Snowden speaking from a Custom Faraday Cage in Sheremetyevo Airport’s Hotel Novotel (Photo: The InternetChronicle)
MOSCOW, Russia – Edward Snowden, NSA whistleblower and fugitive, released documents Tuesday to Internet Chronicle reporters proving that the High Frequency Active Auroral Research Program, or HAARP, is definitively engaged in a program of assassination and mind control.
While the military prison industrial complex has routinely insisted that the Alaskan-based HAARP is only meant to study natural phenomena in earth’s ionosphere, Snowden has managed to blow open a brutally massive charade.
“The HAARP research station,” he said, “strategically based away from prying eyes near Gakona, Alaska, is actually used to terminate or manipulate would-be dissidents of global capitalism on the scale of millions of people.”
Added Snowden, using finger quotes, “With these terrestrial antennas, NATO [the North Atlantic Treaty Organization] is able to, on a global scale, remotely silence ‘perpetrators’ of ‘deviant or subversive’ strains of thought.”
Unbeknownst to victims or their loved ones, HAARP projects ultra-high-powered radio waves. Those waves operate at the same electronic frequency asthe truncus encephali, or brain stem, selectively inducing deaths seemingly by natural causes – including by some appearing to coroners as innocuous as strokes or heart attacks.
"Comme Vous 1e souhaitiez, j'en ai pris connaissance et j'ai également consulté tous les dossiers qui ont été ouverts a Votre nom depuis deux ans. Ils sont nombreux et concernent toujours cette problématique de GANG-STALKING. Je me dois d’être franche avec vous et de vous faire savoir que le Parquet ne peut vous suivre dans Vos affirmations et entamer des devoirs d’enquête; aucun indice concret d'infraction n'ayant été relevé. Ne croyez-vous pas que cette certitude d’être harcelé relève davantage d'un sentiment in traiter au niveau psychologique ? Je ne peux que vous conseiller d'aller consulter un médecin et de lui exposer votre problématique. Il saura peut-être déjà vous apporter certaines réponses."
Mes écrits sont controlés par Roberto Scaruffi....qui suit mon travail journalièrement depuis novembre 2011.
Roberto Scaruffi,Rio de Janeiro, RJ, Brazil
• Degree [“doctor”] in Political Sciences [major in Economics] from the University of Turin; • EAP course by the Essex University (score 7 in IELTS); • DEA by the UCL in LLN (Belgium); • completed and finally [Spring 2002] academically perfect Ph.D. research by the UCL in LLN (Belgium) [[formal PhD still not awarded since an annihilation operation (an [failed] operation for producing State/“government” managed terrorism) of Italian Secret Police Bureaux with very active cooperation of NATO Secret Police Bureaux at world level; ask them... http://www.uclouvain.be ; http://www.carabinieri.it ; http://www.comiteri.be ; http://www.sicurezzanazionale.gov.it ; http://www.nato.int ; http://www.interpol.int ; information from here: http://scaruffi.blogspot.com ; the Ph.D. research is academically perfect and it is NOT failed!]]; • Chinese language classes by three universities in China [PRC] and Taiwan [RoC]
Je possède toute les preuves nécessaires pour l’annihilation de ce réseau depuis deux ans. La police de Ciney en rétentionne.
Les flics de la zone Condroz-Famenne et de la zone des Arches ont participé à mon stalking depuis quatre ans via des faux documents (identifiés) entre autre, parce qu'il sont hakés, J'ai tout donné à Ciney en juillet il y a deux ans et ils on continué à me nuire malgré le dossier amplement suffisant à l'arrestation des ordures,
dont les preuves d'usurpation de mes voisins disponibles mais malgré tout réfutées et une accusation d'assassinat. Ils m'ont fait taire à chaque rencontre de manière dégueulasse et honteuse.
Je suis maintenant sans argents et sans permisà cause de cette affaire et Je n'ai jamais pu être entendu. La police m'a acculé
Au niveau physique, j'ai été détecté en chambre anéchoique par des spécialistes internationaux via une technique qu'ils ont spécialement élaborée dans le cadre de la lutte anti-terrorisme international
(Lars Drudgaard, Barrie Trower héros et ex agent spécial du MI5, Jesse Beltram, Dr Hall, ect). http://icaact.org/
Au niveaux informatique, notre réseau d'informateur et self-défenseur est bien implanté et ultra clean.Nous avons énormément ralenti et annihiler l’expansion de la peste. Nous avons les preuves nécessaires de notre hacking.
J'ai le droit de recevoir l'analyse de mon web et c'est urgent depuis longtemps,ce qui représente le découvert la NetOps et des perpétrators, je suis actif et logué sur la plupart des réseaux publics depuis trois ans et uniquement dans ce cadre , je me suis fait hacké et tracké sur chaque réseau et je le suis encore. Tout mes rapports d'erreurs de navigations ont été envoyés depuis toujours. J'ai des disques durs plantés et certainement REMPLIS DE TRACE D'ARMES A ÉNERGIE DIRIGÉE.
Computer Network Opération (CNO) balancée avant le Bombing de Liège (ce qui à failli me coûter l'asile pr la troisième fois, malgré la recommandations du commissaire sortant, Pol Borlon).
JE SUIS BLOQUE. Nous sommes plein de victimes et nous avons des choses les uns pour les autres. Nous sommes tous hackés, traqués et isolés. Nos familles ne sont pas en sécurité. J'ai encore les assassins.
Mes moyens de communications sont toujours hackés.
J'avais une entreprise que j'ai monté seul avec l'aide de mon père...ces batards l'on liquidé alors que je fesait 90.000 euros de chiffre seul. Tout mes clients satisfait à 100 %. Je suis assuré.
J'ai gardé une voiture qui porte sans doute des traces de sabotages à l'arme à énergie dirigée (eprom up-datée chez power plus). J'ai une panoplie de matériel détruits.
J'ai fait des mesures de radioactivité.
Je suis toujours locké au monitor (cfr Darpa, nasa..) des ordures. Et ce n'est pas réversible sans moi.
LA POLICE DE CINEY EST POURRIE ET INSALUBRE, LES ATTITUDES DE CERTAINS AGENTS ET COMMISSAIRES SONT CRIMINELLES ET DÉFIENT LES DIRECTIVES ET CONCERNANT LES DROITS DE L'HOMME.LES DEVOIRS D’ENQUÊTES NE SONT PAS HONORES. LES PLAINTES NE SONT PAS ACCEPTÉE. LES DÉPOSITIONS NE SONT QUE DICTÉES OU NON ACCEPTÉES. EN OUTRE CERTAINS PROTÈGENT DES ASSASSINS ET ÉVOLUENT DANS L’ILLÉGALITÉ. LEUR MANIÈRE DE "TRAVAILLER" EST UNE HONTE MAINTE FOIS NUISIBLE A TOUT LE MONDE.
