http://www.zerohedge.com/news/2012-11-20/largest-weekly-inflow-bank-savings-accounts-record-flashing-red-alarm
And as we wait to see if white smokes emerges from the Cathedral in Brussels tonight , just check the state of play regarding Greece ...... trial ballons being floated , no agreement on anything yet most important item to note. No sense breaking down trial balloons , let's see what the folks actually come together on tonight , if anything.
4.33pm GMT
Before we see what we shall see, let's revisit the past and the prior PSI clusterfuck for private investors... so here's the question , do you re-sock the private investors with another 70 - 80 percent haircut on greek bonds and really expect private investors to not immediately sell off debt of Spain , Italy , Portugal , Ireland , Belgium , France ?
http://www.fxstreet.com/fundamental/market-view/european-crisis/2012/03/09/
On another track , consider this bit of tin as another oddity - kinda like seeing hundreds of birds taking off suddenly and flying away right before an earthquake.....
http://beforeitsnews.com/conspiracy-theories/2012/11/elite-bugging-out-to-denver-11-22-2446102.html
Perhaps two of the most important dates and power number sequences to the illuminati are 11 & 22 (11/22).
Is The Largest Weekly Inflow Into Bank Savings Accounts On Record, A Flashing Red Alarm?
Submitted by Tyler Durden on 11/20/2012 16:48 -0500
- Ben Bernanke
- Ben Bernanke
- Debt Ceiling
- Excess Reserves
- Fail
- Fractional Reserve Banking
- Hyperinflation
- Lehman
- M1
- M2
- Money On The Sidelines
- New Normal
- Savings Rate
- St Louis Fed
- Tim Geithner
When one thinks of America, the word "savings" is likely the last thing to come into a person's head, for the simple reason that the vast majority of Americans don't save: recall that in September the personal savings rate dipped to 3.3%, the lowest since 2009 save for one month.
On the surface this makes sense: the average US consumer, tapped out, with more spending than income, has no choice but to max out their credit card, and eat into whatever savings they may have.
This is usually as far as most contemplations on savings go. And this is a mistake, because at least according to official Fed data reported weekly as part of the H.6, which lists the data on the various components of M1 and, more importantly, M2, the real story with US savings is something totally different.
As a reminder, the H.6 lists the bank sector "liability" equivalents of the components that make up M2, which as most know comprises of M1, or physical currency in circulation at just over $1 trillion as well as Checkable and Demand deposits, amounting to $1.4 trillion, and the various M2 components which comprises of Savings Deposits, the largest component of M2 at $6.6 trillion, a modest amount of Time Deposits, and an even more modest amount of Retail Money Funds.
It is the Savings Deposits component that is of most interest. Recall that the primary definition of a savings account is, naturally, an amount of cash parked with an institution for a longer period of time, in exchange for receiving interest (or no interest in the era of The Great Chairman), which also have a limitation on the number of withdrawals: six per month at last check. Savings accounts also encompass the broader Money Market account category, which has a higher floor requirement than an ordinary savings account.
At first blush one would balk at the concept of a Savings Account in the New Normal: after all who in their right mind would face the counterparty risk associated with having money in a bank, especially money that has withdrawal limitations, if there is nothing to be gained in exchange, because under ZIRP nobody collects any interest, and won't until the system finally collapses.
Well prepare to be surprised.
The chart below shows the time progression of the largest Savings Component: total Savings Deposits at Commercial Banks, which at $5.6 trillion in the week ended November 5, 2012, is also the largest single component of M2, and thus broader money stock of the US (accessible source data via the St Louis Fed).
The chart above hardly shows any slowing down in cash entering Savings Accounts. In fact, quite the opposite. As we have conveniently highlighted, the historic rate of growth in this category of about $200 billion per year, aka the "pre-New Normal" regime, nearly quadrupled to just shy of $700 billion, with a distinct break when Lehman failed aka the "post-New Normal". That's $700 billion per year entering what the Fed defines as a "Savings Account." And all it took to get everyone to scramble to the uncompensated safety of savings accounts? A near collapse of the entire financial system!
This topic alone is worthy of a far greater discussion, because there is a distinct possibility that what the Fed discloses as a "savings account" book entry may simply be a book entry "plug" at the bank level to account for the surge in Excess Reserves into the banking system, after applying an appropriate reserve discounting factor: one way of thinking of M2 is the full lay out of the monetary system using base currency and Fed Excess Reserves and applying a Fractional Reserve banking multiplier. At last check the, multiplier from currency outstanding (1.08 trillion) to total M2 ($10.3 trillion) was 9.5x, in line with the historic ratio of ~10x.
A better representation of the very tight correlation between M1, which captures both currency and physical excess reserves, and M2 can be seen on the chart below.
As can be seen M1 is M2 just with a multiplier factor of ~4.5x.
What has been unsaid so far, is that to Ben Bernanke and the champions of the status quo, money in Savings Accounts would be far better used if it were to be dumped into stocks. After all, the primary reason for the urge by the Group of 30, Tim Geithner, Bernanke and the SEC to crush money markets and to make them even more uneconomical is to pull all the cash contained there and to have it invested into bonds, stocks, and other risky products.
In summary, the more money allocated to Savings Accounts, the more Bernanke's attempts to rekindle the "animal spirits" fail. And while this cash is at least on the surface what is known as "money on the sidelines", the flipside also is that should this money ever leave the "sidelines", modestly at first, then all at once, then the Fed's moment of reckoning will come, as that will be the moment when the Fed's ability to keep inflation grounded in "15 minutes" or less, will be thoroughly tested.
Paradoxically, Bernanke wants this money to re-enter the risk markets, and/or the economy, but not in a way that leads to hyperinflation. After all there is $10 trillion in electronic "money" in the US system,and only $1 trillion in cold, hard cash available for cash claims satisfaction.
All that brings us to the topic of today's post: weekly changes in the amount of cash held in Savings Deposits at Commercial Banks. As the chart below shows, rapid, dramatic shifts, characterized by massive inflows of cash into such savings accounts usually coincide with times of great monetary stress: the three biggest episodes in history to date have been the 2008 Lehman failure, the August 2011 Debt Ceiling Crisis and associated US downgrade, and the May 2009 First Greek failure and bailout.
Those three episodes represent the biggest weekly Savings Deposits inflows number 2 through 4.
When was the largest ever inflow into Savings Deposits at Commercial banks, at $131.9 billion in one week? This past week.
Why?
We don't know, but the people who control $5.6 trillion in US commercial bank savings deposits - certainly not the vast majority of the US population who have virtually no money saved up, but the true 1% - just decided to park the most cash on a week over week basis into their savings accounts in history.
Perhaps ask them why they did it...
Source: H.6
And as we wait to see if white smokes emerges from the Cathedral in Brussels tonight , just check the state of play regarding Greece ...... trial ballons being floated , no agreement on anything yet most important item to note. No sense breaking down trial balloons , let's see what the folks actually come together on tonight , if anything.
Eurogroup meeting 'paused'
News from Brussels: the Eurogroup meeting has been 'paused' while officials from the eurozone and the Troika prepare new proposals.
