Obama orders military to carry out cyber attacks against the US and foreign states.
Corruption, World news Thursday, August 16th, 2012In June of 2010 Mr Obama (alias for Barry Soetoro) ordered the Pentagon to create a special online unit to carry out cyber attacks against the United States people and foreign states. NETCOM lead by Maj. Gen. Alan R. Lynn conducts cyberspace operations in support of full spectrum operations to ensure U.S. and allied freedom of action in cyberspace, and to deny the same to adversaries. US soldiers have now begun a new type of geopolitical warfare – cyber warfare.
US soldiers from NETCOM / Cyber Command are now ordered to gain unauthorized access to digital systems for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Operations may also be carried out in a manner that does not require gaining unauthorized access, such as by causing denial-of-service (DOS) attacks on websites. Their attacks are not limited to foreign computer systems. They have been illegally authorized by Obama to spy on Americans and to misappropriate American citizens’ assets or sensitive information, to corrupt media, corporate and technical data, and cause operational disruptions to trade, commerce, banking, transportation, water systems, and energy systems including nuclear reactors – future false flag attacks.
No business, personal or government systems are exempt from cyber attacks by NETCOM. Not even the computers of the US Congress and House of Representatives. The US is, without a doubt, under martial law. The US military now patrol and carry out military operations inside the continental United States and against US citizens. A direct violation of the Posse Comitatus Act.
SEC. 15. From and after the passage of this act it shall not be lawful to employ any part of the Army of the United States, as a posse comitatus, or otherwise, for the purpose of executing the laws, except in such cases and under such circumstances as such employment of said force may be expressly authorized by the Constitution or by act of Congress; and no money appropriated by this act shall be used to pay any of the expenses incurred in the employment of any troops in violation of this section And any person willfully violating the provisions of this section shall be deemed guilty of a misdemeanor and on conviction thereof shall be punished by fine not exceeding ten thousand dollars or imprisonment not exceeding two years or by both such fine and imprisonment.
10 U.S.C. § 375. Restriction on direct participation by military personnel
The Secretary of Defense shall prescribe such regulations as may be necessary to ensure that any activity (including the provision of any equipment or facility or the assignment or detail of any personnel) under this chapter does not include or permit direct participation by a member of the Army, Navy, Air Force, or Marine Corps in a search, seizure, arrest, or other similar activity unless participation in such activity by such member is otherwise authorized by law.
Gaining unauthorized access to digital systems for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruption is direct participation by a member of the Army, Navy, Air Force, or Marine Corps in a search, seizure, arrest, or other similar activity. Obama does not have legislative nor judicial authority so NETCOM is acting illegally.
So how do you know if you’ve been hacked by NETCOM? Have you network people look for an IP address like this in your server’s log – 55.138.87.109 – United States Army Information Systems Command. NETCOM uses the IP range 55.0.0.0 – 55.255.255.255. To block any or further attacks IP Ban the 55.0.0.0 – 55.255.255.255 NetRange or simply create a .htaccess file in the root of your server and add 55.0.0.0/8 to it. .htaccess can be created simply by entering (copy and paste the following) ;
order allow,deny
deny from 55.0.0.0/8
allow from all
How to surf the Internet without being hacked by the US.
Any network or computer literate person can easily counter hack the US hacking of their corporate, personal or government computer system. If you’ve been hacked you are a victim of a military coordinated attack. Any and all military operations against civilians are illegal. In self-defense, use the US government’s own computer systems against them. How? Download an iso image of a Linux live CD. For example – Linux Mint.
1. Download the LiveCD ISO image from http://linuxmint.com
2. Burn the image onto a CD or DVD. Tutorial: How To Burn A LiveCD.
3. Boot your computer from the CD you just created. Use a separate computer system to install the Linux Live CD to.
4. Double-click the “Install Linux Mint” launcher on the desktop and follow the steps shown in the dialog boxes.
When it asks for your full name, a name for your computer, your login credentials (username and password) use a US government domain name like defense.gov or nsa.gov or dhs.gov or arcyber.army.mil or whitehouse.gov or cia.gov
So, for Full Name enter defense.gov or nsa.gov or dhs.gov or arcyber.army.mil or whitehouse.gov or cia.gov
name your computer defense.gov or nsa.gov or dhs.gov or arcyber.army.mil or whitehouse.gov or cia.gov or exactly the same as what you entered previously as full name. For username enter Obama or Petraeus or Panetta or Lynn – you get the idea. For password use anything you like but make it extremely difficult to crack.
