Goliath Cyberwar: Sony Failure to Follow Basic Digital Security & What State Secrets Could They Have Shared?

google-fear-screamBy now everyone interested in this story have witnessed the story change so many times that the numerous lies are difficult to archive.
Sony also screwed up by putting sensitive information in unencrypted files on their servers. Yeah, airheads but seriously, this is a breach of network security training, and I scratch my head in awe. This is not even credible for a major multinational conglomerate corporation with a major computer market!
My training would be to first look inside, as an inside job is a more likely possibility.
Then the government gets involved seeking geopolitical opportunity to falsely blame cyber-warfare against a vulnerable adversary nation. Phrases such as “Come out swinging” was used by FOX News actors prior to feeds from the White House Press Room.
Mass Surveillance & Regulating/Censoring The Internet:
Terror policy campaign could seek to exploit the media hype over this stupid breach of basic business network security training protocols.
Be alert for the return of CISPA, or worse legislation!
Then I learned about Project Goliath!
Never heard of it?
Who or What is Goliath?
Did you know about the Hollywood corporate giants colluding to attack Google ?
Have you heard of Salary or Compensation Discrimination?
We should thank the hackers for revealing so many secrets in the released information to the public. ~Ron

Is it newsworthy that Sony executives have exchanged vaguely racist emails in private? Yes, it is—these are the people who determine which movies get made and who stars in them, and it’s reasonable to wonder whether opinions exchanged in private affect their public-facing decisions. Is it newsworthy that there are race and gender discrepancies in pay in Hollywood, as Fusion has reported? Yes, it is. Gawker has used the leaks to report on how Sony may have mustered influence to kill stories in the New York Times. The Verge used the leaks to report on how, after the Stop Online Piracy Act died in 2012, movie studios and the Motion Picture Association of America changed tactics in their war against pirated content, in an initiative dubbed “Project Goliath.” These are all legitimate stories, and they’re all stories that we wouldn’t have if not for the leaks. –sandiegofreepress.org

Click to access 151108.pdf


What is “Goliath” and why are Hollywood’s most powerful lawyers working to kill it?
In dozens of recently leaked emails from the Sony hack, lawyers from the MPAA and six major studios talk about “Goliath” as their most powerful and politically relevant adversary in the fight against online piracy. They speak of “the problems created by Goliath,” and worry “what Goliath could do if it went on the attack.” Together they mount a multi-year effort to “respond to / rebut Goliath’s public advocacy” and “amplify negative Goliath news.” – theverge.com

Sony Attack: U.S. Blames Iran, China and Russia

Corporate media suggests economic warfare against China’s banks

by Kurt Nimmo Infowars.com Dec 19, 2014

A source told Fox News on Friday the sophistication of the attack rules out North Korea and instead implicates Russia, China or Iran.

It is speculated the U.S. may respond to the attack by engaging in economic warfare against countries that do business with North Korea.

“Even Chinese companies operating in the country could be targeted, experts said, although sanctions against these firms could result in consequences that spill beyond the Korean peninsula,” CNBC reported on Thursday.

“The toughest option: The United States could restrict North Korea’s dollar-denominated trade by hitting Chinese banks that do business with Pyongyang — a tactic used against Iran and, less comprehensively, against Russia after its incursion into Ukraine’s Crimea region,” reports CNN.

The overblown Sony malware attack is designed to open another front in the war against Russia and China, both considered geostrategic threats by the financial elite.

“China today, because of its dynamic economic growth and its determination to pursue sovereign Chinese national interests, merely because China exists, is becoming the Pentagon new ‘enemy image,’ now replacing the false ‘enemy image’ of Islam used after September 2001 by the Bush-Cheney Administration to justify the Pentagon’s global power pursuit,” writes F. William Engdahl. “The new US military posture against China has nothing to do with any aggressive threat from the side of China. The Pentagon has decided to escalate its aggressive military posture to China merely because China has become a strong vibrant independent pole in world economics and geopolitics.”

In 2009, the Pentagon hosted a war game that included participants from Wall Street and the banking cartel in addition to members of the intelligence community. The event, held at Ft. Meade, Maryland, concentrated on “global scenarios that could shift the balance of power between the world’s leading economies,” Politico reported at the time.

The U.S. Treasury Department is also engaged planning economic war. “The United States has constructed a financial neutron bomb,” Ambrose Evans-Pritchard wrote in April. “The strategy relies on hegemonic control over the global banking system, buttressed by a network of allies and the reluctant acquiescence of neutral states. Let us call this the Manhattan Project of the early 21st century.”

Russia and China have responded to the prospect of economic war by forming a strategic defense alliance.

“Whether or not the Russian and Chinese leadership equate the growing war provocations with the financial and economic disintegration of the trans-Atlantic region, it is precisely that breakdown process that is driving the world toward a conflict that could escalate into a thermonuclear war of extermination,” noted EIR last November.


Sony Hack Bears Hallmarks of U.S. Intelligence Operation

Obama admin. mulling “proportional” response
by Kurt Nimmo Infowars.com Dec 18, 2014

The Obama administration considers Sony’s inability to secure its computer network and allowing unknown hackers access to confidential information to be a serious breach of national security.