That's according to the latest news flashes from Reuters, which reports that ministers haven't agreed on anything yet:
• EU OFFICIAL SAYS EURO ZONE FINANCE MINISTERS AIM TO BRING GREEK DEBT DOWN TO 120 PCT/GDP IN 2020
• EURO ZONE MINISTERS CONSIDERING GRANTING GREECE 10-YEAR MORATORIUM ON INTEREST PAYMENTS ON EFSF LOANS, THIS WOULD SAVE ATHENS 44 BLN EUROS-EU OFFICIAL
•EURO ZONE MINISTERS DISCUSSING CUTTING INTEREST ON BILATERAL LOANS TO GREECE TO 25 BPS FROM 150 BPS, GERMANY OBJECTS
• EURO ZONE MINISTERS' DISCUSSION OF GREEK DEBT BUY-BACK IDEA SHIFTING FROM 25 CENTS FOR ONE EURO TO 30 CENTS PER EURO, TO BUY 35-40 BLN EUROS OF DEBT-EU OFFICIAL
• EURO ZONE MINISTERS HAVE MADE NO DECISIONS YET ON ANY OF THE TOPICS-EU OFFICIAL
• EURO ZONE MINISTERS PAUSE MEETING FOR EU/IMF TROIKA TEAM TO PREPARE NEW PROPOSALS-EU OFFICIAL
Updated
FT: Compromise deal is close
The Financial Times is now reporting that the Eurogroup is "close to a deal" on Greece.
Interestingly, it has details of a compromise plan that might find favour with the International Monetary Fund:
While the details are still under negotiation, the shape of the potential deal involves Greece missing its target of maximum debt of 120 per cent of gross domestic product by 2020 – a benchmark of “debt sustainability” the IMF regards as sacrosanct.But additional debt relief measures would ensure that by 2022 Greece’s debt would fall to less than 110 per cent of GDP.
Last week, Eurogroup chair Jean-Claude Juncker and IMF head Christine Lagarde clashed publicly over whether the 120% target should be shunted back by two years to 2022 (he said "yes", she said "not a chance").
A new target of debt/GDP of below 110% in 2022 does, at first glance, sound like an serious attempt to persuade the IMF that Greece's debts are on a sustainable path - just over a longer journey than it would like.
4.33pm GMT
Before we see what we shall see, let's revisit the past and the prior PSI clusterfuck for private investors... so here's the question , do you re-sock the private investors with another 70 - 80 percent haircut on greek bonds and really expect private investors to not immediately sell off debt of Spain , Italy , Portugal , Ireland , Belgium , France ?
http://www.fxstreet.com/fundamental/market-view/european-crisis/2012/03/09/
Greece PSI deal completed: €172 bln bonds swaped, will enact CACs
Euro is going through a buy the rumour sell the fact after Greek govt announced it had completed a debt swap with participation at 85.8% vs expectations running as high as 90/95%, although the number stays very much in line with the first initial pre-announcement by Greek offcials at the NY close.
Holders of 172 bln euros worth of bonds in total have consented to bond offer vs €206 eligible with Greek officials saying they will enact CACs, as they will amend terms of Greek law bonds for all holders. Greece says 69% of non-Greek bondholders participated. Greece has also said participation will be 95.7% (€197m) after CAC triggered, which means forcing reluctant bondholders to participate against their will. Now is time to wait for ISDA to know whether CDS are triggered or not.
So, the next risk event in this whole Greek Bond Swap Soap Opera will be the ISDA committee meeting at 1:00 pm GMT to decide whether a credit event has occurred relating to Greece.
The final numbers are quite accurated with those rumored through the Asian session after the Greek agency ANA reported receiving an acceptance as high as 85%. One person involved in the deal had been said total participation would top 90 per cent, and maybe even 95 per cent if “collective action clauses” were used as expected, the Financial Times reported, which is also really accurate with the recent report coming in.
However, one unexpected sticking point is now a headline from Reuters, suggesting some hedge funds had found a legal loophole they believe will force Greece to repay some of its debt in full, three sources close to the matter said on Thursday. "This would intensify the standoff between the country and its debtors" the news agency reports.
Holders of 172 bln euros worth of bonds in total have consented to bond offer vs €206 eligible with Greek officials saying they will enact CACs, as they will amend terms of Greek law bonds for all holders. Greece says 69% of non-Greek bondholders participated. Greece has also said participation will be 95.7% (€197m) after CAC triggered, which means forcing reluctant bondholders to participate against their will. Now is time to wait for ISDA to know whether CDS are triggered or not.
So, the next risk event in this whole Greek Bond Swap Soap Opera will be the ISDA committee meeting at 1:00 pm GMT to decide whether a credit event has occurred relating to Greece.
The final numbers are quite accurated with those rumored through the Asian session after the Greek agency ANA reported receiving an acceptance as high as 85%. One person involved in the deal had been said total participation would top 90 per cent, and maybe even 95 per cent if “collective action clauses” were used as expected, the Financial Times reported, which is also really accurate with the recent report coming in.
However, one unexpected sticking point is now a headline from Reuters, suggesting some hedge funds had found a legal loophole they believe will force Greece to repay some of its debt in full, three sources close to the matter said on Thursday. "This would intensify the standoff between the country and its debtors" the news agency reports.
On another track , consider this bit of tin as another oddity - kinda like seeing hundreds of birds taking off suddenly and flying away right before an earthquake.....
http://beforeitsnews.com/conspiracy-theories/2012/11/elite-bugging-out-to-denver-11-22-2446102.html
‘Elite’ Bugging Out To Denver 11-22?
Tuesday, November 20, 2012 15:25
Perhaps two of the most important dates and power number sequences to the illuminati are 11 & 22 (11/22).
Normally I wouldn’t think too much about it, but now with the illuminati and their puppets Israel and the United States looking for provocation to attack Iran, this may have all manifested perfectly with 11/22/2012 logically being a key date to watch for a ‘False Flag’ or an official attack.
By itself, that still might not be enough to be concerned about this date…. that is until you consider a very strange story someone working in the airline industry shared with the Idaho Picker claiming that an unusually large number of ‘elites’ and business executives are all flying to Denver, Colorado, for Thanksgiving, 11-22-2012!
Why so many ‘elitists’ going to Denver this weekend? Are the turkeys and pumpkin pies in Colorado that much better than they are in the rest of America?
Published on Nov 10, 2012 by idahopicker
Investigate this. This would be a very bad sign. It is already confirmed from an airline insider, but I am asking you to investigate and send me what you find. Send me a YT private message or go to:http://idahopicker.weebly.com/contact-the-picker.html
more tin from a comment board.....
And if that wan't odd enough, lets have a little fun with numbers...
11/22/2012 can also be expressed as 1122212
add up the numbers.... 2+2+1+1+2+1+2 => 11
Anything else?
Well, NOVEMber just happens to be the 9th month in the Ancient ROMAN calendar.
NOVEMber = the 9th month
22 a major Illuminati power number due to the double 11 (1111)
So you could say 11/22 via numerology, is equivalent to
9/22 which would somewhat parallel 9/11/2001.
IOW... 11/22/2012 = 11 And now 9/22/2012 or 9+2+2+2+1+2 also = 11
09/22/2012
-9/11/2001
----------
00/11/0011 = 11/11 or in other words in numerology...
