NEW WORLD ORDER: MEDIA: TECH: Cybersecurity is a Racket

By Jiminy Cricket on April 20, 2025, via Miles Williams Mathis

A racket, so you know, is:

“a service that calls forth its own demand and would not have been needed otherwise.”

By that definition, most major industries today are rackets, including:

  • healthcare
  • insurance
  • national defense
  • public safety
  • higher education

and so on.

Miles Williams Mathis: THE MOB PROTECTION RACKET GOES MAINSTEAM – Library of Rickandria

I’m here to tell you we can add one more burgeoning industry to that list.

Here’s what Google AI tells us:

The cybersecurity industry is experiencing substantial growth, driven by increasing cyber threats and the need for robust security solutions, with a global market projected to reach $578.2 billion by 2033.

Why they picked that particular year on which to base their projections, I think you know.

Point being, cybersecurity means big money.

Rush – The Big Money

BOOK: Monsters of Babylon: How the Jews Betrayed Mankind (1550 BC to 1000 AD) – Volume II – 4th Edition – Chapter 1: Big Money Spawns the Self-Chosen Ones – Library of Rickandria

In today’s world, nothing gets to be big money by accident.

NEW WORLD ORDER: BANKING: The Truth Behind Money? – Library of Rickandria

The economy is just a giant cart pulling the horse, with the billionaire and trillionaire families hidden behind private equity and investment groups creating and inflating new markets with Monopoly money.

CIVILIZATION: RICHEST in 19th Century – Library of Rickandria

Information technology is a prime example of that, and cybersecurity is just the latest phase.

It’s analogous to the physical security market.

You’ve seen smart cameras popping up at traffic lights and public squares and school campuses all over your city; how did they ever justify that expense to the public?

By staging fake events like mass shootings, of course.

We need only apply that logic to the digital world to make sense of the rapid rise of the cybersecurity industry.

I offer a single fact, courtesy of Wikipedia, to substantiate my claim:

55 percent of data breaches are caused by organized crime.

Miles has already shown that organized crime was entirely an FBI creation.

Miles Williams Mathis: Al Capone was Fictional – Library of Rickandria

Hoover created the American mafia from whole cloth and sold it to the public in order to justify a massive expansion of the FBI’s budget.

Official portrait, 1961 9.15 MB View full-size Download

John Edgar Hoover (January 1, 1895 – May 2, 1972) was an American attorney and law enforcement administrator who served as the fifth and final director of the Bureau of Investigation (BOI) and the first director of the Federal Bureau of Investigation (FBI). President Calvin Coolidge first appointed Hoover as director of the BOI, the predecessor to the FBI, in 1924. After 11 years in the post, Hoover became instrumental in founding the FBI in June 1935, where he remained as director for an additional 37 years until his death in May 1972 – serving a total of 48 years leading both the BOI and the FBI under eight Presidents.

Miles Williams Mathis: John Dillinger was Fictional – Library of Rickandria

So, to see organized crime responsible for over half of all data breaches just means that your own government officials—and your own tax dollars—are stealing your data.

Theft by Deception – Deciphering the Federal Income Tax

NEW WORLD ORDER: BANKING: Theft by Deception – Deciphering the Federal Income Tax – Library of Rickandria

But wait, why would they need to do that when they already have full access to all of your data via cozy partnerships with:

  • Google
  • Intel
  • Microsoft
  • Apple

etc.?

TECHNOLOGY: MEDIA: GLOBAL CONTROL – Library of Rickandria

In other words, why would the trillionaire families have to steal data they already own?

The only answer that makes sense is that they are trying to sell their latest scam:

cybersecurity.

Computer security – Wikipedia

To be clear, I’m not saying all cyberattacks are perpetrated by your own government.

NEW WORLD ORDER: SHADOW GOVERNMENT: THE DEEP STATE – Library of Rickandria

I am saying all the major ones are, and probably most of the minor ones, too.

