Howestreet.com - the source for market opinions

ALWAYS CONSULT YOUR INVESTMENT PROFESSIONAL BEFORE MAKING ANY INVESTMENT DECISION

July 23, 2017 | Bracing for “Cyber 9/11”

James Corbett

James Corbett is an editorial writer for The International Forecaster, the bi-weekly e-newsletter created by the late Bob Chapman.

As Al CIA-da become the “good guys” (again), and I-CIA-SIS starts to fall apart, and the latest boogeymen fail to strike a chord of panic in a boogeyman-weary public (remember the fearsome Khorasan Group, anyone?), it is safe to say that the old war of terror paradigm is falling by the wayside. Lucky for the multi-trillion dollar global terror-industrial complex, then, that the spiffy new cyberterror paradigm is waiting in the wings to take its place!

But just as the fading “Global War on Terror” (GWoT) paradigm requires a steady stream of  (perceived) threats in order to justify the bloated budgets of the US intelligence and security apparatus, so too does this new cyberterror paradigm require a constant flow of (perceived) online threats to justify the bloated budgets of the US cybersecurity forces. And just as in the GWoT, every “failure” of cyber-intelligence and every “inadvertent” proliferation of cyber-weaponry gives the newly-createdCyber Command an excuse to expand its role and take even bolder action in its quest to “fight the net.”

The GWoT and all of its attendant ills have been built on the back of that “catalyzing event,” our “new Pearl harbor,” 9/11. So it should hardly be surprising that the new cybersecurity establishment is waiting breathlessly for the “cyber 9/11” that will justify the complete crackdown and government takeover of the internet.

Unsurprisingly, the “cyber 9/11” meme stretches back almost to 9/11 itself. Back in 2003, even as the Pentagon was drafting up its plans to “fight the net” as if it were “an enemy weapons system,” Mike McConnell, the ex-director of the National Security Agency (NSA), was fearmongering over the possibility of a cyber attack “equivalent to the attack on the World Trade Center” if a new institution were not created to oversee cyber security. Since then, report after report has continued to use the horror of 9/11 as a way of raising public hysteria over cyberterrorism.

Of course, many of those reading this report will already know the reason for this cyberterror hysteria: There is a pre-planned solution waiting in the wings to be revealed to the public after they have been prompted to respond to the next (virtual) false flag provocation. We don’t have to speculate on this point. In 2008, Harvard law professor Lawrence Lessig told a technology conference that a cyber equivalent of the constitution-destroying Patriot Act is on the shelf, ready to be rubber stamped into law. All it requires is a “cyber 9/11” to make such legislation politically viable.

“There’s going to be an i-9/11 event. Which doesn’t necessarily mean an Al Qaeda attack, it means an event where the instability or the insecurity of the internet becomes manifest during a malicious event which then inspires the government into a response. You’ve got to remember that after 9/11 the government drew up the Patriot Act within 20 days and it was passed. … So I was having dinner with [former counter-terrorism czar] Richard Clarke and I asked him if there is an equivalent, is there an i-Patriot Act just sitting waiting for some substantial event as an excuse to radically change the way the internet works. He said ‘of course there is.’”

In effect, the cyber security establishment—the advisors, agents and experts in the cybersecurity industry—are waiting for a spectacular cyberterror attack to justify a crackdown on the internet, including plans for ‘identity management’ schemes like fingerprinting for internet access which would put an end to the free Internet as we have known it.

So if we know the psychopaths in power need a cyber 9/11 to spring their iPatriot Act on the internet, the obvious questions are: Would the US and their cronies really do something like this? And who would they try to pin the blame on?

The first question is easy enough to answer: Yes. Yes they would do this. Case in point: Stuxnet.

Stuxnet was a computer worm that the US and Israel jointly created to target Iran’s uranium enrichment facilities at Natanz. And as we now know, Stuxnet was only one part of a much larger cyberattack against Iran, jointly launched by the US and Israel and dubbed “NITRO ZEUS.” Although Stuxnet was intended to be the cyber equivalent of a precision-guided bomb, only capable of damaging the specific computer systems it was intended to target, it quickly escaped the computer systems at Natanz and spread across the internet. Oops. Hope that kind of cyberweaponry doesn’t end up in the hands of one of our “enemies.” That might lead to a cyber 9/11!

And wouldn’t you know it? Other attempts to contain the tools in the Pentagon’s cyber-armory have been similarly unsuccessful.

In 2016 it was revealed that the NSA had not only found security vulnerabilities in numerous software and hardware products but, in direct contradiction to their earlier assurances, failed to inform the vendors of these problems so they can properly secure their product. Instead, they have been hoarding those exploits so they can gain backdoor access to the computer systems of targeted governments and individuals. As cybersecurity researchers warned at the time, this practice ultimately increases the likelihood that these vulnerabilities will be discovered by criminals, hackers and terrorists somewhere down the line. With the spread of the WannaCry ransomware of 2017, itself made possible by an exploit stolen from the NSA, these fears were realized.