11 DAYS AND 11 YEARS FROM 9/11/2001
http://beforeitsnews.com/war-and-conflict/2012/11/alert-cybergeddon-terror-plot-to-destroy-america-exposed-2444202.html
Based on recently foiled terror plots and the latest terror related arrests, exercises, drills and propaganda, the American holidays known as Thanksgiving Day and Black Friday may be targeted for false-flag terror. These attacks, should they occur, will likely happen sometime between Thursday, November 22, 2012, and Monday, November 26, 2012, and target entertainment, financial, holiday, retail and travel related entities.
* * *
Thanksgiving Day & Black Friday Madness
Aside from the fact that a mall terror attack occurred on Black Friday in the movie “Mall Cop”, thisThanksgiving Day and Black Friday, Los Angeles International Airport (LAX), Target and Wal-Mart will be in unprecedented chaos due to capacity crowds as well as labor unions and labor organizations who are forcing their employees to walk off the job, protest or strike. These events will obviously create mass confusion, gridlock, mob psychology and a perfect opportunity whereby airports, crowds and/or retail locations can be easily targeted for terror.On October 10, 2012, it was reported that Wal-Mart employees are threatening to strike on Black Friday, the busiest, and most lucrative, retail day of the year. A month later on November 15, 2012, it was reported that Target faces a “backlash” from its employees the decision to open its doors on Thanksgiving evening. That same day, it was also reported that a group of Wal-Mart workers are planning to stage a walkout on Black Friday. According to the report, the walkout builds on an October strike that started at a Wal-Mart in Los Angeles which has now spread to stores in 12 other cities. A day later on November 16, 2012, it was reported that employees at Los Angeles International Airport are considering plans to walk off the job on Black Friday, traditionally the busiest traveling day of the year. According to the report, as many as 1,000 airport workers and union supporters are expected to march on Century Boulevard just as an estimated 1.8 million passengers are expected to travel through LAX over the holiday weekend. On November 20, 2012, it was reported that Los Angeles’ labor unions have decided to protest on Thanksgiving Eve, expecting to jam pre-Thanksgiving traffic in and around Los Angeles International Airport (LAX). That same day, it was also reported that Wal-Mart is taking legal action against its organized labor opponents, filing an unfair labor practice charge over widespread protests and rallies planned for at its stores across the country. According to the report, Wal-Mart is asking the National Labor Relations Board (NLRB) for an injunction against the rallies, pickets and flash mobs which have sprung up at Wal-Mart stores nationwide.
Israeli Cyber Terror
Cyber-terror attacks theoretically have the power to destroy almost every facet of American life, including but not limited to: Airplanes, banks, cars, communication, election results, government functionality, electricity, military defense, nuclear power plants, oil pipelines and refineries, prison systems, trains, satellites and the water supply stations. While China has been publicly scapegoated for cyber-terror, Israel who ranks # 1 in cyber terrorism, is by far the greatest provocateur of cyber-terror and will most likely be responsible for any future cyber-terror attack on America. A movie played at a retirement party for the head of the Israel Defense Forces (IDF) bragged that Israel was indeed responsible for the Stuxnet cyber-attack. Israel has also been accused of creating the Duqu virus, a cyber-terror worm related to the Israeli Stuxnet virus. The Duqu virus was purposely programmed by Israel to take over, control and crash computer systems at airports, banks, nuclear reactors and stock markets. According to Wikipedia, Duqu looks for information that could be useful in attacking industrial control systems, and based on the modular structure of the virus, it can theoretically be used to destroy any type of industrial computer system.
Batman Movie Foreshadows Doomsday Cyber Terror
The concepts and ideas put forth in the 2012 Batman movie entitled “The Dark Knight Rises” appears to be programming for what will transpire in America near the end of 2012. “The Dark Knight Rises” has implications that America will literally go dark, most likely from a cyber-attack or EMP, and it is filled with numerous acts of terror which ultimately programs viewers for what is planned to later transpire in reality. “The Dark Knight Rises” depicts a bloody attack on the New York Stock Exchange, a cyber-terror attack and heist where criminals make off with millions, a terror attack on the Brooklyn Bridge in New York while children are stranded on a school bus, a free-for-all prison break where criminals terrorize the streets, and a very vivid attack on the a professional football stadium in Gotham (New York).
Obama Weak on Terror
Just as the Obama administration attempts to pick up the pieces of a public intelligence failure in the alleged Al Qaeda attacks on U.S. embassies in Benghazi, Libya, Egypt, Yemen and Tunisia, and the highly publicized sex scandal regarding the resignation of U.S. General David Petraeus, the illegal stateof Israel is busy attacking the Gaza Strip in a coordinated effort to enrage Muslims against the West just prior to major terror attacks against the United States. These events are being orchestrated to precipitate a “revenge” type of scenario whereby the U.S. is attacked for its support of Israeli airstrikes on Gaza and because of Obama’s perceived weakness on foreign policy as the U.S. Commander in Chief.
Middle East Scapegoats PrimedOnly days before a potential terror attack, both Al Qaeda and the Taliban are front and center in the minds of millions, all thanks to the corporate media and the government of the U.K. In the highly rated Israeli inspired “Homeland” television series, terrorist leader “Abu” Nazir is being sought by the CIA in an effort to stop suicide bombers and other unknown terror attacks on America. In an obvious collusion between the CIA and Hollywood, it was reported on November 13, 2012, that a radical Islamist cleric “Abu” Qatada, described by prosecutors as a key Al Qaeda operative in Europe, was mysteriously freed from prison. According to reports, the preacher was seen smiling as he was driven away from Long Lartin maximum security jail in Worcestershire, central England. “Abu” Qatada is accused by Britain of links with Zacarias Moussaoui, the only person charged in the United States in the 9/11 terrorist attacks. Three days later on November 16, 2012, it was reported that a Taliban spokesperson sent out a routine email last week in which he publicly CC’d the names of everyone on his mailing list. According to the report, the names were disclosed in an email by Qari Yousuf Ahmedi, an official Taliban spokesperson was made up of more than 400 recipients includes an address appearing to belong to a provincial governor, an Afghan legislator, several academics and activists. These incidents, which appear completely contrived, have set the stage for the return of Islamic terror to the United States.
* * *
2. CYBER TERROR TARGETS
2.1: Airplanes & Cyber-Terror
According to recent cyber-terror propaganda, drones and planes can be remotely hijacked and then used as weapons, similarly to what happened on September 11, 2001. On June 25, 2012, it was reportedthat with the right equipment, anyone could take control of a GPS-guided drone and easily turn it into a weapon. Professor Todd Humphreys of the University of Texas at Austin stated that “Each one of these [drones] could be a potential missile used against us.” A month later on July 27, 2012, it was reported that air traffic control software which is used around the world could be exploited by hackers to unleash squadrons of ghost planes. Interestingly, in October of 2012, American Airlines has pulled 47 planes due to malfunctioning seats and 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes will play in the wake of a cyber-terror attack is unknown, but there is a real possibility that these planes have been remotely “programmed” to lose all power at a future date.
2.2: Nuclear Reactors & Cyber-Terror
On December 13, 2011, it was reported that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyber-attacks against U.S. targets, including nuclear power plants. There have also been approximately 40 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion.
2.3: Prisons Breaks & Cyber-Terror
Since September of 2012, there have been 4 major prison breaks in Iraq Libya Mexico and the U.S.which untimely indicates that more major prison breaks are imminent. On November 10, 2011, it was reported that officials with the Federal Bureau of Prisons have been informed that U.S. penitentiaries could be vulnerable to cyber-terror attacks that would help prisoners escape. According to the report, most American prisons are operated by industrial control systems (ICS) that also are used by power plants, water treatment facilities and other infrastructure operations. ICS’ vulnerability was demonstrated two years in Iran, when hackers sabotaged that country’s nuclear program by exploiting its Siemens programmable logic controllers (PLCs). Almost all of the 117 federal correctional facilities, 1,700 prisons and 3,000 jails in the United States use PLCs to control doors and manage their security systems. Coincidentally, on October 2, 2012, it was reported that the Obama administration plans to buy an Illinois prison which end up being the prison facility that suffers a cyber-terror prison break.
2.4: Stock Markets & Cyber-Terror
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror and financial related crimes, financial cyber-terror is blinking red on every level. An April 24, 2012, report stated that Osama bin Laden was looking for a follow-up terror attack to doom the American economy, so there is a real possibility that cyber terror attack targeting U.S. banks and Wall Street could hijack trillions of dollars ultimately dooming the American economy. To date, individuals have been arrested for cyber-terror related crimes such as credit and debit card PIN theft, the theft of proprietary software code from the Federal Reserve Bank of New York, theillegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, the malware SpyEye used to steal and use personal banking and credit card datafrom unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank has admitted to committing £2.5 million fraud. Essentially, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.
2.5: Subways/Trains & Cyber-Terror
On December 29, 2011, it was reported that Professor Stefan Katzenbeisser of Technische Universität Darmstadt had told a security conference in Berlin that new train system was vulnerable to hackers and “Denial of Service”. Future cyber-terror attacks could rhetorically target train switching systems, which enable trains to be guided from one track to another at a railway junction. Although these switching systems have historically been separate from the online world, this is no longer the case. The Israeli cyber-terror worm entitled the “Duqu virus”, has already wreaked havoc worldwide and could be used to target trains in the U.S. and Europe. Based on recent and inexplicable train crashes, this virus may already be attacking trains worldwide. Acting as a Trojan horse, the Duqu virus has the ability to essentially hijack its victim and then allow for the remote control of whatever entity is hijacked. If the Duqu virus hijacked a train, it could theoretically control train acceleration, braking and track switching.
3. CYBER TERRORISM
3.1: Cyber-Terror AttacksSince 2011, there have been an epidemic of “cyber-attacks” targeting high-profile government entitiessuch as the Vatican, United Nations, Interpol, NASA, Scotland Yard, FBI, DHS, CIA and the U.S. Federal Trade Commission. Less publicized however have been the cyber-attacks on critical infrastructure such as water plants, nuclear power plants, oil refineries and banks. These alleged cyber-attacks, whether real or not, give the perception that any entity with an internet connection is vulnerable to a future cyber-attack.
3.2: Cyber Terror DrillsBoth the Israeli and U.S. government, namely the CIA and the U.S. Department of Homeland Security, have been drilling cyber-terror attacks on a routine basis. Past cyber-terror drills range in duration and targets, generally focus on the financial and infrastructure targets. According to reports, authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.”
3.3: Cyber-Terror Hotline
Just as the United States and the Soviet Union had a nuclear hotline to avoid potential nuclear misunderstandings during the Cold War, a new “cyber-war hotline” is being speculated about in order to avoid future misunderstandings in the wake of major cyber-terror attacks. Security expert Bruce Schneier stated that a hotline between the world’s cyber commands would “at least allow governments to talk to each other, rather than guess where an attack came from.” On October 4, 2012, it was reported that Britain has begun tentative talks with China and Russia about setting up a hotline to help prevent cyber-emergencies from spiraling out of control. “At the moment, we don’t really have sufficient information-sharing arrangements with some countries such as China and the Chinese computer emergency response team,” said a senior Foreign Office official.
3.4: Cyber-Terror Plots & Patsies
Since April of 2011, there has been at least 25 major cases in which individuals or groups were charged with committing acts hacking or cyber-terror, while in China, police allegedly arrested 10,000 people in an unprecedented cyber-terror sweep. In most of the cases, finance or bank related hacking or cyber-terror was the motive although major corporate, energy or government institutions such AT&T, Blackberry, British National Party CIA, English Defence League, Facebook, Federal Reserve Bank, NATO, NHI, Nintendo, Sega and Symantec have also been allegedly targeted.
3.5: Cyber-Terror Security TakeoverUnder the guise of “cyber security”, the U.S. government has spent billions of dollars mapping and federalizing cyberspace and cyber security throughout America. According to the 2009 CRS Report for Congress entitled “Comprehensive National Cybersecurity Initiative”, the sudden change in policy is to ensure that “U.S. Government cyber security initiatives are appropriately integrated, resourced and coordinated with Congress and the private sector“. This changes essentially ensures that the private sectors of the economy (banks, gas, oil, power, stock markets, etc.) are under the cyber thumb of the U.S. government so that they can be targeted, hijacked and ultimately destroyed in a future cyber terror attack.
3.6: Cyber Terror Scapegoat: China
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on news and events surrounding, China more than any other nation is sure to be scapegoated in the aftermath of cyber-terror attacks against the United States. On October 5, 2011,U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign and cybercrime against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta, has publically stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyber-attacks against American companies and the government. October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.
3.7: Military Computer TheftsSince 2006, thousands of military laptops have been stolen in the United States and the United Kingdom. Why these thefts are being allowed to occur is not yet clear, but it plays nicely into the narrative of impending cyber-terror attacks. These laptops will have likely made it onto the black market and into the waiting hands of “terrorists” who will allegedly launch cyber-terror attacks against the U.S. and U.K. militaries and governments.
3.8: U.S. & Israeli Sponsored Cyber TerrorWhen massive cyber-terror attack begin to occur, the prime suspects should be the U.S. and Israeligovernments who openly brag about their offensive cyber-attack capabilities. According to Wikipedia, the Joint Functional Component Command – Network Warfare team (JFCCNW) is “responsible for coordinating offensive computer network operations for the United States Department of Defense” and that the JFCCNW is “the world’s most formidable hacker posse: a super-secret, multimillion-dollar weapons program that may be ready to launch bloodless cyber-war against enemy networks”. Aside from being implemented in both the “Stuxnet” virus and the “Duqu” virus, the Israeli government allegedly ranks #1 in cyber terrorism.
* * *
Why so many ‘elitists’ going to Denver this weekend? Are the turkeys and pumpkin pies in Colorado that much better than they are in the rest of America?
Published on Nov 10, 2012 by idahopicker
Investigate this. This would be a very bad sign. It is already confirmed from an airline insider, but I am asking you to investigate and send me what you find. Send me a YT private message or go to:http://idahopicker.weebly.com/contact-the-picker.html
more tin from a comment board.....
And if that wan't odd enough, lets have a little fun with numbers...
11/22/2012 can also be expressed as 1122212
add up the numbers.... 2+2+1+1+2+1+2 => 11
Anything else?
Well, NOVEMber just happens to be the 9th month in the Ancient ROMAN calendar.
NOVEMber = the 9th month
22 a major Illuminati power number due to the double 11 (1111)
So you could say 11/22 via numerology, is equivalent to
9/22 which would somewhat parallel 9/11/2001.
