Tuesday, June 20, 2023

A Cyber Polycrisis Psyop?

How the Cyber Polycrisis Mirrors CV Psyop


On Friday, June 16, the GovExec.com online magazine published an article explaining to its readership in the federal government’s agencies and departments that there was “no ‘systemic risk’ to government networks,” last week resulting from a spate of ransomware attacks, according to CISA.

On Saturday, scores of citizen reports began streaming into Twitter feeds and other social media platforms with video clips showing the U.S. military on the move in urban settings. The armed forces mobilized rubber-tire armored vehicles in Center City Philadelphia and V-22 Osprey aircraft transporting Marines to Laksper, California, north of the Golden Gate Bridge in San Franciso. Later, more videos captured trains moving tanks and heavy equipment across several states, tanks on the road in Idaho Falls, and squadrons of UH-60 Black Hawk and AH-64 Apache Attack helicopters flying over San Diego and other places across America.

Not to be outdone, Mexico and Canada jumped into the military transport game on Sunday, moving jeeps and heavily armored vehicles along the south and north borders of the United States. None of the military mobilizations felt like some grand exercise between the trio of North American nations.

Two days before the “no systemic risk” notification cited in GovExec.com, the U.S. Cybersecurity Infrastructure & Security Agency (CISA) published an alert titled, “CISA and Partners Release Joint Advisory on Understanding Ransomware Threat Actors: Lockbit.”

The alert encouraged other federal agencies and departments to implement CISA and its partners’ recommendations to lower the cyber risk surface area to prevent falling victim to ransomware attacks.

The recommendations were derived from cyber forensic analysis of the 2022 “Lockbit” hack conducted by the FBI on “indicators compromise associated with Lokbit 2.0,” a Ransomware-as-a-Service (RaaS) that deployed a wide range of data breach tactics and strategies, according to the FBI Flashreport.

While CISA and FBI released the comprehensive ransomware prevention guide midweek, several U.S. agencies, including the U.S. Energy Dept., came under a swarm of cyberattacks and data breaches. Mainstream news outlets, from CNN and USNews, to ABC and NBC covered the story as it unfolded.

What was odd about the Big Media blanket coverage, is how the same news outlets failed to cover any of the military mobilizations on the city streets or in the sky, which continued on Monday with additional movements of heavy tanks by trains, from Arizona to California and across other states like Texas.

Over the same weekend, we came to learn of the potential connection between the U.S. military movements into urban centers and the coordinated ransomware attacks last week.

In two separate videos from Dr. Jason Dean on his Telegram channel @BraveTV, he reported, according to his sources, that at least 17 U.S. cities had fallen prey to ransomware attacks, with as many as 250 cities sharing the same locked-out-of-their IT systems status worldwide.

In the United States, the federal agencies’ IT networks and systems are separated, for the most part, from cities and states. All cities run similar IT payrolls, human resources, communications, emergency response, energy services, and infrastructure management.

What Jason Dean reported on Sunday startled many who followed his reporting. State actors held the ransomware cities, hostage, for two years and more. Looking back that appears to be the reality with such attacks occurring in 2021. As such, the White House followed with a briefing document on the U.S. plan to counter ransomware attacks, as well as ransomware reports from the U.S. DHS and HHS.

Dean’s intel from a CISA insider and an intel source boiled down to: The U.S. military taking over the 17 or more cities with a local or “soft” martial law to come as it swaps out targeted IT systems and installs a new parallel IT network in three waves.


At the January 2023 Davos confab, Klaus Schwab and the World Economic Forum (WEF) planted the seed of the coming polycrisis events with the spearpoint being cyberattackscrippling the healthcare systems and a global economic shutdown. The WEF calculated the costs for the world of one day without would be $50 billion, “and that’s before considering the economic and societal damages, should these devices be linked to essential services, such as transport and healthcare.”

The less than two-minute video concludes that COVID-19 was a “known risk” and “So is the digital equivalent…”

Joining the WEF in planting the polycrisis seeds of fear, including UNICEFNGOsnonprofits, and mainstream news outlets, such as Fortune magazine.

In the world of predictive programming, Klaus Schwab and his elite minions at the World Economic Forum seized the opportunity the way Dr. Anthony Fauci hexed President Trump’s first term, two weeks before he took the oath of office in January 2017, by guaranteeing there would be a “surprise outbreak” of a coming global pandemic.

On a parallel path, the only way for Klaus Schwab and WEF could predict the cyber polycrisis “infecting” 250 global cities at the start of this year, was for them to have already been inside those cities’ IT networks, whether by breach or backdoor invite, such as Hillary Clinton’s open server in her Westchester County, New York, home last decade.


More...



1 comment:

  1. Once upon a time long, long, ago, USA had no real internet world news, or other technology, (Military 30 years ahead, they had it, IMO); but point is, ditch it, bet much of the propaganda wilts on the vine, right?

    Go back to how Amish live, little House on the Prairie, like the 50's, like Native Americans in Teepee's, classy Gypsies, who cares? This nonsense now days is allowing insanity in the back door, IMO!

    ReplyDelete