The networks have all reported the DDoS (Distributed Denial of Service) cyberattack upon the DNS (Domain Name Server) Dyn that occurred last Friday. This attack effectively tied-up (and shut down) thousands of websites in the Northeastern United States and eventually progressed to affect the West Coast, most of Texas, and then a large part of Europe. Tens of millions of people were affected by this attack on the networks.
This article is not about the specifics of that attack. The most definitive post on the cyberattack can be found within an article by Libby Plummer for MailOnline written for the DailyMail.com entitled Massive cyber hack that floored Amazon, Twitter, HBO and Reddit could be ‘practice for election day. The article covers the “how’s” and technical parameters of everything that happened with the attack, and it is approximately 26 pages long. We will be utilizing some of the key tenets of that article here; however, the purpose for this one is not to examine the specific attack. Please refer to Miss Plummer’s article for those specifics and a good primer on the intricacies of a cyberattack.
In this instance the attack was conducted against Dyn, an infrastructure maintenance DNS based in New Hampshire that enables users to connect to the servers of various websites. Dyn has stated that tens of millions of IP (Internet Provider) addresses were used in the cyberattack to effect chaos. Dyn was quoted as saying the breach was “a very sophisticated and complex attack.” To understand what Dyn does is critical to the rest of this article.
DNS firms serve the critical function of converting IP addresses, in the form of a number, into the various domain names found on the websites that users link to. Picture it as being a “baseball team manager” who manages the players and organizes them into an effective team. Of course this analogy is small-scale, as this cyberattack effected thousands of different websites.
The point is this: just one DNS was taken down, effectively disrupting thousands of websites and millions of users.
Here is an excerpt from the aforementioned article that gives some basic insight.
“…online criminals have once again gone after a significant site with a DDoS attack. Not Twitter, or other popular and equally affected sites such as Spotify, Reddit, Github and SoundCloud though, but rather DNS provider Dyn. And that highlights a problem – any company running its own website may well have its own technology in place to mitigate DDoS attacks, but it’s all for nought if the DNS provider itself is not applying a sufficient enough level of protection to its own servers and data centres.”
Lee Munson, security researcher for Comparitech.com.
Basically what Mr. Munson is saying is it is the DNS provider that is the key to such rampant chaos in the cyberattack. The DNS’s are “soft” targets in themselves. Following the Alinsky principle out of “Rules for Radicals,” Obama, Clinton and their ilk don’t have to collapse the websites: they just have to take down the DNS’s…throughout the entire economy. They don’t have to convince all the Union workers…just the Union Rep and the leadership…then the rest will follow. They’ll take out the “big dogs” (the DNS’s) and then all of the “little dogs” (the websites) will crash and burn.
Not to mention the fact that they can set us up by taking down the computer network in the Department of Defense…blaming it on foreign hackers from nations such as North Korea, China, or Russia. Then it’s “open season” on the U.S., taken down effectively from within and blamed on foreign nations.
Here is a partial list taken from that article of the more well-known sites out of thousands that were affected by the cyberattack:
|WHO WAS HIT BY THE ATTACK?|
|Thousands of sites were hit, including:|
Wix Customer Sites
Squarespace Customer Sites
Starbucks rewards/gift cards
Recode Business Insider
A group called New World Hackers took credit for the cyberattacks, stating they used an organized network of botnets that staged the attack at a rate of 1.2 terabits per second of data and directed it toward Dyn’s servers. As you may read in the article, one hacker claimed to be in China, another in India with a third in the UK. One more excerpt from the article deserves attention:
“DNS has often been neglected in terms of its security and availability from an enterprise perspective – it is treated as if it will always be there in the same way that water comes out of the tap and electricity is there when you switch it on. This attack highlights how critical DNS is to maintaining a stable and secure internet presence, and that the DDOS mitigation processes businesses have in place are just as relevant to their DNS service as it is to the web servers and datacentres.”
