Tuesday, October 25, 2016

Cyberattack against USA by Russia ? : Are you JOKING ?




Simon Parkes is a life long experiencer of aliens, shadow people, elementals and ufo's, these include Mantid (Mantis) beings, Draconis Reptilian, Feline, small and tall Grey creatures, Crystalline beings and other creatures that can't be identified. Simon was an elected Politician and served a full term of office. 
Simon's biological mother worked for the British Security Service, often called MI5 between 1965 - 1979. However while she was managed by British Intelligence she was in fact working "jointly" for the National Security Agency (NSA) of America. Her job was to type out documents that related to crashed ufo craft that had come down all over the Earth's surface and had then been retrieved by American special forces/recovery teams.



1 .Denial of service attacks on internet infrastructure



..............................................................................................................................................

22 OCT.2016

Dyn was the target because the company has access to a large amount of bandwidth. This is also a reason why Dyn is the world’s largest host of Webcams
Yesterday's cyber attack came from Mcconnell Air Force Base in Wichita USA.
Either for the purposes of jamming arming codes being routed via servers that then impacted and effected the civilian internet or to prevent new Wikileaks revelations.

21/10/2016

An attack known as a denial of service (DOS, or DDOS) occurred on the Internet in US and UK this evening.
Many people unable to make Skype calls, access websites or download information etc.
No explanation as yet but it's believed to be intentional and Perhaps a practice run


....................................................................................................................................................................

2.

A Foreshadowing Of Things To Come: “This Cyberattack Was Initiated By The U.S. Government… A Beta Test Done In Preparation For A False Flag”


The networks have all reported the DDoS (Distributed Denial of Service) cyberattack upon the DNS (Domain Name Server) Dyn that occurred last Friday.  This attack effectively tied-up (and shut down) thousands of websites in the Northeastern United States and eventually progressed to affect the West Coast, most of Texas, and then a large part of Europe.  Tens of millions of people were affected by this attack on the networks.
This article is not about the specifics of that attack.  The most definitive post on the cyberattack can be found within an article by Libby Plummer for MailOnline written for the DailyMail.com entitled Massive cyber hack that floored Amazon, Twitter, HBO and Reddit could be ‘practice for election day.  The article covers the “how’s” and technical parameters of everything that happened with the attack, and it is approximately 26 pages long.  We will be utilizing some of the key tenets of that article here; however, the purpose for this one is not to examine the specific attack.  Please refer to Miss Plummer’s article for those specifics and a good primer on the intricacies of a cyberattack.
In this instance the attack was conducted against Dyn, an infrastructure maintenance DNS based in New Hampshire that enables users to connect to the servers of various websites.  Dyn has stated that tens of millions of IP (Internet Provider) addresses were used in the cyberattack to effect chaos.  Dyn was quoted as saying the breach was “a very sophisticated and complex attack.”  To understand what Dyn does is critical to the rest of this article.
DNS firms serve the critical function of converting IP addresses, in the form of a number, into the various domain names found on the websites that users link to.  Picture it as being a “baseball team manager” who manages the players and organizes them into an effective team.  Of course this analogy is small-scale, as this cyberattack effected thousands of different websites.
The point is this:  just one DNS was taken down, effectively disrupting thousands of websites and millions of users.
Here is an excerpt from the aforementioned article that gives some basic insight.
 “…online criminals have once again gone after a significant site with a DDoS attack.  Not Twitter, or other popular and equally affected sites such as Spotify, Reddit, Github and SoundCloud though, but rather DNS provider Dyn.  And that highlights a problem – any company running its own website may well have its own technology in place to mitigate DDoS attacks, but it’s all for nought if the DNS provider itself is not applying a sufficient enough level of protection to its own servers and data centres.” 
Lee Munson, security researcher for Comparitech.com.
Basically what Mr. Munson is saying is it is the DNS provider that is the key to such rampant chaos in the cyberattack.  The DNS’s are “soft” targets in themselves.  Following the Alinsky principle out of “Rules for Radicals,” Obama, Clinton and their ilk don’t have to collapse the websites: they just have to take down the DNS’s…throughout the entire economy.  They don’t have to convince all the Union workers…just the Union Rep and the leadership…then the rest will follow.  They’ll take out the “big dogs” (the DNS’s) and then all of the “little dogs” (the websites) will crash and burn.
Not to mention the fact that they can set us up by taking down the computer network in the Department of Defense…blaming it on foreign hackers from nations such as North Korea, China, or Russia.  Then it’s “open season” on the U.S., taken down effectively from within and blamed on foreign nations. 
Here is a partial list taken from that article of the more well-known sites out of thousands that were affected by the cyberattack:
WHO WAS HIT BY THE ATTACK? 
READ MORE...