And most of the hackers out there are in the employ of national intelligence, whether they realize it or not.

Check out this illuminating post on Quora from an NSA analyst who admits that the NSA tracks down hackers globally, not to hand them over to the FBI, but to recruit them.

Does the NSA always get to the end of finding wanted hackers? – Quora

But let’s dig deeper.

One of the largest cybersecurity firms in the world is Palo Alto Networks.

The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100.

It is a partner organization of the World Economic Forum.

NEW WORLD ORDER: WEF: World Economic Forum – Library of Rickandria

Big red flag there already.

The WEF is not in the business of protecting personal rights or privacy, so why would they want to partner with Palo Alto Networks?

Because the WEF is really about engineering the global economy for the trillionaires’ maximum profit, and cybersecurity is one of their latest high-margin markets.

Palo Alto Networks was founded in 2005 by Nir Zuk, a former engineer from Check Point and NetScreen Technologies.

How I Got Here: Nir Zuk, CTO, Palo Alto Networks | ITworld

Zuk, an Israeli native, began working with computers during his mandatory military service in the Israeli Defense Forces in the early 1990s and served as head of software development in Unit 8200, a branch of the Israeli Intelligence Corps.

NEW WORLD ORDER: MEDIA: INTERNET: OMG, A Jewish History of the Internet – Library of Rickandria

Another huge red flag, isn’t it?

One of the founding fathers of cybersecurity came out of Israeli military intelligence, which is to say American military intelligence.

They are one and the same, you know.

It reminds us of how Google was also created by U.S. intelligence via the CIA’s investment arm, In-Q-Tel, and how the entire internet was a DARPA project.

NEW WORLD ORDER: DARPA: Defense Advanced Research Projects Agency – Library of Rickandria

Speaking of Google:

In June 2018, former Google and SoftBank executive Nikesh Arora joined the company as Chairman and CEO.

Arora in 2015 2.07 MB View full-size Download

Nikesh Arora (born February 9, 1968) is an Indian-American business executive. He has been the chairman and chief executive officer of the American cybersecurity company Palo Alto Networks since June 2018. Arora was formerly a senior executive at Google and president of SoftBank Group from October 2014 to June 2016. According to the Bloomberg Billionaires Index, his net worth was estimated at $1.5 billion in early 2024.

There are no Google executives who are not on the U.S. intelligence payroll, which indicates Palo Alto Networks is just another CIA or DoD front.

The President of Palo Alto Networks is BJ Jenkins, who previously worked at EMC Corporation.

Palo Alto Networks Nabs Barracuda Networks CEO BJ Jenkins As President | CRN

EMC was a big-time:

  • data storage
  • cybersecurity
  • cloud computing

company founded by Richard Egan.

image.png 94.6 KB View full-size Download

Richard John Egan (February 28, 1936 – August 28, 2009) was an American business executive, political fundraiser, and United States Ambassador to Ireland (2001–2003).

Where did Egan come from?

Before founding EMC, he was on the team that helped develop Project Apollo memory systems for NASA and also worked at Lockheed Martin and Intel.

Another big cybersecurity firm is CrowdStrike, which was founded in partnership with the private equity firm Warburg Pincus.

They come from the infamous Warburg banking family, who were Venetian Jews and one of the wealthiest families in the world going all the way back to the 1500s.

Warburg family – Wikipedia

Two of Crowdstrike’s top executives, Shawn Henry and Steve Chabinsky, are former FBI officials.

Are you starting to get the picture?

We can go back further.

The first commercial antivirus software was developed by John McAfee.

