***Sony's letter to Congress blaming hackers is part of "a false-flag operation"

Author Topic: ***Sony's letter to Congress blaming hackers is part of "a false-flag operation"  (Read 7746 times)

0 Members and 1 Guest are viewing this topic.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Sony's letter to Congress blaming hackers is part of "a false-flag operation"
By Stephen C. Webster
Thursday, May 5th, 2011 -- 1:07 pm

Sony Computer Entertainment America (SCEA) does not know who stole data from nearly 75 million customer accounts on their PlayStation and Sony Online services, but they claim to have a hunch. In an open letter to members of the U.S. House Subcomittee on Commerce Manufacturing and Trade, the chairman of SCEA claimed that forensic researchers have discovered a file that was "planted" on their systems by hackers.  He told Congress the document only contained a single sentence: Titled "Anonymous," it read, "We are legion."  That is indeed an Anonymous catch-phrase, but it is not entirely clear whether this can be blamed on the group, one of its members or someone trying to make it appear as if they were involved. In a media release pushed through a number of regular Anonymous channels, the group claims they had nothing to do with the attack on PlayStation or the theft of users' credit card data.

"1. Anonymous has never been known to have engaged in credit card theft," they insist.

"2. Many of our corporate and governmental adversaries, on the other hand, have been known to have lied to the public about Anonymous and about their own activities."

"3. To the contrary, Anonymous is an ironically transparent movement that allows reporters in to our operating channels to observe us at work and which has been extraordinarily candid with the press when commenting on our own activities, which is why reporters prefer to talk to us for truthful accounts of the situation rather than go to our degenerate enemies to be lied to.

"4. Whoever broke into Sony's servers to steal the credit card info and left a document blaming Anonymous clearly wanted Anonymous to be blamed for the most significant digital theft in history. No one who is actually associated with our movement would do something that would prompt a massive law enforcement response."

SCEA chairman Kazuo Hirai, however, did not seem too certain. He noted in his letter that at the same time PlayStation was hacked, members of Anonymous had openly declared that they were launching a Distributed Denial of Service (DDoS) attack on the company's website. He claims that may have increased their vulnerability to other attacks -- "all perhaps by design," Hirai speculates. "Whether those who participated in the denial of service attacks were conspirators or whether they were simply duped into providing cover for a very clever thief, we may never know," Hirai admits. "In any case, those who participated in the denial of service attacks should understand that -- whether they knew it or not -- they were aiding in a well planned, well executed, large-scale theft that left not only Sony a victim, but also Sony's many customers around the world."

"A group of standard online thieves would have every reason to frame Anonymous in order to put law enforcement off the track,” Anonymous maintains. In a chat log published by Ars Technica, one member even called Sony's letter to Congress part of "a false-flag op."  "Anyone could leave such a file," user BarrettBrown wrote. "We could break into a server and leave a file saying 'Hai this is opAnon64 please arrest me!' [...] That's the nature of a false flag op".

The orchestration of DDoS attacks, which Anonymous clearly promoted in dozens or even hundreds of instances over the last years, is not always illegal. While many have born the hallmarks of being carried out by massive sub-networks of computers enslaved by malware without the knowledge of their owners, other DDoS attacks have been voluntary, with participants lining up to request a website do what it is made to do: serve pages. These are more akin to a sit-in protest, and some legal experts have suggested they should not be banned.  It was not clear what form of DDoS attack Sony's websites were under at the time of the theft. Anonymous said it was launching the DDoS to protest Sony's pursuit of hacker George "Geohot" Hotz, who figured out how to jailbreak the PlayStation 3 and install user-created software on it.  Although the U.S. government has permitted this sort of activity when it comes to iPhones and other mobile devices, Sony was able to trigger a police SWAT raid on Hotz's home after he publicized in an Internet posting a string of numbers that unlocks the system. Hotz and Sony have since settled the case -- but now it seems another one, of much greater significance, is set to begin in earnest.  The PlayStation Network (PSN) has been down since April 19, when the data theft was discovered. It was still offline at time of this writing. The company told members of Congress it would provide affected users with access to identity theft protection services and give them a free month of access to PSN.

Read SCEA's complete letter to Congress here (PDF).

*Update: An original version of this article said 75 million customers' credit cards were stolen. In fact, that has yet to be determined -- and it was 75 million user accounts, not necessarily 75 million customers.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
I came across this letter in my FF research.

The EU Nuke power regulators were using it in reference to Nuke plant security.  The next day the nuke plant in Syracuse NY had the 'mysterious' auto shut down.
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.


Offline Effie Trinket

  • member
  • Member
  • *
  • Posts: 2,293
I came across this letter in my FF research.

