williambanzai7's picture


Meet the latest boogey monster...




You may have noticed the chatter building up to today's MSM Chinese hacker frenzy. For example, Google's Schmidt said just a few weeks ago that Chinese hackers were the greatest threat to the internet.

Now suddenly, a cyber-security firm (Mandiant: Link) decides to release a very impressive report describing the results of its ongoing investigation of Chinese hacking activities involving a nefarious government building in Shanghai and data vampirism of intellectual property etc. Enter, the MSM propagandistas.

I have little doubt that China is engaged in some form cyber espionage enabled by technology sold to them by American tech companies. I doubt, however, they are trying to spy on each of you.

More importantly, I have no doubt who is.

Did the Chinese create virus called Stuxnet? Are they building a gigantic server farm in some dystopian data bunker deep in a mountain somewhere out west? Are they busy trying to create a data hologram of everything that happens online? Yadda, yadda.

Here is something else I know: 

Electronic Frontier Foundation via Boing Boing--


"Last year, Representatives Rogers and Ruppersberger introduced CISPA, which would create a gaping new exemption to existing privacy law. CISPA would grant companies more power to obtain “threat” information (such as from private communications of users) and to disclose that data to the government without a warrant -- including sending data to the National Security Agency.


This week, CISPA was reintroduced in the House of Representatives. EFF is joining groups like ACLU and Fight for the Future in combating this legislation.


Last year, tens of thousands of concerned individuals used the EFF action center to speak out against overbroad and ineffective cybersecurity proposals. Together, we substantially changed the debate around cybersecurity in the U.S., moving forward a range of privacy-protective amendments and ultimately helping to defeat the Senate bill.


Now we need your help again. Can you send a message to your Representatives asking them to oppose this bill?"



WB7: Coincidence?

"Those Chinese hackers are everywhere, we have to pass another new law for spying on American citizens ordering Chinese food!"

Hey, what do I know.  It's Copernicus' birthday and I'm just a tin hatted fringe low brow ZH moron.




"I got this moron thing that I do, it's called thinking."--George Carlin






Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
monad's picture

That's not what Steve Jobs said...

Zero-risk bias's picture

I see that the youth sporting the covert communications shirt is in possession of a copy of 'young hackers liberation weekly'.

(Free iPhone VPN trial app included)?


NoWayJose's picture

And remember, this is the country that is building nearly all of the computers and electronic gadgets used throughout the world. I have little doubt that they have added some extra goodies to the chips they produce. They do not need to win a shooting war if they win the economic war.

williambanzai7's picture

I'm not a code freak, but I have an imagination. If they are smart enough to track the source of this, I can think of all kinds of things involving Trojan horses and nasty viruses, that could be deployed to counter it.

The question is why have they disclosed this instead of taking the necessary countermeasures. The answer is a combination of they don't want to, they don't want it to blow back on them since they are also in everyone's data underpants and they like boogeymonstering the Proles.

williambanzai7's picture

Oops, now the Boogeyman is Eastern European:

It is only a matter of time before a verified online ID becomes mandatory.

Dewey Cheatum Howe's picture

Reality is it isn't. This shit has been going on for awhile now. Just they allowing more of it to be publicized to make it look like an escalating problem to push the cyber-security agenda.

Phoenix_Rising's picture

You think the obvious idiot false flags to crucify assault weapons were an assault on your critical thinking skills?

Just wait

They are going to make you so scared to even turn on your computer you will awake with sweat running down your face

Full force frontal lobotomy for the O'dumfucks

Obama--It only works on stupid shits

Dewey Cheatum Howe's picture

The Eastern Europeans especially ones tied to the Russian mob have been at it for years doing industrial espionage hacking, stealing credit card numbers and such. It is called earning money....... Chinese have been in the industrial espionage business to for years now. The cyber-security aspect is not paranoid tinfoil hat stuff. The world is getting ready to erupt and they are woefully behind on securing the systems like the electrical grid for example. They are just making more noise about it so they can try for the most draconian security measures possible. The more noise you make the more they will back off (assuming cooler rational heads prevail) until you quiet down. Free speech and influence of public opinion are different issues, ones frankly are more important for US. They are losing the attention of the distracted in the matrix via their control mechanism aka MSM and you can see the concern with the reactions.

Dewey Cheatum Howe's picture

Looks like anonymous is still at it.

