Manufactured Cyber-Attacks On Banks Validate One World Currency

Susanne Posel, Contributor
Activist Post

PNC Bank has issued warnings to 5 million customers that high volume of traffic is a type of cyber-attack meant to slow down their servers. In an effort to block the “attacks” PNC Bank has accidently “blocked access for a small percentage of legitimate customers for an extended period.”

The email from PNC stated: “A number of banks in the U.S., including PNC, are seeing an unusually high volume of traffic at their Internet connections. This volume of traffic is consistent with threatened cyber-attacks on the U.S. banking system.”

The hackers essentially caused a denial-of-service (DoS) breakdown to occur, blocking out customers because of inundation of traffic. In total 58 downtime reports were admitted by PNC.

In 2011, Citibank reported that hackers obtained private information on 360,000 customers. Names, addresses, account numbers and email addresses among other information were taken. Citibank waited 3 weeks to notify their customers of the breach.

The security firm Radware stated that attacks on US banks last year originated in Saudi Arabia. Radware said that the malware was created “live” on a server; and came from an independent data center which held servers for corporations that conduct business with financial institutions in America. The logical assessment was that these relationships, by their nature, may be purposefully less secure, thereby allowing hacker attacks to take place.

The timing of the newly formed “digital al-Qaeda” and their expressed anger over the US-produced anti-Muslim film are questionable considering how the US and Israeli government are setting the stage for a justified war with Iran. This fake hacker group is threatening other countries controlled by the Zionist regime, such as France, Germany and Britain. According to the false flag group:

The army was recently formed and we have started to work as a team after we used to work individually. The hacking operations are of course a response to the offense against the prophet, peace and blessing be upon him.

In September of 2012, Wells Fargo & Co. upped their cybersecurity measures after being attacked by a nameless, faceless group calling themselves Cyber Fighters of Izz ad-din Al Qassam. Wells Fargo announced in a formal statement:

We apologize to customers who may be experiencing intermittent access issues to wellsfargo.com and online banking. We are working to quickly resolve this issue.

Senator and self-proclaimed Zionist Joseph Lieberman declared that it was Iran who cyber-attacked Bank of America and JPMorgan Chase in 2011 and began with more frequency this year. Lieberman, as the chairman of the Homeland Security and Government Affairs Committee states that the financial attack was spawned from the state-sponsored anti-Muslim film circulating the Middle East thanks to CIA-operatives al-Qaeda.

The latest country attributed to the cyber-attacks on US banks is Russia. McAfee Labs warns of a cyber-attack planned for the spring of 2013 that will steal millions of dollars from customer accounts. Thirty US banks have been named as a nameless, faceless band of “criminals” have released a Trojan virus that will remove digital currency from accounts at banks like:

1 Troy Ounce Limited Edition Silver Medallion

• JPMorgan Chase & Co
• Wells Fargo
• Citibank
• PayPal/eBay
• Fidelity
• Charles Schwab
• Wachovia
• Capital One
• Bank of America
• Suntrust
• eTrade
• Ameritrade
• Navy Federal Credit Union

The scheme is referred to as “Project Blitzkrieg” (PB). In a beta-testing of the assault, it is reported that 300 bank accounts were affected in the United States. The recruitment for PB is being linked to Russian cyber-criminals and an alleged cyber-mafia headed by an anonymous NSD. Those who enter into PB are tasked with infecting specified US computers with predetermined malware, cloning, siphoning passwords and login information, transferring digital information from customer accounts.

Pat Calhoun, a senior vice president at McAfee said:

Our researchers have been pouring into this and what they have found, they actually found somewhere between 300 to 500 devices in the U.S. that have actually been infected with the particular malware that this individual is talking about. That, combined with some additional research we’re doing, has led us to believe this is true. This is actually a real operation that this individual is planning to launch sometime before spring 2013.

The Swiss Federal Institute (SFI) in Zurich released a study entitled “The Network of Global Corporate Control” that proves a small consortiums of corporations – mainly banks – run the world. A mere 147 corporations which form a “super entity” have control 40% of the world’s wealth; which is the real economy.

These mega-corporations are at the center of the global economy. The banks found to be most influential include:

• Barclays
• Goldman Sachs
• JPMorgan Chase & Co
• Vanguard Group
• UBS
• Deutsche Bank
• Bank of New York Melon Corp
• Morgan Stanley
• Bank of America Corp
• Société Générale

Using mathematical models normally applied to natural systems, the researchers analyzed the world’s economy. Their data was taken from Orbis 2007, a database which lists 37 million corporations and investors. The evidence showed that the world’s largest corporations are interconnected to all other companies and their professional decisions affect all markets across the globe.

Susanne Posel is the Chief Editor of Occupy Corporatism. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media. You can find us on our Facebook page.

var linkwithin_site_id = 557381;

linkwithin_text=’Related Articles:’


Activist Post Daily Newsletter

Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

Be the first to comment on "Manufactured Cyber-Attacks On Banks Validate One World Currency"

Leave a comment