When you enter the computer name as defense.gov or nsa.gov or dhs.gov or arcyber.army.mil or whitehouse.gov or cia.gov it will probably say computer name already exists. Continue with the install anyway. When the install is complete reboot your computer. Login and begin surfing the Internet without worry of being spied on, hacked, or your personal or business data being misappropriated or mined data being used against you in trumped up charges. Using this system also corrupts their data – majorly.
If you are a foreign government and are feed up with the US attacks install a Linux Server Live CD instead of a desktop version. Have your network people use the US government’s computer names just as stated above. Then once the install is complete have your network people set up a mail server. Set up a catchall (default) email address. i.e obama@arcyber.army.mil or Petraeus@cia.gov or Panetta@defense.gov or Napolitano@dhs.gov
The default or catch-all address is the one to which all e-mails, addressed to a non-available or mistakenly entered email account at your domain name are routed to. In case someone sends an email to info@yourdomain.com and you do not have such mailbox, the catch-all option will forward this email to your default email address.
Because you installed the Linux server using the computer name arcyber.army.mil (or your choice) any and all email for arcyber.army.mil will be forwarded to your default or catchall email address.
You cloned the US government website and the Internet is stupid. It can only do what it is instructed to do. It doesn’t know what to do with the emails until someone tells it what to do. It can’t determine on its own which obama@arcyber.army.mil is the right email address so it sends the email to all obama@aarcyber.army.mil addresses – whether or not any are clones. And, since you’ve set up a default or catchall email address any and all emails to arcyber.army.mil (or your choice) will be forwarded to you. You’d be surprise how many US government emails will be inadvertently forwarded to you – i.e. sensitive files, including CCTV files of the 9/11 Pentagon attack, warning that 9/11 was imminent, underground nuclear detonation reports at ground zero New York City New York September 11, 2001, locations to all DUMB (Deep Underground Military Bases), the president’s itinerary, troop movement, preparations for war of aggression, funding for mercenary terrorist acts in Libya and Syria, election rigging, White House security scheduling, Clinton’s offshore drug trafficking account numbers, …
Short URL: https://presscore.ca/news/?p=6985
Dr. Webster Griffith Tarpley, an author and historian from Washington recently revealed that – “The current US policy under the Obama administration with Hillary Clinton in the State Department aims at the destruction of all sovereign states on this planet.”
” .. their goal is not just regime change: it’s now microstates; “ministates”, to use the terms of Zbigniew Brzezinski; “partition”, the favorite term of George Soros; balkanization, failed states, rump states, warlords – warlords of the type that we see for example in Libya.”
“This is the goal, to have a situation where the International Monetary Fund and NATO rule the world from above but then on the ground you’ve got a kind of crazy court of petty, squabbling, impotent little entities that could never resist Exxon Mobile or JP Morgan Chase or Halliburton or anything of the kind, something, again, like Libya today.
That’s where they’re headed to this. It would be for them to break up Syria, to detach the Kurdish part, to detach parts that would be claimed by Turkey, to perhaps start the Lebanese civil war again, perhaps there would be a continuous civil war in Syria, perhaps Israel will start helping itself to various tracts of territory, and so on down the line. So that’s where this is going. It’s very sinister.”
Source – http://www.presstv.ir/detail/2012/07/02/248921/us-has-sinister-plan-for-world/
During the August 23, 2011 false flag event that rattled six nuclear power plants within 150 Miles of the detonation Maj. Gen. Jennifer L. Napper was Commanding General of NETCOM. Napper assumed command of NETCOM, Sept. 22, 2010. She was in command of cyber operations that day. Anna Nuclear Power Plant and any other “unusual events” affected nuclear power plant should go over their logs for August 23, 2011 and look for any access to their systems from IP range 55.0.0.0 – 55.255.255.255 – NETCOM’s IP addresses.
Napper recently became director of plans and policy, J-5, with the U.S. Cyber Command located at Fort Meade, Md. She replaced Maj Gen. Suzanne Vautrinot, USAF – Director of Plans & Policy (J5) U.S. Cyber Command (USCYBERCOM)
Other Cyber Attack Forces and their Commanders include:
Maj Gen George Allen, USMC, Deputy Director, Marine Corps Forces Cyber Command (MARFORCYBER), & Director, Command, Control, Communications & Computers (C4) & CIO;
RDML Robert E. Day, Jr., USCG Director, Coast Guard Cyber Command;
Brig. Gen. Greg Brundidge, USAF Director, Communications & Information (J6) & Deputy Director for Cyber, EUCOM Plans & Ops Center (EPOC) U.S. European Command (USEUCOM);
COL (Promotable) Mark R. Quantock, U.S. Army, Nominated for Director of Operations (G-3), Army Forces Cyber Command (ARFORCYBER)
Cybercom was created in June 2009, when then Defense Secretary Robert Gates approved the group. Just 5 months after being sworn in as the 44th US president Obama went to work to use the US military to take charge of domestic spying – evading constitutional checks and balances. All wiretapping of American citizens by any agency of the United States government requires a warrant from a three-judge court set up under the Foreign Intelligence Surveillance Act.
