As I have written, US Vice-Pres. Joe Biden as well as Hillary Clinton and pres. Obama are accusing Russia of the hacking of the e-mails of the Democratic Party´s National Committee, of Hillary Clinton and her campaign leader, John Podesta´s.
Apparently, the US government has sent Pres. Putin an ultimatum and told him there will be a proportionate retaliation. Breitbart 31 July 2016 thought a disgrumbled intelligence officer was behind the hacking.
Cyber war is a deadly serious thing: NATO’s 28 member states are moving closer to officially applying the law of armed conflict to cyber warfare, a move that would have far-reaching consequences on how military operations are conducted in the digital age.
So, it is paramount to be certain of who a cyber attacker is before responding. It may be a matter of peace or war
It is important to distinguish criminal measures from acts of war.
But is the US government sure that Russia is the culprit?
DWN 23 Okt. 2016: Cyber attacks on the Internet in the US (on Oct. 21) came from many different states. Other states were also attacked. Keine einzige Attacke aus Russland No attacks from Russia.
According to information from the Digital Attack Map, on Saturday large-scale Ddos attacks on Brazil were observed.
A global attack on a provider of domain name system services, Dyn Inc., caused a long-term failure of the Web sites of Twitter, Spotify, Reddit, CNN, Etsy and The New York Times from New York to Los Angeles. “Anonymous” and “World hackers” has claimed it for themselves. Most attacks came from Scandinavia and Eastern Europe.
The Daily Mail 22 oct. 2016 asks if this is PRACTICE for ELECTION DAY. WikiLeaks believes its supporters were responsible for the attacks
The attack is ‘well planned and executed, coming from tens of millions of IP addresses at same time.’
YourNewsWire 21 Oct. 2016: The FBI and Department of Homeland Security are investigating multiple cyber attacks that caused widespread online disruption on both sides of the Atlantic on Friday.
Access to dozens of websites was disrupted and prevented many users from accessing Amazon, Netflix, PayPal, Reddit, Spotify and Twitter.
It was not immediately clear who was responsible for the outages that started in the Eastern United States spreading to other parts of the country and Western Europe.
“What they’re actually doing is moving around the world with each attack,” Dyn Chief Strategy Officer Kyle York said in a conference call Friday afternoon.
Four methods of attack have been identified: denying access to a network; capturing
information; altering or destroying data; and gaining full access of a network.
Wayne Madsen Strategic Culture 21 Oct. 2016: The U.S. Intelligence Community, led by the three most political actors in recent history, claims to have irrefutable “proof” that the Russian government was behind the hacking of Democratic Party computers and those affiliated with the Hillary Clinton presidential campaign. However, CIA Agency director John Brennan, Director of National Intelligence James Clapper, and National Security Agency director Admiral Mike Rogers provided not one iota of evidence that it was Russian state players who hacked into the computers of the Democrats or the personal email accounts of Hillary Clinton campaign manager John Podesta and other staffers.
Podesta has a long track record of interest in extraterrestrial visitations of our planet and unidentified flying objects (UFOs) and the files the U.S. government possesses on these subjects. Consequently, Podesta, who has served as White House chief of staff for Presidents Bill Clinton and Barack Obama, has drawn the interest of the most dedicated contingent among the computer hacker community: those who hope to discover the “mother lode” of secret files allegedly held by the U.S. government on alien visitations and UFOs. However, thereby, they made other interesting discoveries.
It was my job to monitor hacker operations throughout the 1980s and 1990s for the NSA, Department of State, National Institute of Standards and Technology (NIST), and U.S. Navy.
It was clear then, as it is evident today, that computer hacking blamed on nefarious “state-supported” hackers was almost always the result of a teenager.
Democrats do not want to be embarrassed by admitting that the real culprits are hackers who want to know more about Podesta’s knowledge of the “little gray aliens.”It is the fault of Podesta and Mr. and Mrs. Clinton that they have attracted, with their talk about aliens, every computer hacker and script kiddie on the planet hungry for any morsel held in government and private computers about ET.
There is not one scrap of evidence of Russian government involvement.
What is cyber war?
The Scientific American 18 Oct. 2016: The actual threat refers to the Obama administration’s contention that Putin is likely behind the cyber attacks on Democratic National Committee computers and the leak of more than 19,000 pilfered DNC e-mails to WikiLeaks just before the party’s July national convention.
Additional e-mails from presidential nominee Hillary Clinton and other Democrats have since surfaced on WikiLeaks’ site, fueling concerns that Russia is trying to skew the election in favor of Republican nominee Donald Trump.
This makes the Illuminati and their media so nervous that they tell us it is illegal to have or read these e-mails.
The Obama administration’s very public threat to engage Russia in a cyber snowball fight is an unprecedented move with unclear consequences, given the unpredictability of online attacks.
Scientific American spoke with O. Sami Saydjari—a former senior U.S. Department of Defense cyber expert.
Saydjari: This is a cyber version of mutually assured destruction—or, maybe more accurately in this case, mutually assured damage.
You damage our cyberspace, we’ll damage your cyberspace. But that’s a dangerous game. One possibility [for going public] is to draw the attention of the international community and possibly attract sanctions.
Cyber action is the purview of the U.S. Cyber Command and not the intelligence community. The U.S. Cyber Command happens to be commanded by the head of the National Security Agency (NSA), Adm. Michael Rogers .
What types of weapons are used to launch a cyber offensive?
Malware, network attacks and cyber sabotage are the three main categories in a cyber arsenal. The issue is more about where you place these attacks. It may take some time—even years—to set up such an attack. The attackers are waiting for just the right time to use them because they’re use-once weapons (as indicated by Joe Biden).
If a piece of code reaches a certain level of sophistication, it becomes more likely that the developer was backed by a nation-state. In some cases you can do “thumb printing.” Programmers tend to use the techniques they develop over and over again, so you can tell malware that’s been developed by the same set of people.
There’s cyber conflict and then there’s cyber war. We have definitely seen examples of cyber conflict between nation-states—it happens every day. Cyber war is another level, where there is an all-out attack and an intention to do strategic damage to another nation-state entity. We have not seen cyber war yet.