TOUS VOUS PARTICIPEZ A DU "COMMUNITY TERRORISM"(S/G-OS) ET A BIAISEZ LES RELATIONS, ET INSTITUTIONNELLES DE MANIÈRE CRIMINELLE ET SANS FRONTIÈRES.
LA MAISON BLANCHE POURRAIT VOUS LE CONFIRMER SI VOUS FAISIEZ L'EFFORT DE TÉLÉPHONER. VOS IN/ACTIONS ET COUP DANS L'EAU SUITE CE GENRE DE MESATTITUDES COÛTENT ÉNORMÉMENT A TOUS.
J'ai besoin d'une bonne radio,de sous et d'une auto en ordre. Je suis habileté à l'usage d'armes.
GANG-STALKING is stalking by more than one person to a victim, usually involving community harassment, or the “mob”, using people from all backgrounds and vocations to harass, tracking 24/7, sometimes organizing lethal vehicle accidents, poisoinings, electronic harassment, home invasions/property destruction, corrupt or ignorant doctor diagnosis given to stamp the victim as bogus mentally ill with delusions, paranoi, or schizophrenia, etc.
Until here, it is State/government organized stalking: “GANG-STALKING is stalking by more than one person to a victim, usually involving community harassment, or the “mob”, using people from all backgrounds and vocations to harass, tracking 24/7″.
This: “home invasions” can be consistent with the S/G-OS. This: “property destruction” only if and when they have renounced to induce the target to self-convince that everything be casual. “electronic harassment” is probably and additional program. This: “sometimes organizing lethal vehicle accidents” certainly is an assassination program. They have a government secret decree to liquidate the target. Conceptually and bureaucratically different from the S/G-OS.
This: “corrupt or ignorant doctor diagnosis given to stamp the victim as bogus, mentally ill, with delusions, paranoia, or schizophrenia, etc” when the S/G-OS is failed, they are eventually unmasked, and so they need to annihilate/liquidate the target.
The S/G-OS is a very old para-police procedure. Its function is to push the target to do something, obstructing all his/her different options. It is the starting of, precondition for, using techniques of hetero-management of the target.
There are MANY, MANY others, all over the world, who are being subjected to similar torture and abuse.
YOU HAVE BEEN CHOSEN TO BE “A SELECTED WITNESS” to these extreme and monstrous CRIMES AGAINST HUMANITY - indescribably terrible in themselves - coupled with the ORWELLIAN secrecy and denial of any support at all that we are experiencing, makes them even more horrendous and monstrous.
We have contacted most Governments, Security/Intelligence Agencies, Religious Organisations, International Organizations, Human Rights Organizations, Universities, Scientific and other Institutions, and the International Media all over the world - over and over and over again – and have had our appeals for assistance, protection and/or publicity almost completely ignored and/or suppressed.
Some TARGETED INDIVIDUALS have been attempting to gain assistance, protection and/or publicity about these crimes since the 1990s - and even earlier - this extends as far back into the history of illegal ‘scientific and medical’ testing and experimentation as MKULTRA, COINTELPRO and the DUPLESSIS ORPHANS - and further.
We are still collecting CASE SUMMARIES from TARGETED INDIVIDUALS all over the world, and we have also advised them to send them to you - “THE SELECTED WITNESSES”- TO WITNESS, RECORD AND OPPOSE so that :-
A. We can be sure that as many people as possible know about these horrendous crimes.
B. We can be sure that these AUTHORITIES and ORGANISATIONS are either trying to uphold the rule of National, International and Human Rights Law, and that we will, sooner or later, be protected by these laws.
C. Or that we can be sure these AUTHORITIES and ORGANISATIONS are complicit and/or acquiescent to these CRIMES AGAINST HUMANITY and that National, International and Human Rights Law no longer apply - in which case our task will be to get the rule of these laws restored.
Later these records should become an information source - such as the INTERNATIONAL TRACING OFFICE set up to record the fates and whereabouts of Jews (and others?) after WW11. The information collected can then be used by the appropriate people for LEGAL, MEDICAL, WELFARE, HISTORICAL etc. records.
As well as being illegal the crimes being committed against us are contrary to the Principles and Values of all the major religions and ethical systems - so we will also be demonstrating to all of these people and AUTHORITIES AND ORGANISATIONS the huge disconnect between their professed Principles and Values and the reality. We will be showing their monstrous Doublespeak Doublethink Doubledo ignorance, stupidity and/or hypocrisy.
It is our responsibility to record and alert the world to these horrendous crimes - and the extreme danger that these technologies, powers and tendencies pose to human rights, liberty, democracy, privacy and the mental and physical freedom, individuality, integrity, health and growth of all people – in all their “infinite?” richness, degrees, dimensions, aspects, qualities and diversity!
Make no mistake these are the most horrendous totalitarian weapons and crimes imaginable and the people and organizations using them are mass-murdering conspirators pursuing totalitarian fundamentalist schemes.
Beware of the brain and gene phrenologists/determinists/reductionists, and those who seek to control and reduce the range, quality and diversity of human thoughts, imaginations, senses, sensibilities, moods, attitudes, speech and psycho-physiologies – the would-be socio-economic, cultural AND PSYCHOLOGICAL/INTELLECTUAL/ PHYSIOLOGICAL monopolists, monoculturalists, police and prosecutors who are already literally and physically actively at work amongst us!! Both monstrously and criminally, and also far more insidiously.
And beware of this dumbing-down, disenfranchisement, degradation and monoculturalisation caused by the paucity and total degradation of public information and discourse, and the subsequent and consequent degradation and “Fahrenheit 451-ing” of previously autonomous cultures, professions, fields of human endeavour, memories, languages and intelligences.
It is no exaggeration to say our cases are as horrendous and urgent as people fleeing Nazi or Pol Pot concentration camps – specifically Dr Mengele-type torturers and butchers.
PLEASE ASSIST US URGENTLY!!!
Yours in the search for openness and respect for universal human rights John Finch, 5/8 Kemp St, Thornbury, Vic 3071, Australia, TEL: 0424009627
Hello, darkness, my old friend I’ve come to talk with you again Because a vision softly creeping Left its seeds while I was sleeping And the vision that was planted in my brain Still remains within the Sound of Silence.
