OUT OF MIND
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Latest topics
» Is it possible to apply positive + in favor Newton III Motion Law as a dynamic system in a motor engine
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptySat Mar 23, 2024 11:33 pm by globalturbo

» Meta 1 Coin Scam Update - Robert Dunlop Arrested
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptySat Mar 23, 2024 12:14 am by RamblerNash

» As We Navigate Debs Passing
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Jan 08, 2024 6:18 pm by Ponee

» 10/7 — Much More Dangerous & Diabolical Than Anyone Knows
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyThu Nov 02, 2023 8:30 pm by KennyL

» Sundays and Deb.....
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptySun Oct 01, 2023 9:11 pm by NanneeRose

» African Official Exposes Bill Gates’ Depopulation Agenda: ‘My Country Is Not Your Laboratory’
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyThu Sep 21, 2023 4:39 am by NanneeRose

» DEBS HEALTH
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptySun Sep 03, 2023 10:23 am by ANENRO

» Attorney Reveals the “Exculpatory” Evidence Jack Smith Possesses that Exonerates President Trump
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyTue Aug 29, 2023 10:48 am by ANENRO

» Update From Site Owner to Members & Guests
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyTue Aug 29, 2023 10:47 am by ANENRO

» New global internet censorship began today
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 21, 2023 9:25 am by NanneeRose

» Alienated from reality
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 07, 2023 4:29 pm by PurpleSkyz

» Why does Russia now believe that Covid-19 was a US-created bioweapon?
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 07, 2023 4:27 pm by PurpleSkyz

»  Man reports history of interaction with seemingly intelligent orbs
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 07, 2023 3:34 pm by PurpleSkyz

» Western reactions to the controversial Benin Bronzes
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 07, 2023 3:29 pm by PurpleSkyz

» India unveils first images from Moon mission
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 07, 2023 3:27 pm by PurpleSkyz

» Scientists achieve nuclear fusion net energy gain for second time
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 07, 2023 3:25 pm by PurpleSkyz

» Putin Signals 5G Ban
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 07, 2023 3:07 pm by PurpleSkyz

» “Texas Student Dies in Car Accident — Discovers Life after Death”
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 07, 2023 3:05 pm by PurpleSkyz

» The hidden history taught by secret societies
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 07, 2023 3:03 pm by PurpleSkyz

» Vaccines and SIDS (Crib Death)
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 07, 2023 3:00 pm by PurpleSkyz

» Sun blasts out highest-energy radiation ever recorded, raising questions for solar physics
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptyMon Aug 07, 2023 2:29 pm by PurpleSkyz

» Why you should be eating more porcini mushrooms
Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D EmptySun Aug 06, 2023 10:38 am by PurpleSkyz


You are not connected. Please login or register

Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D

Go down  Message [Page 1 of 1]