IOW... 11/22/2012 = 11 And now 9/22/2012 or 9+2+2+2+1+2 also = 11
09/22/2012
-9/11/2001
----------
00/11/0011 = 11/11 or in other words in numerology...
11 DAYS AND 11 YEARS FROM 9/11/2001
http://beforeitsnews.com/war-and-conflict/2012/11/alert-cybergeddon-terror-plot-to-destroy-america-exposed-2444202.html
Based on recently foiled terror plots and the latest terror related arrests, exercises, drills and propaganda, the American holidays known as Thanksgiving Day and Black Friday may be targeted for false-flag terror. These attacks, should they occur, will likely happen sometime between Thursday, November 22, 2012, and Monday, November 26, 2012, and target entertainment, financial, holiday, retail and travel related entities.
* * *
Thanksgiving Day & Black Friday Madness
Aside from the fact that a mall terror attack occurred on Black Friday in the movie “Mall Cop”, thisThanksgiving Day and Black Friday, Los Angeles International Airport (LAX), Target and Wal-Mart will be in unprecedented chaos due to capacity crowds as well as labor unions and labor organizations who are forcing their employees to walk off the job, protest or strike. These events will obviously create mass confusion, gridlock, mob psychology and a perfect opportunity whereby airports, crowds and/or retail locations can be easily targeted for terror.On October 10, 2012, it was reported that Wal-Mart employees are threatening to strike on Black Friday, the busiest, and most lucrative, retail day of the year. A month later on November 15, 2012, it was reported that Target faces a “backlash” from its employees the decision to open its doors on Thanksgiving evening. That same day, it was also reported that a group of Wal-Mart workers are planning to stage a walkout on Black Friday. According to the report, the walkout builds on an October strike that started at a Wal-Mart in Los Angeles which has now spread to stores in 12 other cities. A day later on November 16, 2012, it was reported that employees at Los Angeles International Airport are considering plans to walk off the job on Black Friday, traditionally the busiest traveling day of the year. According to the report, as many as 1,000 airport workers and union supporters are expected to march on Century Boulevard just as an estimated 1.8 million passengers are expected to travel through LAX over the holiday weekend. On November 20, 2012, it was reported that Los Angeles’ labor unions have decided to protest on Thanksgiving Eve, expecting to jam pre-Thanksgiving traffic in and around Los Angeles International Airport (LAX). That same day, it was also reported that Wal-Mart is taking legal action against its organized labor opponents, filing an unfair labor practice charge over widespread protests and rallies planned for at its stores across the country. According to the report, Wal-Mart is asking the National Labor Relations Board (NLRB) for an injunction against the rallies, pickets and flash mobs which have sprung up at Wal-Mart stores nationwide.
Israeli Cyber Terror
Cyber-terror attacks theoretically have the power to destroy almost every facet of American life, including but not limited to: Airplanes, banks, cars, communication, election results, government functionality, electricity, military defense, nuclear power plants, oil pipelines and refineries, prison systems, trains, satellites and the water supply stations. While China has been publicly scapegoated for cyber-terror, Israel who ranks # 1 in cyber terrorism, is by far the greatest provocateur of cyber-terror and will most likely be responsible for any future cyber-terror attack on America. A movie played at a retirement party for the head of the Israel Defense Forces (IDF) bragged that Israel was indeed responsible for the Stuxnet cyber-attack. Israel has also been accused of creating the Duqu virus, a cyber-terror worm related to the Israeli Stuxnet virus. The Duqu virus was purposely programmed by Israel to take over, control and crash computer systems at airports, banks, nuclear reactors and stock markets. According to Wikipedia, Duqu looks for information that could be useful in attacking industrial control systems, and based on the modular structure of the virus, it can theoretically be used to destroy any type of industrial computer system.
11/22/2012 can also be expressed as 1122212
add up the numbers.... 2+2+1+1+2+1+2 => 11
Anything else?
Well, NOVEMber just happens to be the 9th month in the Ancient ROMAN calendar.
NOVEMber = the 9th month
22 a major Illuminati power number due to the double 11 (1111)
So you could say 11/22 via numerology, is equivalent to
9/22 which would somewhat parallel 9/11/2001.
IOW... 11/22/2012 = 11 And now 9/22/2012 or 9+2+2+2+1+2 also = 11
09/22/2012
-9/11/2001
----------
00/11/0011 = 11/11 or in other words in numerology...
11 DAYS AND 11 YEARS FROM 9/11/2001
http://beforeitsnews.com/war-and-conflict/2012/11/alert-cybergeddon-terror-plot-to-destroy-america-exposed-2444202.html
Based on recently foiled terror plots and the latest terror related arrests, exercises, drills and propaganda, the American holidays known as Thanksgiving Day and Black Friday may be targeted for false-flag terror. These attacks, should they occur, will likely happen sometime between Thursday, November 22, 2012, and Monday, November 26, 2012, and target entertainment, financial, holiday, retail and travel related entities.
* * *
Thanksgiving Day & Black Friday Madness
Aside from the fact that a mall terror attack occurred on Black Friday in the movie “Mall Cop”, thisThanksgiving Day and Black Friday, Los Angeles International Airport (LAX), Target and Wal-Mart will be in unprecedented chaos due to capacity crowds as well as labor unions and labor organizations who are forcing their employees to walk off the job, protest or strike. These events will obviously create mass confusion, gridlock, mob psychology and a perfect opportunity whereby airports, crowds and/or retail locations can be easily targeted for terror.On October 10, 2012, it was reported that Wal-Mart employees are threatening to strike on Black Friday, the busiest, and most lucrative, retail day of the year. A month later on November 15, 2012, it was reported that Target faces a “backlash” from its employees the decision to open its doors on Thanksgiving evening. That same day, it was also reported that a group of Wal-Mart workers are planning to stage a walkout on Black Friday. According to the report, the walkout builds on an October strike that started at a Wal-Mart in Los Angeles which has now spread to stores in 12 other cities. A day later on November 16, 2012, it was reported that employees at Los Angeles International Airport are considering plans to walk off the job on Black Friday, traditionally the busiest traveling day of the year. According to the report, as many as 1,000 airport workers and union supporters are expected to march on Century Boulevard just as an estimated 1.8 million passengers are expected to travel through LAX over the holiday weekend. On November 20, 2012, it was reported that Los Angeles’ labor unions have decided to protest on Thanksgiving Eve, expecting to jam pre-Thanksgiving traffic in and around Los Angeles International Airport (LAX). That same day, it was also reported that Wal-Mart is taking legal action against its organized labor opponents, filing an unfair labor practice charge over widespread protests and rallies planned for at its stores across the country. According to the report, Wal-Mart is asking the National Labor Relations Board (NLRB) for an injunction against the rallies, pickets and flash mobs which have sprung up at Wal-Mart stores nationwide.