In restless dreams I walked alone Narrow streets of cobblestone Beneath the halo of a street lamp I turned my collar to the cold and damp When my eyes were stabbed by the flash of a neon light That split the night and touched the Sound of Silence.
And in the naked light I saw Ten thousand people, maybe more People talking without speaking People hearing without listening People writing songs that voices never share… And no one dare disturb the Sound of Silence.
“Fools,” said I, “you do not know Silence like a cancer grows.” “Hear my words that I might teach you, Take my arms that I might reach you.” But my words like silent raindrops fell, And echoed in the wells of silence.
And the people bowed and prayed To the neon god they made. And the sign flashed out its warning In the words that it was forming.
And the signs said: “The words of the prophets Are written on the subway walls And tenement halls, And whisper’d in the Sound of Silence.”
Paul Simon/Paul Kane’s musical work in the early
1960’s was primarily as a contracted songwriter in the famed “Brill Building
machine.”
He would write songs for other artists to record. He did try his
hand at performing, however. He wrote many ballads and rockabilly tunes
which were recorded, both by Paul and his mildly-successful
Paul Simon, whose family was part of the military-industrialist complex, was very likely a product of the early 1960s military experimentation in Silent Sound mind control,
which is clearly what the lyrics of “The Sound of Silence” convey to those “in the know”.
In this informative and surprisingly uplifting video, Lilou Mace interviews Peter Vereecke, a former mayor of Evergem in Belgium, who awakened 10 years ago to conspiracies such as chemtrails, vaccines, GMO, and other agendas of the New World Order (NWO). Since his awakening, he has become an activist. In 2009, he co-founded The Belfort Group -- Citizens In Action in Belgium. In 2010, his group hosted an international symposium on the illegal spraying of chemtrails, and produced the "Case Orange" report.
Watch as Peter talks about the conspiracies, what our role is, and what we can do about it. Peter's email peter@belfort-group.eu
Stay tuned on the Juicy Living Tour and where it is right now in the world from Lilou's facebook fan page at http://facebook.com/liloumacewebtv
Dream Vortex Radio with Chris Vortex with Melanie Vritschan and Peter Vereecke
Striving for Freedom: Are you being controlled?
This show was about social control on all levels from romote control technologies used for mind control, then the conversation expanding to cover mind control as a general social practice.
ICAACT is an Independent evidence gathering Non Profit Human Rights Organization.
This report details the findings of the ICAACT phase III testing procedure. The ICAACT Phase III testing is about testing the human body for RF (Radio Frequency) emission, in a shielded environment. A Faraday cage was utilized to conduct the testing.
MI5 agent Dr Barrie Trower: dangerous radiation everywhere
No Copyright infringement intended; All Rights Reserved; In the title, We are being bombarded with microwave and other frequencies, ignorant, unlike the government, of the dangers involved, as Barrie Trower says, '' The scientists at the end of ww2 were hanged for what scientists and governments are getting away with today'' You won't get your child a mobile for xmas because i bet they already have one, right? Come help make some noise......be a voice.
Interview with Barrie Trower November 13, 2010.
Barrie Trower is a former Royal Navy microwave weapons expert and former cold-war captured spy debriefer for the UK Intelligence Services. Mr Trower is a conscionable whistle-blower who lectures around the world on hidden dangers from microwave weapons and every-day microwave technologies such as mobile-phones and WiFi. Mr Trower has also repeatedly assisted the UK Police Fedration in their struggle to protect police officers from Tetra/Air-Band radio-communications systems that are harmful to health.
Les policiers ne seront plus sanctionnés par unesuspensionavec maintien de 75 % de leur salaire
Les ministres de l'Intérieur et de la Justice souhaitent mettre fin à la suspension desagents de policeavec maintien de 75 % de leur salaire, telle que le prévoit actuellement une loi disciplinaire, lit-on mercredi dans les colonnes du Morgen et duHet Laatste Nieuws.
En lieu et place de cette suspension,Joëlle Milquet(CDH) etAnnemie Turtelboom(OpenVLD) proposent de mettre en place une pénalité mensuelle et deles obliger à continuer de travailler.
"Quelleentreprise moderne punit-elle encore aujourd'hui les membres de son personnel par des vacances forcées et payées?", s'interrogent les deux ministres, estimant qu'une suspension en tant que sanction disciplinaire est une pratique dépassée. Elles se demandent en outre si le but de la suspension - inciter le membre du personnel suspendu à se remettre en question en le mettant de côté temporairement - est encore atteint.
Joëlle Milquet et Annemie Turtelboom préconisent plutôt de mettre notamment en place une pénalité mensuelle, allant de 2 à 10 % des revenus bruts du policier concerné, et cela pour une période maximale de six mois,et de l'obliger à continuer de travailler.
19 juil. 2013 - Fete Nationale Ciney ce 21 Juillet :Martin GrayCitoyen d'honneurMartin Gray(Holocaust Survivor) Citoyen D Honneur Fete Nationale Ciney by BENJA...
6 août 2013 - Est-il sérieux de décréterl'alerte terroristedans notre pays suite aux informations dela NSAaméricaine alors qu'aux Pays-Bas aucunealerte ... !!!!!!!!
mardi 06 août 2013 à 16h33
Est-il sérieux de décréter l’alerte terroriste dans notre pays suite aux informations de la NSA américaine alors qu’aux Pays-Bas aucune alerte n’a été déclenchée sur base de ces mêmes données ? Et quelle est la part de hasard dans le fait que la NSA décrète un niveau de vigilance jamais vu, un jour après qu’Edward Snowdenait trouvé asile politique enRussie?
Once a target is flagged a marker is placed markers are spatially deployed in function of professional personal relational agenda. Markers are unerasables like the entire warfare thatcriminalswill never have access.
Nullification and non formalization off evidences permit criminals produce more deaths and lots of enormous suffering for more innocents victims.
CETTE LISTE N' EST Q' UN PETIT ECHANTILLON, CERTAINES DE CES VICTIMES ONT ETE EXECUTEES ET LES CIRCONSTANCES RESTENT SOUS COUVERT, LE PLUS SOUVENTS LEURS FAMILLES SONT DETRUITES ET/OU ISOLEES....LES PARTICIPANTS AU BUZZ-SAW , BUZZSAW http://urlink.fr/6CdSONT DES CRIMINELS AVERTIS (stay behind networks)....
