Archive | May 30, 2012

Throwing a ‘Flame’ Across Cyberspace!

Throwing a ‘Flame’ Across Cyberspace!

If all the energy caught up in scheming, and planning, implementation, and maintaining the process of making the lives of others a misery could be re-channeling into doing something good, what a wonderful world it would be for all – yes all. But no, to do good is asking too much of Israel, U.S., and allies to do just that.

In their latest round of nightmares, the “Flame” is the latest in cyber warfare considered by experts to be 20 times stronger than any previous virus. This 20 megabyte virus is so powerful thay experts say only a state cold have created this hellfire currently aimed at the Middle East. Flame:

  • gathers data files
  • remotely change settings on computers
  • turns on computer microphones to record conversations
  • activate a computer’s audio systems to listen in on Skype calls
  • takes screen shots and copy instant messaging chats
  • “vacuum up” information by copying keyboard strokes and the voices of people nearby
  • Detect passwords hidden by asterisks
  • Collect information from Bluetooth devices

Once the data is collected it is uploaded to command and control servers.

Discovered by a Russian security firm,  what else ‘Flame’ can do is still in the process of discovery. Kasperksy Lab comment that ‘Flame’ was released into cyberspace about 5 years ago, and as so far infected machines in Egypt, Israel, Lebanon, Sudan and Syria.

Professor Alan Woodward of the University of Surrey said to the Guardian, U.K., that ‘Flame’ is designed to steal data via computers that use Microsoft Windows.

A convenient way to force acceptability of U.N control of the Internet, which is being discussed in the House and would give the UN’s International Telecommunication Union (ITU) governance of the service – the very same entity that is warning states around the world! The first hearing is scheduled to take place in the 1st week of June, 2012.

In an interview with Russia Today, Vitaly Kamyluk of Kaspersky Lab informed:

RT: This enormous stratum of data that ‘Flame’ can gather, who would need it and is it really possible to analyze such an avalanche of information?

VK: First of all, when we’re talking about the size of data that is to be analyzed, we know that the attackers do not infect as many victims as possible. Their resources are limited; it seems that they understand that. They are keeping the number of infected machines more or less the same. So it’s the same level. When they finish analyzing data that has been stolen from one network, they remove the malware and switch to another.So we think that it’s still possible the extract only the data they are interested in.

RT: So can we call this a cyber war, and if so?

VK: Stuxnet and Duqu were bright examples of cyber weapons which could even physically destroy infrastructure, and this [Flame] is a continuation of this story. So this is another development in this roe which continues in addition to Stuxnet and Duqu.There are also nation stations supporting [these] developments. We think that cyber warfare has been going on for years already. People were just probably not aware of it because cyber warfare has a unique feature: it’s hidden. Nobody knows when cyber warfare operations are going on. This is the key feature of it.

RT: Who is behind these cyber attacks?

VK: Like with Stuxnet and Duqu, it’s currently unclear who is behind it. It’s very hard to find out who is behind it because when we try to follow the traces, who controls the application – it connects to the command and control centers – it turns out to be… dozens or even more servers spread around different countries around the world. More than 80 or 90 domains are associated with those servers. Most of them are registered with fake identities. So they’re pretty well protected and hidden. So it is unclear who is behind that, and we try not to speculate who could be behind such attacks. We try to base it on pure facts like the language we extract from the code. In this case, we only found traces of good English used inside the code.

RT: So who do you think is winning this war?

VK: I think that humanity is losing to be honest, because we are fighting between each other instead of fighting against global problems which everyone faces in their lives.

Fear breeds contempt, alienation, distrust, and violation of what it means to be human, and too many of us just dont seem to be able to kick this destructive habit – what a waste of human potential!

The creation of the Internet came about as a product of Arpanet was the first real network to run on packet switching technology on October 29, 1969, computers at Stanford and UCLA connected becoming the first hosts of what would become the Internet. The Stanford Research Institute is one of the brain-childs of the Tavistock Institute, Sussex University, U.K. and is one of Tavistock’s 30 research centers in the U.S. the Tavistock Institute created NATO.

Back to the Internet, the Stanford Research Institute in its 1974 report entitled: “Changing Images of Man,” (Contract Number URH (489~215O, Policy Research Report No. 414.74), which was written by anthropologist Margaret Mead, psychologist B.F. Skinner, Ervin Laszlo of the U.N., and Sir Geoffrey Vickers of British intelligence stated:

“Many of our present images appear to have become dangerously obsolete, however . . . Science, technology, and economics have made possible really significant strides toward achieving such basic human goals as physical safety and security, material comfort and better health. But many of these successes have brought with them problems of being too successful — problems that themselves seem insoluble within the set of societal value-premises that led to their emergence . . . Our highly developed system of technology leads to higher vulnerability and breakdowns. Indeed the range and interconnected impact of societal problems that are now emerging pose a serious threat to our civilization . . . If our predictions of the future prove correct, we can expect the association problems of the trend to become more serious, more universal and to occur more rapidly.”

The Internet has become one of, if not the strongest globalizing tool. It is today that we can say unequivocally that youth, the greates users of the Internet have common self perceptions and perceptions of reality across cultures, but what any organizational theorist cannot account form cannot regulate, is the flicker of the human spirit over the human animal – the former is not predictable, but the latter is. Give the latter pre-set conditions, one can expect man to react according to plan.

The Stanford Research Institute, SRI today remains the think tank of the U.S. military, for which the Internet was originally conceived by SRI. The computer mouse and the acoustic modem were SRI inventions of the 1960s.

