informationliberation
The news you're not supposed to know...




An Introduction to Austrian Economics: Understand Economics, Understand Everything
The Century of the Self: The Untold History of Controlling the Masses Through the Manipulation of Unconscious Desires
The Disappearing Male: From Virility to Sterility

The Obama Deception: The Mask Comes Off
Operation Gladio: The Hidden History of U.S. Sponsored False Flag Terrorism in EuropeThe New American Century: The Untold History of The Project for the New American Century
(more)
Article posted Sep 14 2009, 12:15 PM Category: Commentary Source: Infowars Print

Internet Security Software Company Says 9/11 Searches Infected with Malware

Kurt Nimmo

Prior to the eighth anniversary of 9/11, researchers at Trend Micro, an anti-virus software company, warned on their blog that Google searches of the term “September 11″ lead to “rogue AV malware.” Malware, short for malicious software, is software designed to infiltrate a computer without the owner’s knowing it. Malware includes computer viruses, worms, trojan horses, rootkits, spyware, misleading adware, crimeware and other malicious and unwanted software.

“It should come as no surprise that the Pentagon would aggressively attack the ‘information highway’ in their attempt to achieve dominance in information warfare.”

Trend Micro’s suggestion? People should rely on “reputable news agencies” for their information on 9/11 — you know, the same corporate media “sources” that spread the official fairy tale generated by the government and its hand-picked whitewash commission of insiders. After its release, the commission report was questioned by highly respected university professors, over 50 senior government officials, medical professionals, victim family members, over 200 pilots and aviation professionals, hundreds of architects and engineers, military officers, senior Republican appointees, federal engineers and scientists, and even members of the commission itself.

As with most malware, the perpetrators behind the TROJ_FAKEAV.BOH virus are unknown. The obvious question is who stands to gain from this exploit? If the creators of this particular malware wanted to spread their virus far and wide, they would likely use a more popular search term — for instance the name of a celebrity or popular television show.

Excuse my paranoia, but the obvious culprit here is the government, not a band of rogue hackers and virus programmers. The government — in league with the Mockingbird corporate media — have turned somersaults in a tireless effort to debunk and discredit the 9/11 truth movement and derail any attempt to initiated a new and independent investigation. “The people behind FAKEAV still show no sign of slowing down,” writes Jessa De La Torre, threat response engineer for Trend Micro — and they won’t until they scare everybody away from investigating 9/11.

Rumsfeld’s Pentagon unleashed a “shadow war” of covert special-forces computer and internet operations soon after 9/11. “But unlike rebellious teenagers sitting at their bedroom computers, these hackers work for intelligence agencies and have advanced training in computer science, math and cryptology,” the Montreal Gazette reported in October, 2001. More recently, General Dynamics Corp., Lockheed Martin Corp., CACI International Inc., Northrop Grumman Corp., and Raytheon Co. competed for “cyber warfare contracts as the Obama administration prepares to spend billions to obtain cyber warfare capabilities to outperform the Chinese and Russians,” according to Washington Technology.

Free exchange of information, according to the Pentagon, is a threat. “The Pentagon’s Information Operations Roadmap is blunt about the fact that an internet, with the potential for free speech, is in direct opposition to their goals. The internet needs to be dealt with as if it were an enemy ‘weapons system,’” writes Brent Jessop. “It should come as no surprise that the Pentagon would aggressively attack the ‘information highway’ in their attempt to achieve dominance in information warfare. Donald Rumsfeld’s involvement in the Project for a New American Century sheds more light on the need and desire to control information.” The PNAC document, Rebuilding America’s Defenses, states: “It is now commonly understood that information and other new technologies… are creating a dynamic that may threaten America’s ability to exercise its dominant military power.”

Last year, according to Wired, the U.S. Special Operations Command suggested “clandestinely recruiting or hiring prominent bloggers” to fight against the enemy. The 2006 report for the Joint Special Operations University, “Blogs and Military Information Strategy,” suggested co-opting bloggers, or even putting them on the payroll. “Hiring a block of bloggers to verbally attack a specific person or promote a specific message may be worth considering,” James Kinniburgh and Dororthy Denning wrote.

