Wednesday, May 26, 2021

With a sort of Love to Russia. Thank you for your ransomware attack on the US Energy Grid last month! Did the same agency that is targeting me and has been doing so all my life in the US "Black ops" division help your Russian hackers to obtain research into the types of hacking and attack that are being administered upon me? Where I live right now there have been groups of Russians inflicting every kind of surveillance, attack and violent body harm upon me using all kinds of US-sponsored weaponry as this has been a "shared" operation in these "underground" but highly sponsored terrorist "gang stalking" death squads groups.

"Costly ransomware attacks hits businesses, cities."  ABC News. May 27, 2021.


 

 

Because, Dearest sophisticated surveillance and hacker world Russia, your attack on the US pipeline that shut the flow of gas along the entire East Coast corridor has spelt trouble for the rest of America which is now much more aware of the cost of allowing the kind of loopholes that allow these types of malicious attacks to continue to plague the consumer base. This laxity has allowed targets and people under covert or regulated surveillance by government sources and their offshoot nefarious (death squad) Gang stalking operations to be continuously interrupted in all flows of international, national and regional telecommunications. 


As the public becomes more aware of the dangers of this huge infrastructure of anti-spyware, anti-malware, and all other industries to essentially penalize consumers for trying to surf with anonymity and safety on the internet by having to pay what is the equivalent of fines in order to purchase such ineffectual "protection" bits of software and for services rendering such "protection".


Obviously the ransomware circumvents all these various purchased forms of protections and has rendered them obsolete in the face of such sophisticated ransomware capabilities.

The heightened awareness of the need for greater protection for internet users is now more important to the regulation of the internet than having these extremely huge portals where all kinds of surveillance can be inflicted and hacking obstructions utilized by these nefarious organizations which continuously plague my every internet use. 

The dividing line between Homeland Security and it's pervasive spyware on every phone call and internet click of people under surveillance should be questioned more openly as ransomware begins to erode the sanctity of commercial and critical infrastructure supply chains. All is interconnected in this sense of the black hatters and the services and essential energy and data-driven operations that are now under serious threat by a more sophisticated type of hacking intrusion. 

While President Biden is proposing a universal Broadband access to every rural and outpost of America in his new proposals for legislation, let it be made clear that security is in need of revamping to protect against ransomware attacks. Furthermore, I am in need of higher security provisions to protect me from US Government-sponsored malicious attacks upon my computer so these black-op agencies can not only monitor my every actions and surfing page and block content and ensure I am "silenced" and censored from expressing the chagrin and the violence being inflicted upon me by malicious celebrities and their partner agencies from the governments of the world where I have had to run to fight to survive from United States terror operations (State-sponsored). Now I need protection for my internet usage and the hope is that there will be administered a higher form of protection for people using the internet as now the US Government is itself under threat from the allowances it has fostered in terms of surveillance and ransomware research and development that has been shared and passed off to people from all over the planet coming to usurp and steal intellectual property from United States--which is then sold off undoubtedly to further terrorist groups and organization because..unfortunately, the United States itself sponsored terrorism upon it's own citizens and I am one of those being targeted in such manner. 


Now the technology of harassment, obstruction of personal date, intellectual property breaches, and all other assorted forms of WiFi and internet usage are coming back to haunt the agencies of the United States which are reliant upon energy needs and other businesses that form the general supply chain within the US, and without to it's international operations.  


----------

The video above explains Three areas of exploitation that need to be addressed and rectified for patches and vulnerabilities for everyday surfing activities by targets such as myself. Please note as an aside that if you listen to lectures given by Edward Snowden, for example, you can hear this former National Security Agency whistleblower explain that EVERY SINGLE phone call in the United States can be intercepted, logged and listened into by the US government surveillance capabilities. If the United States government is listening in, so too can the foreign operators listen in and conduct further surveillance of your every phone call and transaction.

