Obama orders military to carry out cyber attacks against the US and foreign states

Obama orders military to carry out cyber attacks against the US and foreign states.
Posted by PCCorruption, World newsThursday, August 16th, 2012

In June of 2010 Mr Obama (alias for Barry Soetoro) ordered the Pentagon to create a special online unit to carry out cyber attacks against the United States people and foreign states. NETCOM lead by Maj. Gen. Alan R. Lynn conducts cyberspace operations in support of full spectrum operations to ensure U.S. and allied freedom of action in cyberspace, and to deny the same to adversaries. US soldiers have now begun a new type of geopolitical warfare – cyber warfare.
US soldiers from NETCOM / Cyber Command are now ordered to gain unauthorized access to digital systems for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Operations may also be carried out in a manner that does not require gaining unauthorized access, such as by causing denial-of-service (DOS) attacks on websites. Their attacks are not limited to foreign computer systems. They have been illegally authorized by Obama to spy on Americans and to misappropriate American citizens’ assets or sensitive information, to corrupt media, corporate and technical data, and cause operational disruptions to trade, commerce, banking, transportation, water systems, and energy systems including nuclear reactors – future false flag attacks.
No business, personal or government systems are exempt from cyber attacks by NETCOM. Not even the computers of the US Congress and House of Representatives. The US is, without a doubt, under martial law. The US military now patrol and carry out military operations inside the continental United States and against US citizens. A direct violation of the Posse Comitatus Act.
SEC. 15. From and after the passage of this act it shall not be lawful to employ any part of the Army of the United States, as a posse comitatus, or otherwise, for the purpose of executing the laws, except in such cases and under such circumstances as such employment of said force may be expressly authorized by the Constitution or by act of Congress; and no money appropriated by this act shall be used to pay any of the expenses incurred in the employment of any troops in violation of this section And any person willfully violating the provisions of this section shall be deemed guilty of a misdemeanor and on conviction thereof shall be punished by fine not exceeding ten thousand dollars or imprisonment not exceeding two years or by both such fine and imprisonment.
10 U.S.C. § 375. Restriction on direct participation by military personnel
The Secretary of Defense shall prescribe such regulations as may be necessary to ensure that any activity (including the provision of any equipment or facility or the assignment or detail of any personnel) under this chapter does not include or permit direct participation by a member of the Army, Navy, Air Force, or Marine Corps in a search, seizure, arrest, or other similar activity unless participation in such activity by such member is otherwise authorized by law.
Gaining unauthorized access to digital systems for purposes of misappropriating assets or sensitive information, corrupting data, or causing operational disruption is direct participation by a member of the Army, Navy, Air Force, or Marine Corps in a search, seizure, arrest, or other similar activity. Obama does not have legislative nor judicial authority so NETCOM is acting illegally.
So how do you know if you’ve been hacked by NETCOM? Have you network people look for an IP address like this in your server’s log – 55.138.87.109 – United States Army Information Systems Command. NETCOM uses the IP range 55.0.0.0 – 55.255.255.255. To block any or further attacks IP Ban the 55.0.0.0 – 55.255.255.255 NetRange or simply create a .htaccess file in the root of your server and add 55.0.0.0/8 to it. .htaccess can be created simply by entering (copy and paste the following) ;
order allow,deny
deny from 55.0.0.0/8
allow from all
How to surf the Internet without being hacked by the US.
Any network or computer literate person can easily counter hack the US hacking of their corporate, personal or government computer system. If you’ve been hacked you are a victim of a military coordinated attack. Any and all military operations against civilians are illegal. In self-defense, use the US government’s own computer systems against them. How? Download an iso image of a Linux live CD. For example – Linux Mint.
1. Download the LiveCD ISO image from http://linuxmint.com
2. Burn the image onto a CD or DVD. Tutorial: How To Burn A LiveCD.
3. Boot your computer from the CD you just created. Use a separate computer system to install the Linux Live CD to.
4. Double-click the “Install Linux Mint” launcher on the desktop and follow the steps shown in the dialog boxes.
When it asks for your full name, a name for your computer, your login credentials (username and password) use a US government domain name like defense.gov or nasa.gov or dhs.gov or arcyber.army.mil or whitehouse.gov or cia.gov
So, for Full Name enter defense.gov or nasa.gov or dhs.gov or arcyber.army.mil or whitehouse.gov or cia.gov
name your computer defense.gov or nasa.gov or dhs.gov or arcyber.army.mil or whitehouse.gov or cia.gov or exactly the same as what you entered previously as full name. For username enter Obama or Petraeus or Panetta or Lynn – you get the idea. For password use anything you like but make it extremely difficult to crack.
When you enter the computer name as defense.gov or nasa.gov or dhs.gov or arcyber.army.mil or whitehouse.gov or cia.gov it will probably say computer name already exists. Continue with the install anyway. When the install is complete reboot your computer. Login and begin surfing the Internet without worry of being spied on, hacked, or your personal or business data being misappropriated or mined data being used against you in trumped up charges. Using this system also corrupts their data – majorly.
If you are a foreign government and are feed up with the US attacks install a Linux Server Live CD instead of a desktop version. Have your network people use the US government’s computer names just as stated above. Then once the install is complete have your network people set up a mail server. Set up a catchall (default) email address. i.e [email protected] or [email protected] or [email protected] or [email protected]
The default or catch-all address is the one to which all e-mails, addressed to a non-available or mistakenly entered email account at your domain name are routed to. In case someone sends an email to [email protected] and you do not have such mailbox, the catch-all option will forward this email to your default email address.
Because you installed the Linux server using the computer name arcyber.army.mil (or your choice) any and all email for arcyber.army.mil will be forwarded to your default or catchall email address.
You cloned the US government website and the Internet is stupid. It can only do what it is instructed to do. It doesn’t know what to do with the emails until someone tells it what to do. It can’t determine on its own which [email protected] is the right email address so it sends the email to all [email protected] addresses – whether or not any are clones. And, since you’ve set up a default or catchall email address any and all emails to arcyber.army.mil (or your choice) will be forwarded to you. You’d be surprise how many US government emails will be inadvertently forwarded to you - i.e. sensitive files, including CCTV files of the 9/11 Pentagon attack, warning that 9/11 was imminent, underground nuclear detonation reports at ground zero New York City New York September 11, 2001, locations to all DUMB (Deep Underground Military Bases), the president’s itinerary, troop movement, preparations for war of aggression, funding for mercenary terrorist acts in Libya and Syria, election rigging, White House security scheduling, Clinton’s offshore drug trafficking account numbers, …

Aug 17, 2012

Copyright © 2017 SteveQuayle.com

 

Terms   |  Privacy

site index