Are the Accusations of Russian Hacking an Israeli False-Flag Operation?
December 31, 2016
“State-sponsored Russian hacking is a serious threat, and the attempts to penetrate the electric grid through a Vermont utility are the latest example.”
– Sen. Patrick Leahy, D-Vermont, December 30, 2016
“Vermonters and all Americans should be both alarmed and outraged that one of the world’s leading thugs, Vladimir Putin, has been attempting to hack our electric grid, which we rely upon to support our quality-of-life, economy, health, and safety.”
– Vermont Governor Peter Shumlin, December 30, 2016
“The only way to liberate ourselves and our nations from this madness is to expose the true source of terrorism.”
– Christopher Bollyn
Today, in yet another claim that Russia is hacking crucial U.S. computer systems, the Washington Post has an article that blames Russia for hacking into an energy utility computer network in Vermont.
See: “Russian operation hacked a Vermont utility, showing risk to U.S. electrical grid security, officials say”
The essence of the news reports that Russia is behind the hacking is that malware code that is “associated” or “linked” with Russia was found on a laptop at the company:
While the Russians did not actively use the code to disrupt operations, according to officials who spoke on the condition of anonymity to discuss a security matter, the discovery underscores the vulnerabilities of the nation’s electrical grid. And it raises fears in the U.S. government that Russian government hackers are actively trying to penetrate the grid to carry out potential attacks…
Burlington Electric said in a statement that the company detected a malware code used in the Grizzly Steppe operation in a laptop that was not connected to the organization’s grid systems. The firm said it took immediate action to isolate the laptop and alert federal authorities.
AN ISRAELI FALSE-FLAG OPERATION?
While it is certainly possible that Russian hackers are behind the hacking at Burlington Electric, what is far more likely is that a third-party hacker broke into the laptop and left the malware code “associated” with Russia in order for Putin to be blamed. This would mean that the hacking is a false-flag operation meant to be blamed on Russia. Such an operation would be easy for a professional hacker such as Amit Yoran, the Israeli who oversaw cyber-security for the Dept. of Defense prior to 9/11. Israel has an entire branch of military intelligence, Unit 8200, which specializes in hacking into foreign computer networks.
Amit Yoran is an Israeli hacker who made a business out of hacking public utilities like Burlington Electric.
Yoran also worked on security for the Pentagon computers prior to 9/11. He also worked with computer security companies tied to Israeli military intelligence. He went on to work for RSA, another Israeli military linked company that provided encryption software for the NSA.
Amit Yoran, who is described in my book Solving 9/11, actually headed a company that hacked into foreign utility companies. Here is the relevant information from “The Architecture of Terror”, Chapter 7 of Solving 9-11: The Deception that Changed the World:
AMIT YORAN’S “ETHICAL HACKERS”
“Mr. [Amit] Yoran is chief executive of Riptech, a U.S. company that employs ‘ethical hackers’ to test vulnerability of networks, including those of utility companies,” the Irish Times reported on October 5, 2001. “He [Yoran] says his teams have had success in disrupting utilities’ power networks, in Europe particularly,” according to the article, which was aptly titled, “Welcome to the Art of Electronic Warfare.” The Yorans’ company hacked into the computer networks of dozens of energy companies, the Los Angeles Times reported on August 20, 2001:
Riptech Inc., a security company in Alexandria, Va., has tested security for dozens of energy-industry clients. In every case, the firm penetrated Internet-connected corporate networks and often hopped from those networks into supposedly sealed grid-control systems, according to Riptech’s president, Amit Yoran…
Riptech “was founded by Elad and Amit Yoran, two Israeli West Point graduates who claim years of security experience, and Tim Belcher, a Desert Storm veteran who serves as the company’s chief technology officer,” the Washington Times reported on December 11, 2000. “Amit Yoran reportedly helped design the Pentagon’s computer security architecture,” the Times reported.
Riptech was funded by companies associated with Israeli military intelligence through Amit’s brother Elad.
From Solving 9-11, “The Architecture of Terror”:
Yoran had been a vice president with Broadview, one of the mysterious funding entities of Riptech, prior to joining Riptech. Elad Yoran was clearly performing two functions for Riptech: funding the company through his position as “vice president at Broadview International,” an unknown source of funds that poured millions of dollars into Riptech, and as “executive vice president” of Riptech, the privately-held recipient company he co-founded with his brother in 1998. It is through such secretive “venture capital” funding entities like Broadview and Veritas Venture Partners that the hand of Israeli military intelligence can be clearly seen running the computer network “security” companies they have spawned, like Guardium.