PurpleSkyz

PurpleSkyz
Admin

REALPOLITIK: Are Two Playing the Covert-Op Game? – By Joseph P Farrell Ph.D

The Smoking Man 

Source – gizadeathstar.com
“…. Then-French President Francois Mitterrand personally informed President Reagan of the existence of this mole, and shared the KGB shopping list, with Reagan shortly after Mitterrand’s election. The Reagan administration then used this list to “give the Soviets” what they wanted, allowing them to steal software that contained a backdoor. A few months later, this software was allegedly used to cause a massive explosion in – you guessed it – a Soviet natural gas pipeline, an explosion so massive that it was visible from space”
ARE TWO PLAYING THE COVERT OPS GAME?
If you’re a regular reader here, of even if you’re relatively new to this site, I suppose today it would be helpful to reiterate a hypothesis that I’ve held for some time, and judging by the amount of commentary and emails I’ve received regarding the corona virus story, I think it is fair to say that many if not most of you share that hypothesis. That hypothesis is that there is some kind of covert warfare – a covert “mafia” war – being waged right before our eyes, but it remains hidden because so much of it appears in the guise of “accidents” or “acts of nature”, or, if it is reported, is reported as an isolated incident of “malware” or a computer glitch ex machina. In a world where technology has now capable of manipulating weather or simulating earthquakes, the epistemological problem of analyzing events is compounded; one is left to argue or analyze as best as one might, but is never able to advance from hypothesis to theory; we’re all reading tea leaves. Inevitably, one confronts a kind of individual who would rather maintain the simplest theory – usually with invocations of the typically misunderstood name of Ockham lifted wildly out of the theological context in which he formulated his celebrated razor – rather than entertain more complex notions covert warfare and factional infighting and so on.
With that caveat on the record, however, I am going to apply my hypothesis – hopefully with a bit of intriguing parallelism – to a very unusual and seemingly not very significant little story shared by G.B.:
A US gas pipeline operator was infected by malware—your questions answered @ https://arstechnica.com/information-technology/2020/02/a-us-gas-pipeline-operator-was-infected-by-malware-your-questions-answered/
Here’s the essence of the story:
Tuesday’s news that a ransomware infection shut down a US pipeline operator for two days has generated no shortage of questions, not to mention a near-endless stream of tweets.
Some observers and arm-chair incident responders consider the event to be extremely serious. That’s because the debilitating malware spread from the unnamed company’s IT network—where email, accounting, and other business is conducted—to the company’s operational technology, or OT, network, which automatically monitors and controls critical operations carried out by physical equipment that can create catastrophic accidents when things go wrong.
Others said the reaction to the incident was overblown. They noted that, per the advisory issued on Tuesday, the threat actor never obtained the ability to control or manipulate operations, that the plant never lost control of its operations, and that facility engineers deliberately shut down operations in a controlled manner. This latter group also cited evidence that the infection of the plant’s industrial control systems, or ICS, network appeared to be unintentional on the part of the attackers.
Details are frustratingly scarce. According to an advisory published by the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, or CISA, the ransomware infected an unnamed natural gas compression facility. The attack started with a malicious link in a phishing email that allowed attackers to obtain initial access to the organization’s information technology (IT) network and later pivot to the company’s OT network. Eventually, both the IT and OT networks were infected with what the advisory described as “commodity ransomware.”
The infection of the OT network caused engineers to lose access to several automated resources that read and aggregate real-time operational data from equipment inside the facility’s compression operations. These resources included human machine interfaces, or HMIs, data historians, and polling servers. The loss of these resources resulted in a partial “loss of view” for engineers.
Facility personnel responded by implementing a “deliberate and controlled shutdown to operations” that lasted about two days. Compression facilities in other geographic locations that were connected to the hacked facility were also shut down, causing the entire pipeline to be nonoperational for two days. Normal operations resumed after that.
In other words: remain calm, all is under control, nothing to see here, move along.
But I suspect there’s another story here, beyond that even implied by the article itself that the malware infection caused a shut down of natural gas compression plants for a couple of days. If one applies my “covert operations” template to interpretation of that outage, then at the minimum we’re looking at a possible form of economic “dislocation warfare”. There is I suspect a deeper possible story.
In my book Hidden Finance, Rogue Networks, and Secret Sorcery, I reviewed a little-known spy case called the “Farewell” case. “Farewell” was the code name for a mole inside the technical branch of the KGB that was being run by French intelligence during the height of the confrontation between the Reagan Administration and the revolving door of “entities” in the Kremlin in the early 1980s – Chernenko, Andropov, and finally Gorbachev. The “Farewell” case was the mostly highly placed mole inside the Soviet Union that any western power had ever run; so highly placed was “Farewell” that he managed to supply the French security and intelligence services with the KGB’s technology “shopping list” of things it wanted to buy or steal from the West. Then-French President Francois Mitterrand personally informed President Reagan of the existence of this mole, and shared the KGB shopping list, with Reagan shortly after Mitterrand’s election.
The Reagan administration then used this list to “give the Soviets” what they wanted, allowing them to steal software that contained a backdoor. A few months later, this software was allegedly used to cause a massive explosion in – you guessed it – a Soviet natural gas pipeline, an explosion so massive that it was visible from space. At that same time, of course, the PROMIS software scandal was just getting under way, and a number of books, including a novel, Softwar, appeared, outlining how cyber warfare could be conducted against an enemy by using compromised software.
The reaction, inevitably, was that Russia – just a few years ago – decided that for secure internal communications, typewriters (!) were the way to go; meanwhile, both Russia and China established their own cyber-warfare and security departments.
In other words, two can play the covert cyber-warfare operations.
And perhaps, just perhaps, that’s what we’re looking at here. Consider only that this event was being watched by the Department of Homeland security…
See you on the flip side…
Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.
ARE TWO PLAYING THE COVERT OPS GAME?
https://rielpolitik.com/2020/02/24/realpolitik-are-two-playing-the-covert-op-game-by-joseph-p-farrell-ph-d/

Thanks to: https://rielpolitik.com

Back to top  Message [Page 1 of 1]

Permissions in this forum:
You cannot reply to topics in this forum