The effort was a follow-up to a Pentagon program that worked “with a carefully culled list of military analysts, bloggers, and others who can be counted on to parrot the Bush Administration's line on national security issues,” Ken Silverstein wrote for Harpers.

Earlier this year, the Department of Homeland Security actively recruited hackers who "think like the bad guy,” National Terror Alert reported.

Considering the above, it is not a stretch to conclude that the Pentagon would infect 9/11 searches with malware. Once again, cui bono – the principle that probable responsibility for an act or event lies with one having something to gain — comes into play.





Latest Commentary
- With Government Roads, the Customer Is Always Wrong
- Ranchers vs. Regulators: The Clark County Range War
- Bundy, the Senecas and Fighting for Sovereignty
- Tax Day: What Kind of "Civilization" Are We Paying For?
- Justice Should be Blind, Not Crazy
- US Supreme Court Endorses Involuntary Servitude
- The Disturbing Truth Behind Your Next Income Tax Return
- Gun-Control Madness









Comments Add Comment Page 1 of 1
Bill F

Posted: Sep 14 2009, 12:27 PM

Link
75127 Easy on the hackers here . . . .their intent is merely to sell product in the most nefarious ways possible.

This Trojan has been around awhile and "anti-virus" companies ALWAYS scramble to create an excuse for their incompetence. Then they expect you to buy THEIR "solution".

I think we can rest assured that "9/11" was chosen just for the timeliness of it; look for future attacks on "cooking turkey" and maybe "santa" or "jesus' birthday"

... but anything is possible


Add Comment
Name
Comment

* No HTML


Verification *
Please Enter the Verification Code Seen Below
 


PLEASE NOTE
Please see our About Page, our Disclaimer, and our Comments Policy.


FAIR USE NOTICE
This site contains copyrighted material the use of which in some cases has not been specifically authorized by the copyright owner. Such material is made available for the purposes of news reporting, education, research, comment, and criticism, which constitutes a 'fair use' of such copyrighted material in accordance with Title 17 U.S.C. Section 107. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. It is our policy to respond to notices of alleged infringement that comply with the DMCA and other applicable intellectual property laws. It is our policy to remove material from public view that we believe in good faith to be copyrighted material that has been illegally copied and distributed by any of our members or users.

About Us - Disclaimer - Privacy Policy



Advanced Search
Username:

Password:

Remember Me
Forgot Password?
Register

Daytime TV Host Wendy Williams To Women: Trick Your Husband Into Impregnating You, Beat Your 2-Year-Old To Show Her "Who's Boss" - 04/23Cop Swerves His SUV Into Longboarders To Enforce $35 Bylaw Violation - 04/14Louisiana Creates Database of Citizens Who Represent "A Risk to the State" - 04/23North Carolina Deputy Snatches Two Phones, Fails to Snatch Third, as she Handcuffs Man for no Reason - 04/22Town Threatens Jail Time To Citizens Who Feed Stray Cats - 04/23Bunkerville Was Not the BLM's First Rustler's Roundup - 04/22Cop Fakes Injury To Tour With His Band & Collect Disability Payments - 04/23Tax Day: What Kind of "Civilization" Are We Paying For? - 04/14

Rialto, CA Police Made to Wear Cameras, Use of Force Drops by Over Two-ThirdsCop Who Karate Chopped NY Judge In Throat Gets Off Scot-FreeFlorida Cop Smashes Compliant Woman's Face Into Car -- "Maybe Now You Can Understand Simple Instructions"VIDEO: Lapel Cam Reveals A Day In The Life Of A U.S. Police Officer (Tasing, Beating, Breaking & Entering, Stomping On Heads... and Laughing About It)Caught On Tape: Officer Sucker Punches Inmate In Face, Files Report Claiming 'Self Defense'Insult Person On Twitter, Go To JailSWAT Team Brings TV Crew To Film Raid Against Threatening Internet Critic -- Raids Innocent Grandma InsteadCop Karate Chops NY Judge In The Throat
(more)

 
Top