The Fourth Amendment to the United States Constitution is part of the Bill of Rights and helps guard against “unreasonable” searches and seizures by agents of the government. It is solely a right of the people that neither the Executive nor Legislative branch can lawfully abrogate, not even if acting in concert: no statute can make an unreasonable search reasonable, nor a reasonable search unreasonable.
Obama and his predecessor claim that the Taliban are unlawful combatants but according to International Law they are actually “privileged combatants”. Privileged Combatants are “inhabitants of a non-occupied territory, who on the approach of the enemy spontaneously take up arms to resist the invading forces, without having had time to form themselves into regular armed units, provided they carry arms openly and respect the laws and customs of war.”
Afghanistan was unoccupied until the US invaded them in 2001. The Taliban, inhabitants of the then non-occupied territory called Afghanistan, spontaneously take up arms to resist the invading US forces. The Taliban openly carry arms to defend their country . The Taliban are the only ones respecting the laws and customs of war. Afghanistan is their country. The Afghan people are their people. The Taliban have legal right to self-defense from an armed attack by a foreign state – the US.
According to International Law US and Israeli mercenaries in Syria – civilians of the so-called Syrian Liberation Army are “unlawful combatants” – a civilian who directly engages in armed conflict in violation of the laws of war.
Under Article 47 of Protocol I (Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts) it is stated in the first sentence “A mercenary shall not have the right to be a combatant or a prisoner of war.”
On 4 December 1989 the United Nations passed resolution 44/34 the International Convention against the Recruitment, Use, Financing and Training of Mercenaries. It entered into force on 20 October 2001 and is usually known as the UN Mercenary Convention.
Article 2 makes it an offence to employ a mercenary and Article 3.1 states that “A mercenary, as defined in article 1 of the present Convention, who participates directly in hostilities or in a concerted act of violence, as the case may be, commits an offence for the purposes of the Convention.”
PRESS Core has documented Obama’s entire life. Obama (alias for Barry Soetoro) has been attacking the US, the US Constituion and the US people since he was sworn in “twice” as the 44th and current President of the United States.
He has robbed the US taxpayer of $14.5 trillion. An audit of the Federal Reserve revealed that the Federal Reserve has doled out more than $16 trillion since Barack Obama was sworn in as president of the United States of America. This figure is 10 times higher than what the U.S. Congress authorized and Bush ($700 billion) and Obama ( $787 billion) signed off on. The Federal Reserve was only authorized by Congress to use $1.487 trillion in federal tax dollars in bailouts. That means the the Federal Reserve embezzled (stole) another $14.5 trillion – under the leadership of Mr Obama.
He has authorized the CIA to assassinate US citizens. Obama claims is isn’t assassinations but targeted killing. So any foreign government or their agent(s) can legally kill Obama now. According to Obama’s interpretation of the law – Targeted killing is the intentional killing, by a government or its agents, of a targeted civilian, whom they may consider an “unlawful combatant”, who is not in their custody. Obama is for all intent and purposes an unlawful combatant – a civilian who directly engages in armed conflict (Afghanistan, Libya, Syria) in violation of the laws of war. Afghanistan, Iraq, Libya, and Syria have never attacked the US, not on September 11, 2001, not prior to 9/11 nor since 9/11. The US attacked them. Afghanistan, Iraq, Libya, and Syria have, according to Obama, the legal right to target him and kill him – out of self-defense.
The Constitution was drafted to protect and guarantee the rights and freedoms of every US citizen. Nowhere in the Constitution does it state that the US people must serve, protect or defend the US president. The US Congress does not serve, protect or defend the US president. A US soldier must first and foremost support and defend the Constitution of the United States and is only required to obey “lawful” orders of the president and to disobey any and all unlawful orders.
“I, _____, do solemnly swear (or affirm) that I will support and defend the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; and that I will obey the orders of the President of the United States and the orders of the officers appointed over me, according to regulations and the Uniform Code of Military Justice. So help me God.”
He attempted to kill millions by releasing the Fort Detrick Maryland created Swine Flu the day after the nation wide Tax Day Tea Party Revolt.