White House spokesman Josh Earnest did not say North Korea was responsible for the hack. Instead, the accusation was made Wednesday by an anonymous government official “who is not authorized to comment publicly.”

Earnest said U.S. national security leaders “would be mindful of the fact that we need a proportional response.” He was vague on what this meant.

As Paul Joseph Watson noted for Infowars.com on Thursday, there is little evidence implicating North Korea, but this has not prevented the government and the corporate media from attributing the hack to the authoritarian regime of Kim Jong-un.

For more on this, see Kim Zetter’s The Evidence That North Korea Hacked Sony Is Flimsy.
U.S. Intelligence More Likely Responsible
As Marc W. Rogers noted on his security news blog on Thursday, it is unlikely North Korea is involved.

“The fact that the code was written on a PC with Korean locale & language actually makes it less likely to be North Korea,” Rogers explains. “Not least because they don’t speak traditional ‘Korean’ in North Korea, they speak their own dialect and traditional Korean is forbidden. This is one of the key things that has made communication with North Korean refugees difficult.”

Additionally, the broken English used “looks deliberately bad and doesn’t exhibit any of the classic comprehension mistakes you actually expect to see in ‘Konglish’. i.e it reads to me like an English speaker pretending to be bad at writing English.”

This would implicate U.S. or British intelligence. U.S. intelligence has, since 9/11, displayed careless and sloppy application when conducting false flag operations. The textbook example of this is the transparently bogus “intelligence” used in the effort to frame Iraq prior to the invasion of that country in 2003.

Read More: Infowars.com

Sony Hack: What They’re Not Telling You

Who is really responsible and what’s the agenda?
by Paul Joseph Watson Dec 18, 2014 infowars.com

The White House claims North Korea is responsible for the Sony hack; Here’s what they’re not telling you.


Click to access 151108.pdf



Want Worldwide PEACE and Prosperity. We are the solution we have been searching for... Free People on Earth will solve our crisis and create an era of Creativity. Be Aware; Be Creative; Be Active; Be Free; and then Share it. LOVE & Wholeness AMOR y Paz

Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Posted in Freedom-Expressed
3 comments on “Goliath Cyberwar: Sony Failure to Follow Basic Digital Security & What State Secrets Could They Have Shared?
  1. RonMamita says:

    Sony Pictures suspends filming after massive hack ‘affects payments’

    [It seems there was some sort of massive attack under way, from London’s Heathrow Airport to… SONY]
    Published Dec 13, 2014

    Sony Pictures has temporarily stopped filming after hackers, with alleged links to North Korea, paralyzed its computer network. The security glitches have reportedly meant the studio has been unable to process payments.

    This is the latest problem that has rocked the Hollywood studio after an attack by the hacking group, Guardians of Peace. Due to the technical problems with their computer network, the majority of which are offline, Sony Pictures have been unable to pay agencies that are filming for the company, a report in The Times newspaper stated.

    The attackers, who are believed to have links to Pyongyang, have used very sophisticated methods. Joseph Demarest, the assistant director of the FBI’s cyber-division, told a US Senate hearing that the methods used by Guardians of Peace would have managed to hack into nine out of ten company’s computer systems.
    Security experts have estimated that the cost to fix the breach will be in the region of $100 million.

    Sony Pictures has not commented on the issue and cancelled a press conference scheduled for Friday to promote the movie ‘The Wedding Ringer,’ which stars Kevin Hart. The actor was called a ‘whore’ by a Sony executive in emails leaked by the hacking group.

    Security was also tight at the premiere of ‘The Interview’, the film believed to have been the reason behind the hack. The movie caused outrage in North Korea, due to the plot involving the CIA planning to kill the secretive nation’s supreme leader Kim Jong-un.

    The attack began on November 24 when a red skeleton-like image appeared on staff computers alongside a warning that data would be released to the web unless its — unspecified — demands were met.

    READ MORE: Embarrassing: Sony Pictures boss’ shockingly-racist Obama emails exposed

    The company’s problems then started, as four movies were prematurely leaked onto the internet, while sensitive company documents, such as emails and documents listing the salaries of staff members were also released.


  2. Alan Scott says:

    You’re right. I’m sure the end purpose of all the ISIS, Ebola, Sony hack business to tighten up security and get more control over the population. And who’s behind it? Thanks for keeping us informed!

    Liked by 1 person

Please Contribute a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 395 other subscribers
The Worldwide Awakening
Peaceful Awareness & Knowledge Based TransitionSeptember 11, 2017
Exercise freedom and creativity for all Earth’s inhabitants to explore ready breakthroughs in Self Organizing Communities, economics, and technology. This is a D.I.Y. project
State Sponsored Terror
The Big Day ReportMarch 30, 2018
Institutions of crime Big days have come, gone, and come again (Manipulations: Market Exchanges crash, wars, government Elections, and Taxation). Search for what is hidden and for what is not spoken. What secrets are hidden in Antarctica? Be Aware of the next big Day for fraudulent institutions.
Peace Today

Peace Today

RonMamita’s Blog
December 2014
All posts here
Audio coming soon!
%d bloggers like this: