Page 1

NSA Capable of False Flag Attacks Kit Daniels June 20, 2013 Surveillance agency could expand to fueling mass hysteria Inside a grocery store, empty shelves in every aisle gather dust. Outside, the ATM flickers “OUT OF SERVICE” before finally losing power to a blackout. Water faucets run dry and phone networks disappear. These are all feasible effects of cyber warfare in a digitally-dependent nation, and it’s not a stretch to see that these are well within the capabilities of the National Security Agency, the agency known for treating the Fourth Amendment as No Such Amendment. “I’ll talk about what I know, which is offense,” said former NSA employee Charlie Miller to his audience at Defcon in 2010. For his presentation entitled Kim Jong-il and Me: How to Build A Cyber Army to Attack the U.S., Miller presented a hypothetical proposal to a country (North Korea in this case) on how to wage cyber warfare to control and disrupt American targets including freight shipping, power grids, phone service, air traffic, and even Wall Street. Charlie Miller - Kim Jong-il and Me: How to Build a Cyber Army to Defeat the U.S. VIDEO BELOW Prior to this speech, Miller spent five years as a Global Network Exploitation Analyst for the NSA in which he exploited foreign computer networks. Outside of the NSA, Miller has exposed security holes in Apple products such as the iPhone which allowed applications to connect to remote computers and transfer personal data. “You don’t hear much about what people say what they did at the NSA, and for good reason,” said Miller. Miller went on to state that he cannot believe the NSA even allowed him to acknowledge his experience exploiting foreign targeted computers. According to Miller, targeted computers can be exploited through previously unknown vulnerabilities, called zero-day attacks because they occur on “day zero” of awareness of the vulnerability. The vulnerability is known only to the attacker; it is unknown to the community at large or even the software vendor.

Before being patched, zeroday vulnerabilities can exist from three months to nearly three years, with the average lifespan of nearly a year, per Miller’s presentation. Much like an invading army using an unguarded tunnel to capture a fortified city, it is extremely difficult to defend against unknown vulnerabilities. Miller’s speech considers only unintentional vulnerabilities, but this aspect of cyber warfare could also be applied to intentionally-made “back doors.” In the Dark Knight, Bruce Wayne intentionally places a back door into cell phones sold by his company in order to implement a city-wide sonar grid. In the same manner, computer software or systems can have built-in back doors which allow access and control to an outsider, similar to how NSA’s PRISM is supposed to operate. It is certainly easier to access data directly than through legal requests. During his speech, Miller referred to attribution, the act of establishing who is responsible for an attack. “Maybe a computer from China is attacking you but really that computer is some Russian dude who’s logged into that computer,” he said. “So you can’t tell if it was Russia or China.” Miller continues on the subject of attribution. “On the opposite side, it will make attribution really hard for your opponent because you’ll be able to attack from a thousand different places, and from all over the world and they’re not goin g to know who you are,” he said. Miller also mentioned the strategy of dominating cyberspace by controlling as many computer devices around the world as possible. “If you have tons and tons and tons of computers all throughout the world under your control, then you’re in a better position to decide who’s attacking you,” he said. “Because maybe they’re attacking from one of the boxes you already control.” These points are interesting because, much like zero-day vulnerabilities, they can be applied to a feasible concept outside the context of Miller’s speech. The ability to launch cyber attacks from a controlled network in a foreign country, then attribute the attack to any country or faction which would be hard to disprove are all qualities desirable for a false flag attack. This concept could allow an Internet takeover through legislation, such as the recently stalled Cyber Intelligence Sharing and Protection Act, if the population experiences mass hysteria through a false flag cyber attack, such as a stock market crash blamed on a foreign power. The NSA certainly wouldn’t be held back by their budget, which is reported to be in the billions. Washington think tanks have recommended that the federal government better control cyberspace, as reported in this previous Infowars article on the domestic spy grid. In building a cyber army without bringing attention to its purpose, Miller suggested compartmentalization: contracting out to existing companies so that no one company knows the overall purpose.

With so many defense contractors currently hiring exploitation analysts, similar to Miller’s former position at the NSA, it appears that federal agencies already practice compartmentalization. What would prevent the NSA from engaging in these cyber warfare aspects and strategies for sinister purposes? Policy documents? Surely not the Bill of Rights which the NSA has ignored with impunity. Other Sources: Be sure to check out our water filtration systems, including ProPur! Take fluoride out of of your life. Clean water is great for pets, too.

Superman Goes Bad, Joins the NSA June 20, 2013

As Obama fights to grant millions of illegal immigrants amnesty, there’s one alien he wouldn’t mind heading up his domestic surveillance outfit. Superman’s superhuman abilities make him more than qualified to head up the NSA, the intelligence agency which was recently revealed to be downloading information “directly” from the central servers of Facebook, Google, Apple and Microsoft, among others, under a spy operation called PRISM. While Superman’s superhuman intelligence may or may not mean he’s skilled enough to hack into critical infrastructure computer databases, his super speed could likely aid the NSA’s daily collection of millions of Verizon customers’ call data. His super-hearing empowers him to listen in on millions of people’s phone calls, meaning the government could have forgone obtaining a secret Foreign Intelligence Surveillance Court (FISA) order granting the FBI “unlimited authority to obtain the data for a specified three-month period ending on July 19,” according to The Guardian.

Superman can also tune into specific sounds, and could possibly have supported the Department of Justice in monitoring Associated Press journalists’ phone calls, as we learned happened earlier this year in response to the AP’s publishing of a report on a failed Yemeni bomb plot. His ability to see through walls would be beneficial in the hunt for NSA arch-nemesis Edward Snowden, the 29-year-old Booz Allen Hamilton contractor responsible for leaking what many in government consider sensitive, classified data. Indeed, the Man of Steel’s x-ray vision and power of flight would be a comparable substitute for the drones former Congressman Ron Paul speculated could be used to find and “neutralize” the NSA leaker. His superhuman powers would even give NSA partner Microsoft’s much-hyped and anticipated spy apparatus, the Xbox One, a run for its money. The new console’s extra-sensitive microphones will constantly listen for you to give it commands, and can individually discern your voice from your friends. The new Xbox will be sold with a new Kinect motion-sensing device that will be required to be plugged in to operate the console. Its high-definition camera creates a model of your human skeleton and can track you moving about in your home, leading many to infer that it will be able to know when you’re in the shower. As an added creepy bonus, Kinect will watch your eyes to make sure you’re engaged in ads or shows, and will be able to read your heartbeat just by looking at you. The U.S. presidency has already taken some pointers from the son of Jor-El. Hailing from the planet Krypton, Superman is naturally endowed with an incredible healing factor, enabling him to quickly mend his wounds, just like our presidential administrations quickly heal themselves from innumerable scandals through media spin. His knack for disguise is also a trait most presidential administrations have already emulated. Just as Superman’s alter-ego Clark Kent allows him to travel the streets unnoticed, Obama also hides his criminal activity in plain sight.

NSA Capable of False Flag Attacks  
NSA Capable of False Flag Attacks  

Surveillance agency could expand to fueling mass hysteria