McAfee at Politicon in 2016 1.88 MB View full-size Download

John David McAfee (/ˈmækəfiː/ MAK-ə-fee; 18 September 1945 – 23 June 2021) was a British and American computer programmer, businessman, and two-time presidential candidate who unsuccessfully sought the Libertarian Party nomination for president of the United States in 2016 and in 2020. In 1987, he wrote the first commercial anti-virus software, founding McAfee Associates to sell his creation. He resigned in 1994 and sold his remaining stake in the company. McAfee became the company’s most vocal critic in later years, urging consumers to uninstall the company’s anti-virus software, which he characterized as bloatware. He disavowed the company’s continued use of his name in branding, a practice that has persisted in spite of a short-lived corporate rebrand attempt under Intel ownership.

Remember that guy?

image.png 212 KB View full-size Download

He tried to run for president on the Libertarian ticket in 2016 and 2020, which goes to show what a joke the Libertarian Party has become (if it was ever not a joke).

Tim Dowling has McAfee’s genealogy up at Geneanet, where we learn he is a:

  • Ball
  • Locke
  • Atherold
  • Waltham
  • Croxdale
  • Webb

and Hathaway.

William Ball : Family tree by Tim DOWLING (tdowling) – Geneanet

That makes him a relative of:

among many others.

The Webb line takes us directly back through de Richmonds and de Burghs to the Plantagenets, meaning he is European royalty.

BOOK: European Royal Bloodlines of the American Presidents – Library of Rickandria

He was also born on a British U.S. Army base, and his mother is English, so the royal blood is likely even more recent.

He worked for:

  • NASA
  • Lockheed
  • Booz Allen Hamilton

before starting his antivirus software company—all major red flags.

McAfee allegedly died in 2021, but his own ex-girlfriend claims he faked his death.

John McAfee’s ex-girlfriend claims he faked his own death | The Independent

Do you think that bozo was ever involved in anything real?

His whole life, including his death, was a scam, and that goes for his antivirus software, too.

Anyone who ever had McAfee software on their computer knows it acted more like a virus than an antivirus, slowing your computer way down and bugging out constantly.

But I don’t mean a scam in that way.

I mean the whole virus vs. antivirus war was controlled from both sides, just like physical wars.

NEW WORLD ORDER: JEWISH BANKSTERS’ WAR ON AMERICA & THE WORLD – Library of Rickandria

So, the move from defense contracting to antivirus software makes a lot of sense.

Can we tie major cyberattacks back to U.S. intelligence?

Of course we can.

The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.

WannaCry ransomware attack – Wikipedia

It was propagated using EternalBlue, an exploit developed by the United States National Security Agency (NSA) for Windows systems.

EternalBlue – Wikipedia

EternalBlue was stolen and leaked by a group called The Shadow Brokers a month prior to the attack.

Wikipedia is writing my paper for me at this point.

Miles Williams Mathis: Jimmy Wales & the founding of Wikipedia – All the World’s a Stage – Library of Rickandria

One of the biggest cyberattacks in history used an exploit created by the NSA, yet we are supposed to believe the NSA had nothing to do with the attack.

But wait, why would Microsoft allow the NSA to create its own private back door into its operating system?

That is explicitly what Wikipedia tells us.

NEW WORLD ORDER: MEDIA: INTERNET: The Jewish Hand Behind the Internet – Wikipedia – Library of Rickandria

The obvious answer is that both Microsoft and the NSA are simply different departments of the same company.

And how on-the-nose is a group calling themselves “The Shadow Brokers”?

They might as well call themselves The Hidden Hand of Phoenicia or The Isle of Man Bugbears.

But who are they?

The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016.

The Shadow Brokers – Wikipedia

They published several leaks containing hacking tools, including several zero-day exploits, from the “Equation Group” who are widely suspected to be a branch of the National Security Agency (NSA) of the United States.

Equation Group – Wikipedia

See the merry-go-round they are creating for us?

WannaCry used an NSA exploit leaked by The Shadow Brokers, who actually leaked it from the Equation Group, who is actually the NSA.

But it gets better, since Wikipedia tells us it is Lazarus Group who is suspected of being behind WannaCry.