The EU Nuke power regulators were using it in reference to Nuke plant security.  The next day the nuke plant in Syracuse NY had the 'mysterious' auto shut down.
These are some of the actual people involved in the criminal military industrial complex global takeover over all energy systems:


They forced everything into "interoperability", to enable them to control everything.  The same technologies they used to carry out the 9/11 false flag, are literally on every computer system of importance to these real criminal terrorist traitors:


More treason:



Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins

The above word is the foundation that the entire 'order' is based upon.  This is the 'key' to this 'order's' entire organizational system, going as far back to their origins.  All parts SERVE to manage, maintain and progress the 'orders' goals.

This fact is also 'KEY' to defeating this order.  By busting up this network of 'all parts' allowing the 'top of the pyramid' to do it's dirt.
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.


Offline nirosive

  • Member
  • ****
  • Posts: 337
  • Beware The New World Water
Department of Homeland Security Out to Get PSN Hackers


The external intrusion into the PlayStation Network has led to undoubtedly the worst fiasco in the PlayStation universe since the ApocalyPS3 of 2010. If the readers are like us, then we’re all not only sick of the PSN being down but are also sick of all the news surrounding it with little to no positive light at the end of the tunnel. Finally, there finally appears to be some progress in the making thanks to the unveiling of some assuring details.

Despite the word that SCEA is working around the clock with third-party security organizations to bring the network back up for our online gaming pleasure, users were not told what team was conducting the investigations, how large the said company was, and to what extent their resources were spanning out to. However, in a surprising turn of events, the United States Department of Homeland Security revealed that the federal division is lending their hand in assessing the damages of the PSN’s breach. According to Chris Ortman of the DHS:

    The Department of Homeland Security is aware of the recent cyber intrusion to Sony’s PlayStation Network and Qriocity music service. DHS’ U. S. Computer Emergency Readiness Team is working with law enforcement, international partners and Sony to assess the situation.

Also lending their aid straight out of the US legislature is also the Federal Bureau of Investigation. According to one of the officials on the case, Special Agent Darrell Foxworth:

    The FBI is aware of the reports concerning the alleged intrusion into the Sony on line game server and we have been in contact with Sony concerning this matter. We are presently reviewing the available information in an effort to determine the facts and circumstances concerning this alleged criminal activity.

While cabinets of the government are not necessarily hired for situations, the DHS and FBI have justified their involvement on the situation, despite it being an attack on a gaming infrastructure of all things, due to the sheer number of PSN users that may have potentially been affected along with the fact that financial credentials of citizens are on the line. While it definitely is safe to say that the big guns are on the scene, there is no telling with situations in which hackers are involved.


Offline adissenter2

  • Member
  • *****
  • Posts: 2,044
  • Revolt Time

Saudi hackers claim they published Israeli credit card numbers
January 3, 2012 |  4:05 am

REPORTING FROM JERUSALEM -- Prime Minister Benjamin Netanyahu recently increased the amount of money Israelis could spend on Internet goods purchased abroad and imported without paying customs duties. The reason for expanding Israelis' use of EBay and other Web-shopping options was to encourage competitive prices in Israel and make a dent in the cost of living.

But Israelis won't be in a hurry to cyber shop this week, as thousands woke up Tuesday to find their credit card numbers and personal information published online.

Saudi hackers calling themselves Group-XP claimed they broke into a leading Israeli sports website and redirected users to a page where they could download a file containing the sensitive information.

The hackers claimed they published the personal and credit card information of nearly half a million Israelis. After poring over the lists, credit companies said the number was much lower. According to the Bank of Israel, about 15,000 credit cards were compromised.

The credit companies said they quickly blocked the cards and will replace them in coming days.

According to Yoram Hacohen, head of the Israeli Law, Information and Technology Authority -- a relatively new information-protection regulator -- the source of the information is most likely Israeli businesses that didn't sufficiently safeguard customer information.

The hackers may also have merged information from several sources and databases previously breached and published, Hacohen told Israeli radio. 

The credit companies said customers will be reimbursed for any fraudulent purchases made with their cards, as part of the insurance paid for such cases. But the case has raised concerns about information security in Israel, where breaches can expose individuals to identity theft and security risks and the state to cyber terror.

A year ago, Israel had a taste of what a cyber attack on national infrastructure might look like when one of its cellular phone carriers crashed and left nearly a third of the country incommunicado.

The failure was later determined to be a malfunction and not an attack, but it may have helped lead to the establishment a few months later of the National Cyber Directorate, which coordinates the cyber-security efforts of government, national infrastructure and industry.

Israeli websites, including government sites, are frequent targets of hackers, often for political reasons.

Earlier this week, the Foreign Ministry's websites were reportedly hacked. In November, the websites of the Mossad, Israel's spy agency, and the Israel Defense Forces were inaccessible for a time, and others experienced problems for a day.

Israeli officials attributed the crashes to a server glitch rather than an attack, despite a hacker group's threat the day before to protest Israeli policy.
ΜΟΛΩΝ ΛΑΒΕ! Molon Labe! Come and take them!