Monday, December 22, 2014

COMMENTARY & OPINION SPECIAL REPORT

 From the desk of
Bill Ramey

12/22/14

COMMENTARY & OPINION
SPECIAL REPORT


Jeff Dunetz

December 20, 2014

The FBI came down hard on North Korea Friday morning as it blamed the despotic regime of Kim Jong Un for the weeks of cyber-attacks on Sony which led to the company’s withdrawal of the The Interview, a movie which was to be released on Christmas Day.

“North Korea’s actions were intended to inflict significant harm on a U.S. business and suppress the right of American citizens to express themselves,” the statement reads. “Such acts of intimidation fall outside the bounds of acceptable state behavior.”

There were three components of the hack attack which convinced the FBI North Korea was behind the attack: elements in the code of the malware which were similar to other known North Korean attacks; some of the IP addresses used in the attack were the same as attempted North Korean attacks on U.S. government computers; and some of the elements of the hacking programs were the same as an attack on South Korean banks and media which were known to be from the North.

The FBI concluded its statement by promising to impose “costs and consequences” for the attack, but it did not provide any hint of what those consequences would be:

The FBI stands ready to assist any U.S. company that is the victim of a destructive cyber attack or breach of confidential business information. Further, the FBI will continue to work closely with multiple departments and agencies as well as with domestic, foreign, and private sector partners who have played a critical role in our ability to trace this and other cyber threats to their source. Working together, the FBI will identify, pursue, and impose costs and consequences on individuals, groups, or nation states who use cyber means to threaten the United States or U.S. interests.

Below is the entire FBI statement:

Today, the FBI would like to provide an update on the status of our investigation into the cyber attack targeting Sony Pictures Entertainment (SPE). In late November, SPE confirmed that it was the victim of a cyber attack that destroyed systems and stole large quantities of personal and commercial data. A group calling itself the “Guardians of Peace” claimed responsibility for the attack and subsequently issued threats against SPE, its employees, and theaters that distribute its movies.

The FBI has determined that the intrusion into SPE’s network consisted of the deployment of destructive malware and the theft of proprietary information as well as employees’ personally identifiable information and confidential communications. The attacks also rendered thousands of SPE’s computers inoperable, forced SPE to take its entire computer network offline, and significantly disrupted the company’s business operations.

After discovering the intrusion into its network, SPE requested the FBI’s assistance. Since then, the FBI has been working closely with the company throughout the investigation. Sony has been a great partner in the investigation, and continues to work closely with the FBI. Sony reported this incident within hours, which is what the FBI hopes all companies will do when facing a cyber attack. Sony’s quick reporting facilitated the investigators’ ability to do their jobs, and ultimately to identify the source of these attacks.

As a result of our investigation, and in close collaboration with other U.S. Government departments and agencies, the FBI now has enough information to conclude that the North Korean government is responsible for these actions. While the need to protect sensitive sources and methods precludes us from sharing all of this information, our conclusion is based, in part, on the following:

  • Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks.

  • The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. Government has previously linked directly to North Korea. For example, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack.

  • Separately, the tools used in the SPE attack have similarities to a cyber attack in March of last year against South Korean banks and media outlets, which was carried out by North Korea.

We are deeply concerned about the destructive nature of this attack on a private sector entity and the ordinary citizens who worked there. Further, North Korea’s attack on SPE reaffirms that cyber threats pose one of the gravest national security dangers to the United States. Though the FBI has seen a wide variety and increasing number of cyber intrusions, the destructive nature of this attack, coupled with its coercive nature, sets it apart. North Korea’s actions were intended to inflict significant harm on aU.S. business and suppress the right of American citizens to express themselves. Such acts of intimidation fall outside the bounds of acceptable state behavior. The FBI takes seriously any attempt ““ whether through cyber-enabled means, threats of violence, or otherwise ““ to undermine the economic and social prosperity of our citizens.

The FBI stands ready to assist any U.S. company that is the victim of a destructive cyber attack or breach of confidential business information. Further, the FBI will continue to work closely with multiple departments and agencies as well as with domestic, foreign, and private sector partners who have played a critical role in our ability to trace this and other cyber threats to their source. Working together, the FBI will identify, pursue, and impose costs and consequences on individuals, groups, or nation states who use cyber means to threaten the United States or U.S. interests.

