H/t reader squodgy:
“We must spread awareness of the next BIG step the PTB have planned….a CYBER 9/11.”
* * *
H/t reader squodgy:
“We must spread awareness of the next BIG step the PTB have planned….a CYBER 9/11.”
* * *
– Anonymous takes down New York Stock Exchange; media pretends cyber attack was technical incompetence ‘glitch’ (Natural News, July 9, 2015):
Demonstrating America’s extreme vulnerability to activist-driven hackers who are trying to make a point, the New York Stock Exchange was shuttered for most of the day yesterday, stalling out hundreds of billions of dollars in trades.
The lying mainstream media, of course, has rolled out a pathetic (yet hilarious) cover story on all this, claiming there was no hack. Instead, the NYSE is just wholly incompetent and can’t run its own computer systems reliably, we’re told.
– MSM covers up massive cyber attack on America; WSJ, NYSE, United Airlines all under attack (Natural News, July 9, 2015):
A pair of “glitches” that occurred in the IT systems of the New York Stock Exchange and United Airlines Wednesday look an awful lot like a cyber attack, according to some experts and observers, though officially, thus far, the glitches are not being described in that manner.
As reported by Breitbart News, the United Airlines snafu Wednesday morning forced the company to ground or delay about 3,500 flights for as long as two hours. Not long after, a “technical glitch” forced the NYSE to halt all trading, with few details being provided.
– Is This What The First World Cyber War Looks Like: Global Real Time Cyber Attack Map (ZeroHedge, July 8, 2015):
After a series of cyber failures involving first UAL, then this website, then the NYSE which is still halted, then the WSJ, some have suggested that this could be a concerted cyber attack (perhaps by retaliatory China unhappy its stocks are plunging) focusing on the US. So we decided to look at a real-time cyber attack map courtesy of Norsecorp which provides real time visibility into global cyber attacks.
What clearly stands out is that for some reason Chinese DDOS attacks/hackers seem to be focusing on St. Louis this morning.
Whether this is related to the series of suspicious cyber failures today, is so far unclear, although if there is a connection at least there is a way to keep track of the first global cyberwar in real-time.
– Cyber attack hits 4 million current, former U.S. federal workers (Reuters, June 4, 2015):
Hackers breached the computers of the U.S. government agency that collects personnel information for federal workers in a massive cyber attack that compromised the data of about 4 million current and former employees, U.S. officials said on Thursday.
A U.S. law enforcement source told Reuters a foreign entity or government was believed to be behind the cyber intrusion against the Office of Personnel Management (OPM), and media reports said authorities suspected it originated in China.
– Obama chides Sony’s decision to nix film, says US must retaliate and pass cyber act (RT, Dec 19, 2014):
Sony Pictures Entertainment should have touched base with the White House before deciding to cancel the release of a controversial movie, United States President Barack Obama said Friday.
Weighing in on the major Sony scandal only hours after federal investigators attributed the recent hack to North Korea, Pres. Obama said the Hollywood studio was wrong to pull “The Interview,” a satirical film containing a plot to kill North Korean Pres. Kim Jong Un that was scheduled to be released on Christmas Day.
At the same time, though, Obama said the attack should serve as a wake-up call to Congress and prompt lawmakers in Washington, DC to get serious about implementing cybersecurity legislation in the wake of what is only the latest hack to be endured by a major American company.
– China Publishes Data Claiming US Is World’s Largest Cyber Attacker (ZeroHedge, May 20, 2014):
Well that didn’t take long. Having already responded angrily to the US charging 5 military officers with cyber espionage, China has published details of the US cyber attacks:
- *CHINA CALLS U.S. THE BIGGEST ATTACKER OF CYBER SPACE: XINHUA
From 3/19 to 5/18, they claim to have found 135 host computers in the US carrying 563 phishing pages targeting Chinese sites that directly controlled 1.18 million computers. But Jay Carney said earlier that “the US does not engage in economic espionage.”
As Xinhua reports,
– The Most Evil And Disturbing NSA Spy Practices To-Date Have Just Been Revealed (Liberty Blitzkrieg, March 12, 2014):
In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party.
– From Glenn Greenwald’s latest article: How the NSA Plans to Infect Millions of Computers with Malware
The latest piece from Greenwald and company on the unconstitutional spy practices of the NSA may represent the most dangerous and disturbing revelations yet. It’s hard for shadiness at the NSA to surprise me these days, but there was only one word that kept repeating over and over in my head as I read this: EVIL.
As a quick aside, Greenwald points out in the quote above how spam emails are used by the NSA to bait you into clicking dangerous links. This is a timely revelation considering I received one such email yesterday from a friend of mine. The email was sent to a wide list of let’s say “liberty-minded people” and webmasters associated with very popular sites. The link seemed shady so I texted him to ask if he had sent it. He hadn’t.
– Cyber attack that sent 750k malicious emails traced to hacked refrigerator, TVs and home routers (The Age/AFP, Jan 20, 2014):
Call it the attack of the zombie refrigerators.