"Our reasons for this attack are very simple. You've imprisoned or either censored our people. We will not tolerate things as such," according to a message included in the Anonymous data dump. "Aaron Swartz this is for you, this is for Operation Last Resort," it said.  A spokesman for the State Department didn't immediately return a call seeking a request for comment about the assertion by Anonymous that it had hacked into and released data from one of the agency's databases.

The Anonymous Operation Last Resort campaign was launched in the wake of the suicide of Internet activist Aaron Swartz, who had long suffered from depression, and who was facing a 35-year jail sentence after being arrested in 2011 on hacking charges. Those charges stemmed from Swartz allegedly downloading millions of articles from the JSTOR academic database, in part via a Massachusetts Institute of Technology server closet. In the wake of Swartz's death, many legal experts -- as well as Anonymous -- have called for a reform of the country's computer hacking laws. The Anonymous hacktivist collective announced that for President's Day, it hacked the U.S. State Department.

Under the flag of "Operation Last Resort," the group Monday claimed "we still have our warheads armed" and announced that for "round five" in its attack campaign, it was releasing information gleaned from a State Department database. The data dump -- or dox -- appeared to include work email addresses for over 170 U.S. State Department employees, as well as some biographical details, and to have been pulled from a database entitled "test_hrwg_careers_usa_ctc_com."


As noted by Operation Last Resort, the State Department dox was the fifth round of its attacks made in Swartz's memory. For those keeping score, the group executed three rounds of hacks against U.S. government websites and databases, as well as other entities involved in Swartz's case. That included leaking credentials for 4,000 U.S. banking executives that had been obtained from the Federal Reserve System, hacking and defacing the U.S. Sentencing Commission website, and hacking MIT. The group appeared to fail in its fourth bid, however, which was to interrupt the live stream of President Obama's State of the Union address last week.

Are the Anonymous attacks just publicity for the reform of computer crime laws that the group has been demanding? In fact, the attacks appear to have been more damaging than simple defacements or database dumps. Indeed, more than a month after Anonymous launched its attack against the U.S. Sentencing Commission's website, the site appears to remain hobbled, and features only a single "under construction" page, which displays key agency phone numbers, a "save the date" note for a national training seminar, and a link to an external U.S. government website for comment on "Federal Register Notice of Proposed 2013 Amendments to Federal Sentencing Guidelines and Request for Public Comment."

Furthermore, when the agency needed to distribute a major new report on federal sentencing practices that stretched to thousands of pages, it had to find someone else to distribute the report online, reported The Wall Street Journal. The agency reached out to Ohio State University law professor Douglas A. Berman, who posted it on his website.

"I would like to believe our government is functional enough to find some other way to get this out officially," Berman told the Journal. "I don't want to be the only reporter of record for all this material." Currently, however, the commission's single website page currently says that anyone inquiring into the report should contact the agency's office of public affairs, by telephone.

Anonymous, in a separate effort, also claimed Monday to have doxed the investment banking firm George K. Baum & Company by releasing copies of some customer records via ZeroBin. That information appears to include email addresses and account numbers for over 150 customers. Why hack that firm? Via Twitter, Anonymous claimed that the investment bank had ties to private intelligence firm Strategic Forecasting Inc., better known as Stratfor, which was reportedly hacked in 2011 by members of LulzSec and Anonymous. Authorities have accused alleged LulzSec participant Jeremy Hammond of masterminding the Stratfor hack, among other crimes. If convicted of all charges, Hammond faces life in prison. Anonymous also defaced the George K. Burn website, uploading a page that read: "We also know about your finances here Government of the United States ... Are u sure you want to continue this game?" The page was removed from the website by Tuesday.

Of course, Anonymous isn't the only hacktivist group with designs on American institutions. Notably, the Izz ad-Din al-Qassam Cyber Fighters have also threatened to resume their campaign of U.S. banking website disruptions. "We had warned formerly in the event that the offensive films wouldn't remove, we will be forced to resume Operation Ababil," said a Pastebin post uploaded Tuesday.

The Muslim group's distributed denial-of-service (DDoS) attacks against banks were launched last year, supposedly in retaliation for the uploading to YouTube of a copy of a film that mocks the founder of Islam. To date, various copies of the film have amassed tens of millions of hits on YouTube, although the originally uploaded film was removed from the site last month, apparently by the filmmaker. At the time, the al-Qassam Cyber Fighters claimed partial victory in their campaign to rid the Internet of the film, but said it was still holding the U.S. government responsible for excising the other copies.

