Tuesday, October 4, 2011

How long before the world experiences a "Cyber 9/11?

Flying model airplanes into the Capitol Dome was such a stupid-ass attempt at scaring Americans into supporting these never ending "Wars for Wall Street and Israel' that many Americans are realizing they've been had, duped by their own government and Israel when those two criminal organizations pulled off the FALSE FLAG/INSIDE JOB of 9/11.

They're getting desperate, but not stupid enough to knock down some more skyscrapers. There's too many hand-held video cameras and a LOT of cell phones that have recording technology that would probably catch some of the perps in action and that wouldn't go over well when it got posted on the 'Net.

The best way to finally clamp down forever on what's left of our freedoms and Bill of Rights would be to stage a 'Cyber 9/11.' giving the fed the excuse, in the name of National Security, to temporarily shut down the 'Net, but only till they and they're good buddies in the Telecom Industries could install censoring software to forever neuter any REAL truth about what happened on 9/11 reaching the public.

As other more astute writers have pointed out, it doesn't take a genius to see where Haifa University professor Gabriel Weimann wants to lead the U.S. and much of the world: Into a land where our thoughts and conversations are monitored 24/7. And those that don't meet secret guidelines for "political correctness" and thought control will be banished from the Web.

Or, tossed in prison, like Ernest Zundel.

Not if, but when this "Cyber 9/11" takes place, it will be used as an excuse to stomp on civil liberties and wage more wars for Empire and Israel, just like the WTC 9/11 attacks have been used.


"Terror" on the Internet" by Haifa University professor Gabriel Weimann

Weimann is not only a professor at Haifa University, he is also a "fellow" at a place called the United States Institute of Peace (USIP)--which is funded by the U.S. Congress. USIP also receives gifts and contributions from private agencies, organizations, corporations, or other legal entities, except they fail to say who those agencies, etc. are.

USIP proclaims that their is mission to help prevent, manage and resolve violent international conflicts.

To that end, they pay "fellows" like Weinmann to write policy papers, stating USIP's dogma, such as "The Theater of Terror" and a book on Ernest Zundel.

Some other "fellows" at USIP have been: Daniel Benjamin; Jacob Berkovitch: Avner and Raymond Cohen; Shmuel Eisenstadt; Lily Feldman; Shlomo Gazit; Moshe Ma'oz; Donald Rothchid; Robert Rothstein and Mark Katz........... and on and on. Here's a complete list of these fellows.

Weinmann is good at finding non-existent threats and propping up the current state mandated boogieman, aL-Qaeda.

However, he says time and again thru his articles things such as: it is important to keep in mind that to date there are no documented examples of terrorists using the Internet to launch an attack.

But that doesn't stop Weinmann from promoting goverment monitoring and censorhip of the web, like his following comments from the Christian Science Monitor.

Modify the Patriot Act to allow Internet monitoring similar to the way passengers are screened for airline travel.

(Like the screening now done in the U.S. by the thugs at the TSA?
Where people are held up for hours on end for no apparent reason? Yeah, that would work just fine on the 'Net. Connection speeds would go back to prehistoric times of around 8,000 kbps, while others would be kicked off the web.)


Many of the large ones now, he says, have requirements - no violence or pornography. They could monitor for the promotion of terror as well.

Form an international collaborative of Western countries, the ones that have more stable, advanced Internet services. They could better monitor or prevent these sites from running terror material.


(Wonder if "Israel" is one of these Western countries he speaks of that will be trusted to "monitor" the web?)

Weinmann is all in favor of government spying on people thru the Carnivore , AKA DCS 1000 and Magic Lanternprograms.

"Magic Lantern" is particularly invasive, as it is a "keylogging software that is a combination computer worm/trojan horse. It installs itself on the target computer and allows for keystroke capturing."

From USIP's web site:
Gabriel Weimann is a prominent and prolific analyst of international terrorism and the mass media, and professor of communications at the University of Haifa, Israel. Since 1997, he has led a large research project that has catalogued and tracked hundreds of web sites used by terrorist organizations and their affiliates to recruit and mobilize supporters, to raise funds, and to plan and coordinate attacks. His publications include five books—among them The Theater of Terror: The Mass Media and International Terrorism, Communicating Unreality: Mass Media and Reconstruction of Realities, and Hate on Trial: The Zundel Case—and more than 100 book chapters and articles on conflict, terrorism, the mass media information technologies, and the Internet.
Cyberterrorism: Fact vs. Fiction

Cyberwar and cyberterrorism have been especially appealing to the media and the popular imagination because they combine two prime sources of fear—fear of technology and fear of terrorist violence. While there is some cause for concern about cyberterrorism, it is important to keep in mind that to date there are no documented examples of terrorists using the Internet to launch an attack (such as using a computer to disrupt power grids or take over the control of a plane). In contrast, Weimann presented several examples of more typical uses of the Internet by terrorists such as a web site run by Hezbollah with downloadable games for children and two distinct Tamil Tigers (LTTE) web sites tailored to a local and an international audience.

2 comments:

Lee said...

Good article, but why are you giving them advice on how to monitor us?

It's as if you know how to do this already or, possibly you are one of them but accidentally let the cat out of the bag.

Or is this technology in the public domain?

Greg Bacon said...

Lee, other than my personal observations, all the other material is readily available on the 'Net.'

And NO, I am NOT one of 'them.'

I'm a retired firefighter that was still working back in September 2001 and I watched in horror as 343 of my fellow brother and sister FF's were MURDERED by their own government and Israel on 9/11.

Since that time, I have made a vow to help uncover those murderous bastards and try to bring them to justice,

This I will keep doing until justice is served or I'm worm food.

Fair Use Notice

This web site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance the understanding of humanity's problems and hopefully to help find solutions for those problems. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. A click on a hyperlink is a request for information. Consistent with this notice you are welcome to make 'fair use' of anything you find on this web site. However, if you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. You can read more about 'fair use' and US Copyright Law at the Legal Information Institute of Cornell Law School. This notice was modified from a similar notice at Information Clearing House.

Blog Archive