The answer to 1984... is 1776


Thursday, December 17, 2009

SKYGRABER: 'Al-QaedaTerrorists' to control US Death Drones - Controlled Opposition


Editors Note: Does the mainstream media & US Military Officials actually think we believe that 'Al-Qaeda' would be able to hijack a US Military Drone aircraft.

The Military Industrial Complex is letting you know there will be an attack perpetrated on the American people by Al-Qaeda. exercise extreme caution when filtering this propaganda.



Example of the Pentagon hiring gullible operatives for 'Al-Qaeda' to carry out terrorism.

"Sibel Edmonds, FBI Translator, said (jan 6, 2008) the State Department official once again proved useful. “A primary target would call the official and point to names on the list and say, ‘We need to get them out of the US because we can’t afford for them to spill the beans’,” she said. “The official said that he would ‘take care of it’.”
The four suspects on the list were released from interrogation and extradited.
Edmonds also claims that a number of senior officials in the Pentagon had helped Israeli and Turkish agents." read entire LONDON TIMES article.



What I am suggesting, is that 'Al-Quaeda' is 'hired' by the Pentagon/MIC to carry out terrorist attacks to solidify the myth that 'Al-Qaeda' exists and is a real threat. 

Fear is a great control mechanism.

Are you still afraid of H1N1?

Don't forget, it's ok to question what you hear... including this analysis.
Research Further.





A $26 Skygrabber Program Can Intercept Army Communication
How insurgents in Iraq used a cheap computer program Skygrabber intercepting US communications. Skygrabber is a program a review of which can hardly be found online.
According to AFP and EPA Iraqi insurgents used Skygrabber software, which is cheap and readily available, to intercept signals from American unmanned aircraft, announced on Thursday the Wall Street Journal. WSJ journal says Skygrabber could hack the unmanned planes because those planes have unprotected communication link.
WSJ quoted a senior Defense and U.S. intelligence services, saying the cost of SkyGrabberis 25.99 dollars.

How The U.S. Learned About SkyGrabber Use

In 2009 the U.S. found a computer that belonged to a insurgent who was captured by the Army. The laptop used by the insurgent had SkyGrabber installed in it.

While the insurgents could have watched the video, there is no evidence they could have jammed the electronic communications.



A brief review look shows that SkyGrabber is created by a Russian company. It is a software program used to intercept music, photos, videos, software and other content downloaded from the Internet.

This incidence shows the emergence of a new cyber war thatmay be the combat of the future.


**********
******
Now what is SkyGrabber?

Essentially, SkyGrabber is an offline satellite internet downloader. That implies the software can intercept satellite data such as movie, music, pictures that are being downloaded by other users. It saves the information in the hard disk.
Re: SkyGrabber
The software doesn't require an online internet connection. The user just needs to customize the satellite dish for selected satellite provider and start grabbing the data packets.
1way_en
SkyGrabber works on Satellite internet, which is mainly used in remote areas or in areas where Internet access is not smooth due to slow speed and high cost of local Internet connections. In such a set up responses to the requests come from the satellite. The data is accepted by all who are in the satellite coverage area. The SkyGrabber intercepts data of other users, assorts them into files and saves the files in hard drive.

Key Features of SkyGrabber

  • Filtering information by the types of files ( mp3, avi, mpg )
  • Filtering information by IP, MAC addresses
  • Simultaneous work on the Internet and grabbing
  • The monitoring system resources
  • Showing progress downloads
  • Handling TCP, GPE, IP, MPE package
  • Handling HTTP responses (200, 206)
  • Support Kazza, Gnutella
  • Support dreamboxes
(To have a first hand experience free download SkyGrabber)

Implications

 

The Iraqui insurgents  pointing the satellite dishes into air and watching the downloads. The Iranian-backed insurgents intercepted the video feed from an unprotected communications link in some of the remotely flown planes' systems. According to the sources, they regularly captured the drone video feeds.  It is used to intercept and record television feeds.

The incident warns military against the apprehensive shadow cyber war. It is sheer lack of intellect on the part of US military and intelligent use of satellite-interceptingsoftware on the part of insurgents.

This becomes clearer with in a few lines from WSJ that reads U.S. military personnel in Iraq discovered the problem late last year when they apprehended a Shiite militant whose laptop containedfiles of intercepted drone video feeds. In July, the U.S. military found pirated drone video feeds on other militant laptops, leading some officials to conclude that militant groups trained and funded by Iran were regularly intercepting feeds.

In the summer 2009 incident, the military found "days and days and hours and hours of proof" that the feeds were being intercepted and shared with multiple extremist groups.

This would mean a blotch on US military that boasts with a superior digital-age technology.

The cause of security breach was explained by Declan McCullagh in a note
This apparent security breach, which had been known in military and intelligence circles to be possible, arose because the Predator unmanned aerial vehicles do not use encryption in the final link to their operators on the ground. (By contrast, every time you log on to a bank or credit card Web site, or make a phone call on most modern cellular networks, your communications are protected by encryption technology.)

It could be interpreted that the final link between the drone and the operator is between a satellite flying around in space. That final link remains unencrypted for unexplained reasons which makes it vulnerable to anyone with a even cursory knowledge of network communications.

To be more clear with the reason, we need to learn thatit's not critical communications data that will put our troops at risk, so the extra $50 on encryption is unjustified
So money matters for U.S military

No comments:

Post a Comment