A racket, as you know, is "a service that generates its own demand and that one would not have needed otherwise". By this definition, most of today's major industries are rackets, including health services, insurance, national defense, public safety, higher education, and more. I'm here to tell you that we can add another booming industry to that list.
Here's what Google AI tells us:
«The cybersecurity industry is experiencing substantial growth, driven by the increase in cyber threats and the need for robust security solutions, with a global market expected to reach $578.2 billion by 2033."
I think you know why they chose this particular year as the basis for their projections. The fact is, cybersecurity is all about big money. In today's world, nothing becomes lucrative by chance. The economy is just a gigantic horse-pulling cart, with billionaire and trillionaire families hidden behind private equity and investment groups that create and inflate new markets with Monopoly money. Information technology is a great example of this, and cybersecurity is only the latest phase.
This is an analogy to the physical security market. You've seen smart cameras pop up at traffic lights, public squares, and school campuses in your city; How did they justify this expense to the public? By staging fake events like mass shootings, of course. One need only apply this logic to the digital world to understand the rapid growth of the cybersecurity industry.
I offer a single fact, kindly provided by Wikipedia, to support my claim:
"55% of data hacks are caused by organized crime."
Miles has already shown that organized crime is entirely a creation of the FBI. Hoover created the American Mafia from scratch and sold it to the public in order to justify a massive increase in the FBI's budget. The fact that organized crime is responsible for more than half of the security breaches therefore means that officials in your own government – and your tax dollars – are stealing your data. But wait, why would they need to do this when they already have full access to all your data through close partnerships with Google, Intel, Microsoft, Apple, etc. In other words, why should trillionaire families steal data they already have? The only answer that holds water is that they are trying to sell their latest scam: cybersecurity.
To be clear, I am not saying that all cyberattacks are perpetrated by your own government. I'm saying that all major attacks are, and probably most minor attacks as well. And most hackers are in the service of national intelligence agencies, whether they are aware of it or not. Take a look at this enlightening article published on Quora by an NSA analyst who admits that the NSA is tracking hackers around the world, not to hand them over to the FBI, but to recruit them.
But let's go further. Palo Alto Networks is one of the largest cybersecurity companies in the world.
«The company serves more than 70,000 organizations in more than 150 countries, including 85 of the Fortune 100 companies. It is a partner organization of the World Economic Forum."
This is already a big alarm signal. The WEF is not in the business of protecting people's rights or privacy, so why would it want to partner with Palo Alto Networks? Because the WEF is actually in the engineering of the global economy for the benefit of trillionaires, and cybersecurity is one of their last high-margin markets.
«Palo Alto Networks was founded in 2005 by Nir Zuk, a former Check Point and NetScreen Technologies engineer. Nir Zuk, who is of Israeli descent, began working with computers during his mandatory military service in the Israel Defense Forces in the early 1990s and served as head of software development in Unit 8200, a branch of the Israeli intelligence corps.
Another huge wake-up call, isn't it? One of the founding fathers of cybersecurity comes from Israeli military intelligence, in other words American military intelligence. They are one, you know. This reminds us that Google was also created by the U.S. secret services through the CIA's investment arm, In-Q-Tel, and that the entire internet was a DARPA project.
About Google:
«In June 2018, Nikesh Arora, a former Google and SoftBank executive, joined the company as chief executive officer.
There are no Google executives on the U.S. intelligence staff, indicating that Palo Alto Networks is just another front for the CIA or DoD. The president of Palo Alto Networks is BJ Jenkins, who previously worked at EMC Corporation. EMC is a data storage, cybersecurity, and cloud computing company founded by Richard Egan. Where is Egan from? Prior to founding EMC, he was part of the team that helped develop the Apollo Project memory systems for NASA and also worked at Lockheed Martin and Intel.
Crowdstrike is another great cybersecurity company. It was founded in partnership with private equity firm Warburg Pincus. The latter comes from the infamous Warburg family of bankers, Venetian Jews and one of the richest families in the world since the 1500s. Two of Crowdstrike's top executives, Shawn Henry and Steve Chabinsky, are former members of the FBI. Are you starting to get an idea of the situation?
Can major cyberattacks be linked to American intelligence services? Of course!
«The WannaCry ransomware attack is a global cyberattack perpetrated in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It was spread using EternalBlue, an exploit developed by the United States National Security Agency (NSA) for Windows systems. EternalBlue was stolen and leaked by a group called The Shadow Brokers a month before the attack."
From now on, Wikipedia writes my article for me. One of the largest cyberattacks in history used an exploit created by the NSA, and yet we are supposed to believe that the NSA had nothing to do with the attack. But wait, why would Microsoft allow the NSA to create its own private backdoor into its operating system? This is what Wikipedia explicitly tells us. The obvious answer is that Microsoft and the NSA are simply different departments of the same company. And how much too specific can a group that calls itself "The Shadow Brokers" be? They could just as easily be called The Hidden Hand of Phoenicia or The Insects of the Isle of Man. But who are they?
«The Shadow Brokers (TSB) is a hacker group that first appeared in the summer of 2016. They have published several leaks containing hacking tools, including several zero-day exploits, from the "Equation Group”, which is widely suspected to be a branch of the U.S. National Security Agency (NSA).
Do you see the merry-go-round they are creating for us? WannaCry used an NSA exploit leaked by the Shadow Brokers, who actually leaked it by the Equation Group, which is actually the NSA. But there is more, since Wikipedia tells us that it is Lazarus Group that is suspected of being at the origin of WannaCry. They were the ones who used the exploit disclosed by TSG/Equation to carry out the attack. An internal NSA memo that has been leaked tells us that Lazarus is from North Korea. However
«Kaspersky also acknowledged that the repetition of the code could be a false flag intended to deceive investigators and attribute the attack to North Korea, given that the global WannaCry worm cyberattack also copied NSA techniques.