POURRIEZ VOUS ETRE NOS TEMOINS ET JOUER LES INTERMEDIAIRES, NOUS PERMETTRE DE DETRUIRE NOS ASSASSINS? CE N'EST PAS DANGEREUX... NOUS SOMMES DEVENUS DES AMIS EN NOUS PROTEGEANTS ET CERTAINS D'ENTRE NOUS SONT MORTS ..NOUS AVIONS DE L'ARGENT !!! NOS ORDURES SAVENT QU'ILS SONT PERDUS DEPUIS LONGTEMPS.
Da ich selber 17 Jahre alt bin, gehe ich auch auf soziale Netzwerke, mache ich auch Party, habe ich auch den Film « Projekt X » gesehen. Aber ich verstehe nicht, wie man nicht unterscheiden kann zwischen einem Film und der Realität, dass man Menschen besuchen will um alles kleinzuschlagen.
« Projekt X » oder « The Hangover» auf Englisch ist der Name einer amerikanischen Komödie welche die Geschichte von drei Gymnasiasten (Costa, Jb und Thomas) erzählt, welche nicht mehr als „Looser“ gelten wollen und deshalb entschliessen, die „grösste Party aller Zeiten“ zu organisieren. Die Gäste erschein wesentlich zahlreicher als vorgesehen und das Fest entartet rasch, indem es sich zu einem überdimensionalen Anlass entwickelt… Dieser Film ist geprägt durch die Geschichte von Corey Worthington, einem 16jährigen Australier (2008), welcher von der Abwesenheit seiner Eltern profitierte um 500 Personen via Facebook bei sich einzuladen. Das Wochenende endete mit der Zerstörung des Hauses der Familie und mit Beschädigungen in der ganzen Nachbarschaft. Ein Interview des Jugendlichen in dem lokalen Fernsehsender hat anschliessend diese Begebenheit in den Vereinigten Staaten und Australien bekannt gemacht.
Dieser Film, der nach Art eines Dokumentarfilmes gedreht wurde, erschafft die Illusion, an diesem Abend anwesend zu sein, Teil des Filmes zu sein, dass alles wirklich ist … und es scheint, dass bestimmte Jugendliche nicht in der Lage sind, zwischen Realität und Fiktion zu unterscheiden.
Building your own computer is the best way to get the perfect PC for your needs. Want to take your custom build even further? Beef it up with these 10 projects.
Germanneo-Nazi inquiry urges reform of police and intelligence - FT.com
Image may be NSFW. Clik here to view.
A German parliamentary inquiry has called for radical reforms of the police and domestic intelligence services after their failure to track down and arrest a neo-Nazi terror cell following the serial killings of nine immigrants and a policewoman
"Eu sou o Creeper, apanha-me se és capaz!". Era com esta frase provocatória que o primeiro vírus informático aparecia em 1971 nos ecrãs dos primitivos computadores da Arpanet, a rede informática norte-americana que está na origem da Internet.
Mas, o Creeper não passava de uma inocente brincadeira de um programador que apenas quis provar que era possível introduzir programas numa rede informática sem autorização. Ao longo de quatro décadas o cibercrime disparou exponencialmente: em 1990 foram detetados 1300 vírus, em 2000 existiam 50 mil e 2010 foram identificados 200 milhões. Nos últimos cinco anos, estes programas informáticos maliciosos passaram a ter como objetivo o lucro, através de modelos de negócio mais ou menos sofisticados e passaram a fazer parte da guerra industrial entre Estados. Em 2010, Stuxnet danificou seriamente o sistema industrial da Siemens que equipava uma central nuclear no Irão. Já este ano, o Governo francês sofreu um ataque sem precedentes, por ter sido o organizador da cimeira do G20. Quais são agora os principais alvos do cibercrime? Os especialistas defendem que deverão ser os smartphones. Não só porque são um tipo de equipamento móvel cuja utilização está a crescer exponencialmente, como também porque no futuro deverão ter funções de micro-pagamento. E também porque incorporam um sistema de localização (GPS) e têm câmara fotográfica, o que os torna potencialmente intrusivos para os seus proprietários. No passado mês de Fevereiro, a Kaspersky, especialista em segurança, informou ter detetado em simultâneo vários novos programas maliciosos para a plataforma móvel Android (Google). Veja quais são os principais vírus da história da informática:
1971: Creeper
Foi criado em laboratório por um programador que trabalhava no desenvolvimento da Arpanet (rede precursora da Internet).
1982: Elk Cloner
Foi escrito por um adolescente de 15 anos. Propagava-se através de disquetes do Apple II e era uma forma de ter acesso a acesso a informação dos computadores dos amigos, sem que estes dessem por isso.
Foi o primeiro vírus destruidor a ter um impacto global. Em cada 6ª feira, dia 13, este vírus apagava os programas que estivessem em funcionamento no computador. O nome deve-se aio facto de ter sido detetado pela primeira vez na Universidade Hebraica de Jerusalém.
1992: Michelangelo
Pertence à categoria dos vírus adormecidos que acordava no dia 6 de março (dia de nascimento de do artista renascentista) e apagava informação essencial do computador e infetava discos rígidos. Não causou muitos estragos porque os computadores pessoais eram desligados nesse dia.
1999: Melissa
Foi criado em homenagem a uma streaper da Florida. O autor foi identificado e passou 20 meses na prisão e teve que pagar uma multa de 5 mil dólares. Infetava os ficheiros Microsoft Word e enviava-se a si próprio através do Outlook. Era suficientemente poderoso para paralisar os sistemas de correio eletrónico da Internet. Foram criadas variantes e havia quem pedisse 100 dólares 8 partir de paraísos ficais) para anular o vírus.
2000: I love you
Era um vírus tipo worm (que se auto replica) que afetou dezenas de milhões de computadores pessoais. Aparecia através de uma mensagem de correio eletrónico com o assunto "I love you" e infetava o computador quando o ficheiro em anexo era aberto. Depois o vírus auto propagava-se a todos os endereços do programa de mail. Terá provocado prejuízos superiores a 5 mil milhões de dólares em todo o mundo por levar muito tempo "limpar" as máquinas infetadas.
2001: Code Red
Numa semana atacou 400 mil servidores com tecnologia Microsoft. Tal como o I Love You, atacava também os utilizadores finais. Substituía a página inicial dos sítios web com a mensagem "Hacked by chinese".
2004: Sasser
Infetou mais de um milhão de computadores e provocou prejuízos de 18 mil milhões de dólares. Explorava uma vulnerabilidade do Microsoft Windows para se espalhar de uma forma muito rápida. Os computadores ficavam inoperacionais em poucos minutos. A Delta Airlines foi forçada a cancelar voos e a guarda costeira britânica teve que voltar a usar mapas em papel. Descobriu-se que o autor tinha sido um rapaz alemão de 18 anos que seria processado pela Microsoft em 250 mil dólares. O jovem alegou que tinha criado o vírus para ajudar a mãe a arranjar emprego numa empresa de segurança informática.
2005: My Tob
Significou o início na era dos Botnets (agentes de software que funcionam autonomamente) e do cibercrime. Era um worm que combinava as características de zombie (programa controlado remotamente) e de mass-mailer (envio massivo de mensagens de correio eletrónico). Com My Tob, os vírus tornaram-se um negócio para desenvolver atividades de espionagem (spyware), difusão de correio indesejado (spam), hospedagem nos servidores de conteúdo indesejado, interceção de códigos bancários, chantagem, etc.. As receitas deste tipo de atividade atingem milhares de milhões de euros e continuam a crescer até hoje.
2007: Storm botnet
Já com modelos de negócio a funcionar, os cibercriminosos passar a ter estratégias de defesa (dos contra-ataques das empresas de segurança) através de centros de comando descentralizados. O Storm infetou muitos milhões de computadores.
2008: Koobface
Numa analogia ao Facebook, este vírus usava as redes sociais para se espalhar. Ainda hoje deverá haver 500 mil Koobfaces on line ao mesmo tempo.
É um vírus muito sofisticado e resistente. É ao mesmo tempo worm e uma botnet súper robusto. Infetou mais de 7 milhões de sistemas informáticos no mundo inteiro, incluindo hospitais e bases militares (obrigou aviões de guerra franceses a ficarem em terra). Curiosamente, o Conficker não afetava os IP (Internet Protocol) ucranianos. Respeitava uma das regras de ouro do cribercrime. "Não ataques o teu próprio país e o braço da justioça não re atingirá".
2010: Stuxnet
Significou o advento da ciberguerra. Ou seja, é a era dos vírus tão sofisticados que apenas os Estados parecem ter recursos para os criar. Tira partido de uma vulnerabilidade do Windows e atacou o sistema de gestão industrial da Siemens.
According to a report by Reuters on Thursday, Symantec notified Combell that one of its servers was being used for malicious activity on Tuesday. TWo days later, Combell shut down that server.
Duqu was detected in October and experts believe it may be the precurser to a future Stuxnet-like attack. Duqu shares a lot of the same code with Stuxnet, and its purpose is to gather intelligence data and assets from entities like industrial control system manufacturers.
“We investigated the case,” Combell business development manager Tom Blast told Reuters. “We decided to shut down the server immediately.”
An unnamed Combell employee said that the server had been running continuously for about a week and was leased through the end of October 2012, according to the report.
John Bumgarner, chief technology officer of the US Cyber Consequences Unit, said that when the hackers moved thier server from India to Belgium, they modified the original technique used to communicate with computers infected by Duqu.
Duqu est un ver informatique découvert le 1 septembre 2011 et que l'on présume lié à Stuxnet. Le Laboratoire de Cryptographie et de Sécurité Système ...
Le 13 mars 2013 : CINEY - Une maison abritant huit personnes s'est enflamée, samedi matin, à Corbion dans la commune de Ciney
Les flammes ont dévoré sauvagement, samedi matin, une maison abritant huit personnes d’une même famille, à Corbion-Leignon. Il était 8h31 quand l’appel a été lancé aux pompiers. Ceux-ci sont arrivés sur les lieux aux ordres du commandant Lallemand avec un imposant matériel. Le feu avait déjà fait pas mal de dégâts. Pour les huit personnes qui y habitaient, c’est en plus d’un toit, des tas de souvenirs qui sont partis en flammes. Et le vent assez fort qui régnait à ce moment a joué un grand rôle. Heureusement, tout le monde a pu sortir à temps et indemne de la maison.
Un pompier de Namur, voisin de la maison sinistrée qui passait, à ce moment, a même aidé, en attendant les pompiers, à sortir une bonbonne de gaz du brasier. Les causes du sinistre sont accidentelles. La police de Ciney a dressé le constat. Le bourgmestre de Ciney, M. Cheffert, voisin également de la maison, est descendu sur les lieux où est aussi arrivé le commissaire de garde, M. Liégeois. Les pompiers ont éprouvé pas mal de difficultés pour éteindre intégralement les flammes, le toit s’étant abattu dans l’intérieur comme un château de cartes. Ils ne quittaient les lieux que vers 17h. Ils ont dû encore aller arroser les ruines, dimanche matin. Sinistre total dont pour les habitants qui ont été, pour certains, relogés par le CPAS, pour d’autres,, en famille. Anciennement, cette maison était aussi maison de repos…
Certains membres de la famille "reprochaient" aux pompiers la longueur de temps pour arriver sur les lieux. En effet, l’appel a été lancé à 8h31 et ils ne sont arrivés sur les lieux qu’à 8h52. Le service 100 a-t-il confondu Corbion, près de Bouillon et Corbion-Leignon?
Il y a certainement eu un problème de dispatch. Ajouté à cela la situation de l’arsenal de Ciney, au beau milieu de la ville, voilà un incendie qui remet en cause la construction d’un nouvel arsenal sur un zoning proche des grandes voies d’accès. Cette construction serait assez urgente. http://www.lavenir.net/article/detail.aspx?articleid=DMF20130318_00283485
According to surveys conducted in Europe and the United States, company employees spend up to 30% of their working hours on private affairs. By multiplying the hours spent on non-business-related things by the average cost of the working hour, the analysts estimate the costs to companies amounting to millions of dollars a year. Indirect losses may be even higher. If these employees – inadvertently or otherwise – assist hack attacks or identity theft, cause reputational damage or infringe copyright, the costs could be even greater.
The fact is that employees often use office computers to communicate on social networking sites, share links to online entertainment, or download files from suspicious resources. At the same time cybercriminals are actively using social networking sites for phishing and the distribution of malware. Many personal blogs, entertainment sites, file sharing services, torrent trackers, and files downloaded from them are infected. Passwords to email accounts are regularly hacked or stolen.
This article describes some problems which may arise from the improper use of office computers and demonstrate how to prevent similar incidents in the corporate network.
Targeted attacks
The threats that users face every day usually target mass audiences so the antivirus solution on their computers is enough to prevent most accidents. Targeted attacks are different: they are performed secretly, often using a non-standard approach; they are highly sophisticated and well organized. To achieve their goals the fraudsters use the most effective weapon to exploit any available software or social vulnerability.
Social engineering
In 2009, over 20 major software companies such as Google, Adobe, Juniper and Yahoo fell victim to the Operation Aurora targeted attack.
In one version of this attack, company employees were lured to the malicious sites via social networking sites and IM clients. Using social engineering techniques the scammers got acquainted with their potential victims, gained their confidence and did whatever was necessary to make the recipients open a link. Experience shows that to achieve this it was enough to:
collect widely-available information from social networks about the user, his interests, preferences and contacts
create an account, focusing on the interests of the victim and his personal data (the year and the place of birth, school, college)
become "friends" with the people from the victim’s list of contacts
get in touch with the victim using an established "cover"
When an account has been so thoroughly prepared it has every chance of getting potential victims to click on a suspect link. If this fails, the scammer can try a more sophisticated trick, hacking the account of a user whom the victim fully trusts and sending links from there. This is often not difficult to do, especially if the victim’s trusted contacts include potentially vulnerable categories of user - elderly people, children or teenagers.
In a targeted attack, the link is likely to lead the victim to a site which contains a set of 0-day exploits that allow criminals to gain access to vulnerable computers. It is clear that by communicating on social networks from the office computer, employees may unwittingly help hackers penetrate the corporate network.
Watering Hole
In addition to targeted attacks via social networks, so-called Watering Hole attacks are no less dangerous. The basic idea of this type of attack is to find and infect the sites that are most often visited the company's employees. Recently, the site of the U.S. Ministry of Labor was infected but it is assumed that the real target of the attack was the Department of Energy: the criminals were trying to infect the computers of DOE employees who regularly visited the Ministry of Labor’s website.
When a staff member at the company under attack opens the infected site, the code implemented in the body of the page secretly redirects the browser to a malicious site that contains a set of 0-day exploits. Malware posted on infected websites, for example a server script, often acts selectively to implement malicious code in pages sent to the user who is most relevant to the targeted company. Thus the scammers can hide the targeted attack from antivirus companies and IT security experts.
The fraudsters try to infect trusted legitimate sites. In these cases, even when users must carry out additional steps to run the exploit – to turn on JavaScript, to allow execution of the Java applet to confirm the security exception, etc. – they are likely to innocently click "Allow" and "Confirm".
Image may be NSFW. Clik here to view.
Protection
It’s clear that users play an important role in targeted attacks - they unwittingly allow scammers to attack the system. Unfortunately, there is currently no technology that can eliminate human error from corporate network security. However, reinforcing security policies with a few relevant technologies provides effective protection against targeted attacks by combating them at every stage - from the first attempt to exploit a vulnerability to attempts to compromise the network.
Image may be NSFW. Clik here to view.
Protection against exploits
Since targeted attacks use unique malware, signature-based detection is not enough to identify the malicious code that is used. However, antivirus programs have long had more weapons at their disposal than mere signature-based detection. The AEP technology (automatic protection against exploits) which uses DEP and ASLR mechanisms, methods of heuristic analysis and control over executable code are able to block the execution of malicious code when it exploits a 0-day vulnerability.
If the fraudsters have managed to attack the system – via an exploit or a malicious program launched by the user – network traffic control and application control will help to prevent further penetration into the corporate network.
Network traffic control
Once malicious code (a Trojan or exploit shell code) gets in the system, it usually attempts the following (one or more):
Establish connection with a command center (outbound connection)
Open ports for incoming connections
Download additional modules
Implement malicious code in other processes to maintain the connection with the command center
Gather information about the network, its systems and users
Send the harvested information (IP addresses, computer names and accounts, logins, passwords, etc.) to the fraudsters’ server.
Generally, having connected to the system, the scammers try to collect information about it and about the corporate network on which the computer is located. In order to collect local information the fraudsters do not need extra privileges - the list of the running processes, installed software and patches, connected users, etc. can be found quite easily. Information about the corporate network – searches for other vulnerable systems, protection systems, shared folders, network services, servers, etc. – is collected using special scripts and utilities capable of masking their activity and bypassing security systems. All this information is sent to the cybercriminals via the Internet for analysis before they prepare the next stage of the attack.
Using network traffic control technology (Firewall, IPS / IDS) system administrators and IT security specialists can not only block dangerous network activity but also detect any penetration into the corporate network. Firewall and IPS / IDS can:
Block incoming/outgoing connections
by port
by domain name and IP address
by protocol
Generate statistical analysis of traffic (Net flow) for anomalies
Collect suspicious network traffic for further analysis
Detect / Block:
outgoing commands or similar output sent via the Internet
downloads of suspicious files from the Internet (additional malware modules)
transmissions of confidential information (IP addresses, logins, computer names, corporate documents, credit cards numbers, etc.)
Firewall and IPS / IDS can detect anomalies in the way network nodes interact as soon as the malicious code tries to contact the command center or actively scans the corporate network for other systems, open ports, shared folders, etc. This anomaly detection allows IT security experts to promptly respond to the threat, preventing further intrusion which might compromise the corporate network.
Application control
Having accessed the target system, the criminals aim to consolidate their success: additional modules and utilities are downloaded onto the system and malicious code providing connection with the command center is often incorporated into trusted processes like explorer.exe, csrss.exe, smss.exe, etc.
Application Control can block the launch and download of untrusted programs and modules from the scammer’s hacker set and the HIPS policies should be used to block non-standard - and potentially dangerous - behavior from legitimate software. For example, browsers should not open the ports for incoming connections, the system processes (explorer.exe, csrss.exe, smss.exe, etc.) and other applications (calc.exe, notepad.exe, etc.) should not be connected to external servers and deploy malicious code to other trusted processes - this behavior should be prohibited.
To prevent criminals from gaining control of the system, IT security specialists should:
Prevent trusted or potentially vulnerable programs from implementing code in other processes
Restrict applications’ access to critical system resources and files only
Block potentially dangerous functions that are not a default feature of the applications (network access, installation of drivers, creation of screenshots, access to a webcam or microphone, etc.)
Systems which require the highest protection level should be safeguarded by the Default Deny mode which can block any program from starting up if it is not included in the white list stored locally or in the cloud.
File encryption
If the scammers seize control of the system and penetrate the corporate network, they may try to find and upload files which contain information that is potentially important for them:
Corporate documents, including security policies
Files containing credentials
Configuration files
Source codes
Private keys
This information can be found on the main victim machine as well as in open network folders on other systems. To prevent a confidential data leak,
IT security specialists should use file/disk encryption which can restrict local access to the confidential (protected) information.
Data is also transferred in an encrypted form. Even if the criminals manage to download something, they will not be able to read the content of the encrypted files.
Image may be NSFW. Clik here to view.
