from unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank has admitted to committing £2.5 million fraud. Essentially, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.
On December 13, 2011, it was reported that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyberattacks against U.S. targets, including nuclear power plants. There have also been approximately 40 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion.
Cyber-Terror Target: Prisons Breaks
Since September of 2012, there have been 4 major prison breaks in Iraq Libya Mexico and the U.S. which untimely indicates that more major prison breaks are imminent. On November 10, 2011, it was reported that officials with the Federal Bureau of Prisons have been informed that U.S. penitentiaries could be vulnerable to cyber-terror attacks that would help prisoners escape. According to the report, most American prisons are operated by industrial control systems (ICS) that also are used by power plants, water treatment facilities and other infrastructure operations. ICS’ vulnerability was demonstrated two years in Iran, when hackers sabotaged that country’s nuclear program by exploiting its Siemens programmable logic controllers (PLCs). Almost all of the 117 federal correctional facilities, 1,700 prisons and 3,000 jails in the United States use PLCs to control doors and manage their security systems. Coincidentally, on October 2, 2012, it was reported that the Obama administration plans to buy an Illinois prison which end up being the prison facility that suffers a cyber-terror prison break.