SRI plays a key role in [D]ARPA documentation, which is under the U.S., Department of Defense. [D]ARPA is responsible for operating the Information Awareness Office, which spies on American computers (and telephones) in the name of catching terrorists. SRI was also responsible for introducing and spreading the use of ATM’s, and nurturing the acceptance of the cashless society – virtual money, the means by which the global financial elite via its coporations increases its wealth and power-base.

Conceived in 1946, to focus on research in mind control and future sciences, today SRI’s focus is on big business and technology. SRI is an offshoot of Stanford University, which along with UCLA connected to become the first hosts of what would become the Internet.

As Google ‘underdevelops’ its search engine further to:

  • Draw ‘facts’ from places like Wikipedia for historical information
  • CIA World Factbook for geopolitical answers
  • the World Bank for economic ‘facts’
  • Freebase for information about people and other predetermined sources

As the the Cyber Intelligence Sharing and Protection Act was passed by the U.S. House of Representatives on 27th April 2012, and the current move to place the Internet under U.N. governance granting special clearance to the largest Jewish-owned internet providers, such as Verizon, Comcast, Google, and Facebook, SRI comes full circle to fulfilling its original agenda!

July 19 2012

Following confirmation that “Flame” is a part of the Israeli-American cyberwarfare on Iran, a new virus “Mahdi” is deployed exploiting the Islamic tradition of the savior in 2012. Probably neither Israel or the U.S. can afford all out war, as this confirms how much they familarize themselves with the culture and religion of those they have marked as enemies, though the real enemy is themselves, especially in 2012 when all wiil come to the surface, and only the blind will not see.

Unlike “Flame”, “Mahdi” can be modified by remote to recrd keystrokes, remove documents, monitor email communications, and record audio.

However, according to Costin Raiu, senior security researcher at Kaspersky Lab, this piece of malware is not sophisticated, unlike Flame. “Mahdi” has targeted over 800 systems in Iran including financial services, and government embassies, but the Middle East in general, as well as Israel has been targeted!

The Intelhub reports:

The potential similarities between Flame and Mahdi were so striking that Seculert originally contacted Kaspersky Lab in order to examine the two pieces of malware, although ultimately they “couldn’t find a direct connection between the campaigns.”

 “It is still unclear whether this is a state-sponsored attack or not. The targeted organizations seem to be spread between members of the attacking group by giving each victim machine a specific prefix name, meaning that this operation might require a large investment and financial backing,” Seculert states on their blog.

Infections include infected PDF anf Powerpoint file attachments. The Russian Kaspersky Lab notes,

“Large amounts of data collection reveal the focus of the campaign on Middle Eastern critical infrastructure engineering firms, government agencies, financial houses, and academia. And individuals within this victim pool and their communications were selected for increased monitoring over extended periods of time.”


‘Flame’ Virus Explained: How It Works And Who’s Behind It.”

McElroy, D. “Flame: World’s Most Complex Computer Virus Exposed.”

Ruppert, M. “Virus Named After Islamic Messiah Found in Iranian and Israeli Systems.”

Related Topics:

Cyber Intelligence Law Passed by House of Representatives

U.S: Privatizing the Postal System

Bye Bye First Amendment!

Bringing Internet Under UN-US Control*

Big Brother Poised to Spy on Online 24/7…*

You, Social Engineering and The Tavistock Institute

BBC and Syria Massacre Hoax!*

BBC and Syria Massacre Hoax!*

The British media has been caught yet again “with its pants down” in the effort to sell a NATO-led attack on Syria, with the revelation that BBC News used a years-old photo of dead Iraqi children to depict victims of an alleged government assault on the town of Houla.

In a report issued hours after the massacre, the BBC used a photo that was first published over nine years ago and taken in Al Mussayyib, Iraq. The image shows a child skipping over the dead bodies of hundreds of Iraqi children who have been transported from a mass grave to be identified.

The caption used by the BBC to describe the image stated that the picture was provided by an activist and “believed to show the bodies of children in Houla awaiting burial”. After the “mistake” was exposed, the BBC changed their original article but did not issue a retraction.

The photographer who took the original picture, Marco Di Lauro, posted on his Facebook page,

“Somebody is using my images as a propaganda against the Syrian government to prove the massacre.” Di Lauro told the London Telegraph he was “astonished” the BBC had failed to check the authenticity of the image.

Mr di Lauro, who works for Getty Images picture agency and has been published by newspapers across the US and Europe, said: “I went home at 3am and I opened the BBC page which had a front page story about what happened in Syria and I almost felt off from my chair..

“What I am really astonished by is that a news organization like the BBC doesn’t check the sources and it’s willing to publish any picture sent it by anyone: activist, citizen journalist or whatever. That’s all.

He added he was less concerned about an apology or the use of image without consent, adding:

“What is amazing it’s that a news organization has a picture proving a massacre that happened yesterday in Syria and instead it’s a picture that was taken in 2003 of a totally different massacre.

“Someone is using someone else’s picture for propaganda on purpose.”

BBC removed (damage has already been done) the news article when they caught red handed, but mobile version of the story is still online without Marco Di Lauro Iraq war image.


Related Topics:

Syria and the New American Century

The Shock and Awe of the Syrian Rebels*

Rujm el-Hirri: The Stonehenge of Syria

Don’t Believe Everything You See and Read About Ghaddafi

U.S: Control the Media, Control the People