UPDATE 13. May 2022: Communist China Sliding toward North Korean Mode—International Telephone Service Cut off
UPDATE 18. April 2022: SUCCESS: DIGITAL ID CANCELLED IN SASKATCHEWAN, CANADA; BUT DOCTORS THROWN IN PSYCHIATRIC DETENTION, COVID & KING COBRA
UPDATE 25. March 2022: DIRE WARNING - GIVE THE EU HELLFIRE !!! - If YOU as EU citizen will not squash these criminal EU bureaucrats, this nightmare will become reality for you after 30. June 2022:
UPDATE 30. January 2022: WARNING: Make additional contracts with Banks and Payment Services to never withhold your funds - if they disagree: CHANGE IMMEDITELY !
PROLOGUE: The WHO, the CDC, countless governmental databases containing the data of COVID-19 victims, of those who received injections and the contact tracing app servers have been hacked by governmental as well as non-governmental "hackers" (who both are just criminals) - and now even the International Red Cross (ICRC) became the victim. Is someone gathering a database with the names of the most vulnerable 'useless eaters' earmarked to be exterminated? Since the ICRC based on their mandate in war and in war zones has a special status, the hacking of the ICRC servers actually amounts to a war crime.
Cyber Attack Hacks International Red Cross (ICRC) - Are Over Half a Million Highly Vulnerable People Now Under Direct Threat?
What we know
The ICRC determined on 18 January that servers hosting the personal information of more than 500,000 people receiving services from the Red Cross and Red Crescent Movement were compromised in a sophisticated cyber security attack. We take this cyber-attack extremely seriously and have been working with our humanitarian partners around the world to understand the scope of the attack and take the appropriate measures to safeguard our data.
By ICRC - 21. JANUARY 2022
Latest update as of 25 January 2022, 09:00 CET. Here are some answers to questions based on the latest information that we can share. We will continue to update this Q&A with new information based on the latest developments and adapt language for accuracy.
1. What happened?
One of our cyber partners detected an anomaly on ICRC servers that contained information relating to the global Red Cross and Red Crescent Movement's Restoring Family Links services, in which we work across countries to reconnect people separated by war, violence, migration and other causes. We then did a deep data dive with our partner and determined that hackers had been inside these systems and had access to the data on them.
The nature of the attack meant we could not guarantee the integrity of the system, so we took the compromised servers offline. We are now going through each application log to better understand what occurred. We do not believe that the data has been tampered with at this time, but to be sure we are hiring an independent audit firm to confirm this.
We also feel it is important to clarify that this was a targeted, direct cyber-attack on ICRC servers, not the company that hosted them. We manage the data and applications on these servers, not the hosting company. We cannot give any further information on the technical details of how the attack was carried out due to the ongoing nature of the situation.
2. Who is behind this attack?
We do not know who is behind this attack. We have not had any contact with the hackers and no ransom ask has been made. In line with our standing practice to engage with any actor who can facilitate or impede our humanitarian work, we are willing to communicate directly and confidentially with whoever may be responsible for this operation to impress upon them the need to respect our humanitarian action.
3. What are we doing to respond to the breach?
We are working with concerned ICRC delegations and Red Cross and Red Crescent societies on the ground to find ways to inform individuals and families whose data may have been breached, what measures are being taken to protect their data and the risks they may possibly face. We took the compromised servers offline and are now in the process of identifying short-term solutions to enable Red Cross and Red Crescent teams worldwide to continue providing related humanitarian services for the people impacted by this breach.
4. Were data sets copied and exported?
We must presume so. We know that the hackers were inside our systems and therefore had the capacity to copy and export it. To our knowledge the information has not been published or traded at this time. It is also important to share that we believe that no data was deleted and we are working on interim solutions for Red Cross and Red Crescent teams to continue supporting families separated from or without news from their loved ones.
5. What information did the hackers have access to?
The breach included personal data such as names, locations, and contact information of more than 515,000 people from across the world. The people affected include missing people and their families, unaccompanied or separated children, detainees and other people receiving services from the Red Cross and Red Crescent Movement as a result of armed conflict, natural disasters or migration. Login information for about 2,000 Red Cross and Red Crescent staff and volunteers who work on these programs has also been breached. No other information at the ICRC was compromised due to the segmentation of the systems.
6. There are reports that information is now for sale on the dark web. Have you investigated those and what have you found?
We have a dedicated team who are following any reports we receive of data being available on the dark web. Right now, we do not have any conclusive evidence that this information from the data breach has been published or is being traded. If we determine that one of these reports is genuine, we will share this information publicly and transparently.
7. Who are we working with?
We have partnered with highly specialised firms to help us with this, and the Red Cross and Red Crescent network is in contact with the competent national authorities.