The group repeated those demands in its Tuesday missive. "We now warn you seriously that remove the copies of the film and don't make much more trouble for yourselves and online users of the banks, there is not much time remaining," it said.

Dewey Cheatum Howe's picture

And as I said in the past Obama don't negotiate when he gets his nose tweeked.

In his State of the Union address, Obama announced that he had signed an Executive Order on cyber security. He cited the “growing threat from cyber-attacks” as the reason behind the signing, adding that America must face the rapidly growing threat.

According to the order, “cyber threats” will be defined as “website defacement, espionage, theft of intellectual property, denial of service attacks, and destructive malware,” the White House told The Verge.

Under those guidelines, all of Operation Last Resort’s actions would be considered “cyber threats.”



Along with the attack, the group warned that it still has possession of “warheads” – key codes to unlock encrypted files named after the nine Supreme Court justices, which allegedly contain highly sensitive government information. The files were widely distributed January 25 when Anonymous hacked the US Sentencing Commission website.

This “round five” of “Operation Last Resort” refers to three previous #OpLastResort hacks on the property and databases of the US government, as well as one recently failed threat to interrupt the web broadcast of President Barack Obama’s State of the Union address last week.


You better have some good shit in those files, or else the torture ain't gonna be worth it for all the effort. I also hope you got those keys well distributed just in case.

williambanzai7's picture

No teaser?

Is this the best you can do?

Creepy Lurker's picture

It's the first blog of this type I've seen in Ingrish. (But then, I don't get out much.) LOL

nmewn's picture

Sorry, totaly OT...but its Biden so you know it has to be

"He said he has advised wife Jill that if she needs to protect herself, “put that double-barrel shotgun and fire two blasts outside the house. I promise you, whoever is coming in is not going to.”

So, what our super smart-power Vice President is advising his wife to do is, empty the gun into the air, preferrably out on the balcony or sumpin. You know, instead of into the chest of whoever is trying to enter the house after killing off the Secret Service detail guarding the house.

Fucking brilliant Joe.

steveo77's picture

Yep I saw that too, and laughed at the absurdity.

Or if you hear a noise outside, do you just fire through the door, assuming you dont got no balcony.     I guess if you are elite you got balcony, and baloney

nmewn's picture

I did too...LMAO!...almost had to pull to the side of the road I was laughing so hard.

The hysterical thing about it is, he was trying to make a case for why no one needs the UglyEvilBlackGun™ with a large capacity ammo mag...and in the process of doing it, made THE strongest case yet FOR owning one...if Jill has a UglyEvilBlackGun™ and follows his stupid advice, firing "two shots outside" into the air...and it doesn't work, she's still got 28 left to use on the people who just broke in ;-)

It was an incredible display of ole Joe's double barrel mind rambling in search of a logical thought or cogent

besnook's picture

with all due irony...all hail red china! savior(and second coming) of the west!

inevitablecollapse's picture

89 56 82 59 01 05 60 57 36 75 12 42 17 75 00 10 88 06 65 49 48 92 62 04

kaiserhoff's picture

Ve need deeversions, Commander Cody..., deeversions.  Ya?

Fix It Again Timmy's picture

In Vietnam, I got presented a bunch of medals during a ceremony; when it was done, I walked over to the nearest 55-gal. trash container and threw them in... Couldn't buy me then [it was the army or prison], can't buy be now....

Careless Whisper's picture

Of course the Chinese Army is hacking in to large Corpoations' computers to steal proprietary information, why wouldn't they?

But, it's up to those Companies to defend themselves, without taxpayer assistance.

williambanzai7's picture

This occurred to me. They all have flimsy firewalls and mobile gateways designed for idiot employees sitting in motel rooms.

How is the US Gov going to remediate that?

Phoenix_Rising's picture

Kind of like a 13 YO  harvesting credit card numbers in Target's parking lots....

This whole cyber crime thing is hilarious



Phoenix_Rising's picture

If Corporation's can't protect their data, they shouldn't have any data.

