Speculative post here - read if you want to know what's coming down the pipeline probably in regards to censorship and whats already happening which the public and buisnesses are blind too ...
Keep in mind most everything from here on out in this post is simply connecting the dots. So, keep in mind that when reading this...the main speculation here is simply that censorship is possibly occuring (or at very least can and does occur) constantly via 'Secure Severs' which are being monitored for none other than 'security' reasons.
Why this matters...
It's public knowledge your informaiton is being tracked and bought and sold (supposedly) - which is most likely actually occuring and I'm not making a case against that here, I'm going to attempt to make a case though for why 'Secure Buisnesses' and the Government itself are in fact working in unison, if not inadvertently working off of each other.
This is not simply about public information being bought and sold or even you being tracked, while that's important, it doesn't seem to be the main intent of the overall online schemata and agenda of the surveillance state.
Ultimately the spider and fly are the same; in other words the spider is caught in its own web, by design, what we think is the fly is actually the spider and vice versa.
Let me explain...
Does anyone even remember 'SolarWinds Orion hack'? The "[...] breach of nine federal agencies discovered late last year.":
Agency hacks could accelerate push to zero trust security model (
https://fcw.com/articles/2021/03/19/zero-trust-hacks-congress.aspx)
Ok so I'm not going to go into the whole long technical aspect here because I neither fully understand it completly nor do I consider it relevant but here's a synopopsis of this: most people reading this are probably familiar with how a VPN at very least works; your IP becomes masked and you use a server located elsewhere etc. Ok, so that's obvious. What about remote browsing and or browser isolation; i.e. working in the cloud? Seems obvious enough also right? Or how about the zero trust security model? Still following along anyone?
Again, the intent here won't be to go in-depth on these topics, most all of us use them almost daily unaware and if you're a buisness and are using them you think you have security, but it would seem if we connect a few dots here, we'll begin to see the larger picture I'm going to draw.
If you work in the federal government or even remotely you most likely work in the cloud, the basic assumption is that your browsing and data and all the rest of your activity is not being stored locally; i.e. it's being virtually rendered on other servers and not processed directly to your computer. Ok, so again, I need to preface, this is not a very complex concept yet it requires repeating for everything else I'm going to mention here so I'm drilling it in early.
Many buisnesses are goi to remote browser. If you don't know what remote browsing is read this (
https://webgap.io/learning/what-is-remote-browsing.html), then come back.
WEBGAP is responsible for " [...] the team that built the worlds first production remote browsing platform for the US federal government."
This is a key component of the speculative story I'm going to conjecture on so keep that in mind.
Here's a list of other Browser Isolation Cybersecurity Vendors: (
https://index.co/list/16767-browser_isolation_cybersecurity_remote_browsing/companies).
By no means an all encompassing list. The point of interest here is that cybersecurity is being co-opted and has incredibly high risk attached to private buisnesses directly linked to the government. This is (again speculation) but an incredible security threat. The irony, if you can call it that (because it appears intentional to some degree) is that 'security' companies have your data in the cloud and if a buisness you think you're signing up for security - and you may very well be - my intent is by no means to throw anyone under the bus here because unless you audit every security buisness and know the staff and the companies actual reviews of information and follow through on their privacy policies how can you know for certain at what information is being harvested and what isn't? You really don't is the answer.
So where am I going with this? As I said the cybersecurity infrastructure being used for many many buisnesses is also being used with the government. On the surface cybersecuirty does not appear as though it itself would be the threat, but this is exactly what I'm going to be suggesting here; i.e. the actual possible security threat is in fact the 'security' vendors themselves.
Cybersecurity - muchlike I would say stocks and daytrading - is very much foreign to most people, even individuals who make a high salary, it's easy to assume they understand exactly whats going on because of the "halo effect" in a way; many deluded individuals believe status and wealth makes someone a 'good person' or simply trustworthy.
Ok, so there's the introduction...
Anyone know who Gideon Gartner is? I actually had no idea who he was until I started researching Gartner's more...you can read about them here (
https://en.wikipedia.org/wiki/Gartner). Apparently in the IT consulating world they are considered 'reptuable' and have 'accurate' information. As readers of this forum are probably aware or keen too, whenever 'predictions' are made it is normally (though obviously speculative) a leap in logic towards potentially a 'plan' of some sorts. Government training excercises have 'goals' and longterm plans they try to hit and consulating firms are no different it would seem. On the surface this sounds like simply 'tech trends' and 'predictions', yet it seems very convaluted and the language is rather dense. Regardless Gartner put out a list of govt trends (expectations) for 2021.
Keep in mind this is in AUS, yet keep in mind the multilateral UKUSA Agreement; i.e. the five eyes. "The
Five Eyes (
FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence."
Here's #1:
X-as-a-service will make up 95 percent of govt IT investments by 2025.
www.crn.com.au
---
"Gartner’s top 10 govt tech trends for 2021
Gartner has outlined a list of 10 government technology trends to meet the challenges that arose as a result of the 2020 pandemic.
“The COVID-19 pandemic has spurred the acceleration of digital innovation across the government sector around the world, presenting government leaders with new opportunities to use data and technologies to build trust, agility and resilience in public institutions,” Gartner research vice president Rick Howard said.
“While pandemic-related challenges will continue for some time, technology trends have emerged that address critical challenges in areas such as security, cost containment and citizen experience.”
- Accelerated legacy modernisation
Government CIOs are accelerating the move to modern, modular architectures.
The
pandemic exposed the need to move up the
timeline of modernisation to combat modern risks and take advantage of the advances it can offer.
Gartner has
predicted that by 2025,
over 50 percent of government agencies will have modernised critical core legacy applications to improve resilience and agility."
---
Ok, take a deep breath and think through for a moment. What 'modern risks' are they actually referring to here, and it's not the 'pandemic'.
A
Government CIO ... aka cybersecurity. (
https://www.governmentcio.com/about/).
"GovernmentCIO was founded in 2010 with a single purpose: to
transform government IT. Our team combines legacy experience in the federal space with innovation and disruptive approaches that make
Silicon Valley great. By
blending those two cultures, GovernmentCIO has the
connections we need to navigate government bureaucracy, while leveraging futuristic design, development and technology solutions that can
transform how federal agencies manage their IT. Our unique culture and proven track record of success are essential for federal agencies to bring critical government services within reach of its citizens."
This makes WEF look like childsplay.
It's not foolish to want cybersecurity, in fact it's imperative, yet cnnect a few more dots here and we start to see the house of cards fall down fairly quickly. Allowing outside private buisnesses to manage federals security is a fools errand,. Silicion valley working in unision with the government is foolish. Yet this seems to be where it began:
en.wikipedia.org
For the record, wikipedia is more or less a controlled entity in many ways, simply by vitrue of group think if anything else. With that being said consider that what you see in wikipedia, I would gather, espcialy in regards in to politics and subversion tactics, is of ill-repute most assuredly.
Regardless, back to the potential explanation for all of this. Subversion occurs most often it seems not by dissenting and throwing all caution to the wind, but by giving them what they want with parameters attachd. By 'getting' cyber 'security', you think you're secure; i.e. so you don't even realize where the real problem is coming from. A lot of this rolls back to the illusionary nature of computers; people don't understand them and how they work, in a word they can be confusing.
This brings us back to the "[...] breach of nine federal agencies discovered late last year."
You can read about it here:
Three top cybersecurity officials struggled to answer questions from lawmakers about who is to blame for the government's failure to stop the breach of nine federal agencies.
fcw.com