Lazarus | OFFICIAL TRAILER | adult swim

Lazarus Group – Wikipedia

They’re the ones who actually used the leaked exploit from TSG/Equation to perpetrate the attack.

“leaked” internal NSA memo tells us that Lazarus comes out of North Korea.

NEW WORLD ORDER: COMMUNISM: North Korea – Library of Rickandria

However, Kaspersky also acknowledged that the repetition of the code could be a “false flag” meant to mislead investigators and pin the attack on North Korea, given that the worldwide WannaCry worm cyberattack copied techniques from the NSA as well.

They’re basically admitting the NSA was behind it all.

NEW WORLD ORDER: GLOBAL INTELLIGENCE: NSA: The Super-Secret National Security Agency – Library of Rickandria

  • The Shadow Brokers
  • Equation Group
  • The Lazarus Group

are all just codenames for NSA.

It takes less than half a brain to figure that out.

Park Jin Hyok is one of the alleged masterminds behind The Lazarus Group.

Upscaled photo from Park’s FBI wanted poster 2.4 MB View full-size Download

Park Jin Hyok (Korean: 박진혁) is a North Korean programmer and hacker. He is best known for his alleged involvement in some of the costliest computer intrusions in history. Park is on the FBI’s wanted list. North Korea denies his existence.

That’s the only photo we get of him, and it reeks of CGI.

His clothes don’t look real, as if they’re some sort of AI composite.

North Korea denies his existence, which is a little inside joke, since they’re actually telling you the truth.

Park is on the FBI’s Most Wanted list, which just tells you he is an intelligence asset or ghost.

Most Wanted — FBI

Everyone on FBI’s Most Wanted is an agent.

That’s true whether he exists or not.

At this point it’s probably easier for them to AI-generate all their criminals, since using real people runs the risk of them blabbing at their retirement party after a few too many glasses of Moët.

Park and The Lazarus Group used ransomware to extort $81 million from the Bangladesh Central Bank in 2016.

Sure, because why ask for an even 80 mil when you can demand 81?

How else will they get their Dead Man’s Hand in there?

Here is some more pretty explicit evidence the NSA is behind cyberattacks:

The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S 32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA).

Via TAO, the NSA has admittedly created several cyberattack methods, including QUANTUM.

The Next Big Cyber Threat Could Come from Quantum Computers… Is the Government Ready? | U.S. GAO

Why would the NSA, who is supposedly trying to prevent cyberattacks, be creating the ransomware that enables them in the first place?

It gets better:

Microsoft provides advance warning to the NSA of vulnerabilities it knows about, before fixes or information about these vulnerabilities is available to the public; this enables TAO to execute so-called zero-day attacks.

A Microsoft official who declined to be identified in the press confirmed that this is indeed the case but said that Microsoft cannot be held responsible for how the NSA uses this advance information.

We are told these attacks are used on foreign entities.

Okay, but why would we just take the NSA’s word for it?

Do we really think their word means anything?

It’s just a bald claim with no proof, like everything else the NSA tells us.

Remember, we just saw them blaming WannaCry on North Korea when it’s covered in the NSA’s own fingerprints.

But you see how this explains the mechanism by which the NSA can perpetrate cyberattacks on the American public: Microsoft tells them about vulnerabilities before they fix them.

But we already caught them admitting the NSA creates those back doors themselves with Microsoft’s blessing, which means we’ve caught them in a major lie here.

You can’t pretend to be vigilant about finding vulnerabilities when you allow other vulnerabilities to be built into your product in the first place.

Speaking of North Korea, let’s not forget that entire country is just a front for U.S. intelligence.

You might remember this photo of the main mission control center for their space program:

image.png 280 KB View full-size Download

Their space program wasn’t launched until 2012, but apparently, they could only find computers from 1985.

Of course, nothing you see on any of those screens means anything, and those men in white lab coats (why lab coats?) are just paid actors.

Do you think North Korea also has a room like this full of hackers?

