Susanne Posel, Contributor
Activist Post
A grand jury in a US District Court in California has indicted Ryan Cleary, suspected member of LulzSec, the CIA-backed hacking group, of hacking into websites such as Fox Entertainment, PBS and Sony Pictures Entertainment, as well as into servers run by several hosting firms in the United States. Cleary also is accused of in a couple of distributed denial-of-service (DDoS) attacks.
LulzSec has been linked to Anonymous, which has members of the CIA working in and with the hacktivist group in an attempt by the US government to create a false flag threat that justifies the Obama administration’s restriction of American freedoms on the Internet.
The hacktivist movement has spawned new off-shoots of the main groups Anonymous and LulzSec, named “LulzSec Reborn”, “MalSec”, and “SpexSec”. These groups are using the same techniques as Anonymous, with new names. The nature of these groups is to wreak havoc, break apart, and come together under a different name to begin the process over again.
Josh Corman, director of security intelligence for Akamai, who has studied Anonymous, explains that Anonymous members will leave the group “if there is no organizing principle, if they grow frustrated that they are not having enough impact or are not satisfied with their investment of time or they’re sick of trolling.”
LulzSec Reborn is responsible for leaking over 10,000 Twitter usernames and passwords to members of TweetGif, a Gif-sharing application.
Although LulzSec is “dead” their members are reforming and armed with information from various US government agencies like the US State Department, ICE, the Defense Intelligence Agency and other military sites.
It is alleged that they have also gained information from foreign servers in Syria and Colombian prisons. However, if this is true, it just furthers the reality that these hacktivists are actually US government agents pretending to be independent persons in a nameless, faceless hacking group hell-bent on cyber-attacking government agencies.
Flame and Stuxnet, which have been linked to the digital destruction in Iran and Syria, are creations of the US government for use in cyber-attacks against foreign nations.
Eugene Kaspersky, of the Russian Kaspersky Lab, has made the connection between Flame and Stuxnet and the cyber-attack on Iran by the US and Israel.
Kaspersky has hard evidence that Flame and Stuxnet are the same virus, and must have been unleashed by the US and Israeli governments in conjunction with the European Union in an effort to syphon secret information from Iranian servers.
The issue of hacktivists and their threat to the Internet, national security and digital information flow is a ruse designed to fool the American public into thinking that on the other side of their computer screen lurks a Bogeyman ready to pounce.
In reality it is the US government and their false flags that we should all be vigilantly aware of so that we can recognize when Big Brother is trying to usurp our digital rights.
Susanne Posel is the Chief Editor of Occupy Corporatism. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media. You can find us on our Facebook page.
var linkwithin_site_id = 557381;
linkwithin_text=’Related Articles:’
Be the first to comment on "CIA’s Hacktivists May Have Had Access to Flame and Stuxnet"