Monday, July 9, 2012

DNSChanger is False Flag Excuse for FBI to Shut Out Internet Users

Susanne Posel, Contributor
Activist Post

Today The Federal Bureau of Investigations (FBI) will pull the plug on the Domain Name System (DNS) because of DNS Changer malware that has been used as a safety net for servers infected by a virus that redirects users to a bogus DNS server.

On July 9th, Internet users will be able to access the Internet if your computer is not infected.

The FBI wants everyone to check their computer by going to the website for the DNSChanger Working Group. When you visit this site, if your computer is “ok”, you will see a “green square”.

When you go to this website to have your computer checked for DNSChanger, you are essentially giving the FBI the ok to allow your ISP and computer to be surveilled.

If you use Firefox or Microsoft Internet Explorer, you are fine. However, users of Google Chrome and Apple’s Safari may experience a problem being validated.

The FBI claims that they have been “propping up the Internet” for last few months in an effort combat the DNSChanger virus, however they can no longer do so effectively.


In this admission, the FBI is saying that the Internet is essentially being syphoned through the FBI; this includes all user activity on the Internet. All of our digital communications are going through the US government’s databases and being monitored under the guise of searching for the elusive DNSChanger malware.



The DNSChanger malware, according to the FBI, has been around since 2007. This software installs itself on your computer and redirects all Internet traffic to a supposed hacker server.

Luckily, the US government has rounded up these hackers and now they are “getting the word out” about this malware.

The hacktivist movement has spawned new off-shoots of the main groups Anonymous and LulzSec, named “LulzSec Reborn”, “MalSec”, and “SpexSec”. These groups are using the same techniques as Anonymous, with new names. The nature of these groups is to wreak havoc, break apart, and come together under a different name to begin the process over again.

LulzSec has been linked to Anonymous, which has members of the CIA working in and with the hacktivist group in an attempt by the US government to create a false flag threat that justifies the Obama administration’s restriction of American freedoms on the Internet.

The FBI estimated that as of July 4th of this year, 274,000 people worldwide are still infected. Of those computers, 45,000 are located in the US. If the FBI is successful on shutting down people from the Internet, the social networks should see a significant drop in log-ins.

The issue of hacktivists and their threat to the Internet, national security and digital information flow is a ruse designed to fool the American public into thinking that on the other side of their computer screen lurks a Bogeyman ready to pounce.

In reality it is the US government and their false flags that we should all be vigilantly aware of so that we can recognize when Big Brother is trying to usurp our digital rights.

Susanne Posel is the Chief Editor of Occupy Corporatism. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media. You can find us on our Facebook page.

You can support this information by voting on Reddit HERE


BE THE CHANGE! PLEASE SHARE THIS USING THE TOOLS BELOW



BE THE CHANGE! PLEASE SHARE THIS USING THE TOOLS BELOW


If you enjoy our work, please donate to keep our website going.

8 comments:

Anonymous said...

"The FBI wants everyone to check their computer by going to the website for the DNSChanger Working Group. When you visit this site, if your computer is “ok”, you will see a “green square”.

When you go to this website to have your computer checked for DNSChanger, you are essentially giving the FBI the ok to allow your ISP and computer to be surveilled."

I love how you actually link to the site before telling people that they are giving the FBI the ok to allow surveillance. lol

Anonymous said...

The problem here is most people don't understand TCPIP, and therefore DNS.

So people have a WORM on their OS which re-directs to an "Evil DNS Server" which has been replaced by an "FBI DNS Server" which the FBI now wants to turn off.

I don't see a problem here, and I've been quite vocal about corruption and oath breaking in the FBI.

The FBI ran a DNS Server for free (or taxpayer cost) to keep the WORM infected OS's DNS on track.

The real spying happens down at the NSA's FIOS splitters. The only way to combat that is strong encryption. Encryption which most people don't know how to use properly, similar to how most people don't understand TCPIP well enough to change their OWN DNS server settings.

The problem here is education. Specifically Networking and TCPIP. Not the FBI this time.

The test makes sure your requests are resolved properly. You don't have to test on the DNSChanger Working Group's website. Their website simply detects if your request goes to one of their (The FBI's) Temporary DNS Server.

Keep in mine the bottom line is you have a WORM on your system if your DNS depends on FBI's DNS Server.

Anonymous said...

Okay you didn't like my last post.

I'll put it dirt simple.

1. Some boxes may have a WORM. (user fault)

2. The FBI has mitigated, "or resolved" your DNS because your box has a WORM.

Now the FBI is no longer going to mitigate, or "resolve" your infected WORM box. They even gave fair warning.

The reality is if your box was infected, you ALREADY WERE USING THE FBI'S DNS SERVER
which is why they can give numbers on the amount of boxes effected/infected. Simple MATH to count the UNIQUE IP requests.

Since most people do not understand what a primary or secondary dns is, or how to test they are what they say, or TCPIP, they don't know what any of this means.

The FIX for this (IF YOU ARE INFECTED) is.
(for everyone scared of the working group/fbi)

1. CLEAN YOUR WORM BOXEN AND REMOVE THE WORM
2. OBTAIN YOUR ISP's PRIMARY AND SECONDARY DNS ON THE PHONE, TYPE THEM IN YOUR NETWORK SETTINGS
3. IF YOU PLAN TO BE ON THE WEB FOR THE NEXT 10 YEARS GO BUY A BOOK ON TCPIP AND LEARN IT.

Anonymous said...

I'm vindicated,

GO LEARN TCPIP AND DON'T COME BACK WITH THIS AGAIN UNLESS YOU KNOW WHAT YOU ARE TALKING ABOUT!!

Admit it, this article is POOR.
AND I AM CORRECT

ISPs step in to supply DNSChanger safety net
Not going dark, after all

http://www.theregister.co.uk/2012/07/09/dnschanger_plug_pulled/

Lo Pan said...

you're a fucking idiot

Anonymous said...

Dale speculates:

Posel is a false flag fake Occupier working for the FBI, trying to lure you into their trap by first giving the site (I almost clicked in) and then in the next paragraph, warning you not to.

There is NO evidence amidst all these claims.
Is Posel a paid propagandist for the paranoid right, using alarmist fear to shut down critical thinking and masking it all with a phony kind of
left-wing persona, while advancing the agenda of
far right advocacy groups?.

Always check her sources, for she often either totally distorts them or uses tin-foil hat websites to support her claims.

Exercise caution, note whether she provides evidence, and check out sources.

She makes coherent statements enough to lure you in for the propaganda punch. As Goebbels said: good propaganda is 95% truth, and then a Big Lie is inserted to be repeated over and over until it is believed.

Beware and verify.

Usor said...

The only way the FBI is going to monitor your dns requests or web page requests/accesses is if they keep the rogue dns servers on-line. I doubt this is an elaborate plan to get already infected users to download dns-changer malware fixing software which then roots the owners pc since the fbi already has all your dns requests because your box was using the rogue dns servers in the first place!!!

Anonymous said...

Ms. Posel you are chasing a red herring and it makes you look incredibly foolish to put it mildly.

Post a Comment