Richard Meeus, VP technology EMEA at NSFOCUS, a DDoS mitigation company
So there you have the “Achilles Heel” for the internet as a whole: attacks on website’s DNS providers. Now also of interest besides this attack is what happened this last week in Chicago, Illinois, where Rahm Emmanuel (“Never let a crisis go to waste”) and the Democratic Party rule the roost. There was early voting last week in Chicago, and this should be of particular interest in light of the cyberattack we just covered. An article posted October 22nd entitled ‘Calibration error’ changes GOP votes to Dem in Illinois county written by watchdog.org should ring the alarm bells.
Here is a large excerpt from that article that presents a foreshadowing of things to come in November:
“Republican state representative candidate Jim Moynihan went to vote Monday at the Schaumburg Public Library.
“I tried to cast a vote for myself and instead it cast the vote for my opponent,” Moynihan said. “You could imagine my surprise as the same thing happened with a number of races when I tried to vote for a Republican and the machine registered a vote for a Democrat.”
The conservative website Illinois Review reported that “While using a touch screen voting machine in Schaumburg, Moynihan voted for several races on the ballot, only to find that whenever he voted for a Republican candidate, the machine registered the vote for a Democrat in the same race. He notified the election judge at his polling place and demonstrated that it continued to cast a vote for the opposing candidate’s party. Moynihan was eventually allowed to vote for Republican candidates, including his own race.”
So here we are with “calibration error” being assigned to a “change” in voters’ selections in early voting. Keep in mind, as it has been reported throughout the independent news media that George Soros has connections with the companies supplying the voting machines for more than a dozen different states.
Returning to our cyberattack, is it not interesting that the United States Department of Defense has its own branch that deals with Cyberwarfare, set up by General Keith Alexander at Fort Meade, Maryland…without even an arrest yet regarding Friday’s incident? With a $50 billion dollar NSA Data Collection Center in Utah, and the ability to tie in CCTV (Closed Circuit Television), computers attached to the Internet, cellular telephones, and smart devices…and no QRF (Quick Reaction Force) busted down the doors of three individuals that claimed to take part in the attack?
No action was taken because this attack was initiated by and sponsored by the U.S. government, specifically the Obama administration with use of intelligence agencies.
This cyberattack was a Beta-test upon a fairly “soft” target, such as the little websites and accounts that people use to do online shopping, play video games, watch movies, and other minor functions. Now let’s “rewind” to some information posted in previous articles and covered on different websites. In 2014, GridEx 2014 took place where the Russians and Chinese were allowed access to our Internet infrastructure, as well as complex functions dealing with defense computers and our responses to an EMP (Electromagnetic Pulse) threat. Recently a Russian “hacker” was taken into custody in Prague, Czechoslovakia for questioning regarding hacking into U.S.-based internet systems.
Let us also not forget that on October 1, 2016 the transfer of U.S. control over the Internet management passed to ICANN that has an office in Beijing and is owned by many nations, such as Russia, China, Iran, North Korea, and Saudi Arabia, to name a few. Then, on September 9, North Korea detonated a nuclear device with a yield of 20-30 kilotons, and such was significant because two days earlier, September 7, this occurred, as written in a previous article:
“On 9/7/16, two days prior to the North Korean nuclear test of 9/9/16, a DoS (Denial of Service) attack crashed the website of the Project on Crowdsourced Satellite Imagery based in California. So what? So, this project is the one responsible for continuously monitoring North Korea for nuclear tests and missile firings, and hackers shut down their computer systems, preventing satellite image transfer.”
The hackers were listed as being potentially Russian, Chinese, or North Korean. Everyone is also well aware that Julian Assange’s Internet connection was severed…possibly, “maybe” …at the behest of US Secretary of State John Kerry’s prompting of the Ecuadoran Embassy where Assange is exiled…and “coincidentally” just before Assange was ready to release a plethora of documents and e-mails pertaining to Hillary Clinton. These communications were between her and the “big banks,” as well as her longtime supporter John Podesta.
