Since last June, computer hackers have taken down cia.gov (a website defacement that led to the publishing of its member database); compromised the main site of the U.S. Senate (penetration of email); shut down an Atlanta-based website devoted to tracking cybercrime; and launched a major attack on the International Monetary Fund.
The project to control the planet’s population through universal computer ID and tracking systems first began in the minds of high-level planners of America’s super-secretive National Security Agency (NSA), an agency employing thousands of government bureaucrats, intelligence officials, military personnel and technological specialists in a global-wide operation. Its headquarters, closely guarded by U.S. Army security personnel at Fort Meade, Md., is the second largest reconnaissance/intelligence building in the U.S., surpassed only by the Pentagon.
Its mission, broad and all-encompassing, involves war planning, security investigation, classified materials control and management of America’s global spy and intelligence network, including the CIA, State Department and even the White House administration. In the international arena, the NSA is master of all it surveys. Every major foreign intelligence agency and law enforcement bureau is charged with keeping the NSA czars informed at all times of their activities, including the internal security chiefs and justice department heads of every nation in Europe, North/Central/South America and Asia (i.e., France’s intelligence service; Russia’s KGB; Israel’s Mossad: Britain’s MI-6; and Canada’s CSIS). Twenty-four hours a day, the NSA hums along, its giant computer network correlating, deciphering and analyzing data/reports from international banks, the 32 directorates of the U.N., the bowels of secret societies (spec. Masonry), the Vatican curia and various agencies of over 170 nations around the globe.
It has been duly noted by cybercrime observers that “computer dependence is the Western world’s Achilles Heel, and this weakness will ultimately be tested to the full.” A former computer hacker aptly summed it up by stating that “the only secure computer is one that is disconnected from the Internet, turned off, and locked away in a cupboard.” Because occasionally, the hackers even hack each other. Onward Through The Fog.
Wendell E. Carr