This article was posted: Saturday, December 20, 2014 at 5:27 am


Ramey comments:

Our FBI wouldn't lie to us --- would they?  Read on.


MOMENT OF TRUTH


NSA hackers can easily frame another country

Kit Daniels

Prison Planet.com

December 19, 2014

A presentation by a former NSA analyst revealed it’s feasible for the NSA to hack a large corporation, such as Sony Pictures, and blame it on a foreign country such as North Korea.


Credit: Eff.org (Eagle)

Charlie Miller, who spent five years exploiting foreign computers for the NSA, gave a presentation entitled Kim Jong-il and Me: How to Build A Cyber Army to Attack the U.S. in which he explained various hacking methods and how easy it was to blame an attack on another country.

His presentation largely relied on his experience at the NSA.

“I’ll talk about what I know, which is offense,” Miller said to his audience at Defcon.

He explained how targeted computers can be exploited through previously unknown vulnerabilities, but the most revealing part of his presentation was how hackers could easily rout their attack to frame another country.

“Maybe a computer from China is attacking you but really that computer is some Russian dude who’s logged into that computer,” he said. “So you can’t tell if it was Russia or China.”

 ”On the opposite side, it will make attribution really hard for your opponent because you’ll be able to attack from a thousand different places, and from all over the world and they’re not going to know who you are,” he added.

Miller also mentioned the strategy of dominating cyberspace by controlling as many computer devices around the world as possible, which is a key tactic of the NSA based on the documents leaked by various whistleblowers.

The ability to launch cyber attacks from a controlled network in a foreign country, then attribute the attack to any country or faction which would be hard to disprove are all qualities desirable for a false flag attack and they are all within the capabilities of the NSA.

So it’s not far-fetched to consider the NSA as a potential suspect in the Sony hack which the federal government is now blaming on North Korea.

“It’s easy for attackers to plant false flags that point to North Korea or another nation as the culprit,” Kim Zetter with Wired wrote. “And even when an attack appears to be nation-state, it can be difficult to know if the hackers are mercenaries acting alone or with state sponsorship””some hackers work freelance and get paid by a state only when they get access to an important system or useful intelligence; others work directly for a state or military.”

“Then there are hacktivists, who can be confused with state actors because their geopolitical interests and motives jibe with a state’s interests.”


SONY HACK LINKED TO OBAMA REGIME

 December 19, 2014

Sony Hacking Case Shockingly Linked To Obama Regime

By: Sorcha Faal, and as reported to her Western Subscribers

A new report prepared by the Ministry of Defense (MoD) circulating in the Kremlin today states that their new “cyber troops“ division, along with assistance provided by the Foreign Intelligence Service (SVR), have discovered a “false flag“ Obama regime operation against the Japanese multinational conglomerate Sony Corporation designed to cover-up the US intelligence communities role in the making of propaganda movies, while at the same time promoting a war against North Korea.

According to this report, on 24 November, the US-located television and film production/distribution unit of Sony (Sony Pictures Entertainment (SPE) had its computer systems compromised by the notorious Nigerian 419 email scammers that the Palo Alto Networks famed Unit 42 threat intelligence teamwarned this past summer had evolved from simple phishing scams to more sophisticated cyber threats that target businesses.

On 21 November, this report continues, these Nigerian 419 hackers sent an email to Sony Pictures CEO Michael Lynton, Chairwoman Amy Pascal and other executives that read: “[M]onetary compensation we want. Pay the damage, or Sony Pictures will be bombarded as a whole. You know us very well. We never wait long. You’d better behave wisely.”

Important to note, MoD analysts in this report note, is that the 21 November email wasn’t signed by the mysterious GOP or Guardians of Peace, who have since taken credit for the hack, but by “God’s Apstls,” a reference that also appeared in one of the malicious files used in the Sony hack and which is a known religious name used by some Nigerian 419 hackers.

With Sony refusing to pay the Nigerian 419 hackers, however, this report says, on 24 November these cyber gangsters began publically releasing many of the files they had stolen, the most damaging to the Obama regime being internal emails showing that the US State Department and the RAND Corporation consulted on and approved a movie called “The Interview“ depicting the assassination of North Korean leader Kim Jong-Un.