Security policies
In isolation none of the above technologies can effectively prevent a targeted attack. In order to protect the corporate network all these technologies must be well integrated and carefully tuned.
However, system administrators and IT security specialists should also use administrative protection measures:
User education. All users must:
Know and observe company security policies
Understand the possible consequences of the Internet threats, such as phishing, social engineering or malware sites
Inform the security service about all incidents.
Control over user access rights and privileges:
Any rights and privileges should be granted only when necessary
All rights and privileges (access) granted to the users should be recorded
Scan the systems for vulnerabilities and unused network services:
Detect and analyze vulnerable network services and applications
Update vulnerable components and applications. If there is no update, vulnerable software should be restricted or banned.
Many of these measures can be automated. For example if security policies are violated, special software shows the user a warning message. Systems Management technology can be used to search for network services and unauthorized devices, vulnerabilities and automatic updates of vulnerable applications.
Conclusion
Misuse of company resources can lead to both direct financial losses and a serious IT security incident. While communicating on social networking sites or viewing websites on the office computer, employees can become unwitting victims and involuntary allies of criminals who plan targeted attacks.
In the second part of the article we will describe an incident involving the use of personal email, software and unlicensed content on the corporate network and advise on protection measures to prevent such incidents.
The TRUTH about nullification is that it is legitimate, and it is the only way to effect a meaningful check on the federal government when the executive, legislative, and judicial branches unite on an incorrect interpretation of the Constitution, and threaten the independence of the states and the reserved rights of the People.
The federal government CANNOT be permitted to hold a monopoly on constitutional interpretation. If the federal government has the exclusive right to judge the extent of its own powers, as Madison and Jefferson warned in 1798-99, it will continue to grow – regardless of elections, the separation of powers, and other limits on government power. Nullification has always been available to push the government back within the boundaries of the Constitution, but for too long, those hostile to the Constitution have insinuated – FALSELY – that the doctrine was the reason for the Civil War and for segregation, thereby trying to use shame to invalidate it.
We should take a cue from Patrick Henry. While others were celebrating the Constitution and rejoicing that a more effective compact was created, Henry urged them to cool their heads and take a step back – to look carefully at the document they were asked to ratify. It was his opinion that the government created by the Constitution would tend to concentrate power, strip power from the states, and become no better than England’s monarchy (“it squints toward monarchy”). He urged Virginia to reject the Constitution. He reminded the delegates that trade, power, and security should not be the first concerns on their mind. He said the proper inquiry should be “how your liberties can be better secured, for liberty ought to be the direct end of your government.”
On that first day of the Virginia Ratifying Convention, June 5, 1788, Patrick Henry addressed the delegates with these words:
Liberty, the greatest of all earthly blessing — give us that precious jewel, and you may take everything else! Guard with jealous attention the public liberty. Suspect everyone who approaches that jewel. Unfortunately, nothing will preserve it but downright force. Whenever you give up that force, you are inevitably ruined.
When the American spirit was in its youth, the language of America was different.. Liberty, sir, was then the primary object. We are descended from a people whose government was founded on liberty: our glorious forefathers of Great Britain made liberty the foundation of everything. That country is become a great, mighty, and splendid nation; not because their government is strong and energetic, but, sir, because liberty is its direct end and foundation. We drew the spirit of liberty from our British ancestors: by that spirit we have triumphed over every difficulty. But now, sir, the American spirit, assisted by the ropes and chains of consolidation, is about to convert this country into a powerful and mighty empire. If you make the citizens of this country agree to become the subjects of one great consolidated empire of America, your government will not have sufficient energy to keep them together. Such a government is incompatible with the genius of republicanism. There will be no checks, no real balances, in this government. What can avail your pecious, imaginary balances, your rope-dancing, chain-rattling, ridiculous ideal checks and contrivances? But, sir, we are not feared by foreigners; we do not make nations tremble. Would this constitute happiness, or secure liberty? I trust, sir, our political hemisphere will ever direct their operations to the security of those objects.”
The jury is still out on this thing we call the Great American Experiment.
We separated from Great Britain when we insisted on governing ourselves consistent without our own values. Those values were articulated in the Declaration of Independence. Contrary to the “divine right of Kings” which was the system respected in Britain, the American colonies would establish a government “of the people, by the people, and FOR the people.” It would go one step further.. it would establish a government whose powers were derived from the people themselves (so that the people could always take them back when they were fed up with that government).
While the British people had to stand up for their rights many times, Americans have never done so since the Revolutionary War. The British protested and demanded that the King respect their rights in 1100 (resulting in the 1100 Charter of Liberties), in 1215 (the Magna Carta or “Great Charter”), in 1628 (the Petition of Right of 1628), in 1641 (The Grand Remonstrances of 1641), in 1679 (the Habeas Corpus Act), and finally in 1689 (English Bill of Rights of 1689). [The Grand Remonstrances and The English Bill of Rights, like our Declaration of Independence, set out lists of grievances against the King for usurpation of the rights that were proclaimed in the earlier charters]. The interesting thing about history of the British people in asserting their rights and demanding restraint from their government is that each time they did so, they were able to secure greater freedom. We can take a lesson from British history.
There is another great distinction between the British system and ours. When the kings signed those charters, they often did so very reluctantly. For example, almost immediately after King John (the infamous King John of the Robin Hood legend) signed the Magna Carta, he ignored it. It was ignored on and off until the 17th century. The point is that the rights of the people were enjoyed at the mercy of the king. There was no meaningful way to enforce the charters. Parliament tried to, but as with King Charles I (son of King James I, who granted the charters to the Pilgrims and Puritans to settle in America), when Parliament tried to force his hand, he turned around and dissolved it.
Our Founding Fathers intended that our Constitution and Bill of Rights would be stand the test of time, guarantee the proper relationship between the People and government, and not jeopardize the rights and liberties of the people. That’s why they divided power among two equal sovereigns (power to check power) and why they included so many checks and balances.
To deny nullification is a dangerous decision. To deny it is to: (i) deny the wisdom of our Founders; (ii) trust your rights to a government which is growing more hostile to them by the day; and (iii) submit to the notion that government is capable of restraining itself and capable of divesting itself of all the unconstitutional powers it has already assumed and repealing such laws it has passed.