Israeli Cyber Terror
Cyber-terror attacks theoretically have the power to destroy almost every facet of American life, including but not limited to: Airplanes, banks, cars, communication, election results, government functionality, electricity, military defense, nuclear power plants, oil pipelines and refineries, prison systems, trains, satellites and the water supply stations. While China has been publicly scapegoated for cyber-terror, Israel who ranks # 1 in cyber terrorism, is by far the greatest provocateur of cyber-terror and will most likely be responsible for any future cyber-terror attack on America. A movie played at a retirement party for the head of the Israel Defense Forces (IDF) bragged that Israel was indeed responsible for the Stuxnet cyber-attack. Israel has also been accused of creating the Duqu virus, a cyber-terror worm related to the Israeli Stuxnet virus. The Duqu virus was purposely programmed by Israel to take over, control and crash computer systems at airports, banks, nuclear reactors and stock markets. According to Wikipedia, Duqu looks for information that could be useful in attacking industrial control systems, and based on the modular structure of the virus, it can theoretically be used to destroy any type of industrial computer system.
Batman Movie Foreshadows Doomsday Cyber Terror
The concepts and ideas put forth in the 2012 Batman movie entitled “The Dark Knight Rises” appears to be programming for what will transpire in America near the end of 2012. “The Dark Knight Rises” has implications that America will literally go dark, most likely from a cyber-attack or EMP, and it is filled with numerous acts of terror which ultimately programs viewers for what is planned to later transpire in reality. “The Dark Knight Rises” depicts a bloody attack on the New York Stock Exchange, a cyber-terror attack and heist where criminals make off with millions, a terror attack on the Brooklyn Bridge in New York while children are stranded on a school bus, a free-for-all prison break where criminals terrorize the streets, and a very vivid attack on the a professional football stadium in Gotham (New York).
Obama Weak on Terror
Just as the Obama administration attempts to pick up the pieces of a public intelligence failure in the alleged Al Qaeda attacks on U.S. embassies in Benghazi, Libya, Egypt, Yemen and Tunisia, and the highly publicized sex scandal regarding the resignation of U.S. General David Petraeus, the illegal stateof Israel is busy attacking the Gaza Strip in a coordinated effort to enrage Muslims against the West just prior to major terror attacks against the United States. These events are being orchestrated to precipitate a “revenge” type of scenario whereby the U.S. is attacked for its support of Israeli airstrikes on Gaza and because of Obama’s perceived weakness on foreign policy as the U.S. Commander in Chief.
Middle East Scapegoats PrimedOnly days before a potential terror attack, both Al Qaeda and the Taliban are front and center in the minds of millions, all thanks to the corporate media and the government of the U.K. In the highly rated Israeli inspired “Homeland” television series, terrorist leader “Abu” Nazir is being sought by the CIA in an effort to stop suicide bombers and other unknown terror attacks on America. In an obvious collusion between the CIA and Hollywood, it was reported on November 13, 2012, that a radical Islamist cleric “Abu” Qatada, described by prosecutors as a key Al Qaeda operative in Europe, was mysteriously freed from prison. According to reports, the preacher was seen smiling as he was driven away from Long Lartin maximum security jail in Worcestershire, central England. “Abu” Qatada is accused by Britain of links with Zacarias Moussaoui, the only person charged in the United States in the 9/11 terrorist attacks. Three days later on November 16, 2012, it was reported that a Taliban spokesperson sent out a routine email last week in which he publicly CC’d the names of everyone on his mailing list. According to the report, the names were disclosed in an email by Qari Yousuf Ahmedi, an official Taliban spokesperson was made up of more than 400 recipients includes an address appearing to belong to a provincial governor, an Afghan legislator, several academics and activists. These incidents, which appear completely contrived, have set the stage for the return of Islamic terror to the United States.
The concepts and ideas put forth in the 2012 Batman movie entitled “The Dark Knight Rises” appears to be programming for what will transpire in America near the end of 2012. “The Dark Knight Rises” has implications that America will literally go dark, most likely from a cyber-attack or EMP, and it is filled with numerous acts of terror which ultimately programs viewers for what is planned to later transpire in reality. “The Dark Knight Rises” depicts a bloody attack on the New York Stock Exchange, a cyber-terror attack and heist where criminals make off with millions, a terror attack on the Brooklyn Bridge in New York while children are stranded on a school bus, a free-for-all prison break where criminals terrorize the streets, and a very vivid attack on the a professional football stadium in Gotham (New York).
Obama Weak on Terror
Just as the Obama administration attempts to pick up the pieces of a public intelligence failure in the alleged Al Qaeda attacks on U.S. embassies in Benghazi, Libya, Egypt, Yemen and Tunisia, and the highly publicized sex scandal regarding the resignation of U.S. General David Petraeus, the illegal stateof Israel is busy attacking the Gaza Strip in a coordinated effort to enrage Muslims against the West just prior to major terror attacks against the United States. These events are being orchestrated to precipitate a “revenge” type of scenario whereby the U.S. is attacked for its support of Israeli airstrikes on Gaza and because of Obama’s perceived weakness on foreign policy as the U.S. Commander in Chief.
Middle East Scapegoats PrimedOnly days before a potential terror attack, both Al Qaeda and the Taliban are front and center in the minds of millions, all thanks to the corporate media and the government of the U.K. In the highly rated Israeli inspired “Homeland” television series, terrorist leader “Abu” Nazir is being sought by the CIA in an effort to stop suicide bombers and other unknown terror attacks on America. In an obvious collusion between the CIA and Hollywood, it was reported on November 13, 2012, that a radical Islamist cleric “Abu” Qatada, described by prosecutors as a key Al Qaeda operative in Europe, was mysteriously freed from prison. According to reports, the preacher was seen smiling as he was driven away from Long Lartin maximum security jail in Worcestershire, central England. “Abu” Qatada is accused by Britain of links with Zacarias Moussaoui, the only person charged in the United States in the 9/11 terrorist attacks. Three days later on November 16, 2012, it was reported that a Taliban spokesperson sent out a routine email last week in which he publicly CC’d the names of everyone on his mailing list. According to the report, the names were disclosed in an email by Qari Yousuf Ahmedi, an official Taliban spokesperson was made up of more than 400 recipients includes an address appearing to belong to a provincial governor, an Afghan legislator, several academics and activists. These incidents, which appear completely contrived, have set the stage for the return of Islamic terror to the United States.
* * *
2. CYBER TERROR TARGETS
2.1: Airplanes & Cyber-Terror
According to recent cyber-terror propaganda, drones and planes can be remotely hijacked and then used as weapons, similarly to what happened on September 11, 2001. On June 25, 2012, it was reportedthat with the right equipment, anyone could take control of a GPS-guided drone and easily turn it into a weapon. Professor Todd Humphreys of the University of Texas at Austin stated that “Each one of these [drones] could be a potential missile used against us.” A month later on July 27, 2012, it was reported that air traffic control software which is used around the world could be exploited by hackers to unleash squadrons of ghost planes. Interestingly, in October of 2012, American Airlines has pulled 47 planes due to malfunctioning seats and 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes will play in the wake of a cyber-terror attack is unknown, but there is a real possibility that these planes have been remotely “programmed” to lose all power at a future date.
2.2: Nuclear Reactors & Cyber-Terror
On December 13, 2011, it was reported that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyber-attacks against U.S. targets, including nuclear power plants. There have also been approximately 40 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion.