Computer security researchers say they have discovered a large “botnet” which infected internet-connected home appliances and then delivered more than 750,000 malicious emails.
Possibly related info:
– Arnie Gundersen On U.S. Gov’t Buying 14 Million Potassium Iodide Pills (Used During Nuclear Disasters)
– DHS insider gives final warning (Canada Free Press, Dec 29, 2013):
Under the cover and amid the distraction of the Christmas bustle, I had my last “official” contact with a source inside the Department of Homeland Security known as “Rosebud” in my writings. My source is leaving his position, retiring along with numerous others choosing to leave this bureaucratic monstrosity.
For this contact, my source took unprecedented measures to be certain that our contact was far off the radar of prying government eyes and ears. I was stunned at the lengths he employed, and even found myself somewhat annoyed by the inconvenience that his cloak-and-dagger approach caused. It was necessary, according to my source, because all department heads under FEMA and DHS are under orders to identify anyone disclosing any information for termination and potential criminal prosecution.
– Big Banks Are Being Hit With Cyberattacks “Every Minute Of Every Day” (Economic Collapse, Dec 4, 2013):
What would you do if you logged in to your bank account one day and it showed that you had a zero balance and that your bank had absolutely no record that you ever had any money in your account at all? What would you do if hackers shut down all online banking and all ATM machines for an extended period of time? What would you do if you requested a credit report and discovered that there were suddenly 50 different versions of “you” all using the same Social Security number? Don’t think that these things can’t happen. According to Symantec, there was a 42 percent increase in cyberattacks against U.S. businesses last year. And according to a recent report in the Telegraph, big banks are being hit with cyberattacks “every minute of every day”. These attacks are becoming more powerful and more sophisticated with each passing year. Most of the time the general public never hears much about the cyberattacks that are actually successful because authorities are determined to maintain confidence in the banking system. But if people actually knew the truth about what was going on, they would not have much confidence at all.
– Stuxnet infected Russian nuclear plant (SC Magazine, Nov 8, 2013):
Jumped airgap, Kaspersky boss says.
Stuxnet had ‘badly infected’ the internal network of a Russian nuclear plant after the sophisticated malware caused chaos in Iran’s uranium facilities in Natanz.
The malware, widely considered to have been developed by the US Government as a means to disrupt Iran’s uranium enrichment plans, had crossed a physically separated ‘air-gapped’ network in the Russian plant after it was carried across on a USB device.
Eugene Kaspersky, the charismatic boss of the Russian antivirus company bearing his name, said a staffer at the unnamed nuclear plant informed him of the infection.
– Big Sis Says Cyber Attack WILL Bring Down Power Grid: ‘When Not If’ (Activist Post, Aug 30, 2013)
Lawrence Lessig, a respected Law Professor from Stanford University told an audience at this years Fortune’s Brainstorm Tech conference in Half Moon Bay, California, that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.
Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.
This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
Schematically, Alexander’s empire consists of the following: virtually every piece in America’s information intelligence arsenal.
Snowden exposed the U.S. government illegally and unconstitutionally spying on its citizens, …
… gets charged for spying.
Now that makes perfect sense, doesn’t it?
– China’s Xinhua news agency condemns US ‘cyber-attacks’ (BBC News, June 23, 2013):
China’s official Xinhua news agency has condemned the US over continuing revelations about Washington’s surveillance activities by intelligence fugitive Edward Snowden.
In a commentary, it said the US had turned out to be the “biggest villain in our age”.
Xinhua says the latest allegations in the South China Morning Post, along with previous disclosures, are “clearly troubling signs”.
“They demonstrate that the United States, which has long been trying to play innocent as a victim of cyber-attacks, has turned out to be the biggest villain in our age,” says Xinhua.
“It owes too an explanation to China and other countries it has allegedly spied on. It has to share with the world the range, extent and intent of its clandestine hacking programs.”
Xinhua says the Snowden developments provide support for China’s position on cybersecurity.
“Both the United States and China, together with many other countries, are victims of hacking. For the uncharted waters of the Internet age, these countries should sit down and talk through their suspicions,” says Xinhua.
“With good intentions, they can even work for the establishment of certain rules that help define and regulate Internet activities and mechanisms that can work out their differences when frictions do arise.”
– China slams US as world’s biggest villain for cyber espionage (PressTV, June 23, 2013):
China’s official news agency has slammed the United States as the world’s “biggest villain” following new revelations about Washington’s cyber espionage against Chinese companies and institutions.
“These, along with previous allegations, are clearly troubling signs. They demonstrate that the United States, which has long been trying to play innocent as a victim of cyber attacks, has turned out to be the biggest villain in our age,” said a commentary published in the Xinhua news agency on Sunday.