In fact, they admit that the NSA is behind all of this. The Shadow Brokers, Equation Group, and Lazarus Group are just code names for the NSA. It takes less than half a brain to realize this. Park Jin Hyok is one of the alleged masterminds of Lazarus Group.
It's the only photo we have of him, and it reeks of CGI. His clothes don't look real, as if they were some kind of composite created by artificial intelligence. North Korea denies its existence, which is a little inside joke, since it is actually telling you the truth. Park is on the FBI's Most Wanted list, which means he's either an intelligence agent or a ghost. Anyone on the FBI's Most Wanted list is an agent. It's true, whether it exists or not. At this point, it's probably easier for them to generate all of their criminals using AI, because using real people runs the risk of them talking at their retirement party after having had a few too many glasses of Moët. Park and the Lazarus Group used ransomware to extort $81 million from the Central Bank of Bangladesh in 2016. Of course, because why ask for 80 million when you can demand 81 million? How else would they get their hand from the dead man?
Here is some pretty self-explanatory evidence of the NSA's involvement in cyberattacks:
«The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, is a cyberwarfare intelligence collection unit of the National Security Agency (NSA)."
Through TAO, the NSA has admitted to creating several methods of cyberattack, including QUANTU Why would the NSA, which is supposed to try to prevent cyberattacks, create the ransomware that makes them possible? There are better:
«Microsoft notifies the NSA of vulnerabilities of which it is aware, before patches or information about those vulnerabilities are made available to the public; this allows TAO to execute so-called zero-day attacks. A Microsoft official, who declined to be identified by the press, confirmed that this was indeed the case, but said that Microsoft could not be held responsible for the NSA's use of this prior information.
We are told that these attacks are being used against foreign organizations. Okay, but why should we take the NSA's word for it? Do we really think that their words have any meaning? This is just a simple claim without evidence, like everything the NSA tells us. Remember, we just saw them attribute WannaCry to North Korea, while it is covered by the fingerprints of the NSA itself. But you see how that explains the mechanism by which the NSA can perpetrate cyberattacks on the American public: Microsoft alerts them to vulnerabilities before they fix them. But we've already caught them admitting that the NSA is creating these backdoors itself with Microsoft's blessing, which means we've caught them lying. You can't claim to be vigilant in detecting vulnerabilities when you allow other vulnerabilities to be integrated into your product.
Speaking of North Korea, let us not forget that this entire country is just a front for the American intelligence services. You may remember this photo of the main control center of their space program:
Their space program was only launched in 2012, but apparently they only managed to find computers dating back to 1985. Of course, nothing you see on these screens means anything, and these men in white coats (why blouses?) are just paid actors. Do you think that North Korea also has a room like that full of hackers? Do they also wear lab coats? Well, actually:
No blouses, but a man drawing the North Korean flag using Paint on a state-of-the-art Windows 95 PC! This is the headshot of a 2013 Wired article titled "Pentagon Warns North Korea Could Become a Hacker Haven”. Yes, we are all trembling in our boots. Here is the first line of the article:
«North Korea is barely connected to the global internet. But it is trying to escalate its hacker game by breaking into hostile networks, according to a new Pentagon report.
Oh my, the things they want us to believe! Here's another one to make you laugh:
«After an intense birding session, Kim Jong-un and his gay buddies watch season 3 of Will & Grace."
What about the serious security breach in Equifax's data – remember that? Here is Wang Qian, one of the four masterminds of PLA who is behind it:
Couldn't they have done better than that? Pathetic, guys.
Another well-known computer worm is Stuxnet. According to Wikipedia, Stuxnet is responsible for serious damage to Iran's nuclear program.
«Although neither the United States nor Israel has openly admitted responsibility, several independent news organizations have claimed that Stuxnet is a cyber weapon jointly built by the two countries as part of a collaborative effort known as Operation Olympic Games.
It's funny that behind every door where you'd expect to find a group of malicious and obscure hackers, you'll find our own intelligence agencies. And since Iran's nuclear program is about as real as North Korea's space program, we can look at it all for what it is: fake attacks on fake enemies to extort real money through the U.S. Treasury. It's racketeering in all its glory. The NSA creates the problem in order to sell a solution:
«The idea behind the defense-in-depth approach is to defend a system against a particular attack using several independent methods. It is an overlay tactic, designed by the National Security Agency (NSA) as a comprehensive approach to information security and electronic security."
In other words, your business has to spend hundreds of thousands of dollars every year on multiple layers of IT security; The more "robust" (i.e., expensive) they are, the better. That's where companies like Palo Alto Networks come in. To sum it up, can you guess who the major shareholders of Palo Alto Networks are? That's right: Vanguard, Blackrock, Morgan Stanley, State Street and Bank of America. The same goes for Crowdstrike: Vanguard, Blackrock, State Street and Morgan Stanley. These are the investment groups of the trillionaire families that also control the NSA, FBI, CIA, and even all the major "state-owned" companies that are "hacked”, That's why most of these ransomware attacks require bitcoin – it's the local currency of the intelligence community, which is more convenient and helps prevent money from being accounted for. And if a large company has to pay a ransom, it is only stealing from Peter to pay Paul, since the victim and the attacker are both part of the same family. Unless it's a trillionaire family attacking another, which is possible. But in this case, families aren't burdened by the rising costs of cybersecurity – YOU are. Businesses simply raise the prices of their goods and services to cover additional overhead and administrative costs, which includes cybersecurity. As usual, it's you, the consumer and the taxpayer, who foot the bill.
source: Miles Mathis via Olivier Demeulenaere