ed note–as always, a tsunami of important info that every Gentile with a vested interest in his/her own future survival needs to understand about all of this.
Firsto, L&G, it should be recalled that in the months, weeks and days immediately preceding Israel’s terrorist attacks against America on 9/11 that hundreds of Israeli spy rings were detected by US law enforcement and counterespionage agencies. The ‘art students’ seeking to penetrate USGOV offices under the pretext of selling art, kiosks in malls around the country that were staffed by Israeli nationals and of course, the infamous case involving Urban Moving Systems right across the river in New Jersey owned by Dominik Suter that was later deemed by the FBI as a Mossad front.
And of course, the most damning of all, the ‘5 dancing Israelis’ arrested on the morning of 9/11 after being seen by witnesses cheering the destruction of the Twin Towers and who later, after being quietly sent back to Israel by none other than Michael Chertof, went on an Israeli talk show, admitted that they were Mossad and that they had been sent by the Israeli government to ‘document the event’ that took place on 9/11.
Now, the fact that just a few weeks before the Inauguration of DJT as POTUS there is a tsunami of drone sightings across the eastern seaboard of the US, primarily in the New York/New Jersey area, and that the Cybersecurity and Infrastructure Security Agency of the USGOV is telling ‘senior’ officials and politicians to communicate only via encrypted apps/programs should serve as one of those ‘uh oh’ moments similar to those that existed just prior to 9/11.
Now, as far as the fact that it is the Chinese being blamed for the spying, remember–it was the ‘AY-rabs’ who were blamed for the terrorist attacks on 9/11 when in fact, it was the Jews who were primarily behind it all.
Lest we forget, and from none other than Benjamin Netanyahu himself–
The 9/11 terrorist attacks were ‘good’ because they would generate ‘immediate sympathy for Israel’
The U.S. government is urging senior government officials and politicians to ditch phone calls and text messages following intrusions at major American telecommunications companies blamed on Chinese hackers.
Right now.
In written guidance released on Wednesday, the Cybersecurity and Infrastructure Security Agency said ‘individuals who are in senior government or senior political positions’ should ‘immediately review and apply’ a series of best practices around the use of mobile devices.
The first recommendation: ‘Use only end-to-end encrypted communications.’
End-to-end encryption – a data protection technique which aims to make data unreadable by anyone except its sender and its recipient – is baked into various chat apps, including Meta Platforms’ (META.O), opens new tab WhatsApp, Apple’s (AAPL.O), opens new tab iMessage, and the privacy-focused app Signal. Corporate offerings which allow end-to-end encryption also include Microsoft’s (MSFT.O), opens new tab Teams and Zoom Communications’ (ZM.O), opens new tab online meetings.
Neither regular phone calls nor text messages are end-to-end encrypted, which means they can be monitored, either by the telephone companies, law enforcement, or – potentially – hackers who’ve broken into the phone companies’ infrastructure.
That’s what happened in the case of the cyber spies dubbed ‘Salt Typhoon,’ a group that U.S. officials have said is being run by the Chinese government.
Beijing routinely denies allegations of cyberespionage.
Speaking earlier this month, a senior U.S. official said that ‘at least’ eight telecommunications and telecom infrastructure firms in the United States were compromised by the Salt Typhoon hackers and that ‘a large number of Americans’ metadata’ had been stolen in the surveillance sweep.
Last week, Democratic Senator Ben Ray Lujan said the wave of intrusions ‘likely represents the largest telecommunications hack in our nation’s history’ and it’s not clear that American officials have figured out how to defeat the hackers’ spy campaign.
Jeff Greene, CISA’s executive assistant director for cybersecurity, told reporters Wednesday that the investigation remains ongoing and various targeted agencies and people are at different stages of their response.
The Salt Typhoon compromise ‘is part of a broader pattern of PRC activity directed at critical infrastructure,’ Greene said, referring to Chinese-linked cyber operations focused on utilities and other sensitive networks and tracked under the nickname ‘Volt Typhoon.’
‘This is ongoing PRC activity that we need to both prepare for and defend against for the long term,’ Greene said.
Communicating only via end-to-end encryption has long been a recommendation pushed by digital safety experts like those at the Electronic Frontier Foundation, whose senior staff technologist Cooper Quintin welcomed the guidance. Still, he said the idea that the government was steering its own officials away from the regular phone network was worrying.
‘It is a huge indictment of the telecoms that run the nation’s infrastructure,’ he said.
Other recommendations include avoiding text messages based on one-time passwords – like the kind often sent by U.S. banks to verify logins – and using hardware keys, which help protect against a password-stealing technique known as phishing.
Tom Hegel, a threat researcher at cybersecurity company SentinelOne (S.N), opens new tab, echoed Cooper’s endorsement of the CISA guidelines, saying that ‘Chinese actors aren’t the only ones continuing to collect unsecured communications.’
A wide variety of spies and hackers ‘all stand to lose valuable access if their targets adopt these security measures,’ he said.