Saturday, December 8, 2012

Hackers Disrupt International Telecom Conference; Justify UN Claims For Internet Controls

Susanne Posel, Contributor
Activist Post

Earlier this week, the US House of Representatives voted against the International Telecommunications Union (ITU) and their scheme to oversee an “increased government control over the Internet” that would “undermine the current multi-stakeholder model that has enabled the Internet to flourish and under which the private sector.” The European Parliament in England paved the way last month by passing an identical resolution.

The unilateral vote was 397-0 to approve the fight against the UN and their international move to control the Internet.

The 2012 World Conference on International Telecommunications (WCIT) is setting the foundation for a de facto takeover of the Internet and restriction of the free-flow of information by installing authoritative controls through an international legal framework. Free speech would fall under the guidelines set forth by the ITU and the UN as well as put cybersecurity measures within their jurisdiction.

The ITU has concocted the idea of taxing the use of the Internet, much the same as long-distance phone calls and roaming are charged. According to the ITU: “Operating agencies shall negotiate commercial agreements to achieve a sustainable system of fair compensation for telecommunications services and, where appropriate, respecting the principle of sending party network pays.”

The European Union, the US and Russia are poised to oppose Internet taxing and policies designed to create or enforce such an idea.


At the WTIC, new regulatory rules are being discussed that provide more stringent restrictions as well as creating a money-making scheme for the UN.

Because all “calls” are ultimately digital, transmission control protocol (TCP) are used to oversee the beginning, middle and end of all transmissions; including the data that passes through in the middle. Internet users do not have control over TCP sessions because IP providers generate the system and apply the communications under their own authority. The ITU could intercept this process, apply a charge and the payment would be passed down to the customer. Remote connections would obviously become more costly, although it takes the same amount of data exchange to make all digital connections.

In addition, the UTI could have backdoor peering abilities as most ISPs do because the exchange of traffic on the Internet occurs without exchange in the physical world, the UTI could be watching all movement on the Web without detection and claim fees based on observations that are not confirmable or verifiable.

Leaked documents from the WCIT show that identification of all Internet users to control the ability of access to the Web is being discussed, as well as nationalization of regulatory rules over the Internet as segmented appropriate to each individual country.

Transparency on the Internet is the furthest thing from this conference. Non-governmental organizations (NGOs) are clamoring for the end of multi-stakeholder practices at the UN which provides for private entities to control the internet and ultimately become exempt from restrictions because of their financial contributions to the UN. In justifying their need to control the Internet, the UN claims that an appropriately timed hacker attempted to disrupt the WCIT conference.

In a statement, the ITU said: “The incident blocked civil society, media and other interested parties from following the proceedings, and prevented access to the wealth of online information on the ITU’s WCIT home page and newsroom. Some hacker groups are claiming responsibility.”

This assumption was without verifiable proof and serves to create the illusion that a hacker “out there” is ever-presently waiting to destroy the Internet unless there are globalist regulations and restrictions firmly placed to thwart their plot.

The ITU continued on: “Without conclusive proof, we do not directly accuse. We did notice a lot of activity online under the hashtag #OpWCIT, and elsewhere, and subsequently a lot of groups claiming that they had attacked the site immediately after our systems crashed.”

This year hackers have been strategically placed and surprisingly successful at creating ignorant justification for control over the Internet. In the US, hackers were used by the technocrats to set the foundation for a secret network.

The banking institutions have decided to join forces to fight cyber-attacks, along with the federal government so that technological vulnerabilities are identified and eliminated. Morgan Stanley and Goldman Sachs are discussing converging onto a shared data center where secret banking information can be kept under wraps so that hackers cannot steal information, as well as sound an alarm when other banks are under attack.

This new network of technocrats will privatize customer banking information in the name of security while allowing the banksters to further hide their questionable dealings. Banks across America will be able to communicate in covert means that will never be released to the general public. The days of banking scandals are over because their network will prevent them for being caught.

Hackers were employed against GoDaddy to frighten the American public into believing that their websites could be shut down at any time by a band of rogue Internet users who wanted to make sure that their agendas were counted in public opinion. Yet, it did not readily enter the public’s mind to think that this was orchestrated by the US government in a Hegelian Dialectic.


The National Security Agency recruits students from US colleges to become the next generation of hackers working for the government. These trainees will soon be “unseen” in the mainstream media as CIA-sponsored Anonymous or LulzSec.

The Obama administration created the International Strategy for Cyberspace (ISC) which makes an international governance policy priority. Obama’s desire to facilitate the US government’s push toward global engagement, the ISC encompasses a new vision for cyberspace. By using economic prosperity dependent on revamping cyberspace, Obama places the need for over-reaching cybersecurity over the Internet.

Susanne Posel is the Chief Editor of Occupy Corporatism. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media. You can find us on our Facebook page.


BE THE CHANGE! PLEASE SHARE THIS USING THE TOOLS BELOW


BE THE CHANGE! PLEASE SHARE THIS USING THE TOOLS BELOW


If you enjoy our work, please donate to keep our website going.

3 comments:

Anonymous said...

Sorry, but I just can't get behind Anonymous being in on this crap. Believe it or not there are decent thinking people who have skills who aren't afraid to use them.

Anonymous said...

There are 2 "Anonymous" groups - one is decent thinking people who have skills who aren't afraid to use them, the other is CIA/MI5/Mossad/... agents who want the public to think the former group did something.

Anonymous said...

The trick is proving the actions of the bad group and outing them. I hope it happens and this shit stops.

Circular logic rarely makes sense. Except in this case: If you didn't do anything bad then you shouldn't have anything to fear from hackers.

The GOOD hackers only do their tricks to find out what truth is out there. Yes, there are some psychos but hackers as a community tend to police one another quite well. They don't want a fire sale happening-- they want the world to be free but not at the expense of it going to shit first. Well, minus the politicians and corporate blowhards.

Post a Comment