Archive for November 2015

Paris attack used as an excuse to target encryption

Just as I forecast, the Paris terror event of last Friday is being used to launch an attack on the use of encryption.

Greenwald on encryption

The Bloomberg article says:

The bloodshed in Paris led U.S. officials Monday to renew calls for limits on technology that prevents governments from spying on phone conversations, text messages and e-mails.

Senator Dianne Feinstein, a California Democrat, said she asked Silicon Valley companies to help law enforcement and intelligence agencies access communications that have been encrypted — or scrambled to evade surveillance — if terrorists are using the tools to plan attacks.

End of quote.

The N.Y. Times went down a similar path, but then removed the article.

Blaming encryption

Matthew is a Professor of cryptography at Johns Hopkins University and a regular commentator on such matters.

Of course, the public dialogue does not consider the real evidence, but let’s consider some. This study looks at whether there has been any apparent increase in the use of cryptography by on-line jihadists since the Edward Snowden revelations:

  • The underlying public encryption methods employed by online jihadists do not appear to have significantly changed since the emergence of Edward Snowden. Major technological recent advancements have focused primarily on expanding the use of encryption to instant messenger and mobile communications mediums.
  • Aside from warning of tampered copies of “Asrar al-Mujahideen” that were deliberately infected with spyware, none of the prominent jihadi logistical units have expressed any public doubt as to the continued effectiveness of encryption methods employed in their software packages that were released prior to the Snowden leaks.
  • The actual release of new jihadi-themed encryption software packages, like “Asrar al-Dardashah,” seems to have had a far more noticeable impact in terms of driving waves of interest in the subject of encryption among users of jihadi web forums than the publication of the Snowden NSA revelations in June 2013.
  • Well prior to Edward Snowden, online jihadists were already aware that law enforcement and intelligence agencies were attempting to monitor them. As a result, the Snowden revelations likely merely confirmed the suspicions of many of these actors, the more advanced of which were already making use of – and developing – secure communications software.

End of quote.

But this is not about the facts. It’s about justifying to the public the elimination of any encryption that stops the global elite and their proxies, the state, monitoring everything we say and do.

I wonder how much of a fight Apple will put up. Or are they just shadowboxing?

The Paris terror attacks of Friday 13th

I have allowed a few days to pass before commenting upon the events of last Friday in Paris.

Firstly, some people’s initial reaction was, “This was too large an event to have been a false flag”.

To those, I refer you to Chapter 1 of James Perloff’s book “Truth Is a Lonely Warrior”. This chapter is called “Six Wars”, and Perloff discusses six false flag events that led to those wars or the US participation in them. I use the term in its broadest sense in that it includes events that were allowed to happen whilst authorities feigned ignorance when they knew well before what was planned:

  1. Pearl Harbour – both America and Britain had decoded Japanese communications long before that attack, and the oil embargo imposed upon Japan by the US was a move intended to provoke an attack and bring the US into WWII.
  2. The Lusitania was a passenger liner that was intentionally left unprotected and allowed to be sunk by a German torpedo to bring the US into WWI, as committed to by the Rothschilds in exchange for the Balfour Declaration, in which Britain committed to giving Palestine to the Zionists for a Jewish homeland.
  3. The Maine – “on February 15, 1898 – an enormous explosion tore apart the American battleship Mainein Cuba’s Havana Harbor. Most of the crew died – 266 men.” It was used to trigger the Spanish-American war on behalf of the Rothschilds and Rockefellers. “Cuba had become the world’s wealthiest colony and largest sugar producer by the nineteenth century, and its sugar plantations were coveted by the Rockefellers’ National City Bank. The American public was suddenly regaled with phony atrocity stories, such as the Spanish roasting Catholic priests and feeding Cubans to sharks.”
  4. The Korean War – “In April 1944, Foreign Affairs– America’s most influential journal of foreign policy – published an article entitled “Korea in the Postwar World.” It proposed dividing Korea into a trusteeship, its fate similar to that of East and West Germany and Berlin. We would control Korea’s southern half, while our “noble” Soviet allies would take custody of the North. Naturally, Stalin agreed with this idea, and the Soviets received power over North Korea.