Are they also wearing lab coats?

Well, actually:

image.png 340 KB View full-size Download

No lab coats, but we do get a man drawing the North Korean flag in Paint on a state-of the-art Windows 95 PC!

That’s the lead photo in a 2013 Wired article titled “Pentagon Warns North Korea Could Become a Hacker Haven”.

Pentagon Warns North Korea Could Become a Hacker Haven | WIRED

Yeah, we’re all shaking in our boots.

Here’s the first line of the article:

North Korea is barely connected to the global internet.

But it’s trying to step up its hacker game by breaking into hostile networks, according to a new Pentagon report.

Oi Vey, the things they expect us to believe!

Here’s another laugh for you:

image.png 268 KB View full-size Download

“After an intense birdwatching session, Kim Jong Un and his gay pals catch up on season 3 of Will & Grace.”

How about that big Equifax data breach—remember that?

Here’s Wang Qian, one of the four PLA masterminds behind it:

image.png 129 KB View full-size Download

CHINESE PLA MEMBERS, 54th RESEARCH INSTITUTE — FBI

They couldn’t do any better than that?

Pathetic, guys.

Another well-known computer worm is Stuxnet.

Wikipedia tells us Stuxnet is believed to be responsible for causing substantial damage to the nuclear program of Iran.

Miles Williams Mathis: Iran’s Jewish Rulers – Library of Rickandria

Although neither the United States nor Israel has openly admitted responsibility, multiple independent news organizations claim Stuxnet to be a cyberweapon built jointly by the two countries in a collaborative effort known as Operation Olympic Games.

Funny, isn’t it, how behind every door where we’d expect to find some malicious and shadowy hacking group, we find our own intelligence agencies, instead.

And since the nuclear program of Iran is about as real as North Korea’s space program, we can peg all of this for what it is:

fake attacks on fake enemies to extort real money via the U.S. Treasury.

Miles Williams Mathis: The Nuclear Hoax – Library of Rickandria

This is racketeering at its finest.

The NSA creates the problem so that it can sell a solution:

The idea behind the defense in depth approach is to defend a system against any particular attack using several independent methods.

It is a layering tactic, conceived by the National Security Agency (NSA) as a comprehensive approach to information and electronic security.

In other words, your company needs to spend hundreds of thousands of dollars each year on multiple IT security layers; the more “robust” (read: expensive) the better.

That’s where firms like Palo Alto Networks come in.

To bring this all home, can you guess who the top shareholders of Palo Alto Networks are?

That’s right:

  • Vanguard
  • BlackRock
  • Morgan Stanley
  • State Street

and Bank of America.

Miles Williams Mathis: DID BLACKROCK/VANGUARD BUY THE ENTIRE WORLD? – Library of Rickandria

Same for CrowdStrike:

  • Vanguard
  • BlackRock
  • State Street

and Morgan Stanley.

These are the investment groups of the trillionaire families that also control:

  • the NSA
  • the FBI
  • the CIA

and even all the huge “public” corporations that are being “hacked”.

That’s why most of these ransomware attacks demand bitcoin—it’s the intelligence community’s native currency, so it’s more convenient and keeps it off the books.

And if a large company must pay a ransom, it’s just robbing Peter to pay Paul, since both the victim and the attacker are part of the same family holdings.

Unless it’s one trillionaire family attacking another, which is possible.

But in that case, the families aren’t burdened by the increasing costs of cybersecurity—YOU are.

Companies just raise the prices on their goods and services to cover additional G&A costs, and that includes cybersecurity.

As usual, you the consumer and taxpayer are left holding the bag.

CONTINUE

NEW WORLD ORDER: GLOBAL INTELLIGENCE: CIA: Vault 7 – CIA Hacking Tools Revealed – Library of Rickandria

SAUCE

cyber.pdf 465 KB View full-size Download

cyber.pdf


Cybersecurity is a Racket