2.3: Prisons Breaks & Cyber-Terror
Since September of 2012, there have been 4 major prison breaks in Iraq Libya Mexico and the U.S.which untimely indicates that more major prison breaks are imminent. On November 10, 2011, it was reported that officials with the Federal Bureau of Prisons have been informed that U.S. penitentiaries could be vulnerable to cyber-terror attacks that would help prisoners escape. According to the report, most American prisons are operated by industrial control systems (ICS) that also are used by power plants, water treatment facilities and other infrastructure operations. ICS’ vulnerability was demonstrated two years in Iran, when hackers sabotaged that country’s nuclear program by exploiting its Siemens programmable logic controllers (PLCs). Almost all of the 117 federal correctional facilities, 1,700 prisons and 3,000 jails in the United States use PLCs to control doors and manage their security systems. Coincidentally, on October 2, 2012, it was reported that the Obama administration plans to buy an Illinois prison which end up being the prison facility that suffers a cyber-terror prison break.
2.1: Airplanes & Cyber-Terror
According to recent cyber-terror propaganda, drones and planes can be remotely hijacked and then used as weapons, similarly to what happened on September 11, 2001. On June 25, 2012, it was reportedthat with the right equipment, anyone could take control of a GPS-guided drone and easily turn it into a weapon. Professor Todd Humphreys of the University of Texas at Austin stated that “Each one of these [drones] could be a potential missile used against us.” A month later on July 27, 2012, it was reported that air traffic control software which is used around the world could be exploited by hackers to unleash squadrons of ghost planes. Interestingly, in October of 2012, American Airlines has pulled 47 planes due to malfunctioning seats and 17 flights were diverted from Manila’s international airport due to an alleged air traffic equipment “glitch”. What role these 64 planes will play in the wake of a cyber-terror attack is unknown, but there is a real possibility that these planes have been remotely “programmed” to lose all power at a future date.
2.2: Nuclear Reactors & Cyber-Terror
On December 13, 2011, it was reported that U.S. officials were investigating whether Iranian and Venezuelan diplomats in Mexico were involved in planned cyber-attacks against U.S. targets, including nuclear power plants. There have also been approximately 40 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a foregone conclusion.
2.3: Prisons Breaks & Cyber-Terror
Since September of 2012, there have been 4 major prison breaks in Iraq Libya Mexico and the U.S.which untimely indicates that more major prison breaks are imminent. On November 10, 2011, it was reported that officials with the Federal Bureau of Prisons have been informed that U.S. penitentiaries could be vulnerable to cyber-terror attacks that would help prisoners escape. According to the report, most American prisons are operated by industrial control systems (ICS) that also are used by power plants, water treatment facilities and other infrastructure operations. ICS’ vulnerability was demonstrated two years in Iran, when hackers sabotaged that country’s nuclear program by exploiting its Siemens programmable logic controllers (PLCs). Almost all of the 117 federal correctional facilities, 1,700 prisons and 3,000 jails in the United States use PLCs to control doors and manage their security systems. Coincidentally, on October 2, 2012, it was reported that the Obama administration plans to buy an Illinois prison which end up being the prison facility that suffers a cyber-terror prison break.
2.4: Stock Markets & Cyber-Terror
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror and financial related crimes, financial cyber-terror is blinking red on every level. An April 24, 2012, report stated that Osama bin Laden was looking for a follow-up terror attack to doom the American economy, so there is a real possibility that cyber terror attack targeting U.S. banks and Wall Street could hijack trillions of dollars ultimately dooming the American economy. To date, individuals have been arrested for cyber-terror related crimes such as credit and debit card PIN theft, the theft of proprietary software code from the Federal Reserve Bank of New York, theillegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, the malware SpyEye used to steal and use personal banking and credit card datafrom unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank has admitted to committing £2.5 million fraud. Essentially, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.
2.5: Subways/Trains & Cyber-Terror
On December 29, 2011, it was reported that Professor Stefan Katzenbeisser of Technische Universität Darmstadt had told a security conference in Berlin that new train system was vulnerable to hackers and “Denial of Service”. Future cyber-terror attacks could rhetorically target train switching systems, which enable trains to be guided from one track to another at a railway junction. Although these switching systems have historically been separate from the online world, this is no longer the case. The Israeli cyber-terror worm entitled the “Duqu virus”, has already wreaked havoc worldwide and could be used to target trains in the U.S. and Europe. Based on recent and inexplicable train crashes, this virus may already be attacking trains worldwide. Acting as a Trojan horse, the Duqu virus has the ability to essentially hijack its victim and then allow for the remote control of whatever entity is hijacked. If the Duqu virus hijacked a train, it could theoretically control train acceleration, braking and track switching.
Based on unprecedented financial cyber-terror propaganda and the recent rash of suspects and patsies arrested for financial cyber-terror and financial related crimes, financial cyber-terror is blinking red on every level. An April 24, 2012, report stated that Osama bin Laden was looking for a follow-up terror attack to doom the American economy, so there is a real possibility that cyber terror attack targeting U.S. banks and Wall Street could hijack trillions of dollars ultimately dooming the American economy. To date, individuals have been arrested for cyber-terror related crimes such as credit and debit card PIN theft, the theft of proprietary software code from the Federal Reserve Bank of New York, theillegal reproduction and distribution of more than 100 copyrighted commercial and financial business software programs, the malware SpyEye used to steal and use personal banking and credit card datafrom unsuspecting victims’ online accounts, and the former head of fraud and security for digital banking at Lloyds Bank has admitted to committing £2.5 million fraud. Essentially, everything needed to commit the greatest bank heist ever is conveniently in place. Coincidentally, governments around the world have been executing financial cyber-terror drills in which hackers hijack trillions of dollars with no trace.
2.5: Subways/Trains & Cyber-Terror
On December 29, 2011, it was reported that Professor Stefan Katzenbeisser of Technische Universität Darmstadt had told a security conference in Berlin that new train system was vulnerable to hackers and “Denial of Service”. Future cyber-terror attacks could rhetorically target train switching systems, which enable trains to be guided from one track to another at a railway junction. Although these switching systems have historically been separate from the online world, this is no longer the case. The Israeli cyber-terror worm entitled the “Duqu virus”, has already wreaked havoc worldwide and could be used to target trains in the U.S. and Europe. Based on recent and inexplicable train crashes, this virus may already be attacking trains worldwide. Acting as a Trojan horse, the Duqu virus has the ability to essentially hijack its victim and then allow for the remote control of whatever entity is hijacked. If the Duqu virus hijacked a train, it could theoretically control train acceleration, braking and track switching.
3. CYBER TERRORISM
3.1: Cyber-Terror AttacksSince 2011, there have been an epidemic of “cyber-attacks” targeting high-profile government entitiessuch as the Vatican, United Nations, Interpol, NASA, Scotland Yard, FBI, DHS, CIA and the U.S. Federal Trade Commission. Less publicized however have been the cyber-attacks on critical infrastructure such as water plants, nuclear power plants, oil refineries and banks. These alleged cyber-attacks, whether real or not, give the perception that any entity with an internet connection is vulnerable to a future cyber-attack.
3.2: Cyber Terror DrillsBoth the Israeli and U.S. government, namely the CIA and the U.S. Department of Homeland Security, have been drilling cyber-terror attacks on a routine basis. Past cyber-terror drills range in duration and targets, generally focus on the financial and infrastructure targets. According to reports, authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.”