The U.S. is deliberately facing off with Russia on numerous fronts, such as Syria, Ukraine, and the Baltic States of Eastern Europe; the U.S. is deliberately trying to provoke Russia into a war. The alleged “hacking” of the DNC (Democratic National Convention) e-mails is being blamed on Russia without any evidence except the nebulous testimony of the intelligence agencies with no concrete proof.
So we’re to believe that Russia is tampering with the election process and the intelligence agencies are “certain” of it, but nobody can even find and arrest three individuals that “caused” a cyberattack that affected tens of millions in the U.S. and Europe?
Here is the synopsis:
The United States government (directly and with “sanctioned” associates or government operatives), as ordered by the Obama administration carried out a Beta-test on a “soft” segment of the Internet. This was done in preparation for a False Flag event to come, either before or during election time.
The Russians will be blamed for it as justification to enter into a war and/or to suspend or contest the election. Phony “precedence” is already being set, such as the man arrested in Prague (akin to Marius Van der Lubbe as the patsy for the Reichstag fire before WWII) and the “incidents” of hacking already attributed to Putin and the Kremlin. Phony precedent has also been set with things such as the GridEx2014, where Obama and the administration can point the fingers at Russia and say, “See! We tried to cooperate with them in a “partnership” and they turned around and used the information to sway our elections!” The ICANN Internet transfer can also be “pointed at” and used in the same manner, to make Russia a scapegoat.
Obama handed all of this sensitive information over to them to use as “justification” to blame the Russians, when it is Obama who will direct and conduct the False Flag operation(s) against the U.S.
The election, per se, is already a “done” deal, and the administration knows that civil unrest will occur no matter who “wins” the election. Such a crisis containing rioting and civil unrest will not be allowed to go to waste. Vice President Joe Biden already directly threatened the Russians with cyberattacks for the purpose of “embarrassing and humiliating” the Kremlin. The U.S. is cornering Russia and deliberately setting the stage to initiate WWIII…perhaps with the first strike against the U.S. coming from our own government…in the form of an EMP.
The end objective is the suspension of Constitutional rights and the inculcation of martial law in the United States.
The next war will be initiated by an EMP device detonated over the continental United States, followed by a limited nuclear exchange and then conventional warfare.
We already have early voting with changes of votes due to “calibration” problems. That is a total lie. This, too, is a minor “Beta-test” for the Democrats to see what they can get away with…to perfect the technique before the election. They are still trying to figure out how to switch the votes and yet make the voter believe he or she actually voted for the candidate desired. As the Communists proclaimed, “It’s not the voters who decide the election, but those who count the ballots.” As election day draws closer, the feds have even told the Russians that there could be “criminal charges” brought against them if they even monitor the results of the election.
The American people are being set up for a False flag operation or series of operations that will give Hillary Clinton a victory and take us into a war with Russia. All of this is designed to strip us of our individual liberties and propel us into the totalitarian state that Obama has worked to create for almost eight years. Cyberattacks, election fraud, and war are the tools being used to close the gates on this trap. There is little time remaining, and this next few weeks will see whether the United States remains intact as a people and as a nation.
Jeremiah Johnson is the Nom de plume of a retired Green Beret of the United States Army Special Forces (Airborne). Mr. Johnson is also a Gunsmith, a Certified Master Herbalist, a Montana Master Food Preserver, and a graduate of the U.S. Army’s SERE school (Survival Evasion Resistance Escape). He lives in a cabin in the mountains of Western Montana with his wife and three cats. You can follow Jeremiah’s regular writings at SHTFplan.com or contact him here.
This article may be republished or excerpted with proper attribution to the author and a link to www.SHTFplan.com.
This article has been contributed by SHTF Plan. Visit www.SHTFplan.com for alternative news, commentary and preparedness info.