These leaked emails show that Sony enlisted the services of Bruce Bennett, a senior defense analyst at the RAND Corporation who specializes in North Korea, in making this assassination movie and further revealed that Robert King, US special envoy for North Korean human-rights issues, and Daniel Russel, US Assistant Secretary of State for East Asian and Pacific Affairs were helping to consult on this film as well.

As to why the Obama regime would be so involved in making a movie depicting the assassination of a foreign leader, this MoD report states, can be found in an email written by the RAND Corporations senior defense analyst Bennett who worked on this movie and said:




Even worse, this report warns, is that the fanatical Obama regime war mongers consulting on this movie are supported by the new US Secretary of Defense, Ashton Carter, who in 2006 advocated the bombing of North Korea, and in 2012, along with the RAND Corporation senior policy analyst Ashley Tellis, in a conference sponsored by the Asia Society titled “The U.S. Strategic Rebalance to Asia: A Defense Perspective“, further advocated to an American “total war” to gain supremacy in this vital region.

Also to note about Carter, the SVR in this report notes, was his secret trip to Japan this past week (under the guise of his having a mysterious back ailment the Obama regime refused to comment on) during which he met with top Sony Corporation executives who agreed not to allow the release of this movie.

And not just has the Obama regime been successful in keeping from the American people their role in making this assassination movie, this MoD report continues, they have also completely taken over the hacking of Sony using their advanced spying tool Regin, that according to cyber experts, “displays a degree of technical competence rarely seen and has been used in spying operations against governments, infrastructure operators, businesses, researchers, and private individuals.”

As to the “technical route” the Obama regime used in completing the hacking of Sony using Regin, MoD analysts in this report say, was through their Sony Pictures Belgium location and, perhaps, best explained by the leakers of Edward Snowden’s documents who wrote:



To why the Obama regime has taken over the hacking of Sony, this MoD report further warns, is in order to blame North Korea for it and then retaliate in kind, an absurd stance that even some of the world’s top experts are now deriding, including:



Jeffrey Carr, founder and CEO of Seattle cyber security consulting firm Taia Global, who said, “Is North Korea responsible for the Sony breach? I can't imagine a more unlikely scenario.”

Notwithstanding the truth, however, this report concludes, the American people will nevertheless be led into another disastrous Obama regime war even though George Friedman, the founder and CEO of the global intelligence company Stratfor, known as “Shadow CIA“, warned this past week that the evidence proves that the Obama regime plotted the deadly coup which took place in Ukraine in February 2014 in response to Russia’s policy in Syria, and which to date has cost nearly 5,000 lives.


December 19, 2014 © EU and US all rights reserved. Permission to use this report in its entirety is granted under the condition it is linked back to its original source at WhatDoesItMean.Com. Freebase content licensed underCC-BY and GFDL.


Ramey comments: 

It is next to impossible for the average citizen, (whether American, Laotian, Chinese or Indonesian), to comprehend the utter depravity of governments, both past and present.  Governments have kept the masses in the dark for the purpose of control. Control is passed down through ruling families and the connecting links are not always obvious. 

We are looking at the deception today that is to bring about the end of this age in which the Elohim intervene into world affairs in order to keep planet earth from being destroyed by minions of Satan the devil.  All the kingdoms of this world are owned by him as we can see in Luke 4.  His dominion on planet earth is just before being terminated and he will be replaced as we can see in Daniel 7:13-14.

We are currently in the countdown to that event and planet earth will be restructured politically, economically, geographically and religiously.  This has been fore-   told by the prophets in considerable detail. 

Today's world is built on myths such as santa, the easter bunny and Columbus discovered America.  Few have an interest in debunking these myths because it would be too painful.  It amounts to what we see in Jeremiah 16:19 --- "We have inherited lies from our fathers".   Have we the mental agility to see this, accept this and incorporate it into our lives?  Or are we bound to the prophecy of Hosea 4:6 which says: "My people are destroyed for lack of knowledge". 

The next few weeks and/or months will bring a change in the way of life in the U.S. which is unanticipated.  The collapse of the U.S. economy has already begun. There is no Robin Hood to come to our rescue. Our policies of dishonesty


have come to maturity.  The fruits of idolatry have ripened and we are just before joining the list of nations that once were.  And if this sounds like "doomsdaying", then perhaps you should watch the "unalienable prophets" blog in the coming weeks in order to see "“¦the rest of the story".

No comments: