The Global Cyber-Attack Campaign

The Global Cyber-Attack Campaign

Our Dependence on the Internet

Our lives are becoming increasingly dependent on the internet for our survival. From the Federal Reserve announcing they are moving to a digital currency and a cashless society to supply chains that we rely on for food, fuel, and medical services, every area of society is becoming more digitalized.

The growth of the internet has been a positive thing in many ways. Information can be shared and spread faster than at any point in human history, and this rapid spread of information has been one of the most effective tools in resisting oppressive governments. For that reason, it shouldn’t come as a surprise that those in power are shifting their focus to gaining more control over the internet.

Social Credit Scores to Determine Access Levels

The endgame for the elites is to have control over who can and who cannot access the cyber domain. The idea of controlling internet access might seem strange to many of us because we are used to the relatively free and open internet that we currently have, but a closer look shows us that plans are already underway to usher in a new system that uses a “social credit score” to determine the level of access an individual has to online services.

This social credit system is being discussed and has already been implemented in several ways. For example, PayPal has announced that they will work with the Southern Poverty Law Center to investigate their users that are suspected of “anti-government rhetoric.” Other large companies are considering taking similar actions.

Psychological Operations and False Flags

Most people won’t willingly give up their freedoms, but under certain conditions, such as prolonged and targeted psychological operations (like we have seen with the COVID-19 pandemic), a population will happily hand over their own freedoms and fight to take away the freedoms of their fellow citizens as well.

The first step is to convince the public of the internet’s supposed overwhelming vulnerability to hackers. This can easily be achieved through false flag cyber-attacks carried out against critical infrastructure such as the food supply, fuel supply, and other highly visible targets like major social media sites. A growing number of attacks like this will result in fear and uncertainty.

We have already seen the beginning stages of this as cybercrime increased 600% in 2020. Here is a brief list of some of the attacks that have made headlines recently:

  • The SolarWinds Attack - In 2020, attackers managed to access one of the SolarWinds servers to inject malicious code — later dubbed as the ‘Sunburst’ malware — that could allow data exfiltration and remote access to clients’ devices. The attack impacted giants like Microsoft and the US Department of Defense, potentially making it one of the most devastating attacks of 2020.
  • Colonial Pipeline Attack - On May 7, 2021, hackers carried out a devastating cyber-attack against Colonial Pipeline, a major supplier of gasoline to the Southeastern United States. This attack caused major fuel shortages for that region.
  • JBS Attack – The world’s food supply was targeted when JBS, the world’s largest meat processor suffered an attack by hackers.
  • Facebook – Facebook and all its affiliated companies and services suddenly disappeared from the web on Monday, an outage that lasted over five hours and left users unable to reach their main Facebook, WhatsApp, or Instagram accounts.

If someone sees news stories about these cyber-attacks and fails to investigate them any further, it can be easy to buy into the official story and believe that the only way to prevent further attacks is by handing over more control to those in power, like the arguments made for why the national security community needed the Patriot Act following the September 11th attacks. But anyone who examines these events critically will see that the groups benefitting from these cyber-attacks are the same groups that are behind them.

Many might doubt that governments and major corporations would ever attempt to pull off such a massive false flag campaign, but false flag attacks are nothing new. Look at Operation Northwoods as a brief example.

Operation Northwoods was a plan drawn up by the CIA and the Joint Chiefs of Staff in 1962 that proposed American assets conduct terrorist attacks against American civilians, blame the attacks on Castro, and use this as a justification to invade and overthrow the Cuban government. It was never carried out, but the plans were made, and many high-ranking American officials secretly advocated for them.

Understanding that secret operations like this have been planned in the past, it is much easier to realize the feasibility of today’s authorities ordering attacks in the cyber sphere.

Cyber Polygon and The Great Reset

Operations on this kind of scale involve dozens of entities including governmental organizations, financial institutions, and large IT companies. To successfully conduct a global campaign of cyber-attacks, rehearsals and dry runs need to be done, which leads us to Cyber Polygon.

Cyber Polygon is an annual cyber wargame directed by the World Economic Forum (WEF) and attended by organizations from 48 different countries. The exercise simulates multiple cyber-attack scenarios, which many have speculated are rehearsals for actual attacks.

The main concern we should have with Cyber Polygon is the conclusions they and the Chairman of the WEF, Klaus Schwab, have reached. They continue to push for more globalization of cyber oversight organizations. This raises red flags for many because Schwab is also one of the primary advocates for The Great Reset (he authored the book, COVID-19: The Great Reset).

A key element of this new Great Reset system is digital COVID-19 vaccine passports. It has already been proposed that every individual must present a digital ID in the form of a QR code to gain access to basic services and recreation, and this has already been implemented in certain areas.

The Future of the Internet

So, what might the future of the internet look like? The internet is an invaluable tool of the elite to spread propaganda and assist in the efficiency of tracking and tracing the population, but to control the flow of information, powerful elites would need to deny internet access to anyone who might dissent or speak out against those in power. More than likely, future internet access will take a tiered approach. An individual’s social credit score will determine the level of online access he is granted. At the lowest level of access, someone would be able to pay bills, taxes, etc. As that person’s social score increases (through compliance with government mandates and showing support for top-down social initiatives etc.), he is slowly allowed greater levels of access, but this amount of access will likely never fully reach the same amount we have today.

To Summarize

  • Cyber-attacks (real or false flag) will be used to demonstrate the vulnerability of the current internet infrastructure
  • These vulnerabilities will be exploited to make the case that a new system of internet access is needed
  • This new system will grant levels of online access based on a social credit score
  • Through this scoring system, global governments and international corporations will seize more power over the dissemination of information, be able to trace and track every individual in society and use your personal data to manipulate your behavior

In the coming months and years, the psychological campaigns will likely intensify, and many will give in to the pressure and fall in line. Now is the time to solidify your determination. Only those who have prepared for the worst will be able to stand their ground.


Leave a comment

Please note, comments must be approved before they are published