(Gizmodo) – These smart cards are the actual keys to the Internet. There are seven of them and they hold the power to restarting the world wide web “in the event of a catastrophic event.”
The basic idea is that in the event of an Internet catastrophe, the DNSSEC (domain name system security) could be damaged or compromised and we’d be left without a way to verify if a URL is pointing to the correct website. That’s when the holders of these smart cards would be called into action:
A minimum of five of the seven keyholders – one each from Britain, the U.S., Burkina Faso, Trinidad and Tobago, Canada, China, and the Czech Republic – would have to converge at a U.S. base with their keys to restart the system and connect everything once again.
A minimum of five people is needed because each of the smart cards contains only a fraction of the recovery key necessary to set things right again. This means that no single person will hold all the power to resetting our little cyber world. [BBC via PopSci] – Source: BLN
(SteveWatson) – An increasing clamour to restrict and control the internet on behalf of the government, the Pentagon, the intelligence community and their private corporate arms, could result in a staged cyber attack being used as justification.
Over recent months we have seen a great increase in media coverage of inflated fears over a possible “electronic Pearl Harbor” event, with reports claiming that the U.S. could be “felled within 15 minutes”.
Vastly over-hyped (and in some cases completely asinine) claims that the power grids and other key infrastructure such as rail networks and water sources are wired up to the public internet have permeated such coverage. Continue reading →
(DesertPeace) – I’ve always maintained that if I don’t receive at least one hate mail letter a day or one attack on the Internet, then I’m not doing my job well…. Since the start of this Blog, that has been the case, proving, at least to myself, that I am doing a damn good job.
It seems ironic that those who attack me personally or this Blog claim to be pro Palestinian activists, yet use the same terminology in their attacks as the most vicious zionists. Read More Here
See Also: (PaulWatson) – Facebook Deletes Official Alex Jones Page Over Gadsden Flag – Read More Here
(RussiaToday) – Is the United States government or outside forces the real threat to cyber security? Alex Jones says that the government is trying to silence free speech in America by expanding their reach on the internet. He also says his own personal sites have been censored, even deleted. Continue reading →
(Cryptome) – Conficker is a computer worm which has been infecting PC’s on the Internet since November 2008. Worryingly, nothing is publicly known of its mission, because it has yet to do anything of great note. Conficker is building and maintaining a powerful network of enslaved computers, and machines infected with the worm can be made obey the whims of Conficker’s unknown commanders. Its advanced peer-to-peer networking design makes the program’s control network difficult for Internet providers to shut down. Today this strange worm constitutes a powerful overlay of control across an unknown vastness of Internet-connected computers. With the exception of distributing some small-time malware, however, it has been essentially dormant. Conficker is like an army, recruiting and training for two and a half years, with no history save for robbing the corner store. Continue reading →
(ActivistPost) – The latest National Security Directive presented by the establishment mouthpiece, The Wall Street Journal, indicates that the marketing campaign for Cybersecurity has just gone viral.
The Perfect Citizen program markets the idea of corporations and government working together in a joint effort to thwart Cyberterrorism. This is truly a message designed to be spread far and wide, as corporations can sell infrastructure upgrades to terrified American citizens who once again are being required to trade liberty for supposed security. Taxpayers already have provided billions to the Comprehensive National Cybersecurity Initiative as funding for their own cyberprison. Both political parties have supported the campaign of perpetual National Security, and the new program is yet another example of how they agree upon initiatives that will ultimately benefit corporate interests: Continue reading →