“Considering that the Soviets did nothing to win the Pacific war, North Korea was an enormous trophy to give the dictator Stalin, well known to have murdered millions of his own people. Stalin swiftly established a communist government under Kim Il-sung in North Korea, and equipped him with the tanks, MiGs and other weapons needed for the 1950 invasion – which could have been completely avoided had we not made overtures to Stalin to bring him into the Far East.”

  1. Vietnam – “In 1964 Congress passed the Tonkin Gulf Resolution, authorizing President Lyndon B. Johnson to intervene in the Vietnam War, to which he committed hundreds of thousands of troops. The justification given for the resolution was two alleged attacks on U.S. destroyers by Vietnamese torpedo boats in the Tonkin Gulf, on August 2 and 4, 1964.

“President Johnson described the first attack as an “unprovoked assault” against a “routine patrol.” Actually, the destroyer was supporting a South Vietnamese military operation against the North.

“The second attack never occurred at all.”

  1. Iraq – “On February 5, 2003, before the conflict began, U.S. Secretary of State Colin Powell told the UN he had absolute proof that Saddam Hussein possessed weapons of mass destruction (WMDs) that were an immediate threat to world security. He declared: “My colleagues, every statement I make today is backed up by sources, solid sources. These are not assertions. What we are giving you are facts and conclusions based on solid intelligence . . .”

And there are many other examples I could give. In simple terms, wars, at least in the last 200 or so years, have been created to serve the interests of the global elite, and these have led to the death of tens of millions of people. In the scheme of things, the Paris attacks are a mere trifling.

Were the attacks in Paris real, or did they involve crisis actors, as many recent events have done? For me, this question is simply a matter of tactics and is a distraction from the main game – the use of terror to advance the globalist agenda.

In my opinion, this interview with an Irish political journalist encapsulates the context and the event most succinctly. I commend it to you.

I found this report by Dr. Paul Craig Roberts very interesting:

I have received a report from European security that there was a massive cyber-attack on French systems 48 hours prior to and during the Paris attacks.

Amongst other things, the attack took down the French mobile data network and blinded police surveillance. The attack was not a straightforward DDOS attack but a sophisticated attack that targeted a weakness in infrastructure hardware.

Such an attack is beyond the capability of most organizations and requires capability that is unlikely to be in ISIL’s arsenal. An attack on this scale is difficult to pull off without authorities getting wind of it. The coordination required suggests state involvement.

It is common for people with no experience in government to believe that false flag attacks are not possible, because they think the entire government would have to be involved and not everyone would go along with it. Someone would talk. However, if the report I have received is correct, hardly anyone has to be involved, and security forces are simply disabled.

End of quote. I have not seen any other report of this, and Roberts is no neophyte – “Roberts was Assistant Secretary of the Treasury for Economic Policy and associate editor of the Wall Street Journal. He was columnist for Business Week, Scripps Howard News Service, and Creators Syndicate.”

Also, this article by Roberts:

Just as with 9/11, Charlie Hebdo and the Boston Marathon Bombing, the media was scripted with the story and ready to go the minute the happening was reported.

There is no investigation, no questioning, just the media moving in lockstep with the scripted official story. Again the perpetrators conveniently leave their ID. Again the attack coincides with an official drill of the attack. No matter how transparent the false flag attack and the agendas served by it, patriotism whipped to a frenzy blinds people to the reality.

End of quote.

But, for me, the two elements that shriek of a false flag are these:

  1. As this article discusses, there was a drill enacted in Paris that day, which was for exactly such an event. This occurred at 9/11, at Sandy Hook, at the Boston Marathon bombing, to name a few.
  2. Without waiting for forensic analysis, Hollande declares war on ISIS and dispatches France’s one and only aircraft carrier to the Middle East.

Expect more restrictions in many forms in the coming days and weeks. You see, it doesn’t matter if lots of people wake up to what’s going on. The wheels of this monster act upon the meme they have created, as if it were true, and it’s very difficult to put humpty dumpty back together again. It doesn’t matter that the Holocaust was a lie or that 9/11 was a false flag event. The world we live in is a result of those in power acting as if they were true, and you can’t bring the Iraqis or the Palestinians back to life, nor (currently) remove the “depleted” uranium projectiles from the Iraqi landscape, which continue to kill and deform countless numbers.

WP2Social Auto Publish Powered By :
Follow by Email