With his revelations exposing the extent of potential, and actual, pervasive NSA surveillance over the American population, Edward Snowden has done a great service for the public by finally forcing it to answer the question: is having Big Brother peek at every private communication and electronic information, a fair exchange for the alleged benefit of the state’s security. Alas, without further action form a population that appears largely numb and apathetic to disclosures that until recently would have sparked mass protests and toppled presidents, the best we can hope for within a political regime that has hijacked the democratic process, is some intense introspection as to what the concept of “America” truly means.
However, and more importantly, what Snowden’s revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war: an unprecedented cyber war, where collecting, deciphering, intercepting, and abusing information is the only thing that matters and leads to unprecedented power, and where enemies both foreign and domestic may be targeted without due process based on a lowly analyst’s “whim.”
It has also put spotlight on the man, who until recently deep in the shadows, has been responsible for building America’s secret, absolutely massive cyber army, and which according to a just released Wired profile is “capable of launching devastating cyberattacks. Now it’s ready to unleash hell.”
Meet General Keith Alexander, “a man few even in Washington would likely recognize”, which is troubling because Alexander is now quite possibly the most powerful person in the world, that nobody talks about. Which is just the way he likes it.
– A list of the U.S. weapons designs and technologies compromised by hackers (Washington Post, May 28, 2013):
Weapon designs and technologies compromised
The following is reproduced from the nonpublic version of the Defense Science Board report “Resilient Military Systems and the Advanced Cyber Threat”:
Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation
Terminal High Altitude Area Defense
Patriot Advanced Capability-3
Extended Area Protection and Survivability System (EAPS)
Chinese hackers have allegedly compromised the designs of top weapons systems, including the F-35 Joint Strike Fighter, The Washington Post reports. This photo from Northrop Grumman Corp., shows a pre-production model of the F-35 Joint Strike Fighter.
– Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies (Washington Post, May 28, 2013):
Designs for many of the nation’s most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry.Among more than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat aircraft and ships, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board.
– US considering pre-emptive cyberattacks (DW, Feb 2, 2013):
Media reports claim that the US is secretly claiming the right to launch pre-emptive cyberattacks in “credible threat” scenarios, in the wake of the attacks on US media outlets. But how credible are those threats?
The damage done by cyberattacks is not always immediately apparent, even after they have been carried out. Many were surprised when the New York Times, the Wall Street Journal and the Washington Post announced recently that they had been hit for over four months by cyberattacks, in part coming from China. Perhaps more alarmingly, the US Department of Homeland Security said that one power station had been knocked out for weeks by a cyberattack, though it declined to say which.
The US has of course launched a number of digital onslaughts of its own, most notably on Iran’s nuclear enrichment facilities. And that attack was not risk-free, as the so-called Stuxnet virus injected into Iranian systems ended up being leaked onto the Internet and copied millions of times.
– Cyber-assault HQ: how US is under attack from this office in Shanghai (Independent, Feb 19, 2013):
A barrage of malicious cyber-attacks against computer networks in the United States and other countries over several years has been sourced by a private US security firm to a single building on the fringes of Shanghai, which, it says, is occupied by the Chinese military.
A 60-page report released by Mandiant, a Virginia-based firm that specialises in cyber-espionage, concludes that hundreds or perhaps thousands of English-speaking Chinese computer experts toil daily inside the anonymous-looking 12-storey building in the Pudong district of Shanghai. ‘Unit 61398’, as it is known, hacks into foreign networks on behalf of the People’s Liberation Army (PLA), Mandiant alleges.
“The nature of Unit 61398’s work is considered by China to be a state secret; however, we believe it engages in harmful computer network operations,” the security firm said in the report, which drew instant rebukes from the Chinese government. “It is time to acknowledge the threat that is originating in China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively.”
The company asserted that the unit, one of several in China believed to be involved in invading overseas computer systems, had “stolen hundreds of terabytes of data from at least 141 organisations across a diverse set of industries beginning as early as 2006”. While most of the activity targeted corporations in the United States are smaller number is located in Canada and Britain, it said.
– US ready to strike back against China cyberattacks (AP, Feb 19, 2013):
WASHINGTON (AP) – As public evidence mounts that the Chinese military is responsible for stealing massive amounts of U.S. government data and corporate trade secrets, the Obama administration is eyeing fines and other trade actions it may take against Beijing or any other country guilty of cyberespionage.
According to officials familiar with the plans, the White House will lay out a new report Wednesday that suggests initial, more-aggressive steps the U.S. would take in response to what top authorities say has been an unrelenting campaign of cyberstealing linked to the Chinese government. The officials spoke on condition of anonymity because they were not authorized to speak publicly about the threatened action.
The White House plans come after a Virginia-based cybersecurity firm released a torrent of details Monday that tied a secret Chinese military unit in Shanghai to years of cyberattacks against U.S. companies. After analyzing breaches that compromised more than 140 companies, Mandiant has concluded that they can be linked to the People’s Liberation Army’s Unit 61398.
– China denies cyber attack allegations (BBC News, Feb 20, 2013)