3.3: Cyber-Terror Hotline
Just as the United States and the Soviet Union had a nuclear hotline to avoid potential nuclear misunderstandings during the Cold War, a new “cyber-war hotline” is being speculated about in order to avoid future misunderstandings in the wake of major cyber-terror attacks. Security expert Bruce Schneier stated that a hotline between the world’s cyber commands would “at least allow governments to talk to each other, rather than guess where an attack came from.” On October 4, 2012, it was reported that Britain has begun tentative talks with China and Russia about setting up a hotline to help prevent cyber-emergencies from spiraling out of control. “At the moment, we don’t really have sufficient information-sharing arrangements with some countries such as China and the Chinese computer emergency response team,” said a senior Foreign Office official.
3.4: Cyber-Terror Plots & Patsies
Since April of 2011, there has been at least 25 major cases in which individuals or groups were charged with committing acts hacking or cyber-terror, while in China, police allegedly arrested 10,000 people in an unprecedented cyber-terror sweep. In most of the cases, finance or bank related hacking or cyber-terror was the motive although major corporate, energy or government institutions such AT&T, Blackberry, British National Party CIA, English Defence League, Facebook, Federal Reserve Bank, NATO, NHI, Nintendo, Sega and Symantec have also been allegedly targeted.
3.1: Cyber-Terror AttacksSince 2011, there have been an epidemic of “cyber-attacks” targeting high-profile government entitiessuch as the Vatican, United Nations, Interpol, NASA, Scotland Yard, FBI, DHS, CIA and the U.S. Federal Trade Commission. Less publicized however have been the cyber-attacks on critical infrastructure such as water plants, nuclear power plants, oil refineries and banks. These alleged cyber-attacks, whether real or not, give the perception that any entity with an internet connection is vulnerable to a future cyber-attack.
3.2: Cyber Terror DrillsBoth the Israeli and U.S. government, namely the CIA and the U.S. Department of Homeland Security, have been drilling cyber-terror attacks on a routine basis. Past cyber-terror drills range in duration and targets, generally focus on the financial and infrastructure targets. According to reports, authorities have expressed concerns about terrorists combining physical attacks such as bombings with hacker attacks to disrupt rescue efforts, known as hybrid or “swarming” attacks.”
3.3: Cyber-Terror Hotline
Just as the United States and the Soviet Union had a nuclear hotline to avoid potential nuclear misunderstandings during the Cold War, a new “cyber-war hotline” is being speculated about in order to avoid future misunderstandings in the wake of major cyber-terror attacks. Security expert Bruce Schneier stated that a hotline between the world’s cyber commands would “at least allow governments to talk to each other, rather than guess where an attack came from.” On October 4, 2012, it was reported that Britain has begun tentative talks with China and Russia about setting up a hotline to help prevent cyber-emergencies from spiraling out of control. “At the moment, we don’t really have sufficient information-sharing arrangements with some countries such as China and the Chinese computer emergency response team,” said a senior Foreign Office official.
3.4: Cyber-Terror Plots & Patsies
Since April of 2011, there has been at least 25 major cases in which individuals or groups were charged with committing acts hacking or cyber-terror, while in China, police allegedly arrested 10,000 people in an unprecedented cyber-terror sweep. In most of the cases, finance or bank related hacking or cyber-terror was the motive although major corporate, energy or government institutions such AT&T, Blackberry, British National Party CIA, English Defence League, Facebook, Federal Reserve Bank, NATO, NHI, Nintendo, Sega and Symantec have also been allegedly targeted.
3.5: Cyber-Terror Security TakeoverUnder the guise of “cyber security”, the U.S. government has spent billions of dollars mapping and federalizing cyberspace and cyber security throughout America. According to the 2009 CRS Report for Congress entitled “Comprehensive National Cybersecurity Initiative”, the sudden change in policy is to ensure that “U.S. Government cyber security initiatives are appropriately integrated, resourced and coordinated with Congress and the private sector“. This changes essentially ensures that the private sectors of the economy (banks, gas, oil, power, stock markets, etc.) are under the cyber thumb of the U.S. government so that they can be targeted, hijacked and ultimately destroyed in a future cyber terror attack.
3.6: Cyber Terror Scapegoat: China
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on news and events surrounding, China more than any other nation is sure to be scapegoated in the aftermath of cyber-terror attacks against the United States. On October 5, 2011,U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign and cybercrime against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta, has publically stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyber-attacks against American companies and the government. October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.
3.6: Cyber Terror Scapegoat: China
The nation of China has been systematically accused of hacking and has been linked to numerous acts of cyber-terrorism. Based on news and events surrounding, China more than any other nation is sure to be scapegoated in the aftermath of cyber-terror attacks against the United States. On October 5, 2011,U.S. lawmakers publically accused China of cyber-terror and demanded that China stop its “pervasive” cyber-espionage campaign and cybercrime against America. A few weeks later on October 28, 2011, it was reported that Chinese hackers may have interfered with two US satellites on four separate occasions. A week later, a U.S. government report stated that it can expect more aggressive efforts from China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing. In March of 2012, a U.S. congressional report stated that China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage. Despite the alleged cyber-terror threat from China, Chinese joint ventures with U.S. manufacturers in hardware, software and telecommunications have created a “potential vector” for the People’s Liberation Army (PLA) to exploit and compromise American security. In what appears to be cyber-war political posturing, Chinese police arrested over 10,000 suspects and 600 criminal gangs during its latest crackdown on cybercrime while U.S. Defense Secretary Leon Panetta, has publically stated that after several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyber-attacks against American companies and the government. October 8, 2012, a report from the House Intelligence Committee warned that American companies should avoid doing business with China’s telecom companies because they poses a national security threat to the U.S. and that “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes”.
3.7: Military Computer TheftsSince 2006, thousands of military laptops have been stolen in the United States and the United Kingdom. Why these thefts are being allowed to occur is not yet clear, but it plays nicely into the narrative of impending cyber-terror attacks. These laptops will have likely made it onto the black market and into the waiting hands of “terrorists” who will allegedly launch cyber-terror attacks against the U.S. and U.K. militaries and governments.
3.8: U.S. & Israeli Sponsored Cyber TerrorWhen massive cyber-terror attack begin to occur, the prime suspects should be the U.S. and Israeligovernments who openly brag about their offensive cyber-attack capabilities. According to Wikipedia, the Joint Functional Component Command – Network Warfare team (JFCCNW) is “responsible for coordinating offensive computer network operations for the United States Department of Defense” and that the JFCCNW is “the world’s most formidable hacker posse: a super-secret, multimillion-dollar weapons program that may be ready to launch bloodless cyber-war against enemy networks”. Aside from being implemented in both the “Stuxnet” virus and the “Duqu” virus, the Israeli government allegedly ranks #1 in cyber terrorism.
3.8: U.S. & Israeli Sponsored Cyber TerrorWhen massive cyber-terror attack begin to occur, the prime suspects should be the U.S. and Israeligovernments who openly brag about their offensive cyber-attack capabilities. According to Wikipedia, the Joint Functional Component Command – Network Warfare team (JFCCNW) is “responsible for coordinating offensive computer network operations for the United States Department of Defense” and that the JFCCNW is “the world’s most formidable hacker posse: a super-secret, multimillion-dollar weapons program that may be ready to launch bloodless cyber-war against enemy networks”. Aside from being implemented in both the “Stuxnet” virus and the “Duqu” virus, the Israeli government allegedly ranks #1 in cyber terrorism.
* * *
No comments:
Post a Comment