This whole thing is so overblown

They want your internet freedom and your guns

Hmmm wonder why?

steveo77's picture

Yep, that was the first thought after that China story was prominently pimped out.

steveo77's picture

Yep, that was the first thought after that China story was prominently pimped out.

Dewey Cheatum Howe's picture

And in related news the desensitization of killing other human beings by law enforcement and military continues. First it is turning killing into a video game aka drones now this.

What if I told you police in your town could desensitize themselves to the idea of shooting an (armed) child, pregnant woman, or young mother, for just a couple of bucks? The "No More Hesitation" series from Law Enforcement Targets Inc. offers exactly that. For less than 99 cents per target, police can shoot at real-life images "designed to give officers the experience of dealing with deadly force shooting scenarios with subjects that are not the norm during training."

The series contains seven targets in all, titled Pregnant Woman, Older Man 1, Older Man 2, Older Woman, Young Mother, Young Girl, and Little Brother. Each of the depicted subjects is armed.

Now read the company's response

"The subjects in NMH targets were chosen in order to give officers the experience of dealing with deadly force shooting scenarios with subjects that are not the norm during training. I found while speaking with officers and trainers in the law enforcement community that there is a hesitation on the part of cops when deadly force is required on subjects with atypical age, frailty or condition (one officer explaining that he enlarged photos of his own kids to use as targets so that he would not be caught off guard with such a drastically new experience while on duty). This hesitation time may be only seconds but that is not acceptable when officers are losing their lives in these same situations. The goal of NMH is to break that stereotype on the range, regardless of how slim the chances are of encountering a real life scenario that involves a child, pregnant woman, etc. If that initial hesitation time can be cut down due to range experience, the officer and community are better served."


the grateful unemployed's picture

The marines were training using live tissue exercises. They released a number of barnyard animals, then blew them up, and shot them up, and let the medics treat their wounds to get experience. The press got to them and they stopped [i think]...

Dewey Cheatum Howe's picture

There is still a difference between shooting at animals and a person. That doesn't desensitize you from shooting another human being. This on the other hand is using pyschological reinforcement that it is okay to shoot children and pregnant women. It erodes at our basic morality in how we view people by treating them as threats. It is just fucking wrong simple as that.

the grateful unemployed's picture

all serial killers have one thing in common, they tortured animals when they were children. not every kid who tortures an animal becomes a serial killer, but almost all of them have that trait. if you want to be desensitized watch The Walking Dead, which encourages to empathize with survivors who have to designate human beings as target practice. i see your point, the problem is way bigger

Conax's picture

That 'walking dead' show is the most horrific thing I've ever seen them put on tv in prime time.

Heads coming apart, casual murders with no more thought than swatting a fly. Sure, they're supposed to be zombies, but the visuals speak for themselves.

A very evil thing to show juveniles and children every night.  There is an agenda behind it.

bilejones's picture

The themes in current TV shows illustrate just what the agenda is.

1. A plethora of cop shows, the CSI's, Criminal Minds, Castle, Mentalist etc, where the unfailing message is how the astonishingly bright morally superior hero's of the State sacrifice themselves for the unworthy peasants who'd all be slaughtered otherwise.

2. Reality shows where the goal is the normalization of deviant of criminal behavior.

3. The supernaturals, Zombies, vampires werewolves: There are forces out there that are beyond your comprehension or control and can do with you what they will. You are helpless.

You are being prepped, and not for something good.


Dewey Cheatum Howe's picture

Maybe I am wrong on the animal thing, I'm no psychologist, that animal thing at least to me seems more about medics being able to operate on damaged live tissue in a combat scenario than reinforcing killing of other human beings. Some of those training scenarios can be quite gruesome with actors faking being soldiers with missing limbs due to real time fake bombs going off and such. But the scenarios are more about medics being able to save lives in a scenario like that.

the grateful unemployed's picture

you can always rationalize this behavior in the cause of progress. liberte fraternite egalite, and lets all go down to the square and watch them put a few heads through the guillotine. so i've come to doubt progress and the potus who recommends it...