Liberty must always come first. Liberty is a gift, as KrisAnne Hall says, that we must pay forward. We don’t pay it forward by not second-guessing the actions of the federal government, especially when we know it likes to enlarge its powers at every chance. We don’t pay it forward by accepting the government’s version that constitutional remedies that were put in place by our founders to preserve the rights on which this country are founded are no longer valid. We pay it forward by preserving it. We do that by using every option we have to limit the intrusion of government in our lives and over our property. Our Constitution is not the living, breathing document that the progressives and federal judges claim it to be. For if that is the case, it can be twisted so completely as to destroy our understanding of it. The only things that is living and breathing are us, the citizens of the United States, who have inherited a precious gift of freedom to live our lives and raise our families. And so let’s use the common sense and spark of brilliance that God so endowed us with when he also endowed us with free will and inherent rights.
Au niveau physique, je suis detecté par les plus grands spécialistes au monde : Lars Drudgaard, Barrie Trower, Dr Jhon Hall ...regroupés au sein de http:/www.icaact.org pour combattre le terrorisme le plus virulent et ordurier ayant jamais existé !
Ces benevoles ont composé des dossiers pour des milliers de victimes de par le monde qu'ils sillonnent de long en large pour aider des personnes en cours d'assassinats par les ondeurs de cointelpro-gang-stalking, ect
Mes ecrtits sont validés par Roberto Scaruffi....qui suit mon travail depuis le debut.
Roberto Scaruffi,Rio de Janeiro, RJ, Brazil• Degree [“doctor”] in Political Sciences [major in Economics] from the University of Turin; • EAP course by the Essex University (score 7 in IELTS); • DEA by the UCL in LLN (Belgium); • completed and finally [Spring 2002] academically perfect Ph.D. research by the UCL in LLN (Belgium) [[formal PhD still not awarded since an annihilation operation (an [failed] operation for producing State/“government” managed terrorism) of Italian Secret Police Bureaux with very active cooperation of NATO Secret Police Bureaux at world level; ask them... http://www.uclouvain.be/ ; http://www.carabinieri.it/ ; http://www.comiteri.be/ ; http://www.sicurezzanazionale.gov.it/ ; http://www.nato.int/ ; http://www.interpol.int/ ; information from here: http://scaruffi.blogspot.com/ ; the Ph.D. research is academically perfect and it is NOT failed!]]; • Chinese language classes by three universities in China [PRC] and Taiwan [RoC]
Je possède toute les preuves nécessaires pour l’annihilation de ce réseau depuis deux ans.
La police en a. Les flics de Ciney et d'Andenne ont participé à mon stalking depuis quatre ans via des faux documents entre autre (disponible et avérés faux).
J'ai tout donné a la POLICE Ciney en juillet il y a deux ans et ils on continué à me détruire malgré que le dossier les mettait hors cause à mon sujet. Ils m'ont fait taire à chaque rencontre de manière dégueulasse.
Je suis maintenant sans argents et sans voiture à cause de cette affaire et je n'ai jamais pu être entendu.
Au niveaux informatique, j'ai toute les preuves nécessaires de mon hacking depuis plus e trois ans (creeper = stuxnet, le worm d'arpanet) et j'ai le droit de recevoir l'analyse de mon web.
JE SUIS BLOQUES. Nous sommes plein de victimes et nous avons des chose (VITALES) les unes pour les autres.
Quise cache derrière le puissant logiciel espion découvert chezBelgacom? Accuser les Etats-Unis ou Israël serait prématuré. Mais enfin,le faisceaude présomptions est là.
Résumons : pendant au moins deux ans, Belgacom a été victime d'une attaque informatique dont le niveau de perfectionnement laisse penser qu'il s'agit de l'oeuvre d'un Etat. La cyberattaque en question visait surtout à récolter des informations sur les appels téléphoniques émis vers des pays tels le Yémen ou la Syrie. Il ne s'agit pas ici d'un vulgaire virus ni d'un "hacking" exploitant une faille de sécurité, comme certains petits génies de l'informatique sont capables d'en commettre dès l'adolescence. Ni d'attaques extérieures malveillantes à la Anonymous, puissantes, brutales, mais dont la force tient surtout au nombre d'attaquants. Non. On parle ici, selon le parquet fédéral, d'une technique très pointue fondée sur l'emploi d'un logiciel malveillant, lequel se serait propagé sur plusieurs postes du réseau informatique interne de Belgacom. Son but : extraire des informations pour les envoyer à ses commanditaires.
Bref, un botnet. La description lacunaire qu'en ont donnée les autorités ne permet pas de l'identifier, mais il ne serait pas étonnant qu'il s'agisse d'une variante ou d’un cousin de Flame. Découvert en mai 2012 au Moyen-Orient, ce concentré de technologie destiné à l'espionnage avait été décrit par des pointures de la sécurité informatique comme "le logiciel malveillant le plus sophistiqué jamais rencontré". Flame, selon l'éditeur d'antivirusKaspersky, présentait quelques liens de parenté avecStuxnet, un autre "malware" hyper perfectionné qui servait, lui, à saboter les centrifugeuses iraniennes. On a su depuis que Stuxnet était le fruit d'une opération conjointe entre les Etats-Unis et Israël. Baptisée "Jeuxolympiques", l’opération avait été lancée sous l'ère du président Bush et maintenue sous l'administrationObama. Stuxnet lui-même se rapprochait sous certains points deDuqu, un autre agent 007 informatique qui s'intéressait de très près au programme nucléaire iranien.
Dans tous les cas - Stuxnet, Duqu, Flame ou encore la "chose" découverte chez Belgacom - la ou les cibles visées se situaient au Moyen-Orient. Accuser les Etats-Unis ou Israël serait trop hâtif. Mais enfin, disons que le faisceau de présomptions prend des allures de fagot.
Ce qui étonne surtout, c'est que les méthodes utilisées par ces menaces sont connues. La plupart ont été conçues voilà des années et sont désormais largement documentées, du moins dans leurs grandes lignes. Qu'il ait fallu deux ans à une cible stratégique comme le premier opérateur de téléphonie belge pour découvrir l'infection est révélateur. Soit sur le niveau de technologie mis en oeuvre, soit sur la confiance trop béate accordée à certains pays alliés, soit sur le manque de vigilance ou d'expertise belge en matière de cyberattaques. Qu'il ait fallu confier le nettoyage du système de Belgacom à une entreprise néerlandaise spécialisée ne rassure guère sur la troisième option.
English: Trimaran Belgacom of Jean-Luc Nélias, seen during or close to the Tall Ships' Races 2003. This trimaran is now known under the name Gitana 11. Français : Le trimaran Belgacom de Jean-Luc Nélias photographié durant les Tall Ships' Races 2003. Ce trimaran ORMA est maintenant connu sous le nom de Gitana 11. (Photo credit: Wikipedia)