8. How does this impact our work?
Every day, the Red Cross and Red Crescent Movement helps reunite 12 people with their families. Cyber-attacks like this jeopardise that essential work. As a result of this breach, we have been forced to take the data hosting systems in question offline, severely limiting the humanitarian services we can offer to the over half a million people affected. States have mandated impartial humanitarian organizations, such as the ICRC, with specific responsibilities. These include collecting information on people reported missing in order to reconnect separated family members. We need a safe and trusted digital humanitarian space in which our operational information, and most importantly the data collected from the people we serve, is secure. This attack has violated that safe digital humanitarian space in every way.
9. What impact could this have on people's confidence and trust in the ICRC to protect their personal data?
A significant impact, and this is one of our greatest concerns. This cyber-attack could cost us the trust of people we serve to share with us data we need to be able to help them. The data that was breached was collected by Red Cross and Red Crescent societies across the world with the aim of helping some of the most vulnerable reconnect with their families or find a missing loved one. We cannot do this work across countries and oceans without sharing data across the Red Cross and Red Crescent Movement. This work is mandated by States and we are not able to do it without people having the faith and confidence in us to share this information to help find them answers.
10. How could this data be used to cause harm?
We do not wish to speculate on any possible misuse of this data. However, it is important to remember that this data was collected to enable the Red Cross and Red Crescent Movement to trace and track missing people. If misused or in the wrong hands, it could potentially be used by States, non-state groups, or individuals to contact or find people to cause harm. This hack undermines peoples' privacy and safety as well as the Red Cross and Red Crescent Movement's humanitarian protection and assistance operations.
11. Why did we outsource personal and confidential data to a third-party supplier?
We chose this company and have them as a longstanding supplier because they have the same rigor and standards as we would for any servers hosted in-house. We want to reiterate that this was a direct attack on ICRC servers, not the company that hosted them.
12. What systems were in place to prevent an attack like this from happening?
We at the International Committee of the Red Cross have been warning for years of an increase in cyber-attacks on health-care facilities, as well as our increasing concern about data protection in humanitarian situations. We have been long aware of the danger that our data could one day be the target of an attack. We have invested substantially in cyber security and work with trusted partners to maintain high standards of data protection and systems. We have also invested in systems to help us detect any suspicious activity, which is how we came to know of this cyber-attack. To ensure we have professional cyber-defense, we contract an external company each year to audit our systems. However, this attack shows that these systems are not immune from highly sophisticated cyber operations and we want to reiterate that it is crucial that data collected and stored for humanitarian purposes is not the target of attack.
13. What should I do if I think my data might have been accessed in the cyber-attack?
For anyone concerned about their data, please contact your local Red Cross or Red Crescent national society or the International Committee of the Red Cross office in your own country. We know you entrusted us with personal information and details about often traumatic events in your lives. This is not a responsibility we take lightly. We want you to know we are doing everything we can to restore the services that we offer across the world. We will work hard to maintain your trust so we can continue to serve you.
SEE EARLIER COMPILATIONS:
- 1. You Will be Subject to Total Control V
- UPDATE 14. January 2022: How2: Remove a Car GPS tracker UPDATE 05. January 2022: Big Tech is Targeting You UPDATE 02. January 2022: Bosnia become first country in Europe without COVID pass UPDATE ...
- Created on 14 January 2022
- 2. You Will be Subject to Total Control IV
- UPDATE 13. September 2021: VICTORY: For the second time: England vaccine passport plans ditched ... but ... + Boycott Vaccine Mandates and Covid Passports UPDATE 08. September 2021: ProtonMail Logged ...
- Created on 28 December 2021
- 3. You Will be Subject to Total Control III
- UPDATE 08. July 2021: Global Vaccine Passports Have Arrived Courtesy of Google, EU UPDATE 29. June 2021: Vaccine passports: It's all over! UK Cabinet agrees it's time to 'live with Covid'... and you ...
- Created on 30 August 2021
- 4. You Will be Subject to Total Control II
- UPDATE 01. June 2021: Obama Administration Used Foreign Intelligence Service To Spy On U.S. Allies In Europe: Report UPDATE 02. April 2021: SECURITY FOR HAMBURG'S CITY CENTRE - Robot dog on trial in ...
- Created on 21 June 2021
- 5. You Will be Subject to Total Control
- - if we don't stop this together and NOW! UPDATE 15. January 2021: When conspiracy theories come true: Sunday Times under fire for branding Covid vax passports as ‘freedom certificates’ + Baby Social ...
- Created 2020
Communist China Sliding toward North Korean Mode—International Telephone Service Cut off
By Ping - 13. May 2022
Communist China is ramping up decoupling from the international community. As reported by the Chinese Communist Party’s media, Zhejiang Mobile Company announced that telephone service to receive international or Hongkong/Macau/Taiwan phone calls will be switched to the mode of by-registration only, citing the reason for frequent scam phone calls from abroad and protecting the customers’ assets. Basically, international phone call service will be cut off unless the customers make registrations. The Chinese Communist Party regime is trying every method conceivable to control the Chinese population.