the grateful unemployed's picture

Bill Clinton caught a lot of grief after US warplanes bombed the Chinese embassy in Belgrade during the Bosnian conflict. China and Russia vetoed the NATO action in the UN. Then Bin Ladens training camp in Afghanistan wasn't too far from Bejing. More insidiious than American tech companies helping the Chinese jail dissidents who use the internet, is not data spying, but scrubbing. Information is routinely scrubbed to present a santized view of events. Even Wikipedia isn't above it, what you read today, might not be there tomorrow. The government doesn't need to imprison dissidents, it just wipes out all traces they ever existed. In the print age they made copies of things, so historians could dig around and find the truth. The consumer audience has two responses to government policy directed through an entertainment system (MSM). One is to cheer loudly the other is to ignore. No one ever draws a boo, or a protest (Bush used to put them in Free Speech Zones, miles away from where he was going to speak). This is the price you pay for access to free information, the information is disguised, altered, and tossed aside. Bon apetite.. 

tip e. canoe's picture


excellent work Bill.   saw the headline on PuffHo this morning & immediately thought the same.   this shit's becoming so obvious, it's beginning not even to be funny any longer.

just sad.   very sad.

shovelhead's picture

We need all your data to keep it safe from the Chinese.

Tell your Congressmen to support CISPA.


OpenThePodBayDoorHAL's picture

All of your base...base...base

Are belong to us...Us...Us

All of your base are belong to us

Klazy Plick's picture

Ha Ha, I'm committing a thought crime.  Come and get me coppers. Top of the world, ma!

Dewey Cheatum Howe's picture

Next up on cyber warfare. Trolling message boards and facebook.

One use that's confirmed, however, is the manipulation of social media through the use of fake online "personas" managed by the military. Recently the US Air Force had solicited private sector vendors for something called "persona management software." Such a technology would allow single individuals to command virtual armies of fake, digital "people" across numerous social media portals.

These "personas" were to have detailed, fictionalized backgrounds, to make them believable to outside observers, and a sophisticated identity protection service was to back them up, preventing suspicious readers from uncovering the real person behind the account. They even worked out ways to game geolocating services, so these "personas" could be virtually inserted anywhere in the world, providing ostensibly live commentary on real events, even while the operator was not really present.

When Raw Story first reported on the contract for this software, it was unclear what the Air Force wanted with it or even if it had been acquired. The potential for misuse, however, was abundantly clear.

A fake virtual army of people could be used to help create the impression of consensus opinion in online comment threads, or manipulate social media to the point where valuable stories are suppressed.

Ultimately, this can have the effect of causing a net change to the public's opinions and understanding of key world events.

monad's picture

Congrats you just outed AnAnonymous as a closet global nazi.

Phoenix_Rising's picture

Joke or not????


RB: First of all, two days after the inauguration, at exactly 7:00 a.m. on January 23, something called “the Cyber-Warriors for Obama Project” was activated. I heard about this the week after the election, but only saw a hardcopy draft in late December. From what I was told, I believe this is a project that is being paid for through funds from Obama’s political corporation, the 501(c)4 Organizing for Obama, I believe it’s called. I can’t be sure, but that’s what I was told.

At that time, I was shown a white, three-ring binder with Obama’s circular campaign logo imprinted on the outside of the binder with the name “Cyber-Warriors for Obama” printed in blue across the top. Inside were the names and e-mail addresses of 3,575 “cyber assets,” or “warriors,” listed in alphabetical order under about a dozen or so “team leaders.” From a separate sheet I was shown, most of these “assets” are being paid just over minimum wage, but as I understand it, they work from home and have no overhead. I believe there are about two dozen supervisors who make substantially more.

Now I only had the binder for a minute, and could not take it from the room I was in, so this is strictly from memory.

It was tabbed, and one section with the word “targets” had a list of religious web sites, web sites I recognized as Christian. Another section was a listing of conservative Internet sites. There was another tab with the label “problem sites” that seemed quite extensive. I looked at that section, and it was broken down further into “birther” sites, “pro-gun” sites, “anti-abortion” sites, just to name a few.

There was also a section of the usual news sites, like CNN, ABC, you know. Numerous e-mail addresses were conspicuous under each news organization, which also included Fox… [unintelligible]. I figured you were going to ask.

The first page of the binder had bullet points labeled “objectives” and instructions for the cyber-assets. There was also a very detailed non-disclosure agreement with the word “DRAFT” typed in big, light grey letters across the body of the two-page agreement. The agreement and the instructions were typed on white paper with a warning, printed in red on each page, that the document was not to be copied or disseminated.

tip e. canoe's picture

wouldn't be surprised.

got a link tho?