Wednesday, August 14, 2019

The Terrorists Among US-Cyber War and Privateers are true the Domestic Terrorists

Source: The Saker

August 14, 2019  |  by George Eliason for The Saker Blog

What are Cyber Privateers and should you be afraid of them? Cyber privateers and cyber bounty hunters are criminals that are not covered under international law as government agents. In reality, this almost nullifies the chance for war to start over any particular hacking or compromised data event.

The problems hired or volunteer contractors create include a projectable legal attribution. You don't have to be able to prove a country was behind a cyber attack or hack as long as you meet certain conditions. You can literally project the blame entirely to a different entity. The legal aspects will be covered in the next article.

It also nullifies the myth cyber privateers/ bounty hunters can use government tools on civilian or otherwise protected classes of people and infrastructure at will. International law doesn't give people hired or volunteering to commit crimes under any auspices a free pass.

This is a new class of terrorism which separates a cowardly criminal element from the victim the same way a remotely detonated explosive would when used at a shopping mall. This criminal activity is spreading at a rate that raises alarm bells especially with the projection of 3 million untrained new hires over the next few years.

In the last article, I introduced you to Jimmy and Gary. After three difficult months of online Youtube training, both of our heroes were ready to take on careers as international men of mystery.

The absolute risk this presents to international peace and security should be obvious regardless of what accepted policy is. Everybody gets to spy or nobody gets to spy is the mantra this generation of Intel managers was brought along with. Most of the tools in the NSA arsenal have their start or at the very least a counterpart that is freeware.

Disgruntled people have access to software that can literally trigger a heart attack for someone with a pacemaker, cause a seizure, or even take control of your car.

More than 70 percent of the Pentagon's Counterintelligence Field Activity: CIFA is staffed by green badge contractors. The majority of personnel at the DIA, the CIA National Clandestine Service, the National Counter Terrorism Center, and more than 80% of the NSA budget goes to private contractors.

All of the agencies are filled with what amounts to day labor. How many of them already have the keys to the barn that potentially starts the 4 Horsemen of the Apocalypse on their way?

State sized tools give emotionally inadequate and politically repulsive people the ability to illegally mimic or ply actions that are inherently governmental in nature. These same disgruntled overpaid groups fill out the do not fly lists. They are putting people on domestic terrorist watch lists. They are deplatforming journalists and people expressing opinions contrary to their employers and taking over social media and opinion for their employers.

The same groups are hacking websites and stealing financial account information. They gain access to bank accounts through phishing exploits and siphon your account dry. One group I am writing about did this to a family member of mine because of the exposure I'm giving. I'll get back to that later in the series.

Over the last five years, I've not only described the role cyber privateers are playing in world affairs, but have been documenting the players and the damage they are causing.

This article will describe the now accepted US cyber policies that were written by cybercriminals to give themselves cover so they can use the American people and people of the world as their own personal cash cow or reservoir. If they don't like you, no need to wonder who gets to pay for that.

The inherent problem with cyber privateers is covered in the job description as well as their rather fanciful notion they are anything but criminals.

Privateers operate as sanctioned pirates. These throwbacks pretend to operate like their 18th century inspirations did. Back in the day, the sponsor country allowed them to make money attacking merchant and military vessels they didn't like but didn’t necessarily want a war with. When mistakes were made, privateers supposedly made reparations to the groups they victimized. They had to identify themselves and offer a remedy for damages.

The 2019 cyber privateer or bounty hunter is under no such compunction. They don't identify themselves and their victims rarely know who hit them. In fact, when they do identify themselves, it's just to gloat. They do it in a setting that implies the message that needs to get across without confessions that would hold up in a court.

If this sounds wordy, cutesy, or alarmist, private contractors have interrupted the power grid in Venezuela and hacked into Iran's nuclear infrastructure. They are penetrating the power grid in Russia. This is an ongoing problem that’s exasperated by the fact legislators rely on the terrorists to draft the laws to protect them from everyone else.

Think of it this way, if Joey, going by the cool hacker name HedCh33z3, decides he doesn't like Latvia, can he disrupt their electrical infrastructure, medical infrastructure, or elections?

The fact is they move in and out of government service so often, they never bother to switch hats or status. Think of it this way, Joey works for the NSA for a week under a subcontractor and picks up a ton of tools to stalk his Ex and sadistically destroy her life piece by piece. This is what happens when people assume the right to government powers without the authority or responsibility to use them.

Are you willing to send your kid to war or go yourself because Joey HedCh33z3's ex-girlfriends family thinks he's a creep and they are from XXX country? Yet, we are now snugly very close to being put in this horrific position by politically and emotionally stunted people.

Privateers are Terrorists

So, where do they get the right to do this? Starting right after September 11, 2001, OSINT and cyber started as a serious money-making cottage industry. In the last article, we closed with the DOD actively hiring cyber Bounty Hunters to hack into foreign countries infrastructure.

This practice didn’t just start yesterday. Since 2001, there have been many attempts to codify US hiring of cyber privateers or bounty hunters into law. What this has done is enshrine it in US cyber-policy. The DOD use of subcontractors says a lot.
• What are cyber bounty hunters and cyber privateers and what do they actually do?
• Work with direct action military subcontractors
• Work for NGOs, corporations, lobby groups
• Work for US government agencies like the FBI, CIA, DIA, DOD, DNI
• Work for political parties and causes
• Work for foreign governments like Ukraine as shown in this series against the interests of the American people
• Work for themselves
They provide Intel through OSINT and hacking. They provide direct action through hacking and Information Operations. Today, they are taking on inherently governmental responsibilities and making decisions they don’t have the authority to make and they make decisions that belong to State agencies.

Who is the enemy?
Who is friendly (or are there really any friends out there)?
Who is a danger and how?
Why are they a danger?
What is their motivation?
What steps will the US need to take to stop them, turn them in a different direction, or make peace with them?
One attempt to legalize this activity is called the Morgan Doctrine.

Please go to The Saker to read the entire article.




No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Who's visiting Abel Danger
view a larger version of the map below at whos.amung.us

You Too can be a CAPTAIN SHERLOCK