The areas that are under threat in every day sorts of surfing activities include:

Phishing campaigns

Remote Desktop infiltration

Software vulnerabilities

 

Software vulnerabilities are "supposed" to be covered by the range of free or purchasable anti-virus and malware protection software that are sold in huge industries that appear to be absolutely ineffective against the more sophisticated types of malware that proliferate and are now attacking critical infrastructure operations and businesses. It is not enough to continue to allow these covert operations for domestic terrorism, such as those infinitely attacking me which are sponsored by the US Government covertly, but backed up by all kinds of deadly terrorist groups that are subversive but still on the payrolls of said government agencies protected under some kind of hypocritical rubric of "protecting" "The American People" from non-terrorists such as myself. For where the funding for this huge international organization attacking me stems, while politicians and noted celebrities and all kinds of civilian deviants and "normal" and "respectable " citizens not just willingly participate but laugh and giggle and glare in hate as they frenetically and dangerously attack me every single moment and online it's a non-stop censorship of my every attempt to gain any kind of telecommunication or business transaction or personal account of my ideas and thoughts in any kind of written explication. 

Now the dog that has been amply fed until it's a bloated and greedy rabid attack system is coming back to bite the hand that so generously fed this sick puppy that has grown into a junkyard dog viciously attacking people they don't like, and now blocking US critical infrastructure and perhaps destroying businesses. They could also wipe out entire defense systems potentially in an act of cyberterror or war. 

It's enough for the greedy to stop playing into this game of terrorizing lone civilians called "Targeted Individuals' and perhaps for once look at the bigger picture of how badly their selfish aims of power and promotion are leading to a widespread catastrophic system of their own undoing, but brought about by the people they empowered by sharing these death squad groups which are being handed every kind of inter-personal terror technology along with endless surveillance capabilities, in a global network of terrorism and murder and hate and violence upon people or individuals. 

----------------

 

"A conversation with Edward Snowden about our legal case against mass surveillance." Privacy International. May 18, 2021.


Edward Snowden from above video:

"There's a kind of presumption, I think, that governance is of a high enough quality that you can just trust the government. That things will all work out, and that it's all okay. (almost laughing at this point in sarcasm, Snowden continues). And I think people miss, largely, the reality, which is, governments don't reform themselves. 

Power never limits their own capability without a demand, without some kind of force or pressure. Or, in our case here, a court judgement. To say, your crayons are way outside the lines. 

This case (being brought before the European Court on Human Rights), what exactly is it?"

Privacy International: "Fundamentally, this case is challenging two practices of the UK Intelligence agencies. The first has to do with their mass interception of communications. This is all the content and metadata that is traveling over these mass connections by fiber optic cables THAT CONNECT ALL THE COUNTRIES OF THE WORLD but IT JUST HAPPENS THAT THEY ALL RUN THROUGH THE UK (which is a huge force in the terrorist activities surrounding me, personally--my input, the author of this blog--and English absolutely control aspects of American media awards system and media propaganda services and absolutely controls these celebrities most viciously attacking me, along with their highly positioned government leaders). It turns out the, through our research, the UK Intelligence agencies have been using these intercepted communications for their own work. (paraphrasing now her exact quote as hacking and obstruction of my typing and critical thinking capabilities is as usual under severe enough attack by the terrorists I am referring to in this blog post--I mean only a tiny percent of less than .01% of this organization). 

A second aspect of this case is that the US does very similar things.

ALL OF THESE TYPES OF SURVEILLANCE ULTIMATELY POSE A THREAT TO DEMOCRACY."

 

See video above for more very relevant and recent information on what should be alarming for the future security of critical infrastructure needs of the United States and also for privacy of individuals. There needs to be greater protection for targets and for their assailants alike, as all are now integrated into this Matrix of telecommunications and all face threat to survival should dire enemies of the country obtain more access to vulnerabilities in these operational interconnected internet services. 


 







No comments:

Post a Comment