Boy, I sure hope this technology doesn’t end up in the hands of the enemies! They might use it to inflict a Cyber Pearl Harbor attack on us!

And who are the enemies, exactly? Why, the Russians, of course! It’s the Russians! It’s always the Russians! Did you stub your toe on a chair this morning? The Russians rearranged your furniture while you were sleeping! Only mismatched socks left in your sock drawer? That’s because the Russians were rummaging through there last night! And if you get hacked? Well you better believe that’s the Russians!

In fact, even if you don’t get hacked, you can just say it was Russian hackers and millions will believe you unquestioningly. Just ask Hillary and the DNC.

As we already know, the “intelligence reports” that have been released so far detailing Russian “election hacking” have been completely evidence-free exercises in political mendacity (but I repeat myself). In fact, we’re not even taking the intelligence agencies’ word for it, because they are taking the DNC’s word for it. Never forget: the DNC refused to hand over their servers to the FBI for examination.

Now, to be fair, it is possible to imagine a universe without contradiction in which the Russians hacked into the DNC to expose their emails to the world. I mean, there’s no evidence whatsoever that that’s what happened, but it’s not impossible to imagine it happening. However, as the meme-sphere has rightly pointed out, even if that did happen that only means that the Russians rigged the election by exposing how the DNC rigged the election. Hmmm…seems the “I’m Still With Her” crowd haven’t quite thought this one through.

Of course, this isn’t just about the DNC hack or the Podesta spearphishing. This is a now-familiar cycle of the #fakenews MSM identifying a hack, worm or cyberattack, immediately blaming the Russians in all caps headlines on their front page, and burying the inevitable retraction in small print at the bottom of page B27 (or the internet equivalent thereof). If you think I’m joking about this, read MoonOfAlabama’s excellent summary of how this has happened over and over and over and over and over again in the past year.

But as ludicrous as the neo-McCarthyite hysteria has become in recent months, perhaps we reached peak hysteria last month in the Qatar crisis. Readers of my column about that crisis will remember how this latest spat in the Gulf (ostensibly) started: The Qatari Emir threw shade at the UAE, Bahrain, Egypt and the Saudis, accusing them of smearing the Qataris and their Muslim Brotherhood/Iranian/Hamas/Hezbollah allies and friends. Or at least that’s what was reported in a curious little piece on the Qatari News Agency which was yanked down within half an hour.

The Qatari’s immediate explanation for this quickly-retracted report? Hackers had broken in and planted the story on their site. Things being what they are, the FBI immediately turned around and blamed those dastardly Russian hackers, and their lapdog MSM dutifully regurgitated this evidence-free assertion without challenge.

The Russians? The Russians planted a fake news story on the QNA website in order to get the Saudis mad at the Qataris? Really?

No, not really. I know you’re not going to believe this, but that self-same FBI that so confidently pointed the finger at Russia now believes with absolute confidence that it was in fact the UAE that hacked the QNA site. I mean, let’s be clear: they’re probably wrong about this assertion, too, but it just goes to show how seriously we should take their finger-pointing.

It raises the question of how they determine culpability for a cyber attack in the first place. There are a number of methods for doing this, of course, from the ridiculously circular (“We attributed this type of attack to Group X in the past, so it must be Group X this time!”) to the just plain ridiculous (“Look! Russian language and references to old KGB chiefs! Clearly those sneaky Russkies forgetting to hide their tracks!”). But then the CIA’s secret tool for disguising their own hacks to look like it came from another country’s government gets exposed and we’re back to simply taking the CIA’s word for it when they say they never have and never would use such a deceptive tactic (pinky swear!).

In part, this points to the fundamental problem of attribution in the age of cyberterror. It’s one thing to attribute a physical attack to an enemy. In the wake of a bombing or hijacking or other physical attack there is at least some forensic evidence left behind, some money trail for investigators to follow. I mean, those records can be faked, too, of course, but at least there’s something for outside investigators to scrutinize. But in the cyber sphere, there’s nothing at all for anyone to examine. The only people who have any chance of figuring out what actually happened during a cyberattack are the ones with direct access to the server logs, and even those logs can be corrupted, faked or manipulated in various ways. In the end, it amounts to: “Trust the intelligence agencies! Have they ever lied to you?”

If you do know that the intelligence agencies have lied to you, that they have created and spread cyberweapons in the past, that false flag attacks are used to blame political enemies, and that Russia is being set up to take the fall for the big “Cyber 9/11,” then you’ll know what to think when you see the big New Pearl Harbor 2.0 unfolding before you. But your friends and neighbors probably won’t. Perhaps you can share some of this information with them before events unfold so they’ll be forewarned about what’s coming.

STAY INFORMED! Receive our Weekly Recap of thought provoking articles, podcasts, and radio delivered to your inbox for FREE! Sign up here for the HoweStreet.com Weekly Recap.

July 23rd, 2017

Posted In: The International Forecaster

Previous: «

Post a Comment:

Your email address will not be published. Required fields are marked *

All Comments are moderated before appearing on the site

*
*