Xi Jinping steps up decoupling from the West to fulfill his personal ambition of global hegemony, at the expense of the Chinese people. The CCP regime’s economic decoupling from Western democracies has drastically lowered the living standard in China; as Chinese universities withdraw from international college ranking in the educational decoupling, the young Chinese can no longer access international education in science. Yet today in China’s coastal areas like Zhejiang and Jiangsu Provinces that have close ties to the world, Zhejiang Province pilots cut off international telephone service, and this is done in the name of preventing telephone scams from abroad and protecting the common people’s assets. Even if there are overseas scam activities, will the banks controlled by the CCP regime allow money to be wired abroad? In fact, this is a deliberate attempt to cut off communications between the common people in China and their relatives abroad, thus muffling the people’s ears.
A plethora of the common people in China indicates it is harder to make money this year than last year. The hardship and poverty are mainly due to the CCP regime’s economic decoupling from the West. And the global economic recession is mainly because of the bioweapon CCP virus (or Covid) released by the regime. As the CCP regime drags the whole world into the dark abyss, the Chinese people are at the center of the catastrophe.
Nowadays, the CCP regime has imposed lockdowns in Shanghai under the pretext of disease prevention, and Zhejiang Mobile has cut off international telephone service—these are all the regime’s attempts to control the mind of the population in the region. If the residents of Shanghai (the most civilized city in China) capitulate to the political lockdown, then the residents of other cities will also surrender to the man-made disaster and die silently. This is the North Korean-style governance that the CCP dreams of. Xi Jinping envies Kim Jong-un’s emperor-like power. Xi aspires to become Xi the Great Emperor, and the only way to satisfy his dream of becoming emperor is North Korean-style totalitarianism. As manifested by the CCP regime’s grip over the Chinese people, the regime is sliding toward North Korean mode.
Translated by: billwilliam
SUCCESS: DIGITAL ID CANCELLED IN SASKATCHEWAN, CANADA; BUT DOCTORS THROWN IN PSYCHIATRIC DETENTION, COVID & KING COBRA
First published on BITCHUTE April 18th, 2022.
Saskatchewan digital ID program cancelled thanks to Rebels News.
Doctors thrown in psychiatric detention for speaking out against adverse reactions from the jab. The good news is: The resistance and the underground railroad are working in Canada.
Dr. Bryan Ardis came out with the revelation and connection regarding Covid-19 with King Cobra’s venom.
Elon Musk’s Twitter takeover is exposing the corruption of what is going on within Twitter’s corporation.
Central Bank Digital currencies is the Kabal’s game plan for NWO implementation.
About this initiative
Regulation (EU) 2021/953 on the EU Digital COVID Certificate introduced EU-wide rules for issuing and accepting proof of a person’s COVID-19 vaccination, test result or recovery.
The EU Digital COVID Certificate helps people travel freely within the EU during the COVID-19 pandemic. How the certificate is used for other purposes (access to events, etc.) is up to each EU country to decide.
The Regulation currently applies until 30 June 2022. This initiative proposes to extend it by 12 months.
Consumers, Employment and social affairs, Justice and fundamental rights
Type of act
Proposal for a regulation
03 February 2022 - 08 April 2022 (midnight Brussels time)
The Commission would like to hear your views.
This adopted act is open for feedback for a minimum period of 8 weeks. All feedback received will be summarised by the European Commission and presented to the European Parliament and Council with the aim of feeding into the legislative debate. Feedback received will be published on this site and therefore must adhere to the feedback rules.
In order to contribute you'll need to register or login using your existing social media account.
30. January 2022
Make additional contracts with Banks and payment services to never withhold your funds.
If they refuse: CHANGE IMMEDIATELY !!!
Canada Trucker GoFundMe
@AnthonyHuggins aka @bobbie your egging of any further gofundme is compliance to GRAND THEFT and you should damned well know it ! SHAME ON YOU ! Gofundme is keeping 4.whatever MILLIONS of donated dollars from the very people who are advocating for free choice, a choice that people, including their children DO NOT have to aquiece to this eronious experimental human genetic modification !
Technocracy News (https://www.technocracy.news/paypal-terminates-service-for-nonprofits-fighting-vaccine-mandates/)
Paypal Terminates Service For Nonprofits Fighting Vaccine Mandates
Technocracy's coup d'état expands as Big Tech financial companies like Paypal drop organizations who oppose the Tech ...
Peter Thiel, the controversial owner of PayPal who also is behind spy-tech and big data robbery is already on the list of those who will be charged in the Corona Crimes Trials.