He attempted to detonate nukes “on” US soil in August 2011 but his false flag attempt was thwarted by the US Air Force. It all began unfolding with the U.S. Air Force raid of the Citadel Gun and Safe shop in Las Vegas, NV on Friday August 19, 2011. Heavily armed Special Agents of the Air Force Office of Special Investigations (OSI), was launched to recover nuclear warhead detonators that were stolen from Nellis Air Force Base. After recovering the stolen nuclear warhead detonators from the Citadel Gun and Safe shop the United States Air Force Office of Special Investigations proceeded with federal law enforcement agencies in joint operations to recover the nuclear bombs as they still posed a major threat, even without their detonators. On Tuesday morning, August 23, 2011 two were detonated underground. One detonated 84 miles SW of Washington DC.
He waged war with Libya without Congressional approval.
Obama illegally gave the US military the power to carry out armed military operations on US soil – National Defense Authorization Act. Not against an invading foreign military force but against US citizens. A gross violation of the Posse Comitatus Act.
Ordered 650 million high-power and illegal hollow point 40 caliber bullets for use by the DHS against US citizens. Under the Geneva Convention, the use of hollow point ammunition in any war (including a civil war) is a War Crime.
Can you afford to give him another 4 years? To do whatever the hell he wants. To murder at will. To steal everything you have left.
Israel developed another computer worm called Flame (Flamer). Flame is the first cyber weapon used by Israeli intelligence to target its own citizens. It targets specific computers and surveils the entire system, takes screenshots of instant messaging (IM) activity, and can turn on a microphone to monitor audio activity as well. The US government (Obama) is now using Flame against its own people.
Flame has a bluetooth capability. The computer security firm Symantec said any laptop infected with Flamer would search for other bluetooth-enabled devices, sucking up information that might include mobile phone numbers. This would help the attacker “identify the victim’s social and professional circles”. The virus can also infect and device with bluetooth capability – tablets, smart phones, iPads.
Flame can listen in on Skype conversations, record keystrokes, steal files, and hack a smartphone’s call records. Skype was bought by Microsoft for $8.5 billion last year.
Following an investigation request by the United Nations’ International Telecommunications Union, the discovery of Flame was made public. Many of the infected computers belonged to deliberately targeted home users; the exquisitely crafted software escaped evasion by the world’s best antivirus software suites for years.
According to Alexander Gostev of Kaspersky Labs, one of the first experts to investigate Flame, your data is available to the operators through the link to Flame’s command-and-control servers. Later, the operators can choose to upload further modules, which expand Flame’s functionality. There are about 20 modules in total and the purpose of most of them is still being investigated.” Flame activates Bluetooth functionality and siphon name/phone number/address info from Bluetooth enabled phones near infected computers. Flame was written using Lua, a programming language best known for its use in Angry Birds.
The Wall Street Journal reported a year ago that the Pentagon determined that computer sabotage may constitute an “act of war” against the United States, to which the US might respond militarily. So, in effect, what the US government is now doing to the US people is an “act of war”.
In mid July 2010, security experts discovered a malicious software program called Stuxnet that had infiltrated factory computers and had spread to plants around the world. Obama claims that this unit would counter hack the organizations that create and carry out cyber attacks like Stuxnet even though he knew that it was the US who created Stuxnet. The NY Times confirmed that it was a program developed by the US, with a lot of help from the Israelis. A false flag of sorts to quickly get funding for this gross violation of US Constitutional law. New York Times articles titled -“Obama Order Sped Up Wave of Cyberattacks Against Iran” In that article is stated: “Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.”
The N.S.A. and a secret Israeli unit called Unit 8200 developed the enormously complex computer worm that would become the attacker from within. Stuxnet was created by the US and Israel to sabotage Iranian Iranian nuclear plants.
Stuxnet was used last Aug in the US in the immediate aftermath of another false flag event – underground nuclear detonations that created a magnitude 5.9 earthquake in Mineral Virginia – at the Anna Nuclear Power Plant in central Virginia. The August 23, 2011 false flag event rattled six nuclear power plants within 150 Miles of the detonation.
When no damage to the plants occurred Stuxnet was remotely activated triggering the shutdown of the Anna Nuclear Power Plant and spurred declarations of “unusual events” at plants as far away as Michigan.
The image below is the current commander of NETCOM – Maj. Gen. Alan R. Lynn. He oversees the computer attacks against the US people and foreign states. He’s not a very good commander. His people fail to cover their tracks when they attack websites. They got caught because they use their own IP addresses for cyber attacks. I guess Kissinger was talking about you when he said –
“Military men are just dumb, stupid animals to be used as pawns in foreign policy.”
Mr Obama you might want to wipe the smile off this dumb Charlie Foxtrot’s face. Just 4 days on the job – assumed command of NETCOM Aug 9, 2012.
Checkmate!