Yoran’s link to Guardium is important because this is one of the key links between Israeli military intelligence, Ptech, and 9/11. I wrote more about Yoran and these connections in a 2006 article entitled “The Israeli Code on U.S. Government Computers”:
RSA, for example, an older security software company, acquired an Israeli-run security software company, named Cyota, at the end of 2005 for $145 million. In January 2005, Cyota, “the leading provider of online security and anti-fraud solutions for financial institutions” had announced that “security expert” Amit Yoran, had joined the company’s board of directors. Prior to becoming a director at Cyota, Yoran, a 34-year old Israeli, had already been the national “Cyber Czar,” having served as director of the Department of Homeland Security’s National Cyber Security Division. Yoran had been appointed “Cyber Czar” at age 32 by President George W. Bush in September 2003.
Before joining DHS, Yoran had been vice president for worldwide managed security services at Symantec. Prior to that, he had been the founder, president and CEO of Riptech, Inc., an information security management and monitoring firm, which Symantec acquired in 2002 for $145 million.
Yoran and his brother Naftali Elad Yoran are graduates of the U.S. Military Academy at West Point. Elad graduated in 1991 and Amit in 1993. Along with their brother Dov, the Yoran brothers are key players in the security software market. Amit has also held critical positions in the U.S. government overseeing computer security for the very systems that apparently failed on 9-11.
Before founding Riptech in 1998, Amit Yoran directed the vulnerability-assessment program within the computer emergency response team at the US Department of Defense. Yoran previously served as an officer in the United States Air Force as the Director of Vulnerability Programs for the Department of Defense’s Computer Emergency Response Team and in support of the Assistant Secretary of Defense’s Office.
In June 2005, Yoran joined the board of directors of Guardium, Inc., another Mossad-spawned “provider of database security solutions” based in Waltham, Massachusetts. Guardium is linked with Ptech, an apparent Mossad “cut out” computer security company linked with the 9-11 attacks.
WHY WOULD ISRAEL DO SUCH A THING?
Why would Amit Yoran, or any other Israeli (like the military intelligence hackers at Unit 8200) want to frame Putin by leaving code to make it appear that Russia is hacking into U.S. utilities or political parties?
There are several reasons why the Israelis would do something like this:
1. As pay-back for Russia’s intervention in Syria, which succeeded in disrupting the Israeli plot to “Balkanize” Syria by breaking the country into smaller units;
2. To disrupt peaceful and harmonious relations between the United States and Russia, which threaten Israeli hegemony over the occupied territories and the Near East. If Russia and the U.S. co-operate and engage together to try to solve the problems in the Middle East, Israel would be forced to make compromises to settle the Palestinian problem – something that Benjamin Netanyahu and his far-right government are strongly opposed to.
3. To vilify Russian president Vladimir Putin in the eyes of the Western public. This is because Putin is an obstacle for the Zionist Neo-Cons who seek to impose their agenda on the world. There is virtually no resistance to this agenda in the West where the media is controlled by corporations that support that agenda. As we see in Syria, Russia under Putin is able to thwart the Zionist Neo-Con war agenda. The Neo-Cons and the powers that control the Western media would also like to see regime change in Russia, so vilification of Putin serves their agenda.
To support Christopher Bollyn’s work
donate by PayPal to firstname.lastname@example.org
or click here: www.bollyn.com/donate/
Sources and Recommended Reading:
Amit Yoran, Wikipedia, December 31, 2016
Diagram: Network of Israeli individuals and companies which supplied hostile spy software to critical US government computer systems prior to 9/11
“How Israel Spies on Us All through the NSA” by Christopher Bollyn, July 1, 2013
“The Architecture of Terror: Mapping the Network Behind 9/11” by Christopher Bollyn, July 25, 2008
“The Israeli Code on U.S. Government Computers” by Christopher Bollyn, June 16, 2006
Same article is at “Israelis Hold Keys to NSA/US Military Computer Networks” by Christopher Bollyn, June 16, 2006
“The Israeli Criminals behind the NSA Spy Scandal” by Christopher Bollyn, June 13, 2013
“Why NSA Spying Never Catches Israelis” by Christopher Bollyn, July 14, 2013
Note: Due to the transfer of information from the original website to this updated format, some article post dates may differ from the date they were originally published. However, most articles contain the actual publish date at the top of the article.