Home » Posts tagged 'cyberattacks'

Tag Archives: cyberattacks

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

The Cyberattacks Are to Force the End of Paper Money

I find it interesting how nobody seems to distinguish between a digital currency and blockchain cryptocurrency. The former is not traceable other than that transaction. To eliminate cybercriminals, the World Economic Forum is pushing ending paper money and moving to cryptocurrencies – not digital. With blockchain, the government would be able to trace the money to the criminal. The side benefit will be to ensure everyone pays taxes on everything they ever dreamed of. This is the REAL purpose of cyberattacks that are private decisions and outside the jurisdiction of government to trace and prosecute.

This is why Klaus Schwab is warning of cyberattacks. This is to end commerce globally without government-trackable cryptocurrencies. In 1934 when Roosevelt confiscated gold if you had money on deposit in a bank, which had been in gold coin, Roosevelt seized it all. The difference between a digital currency you use today with a debt or credit card is that is not traceable beyond a single transaction. Bitcoin using blockchain allows the government to trace every person who had that Bitcoin in the flow of money. Crypto is far more than digital and they never want to talk about that either. They will tell you no more credit card theft. Everything will be 100% secure. You will no longer be able to find a $5 bill in the parking lot.

I have written before how the Romans tried to outlaw prostitution declaring you could not pay a prostitute with a coin that had the image of the emperor which they all did.  So they created these tokens you would buy from a money changer, you would pay the prostitute and she accepted them because she knew she could go to the money changer and he would convert them to coin.

…click on the above link to read the rest of the article…

 

U.S. cybersecurity experts scrambling to thwart major attacks on power, water, gas infrastructure by “bolting on” fixes to old vulnerable systems

Image: U.S. cybersecurity experts scrambling to thwart major attacks on power, water, gas infrastructure by “bolting on” fixes to old vulnerable systems
(Natural News) Crammed into a small building in Idaho Falls, Idaho, a group of about 50 cyber security experts and researchers are working around the clock to protect American infrastructure from debilitating attacks.

As The Associated Press reports, much of what goes on at the Idaho National Laboratory, once known as the country’s primary nuclear research facility, isn’t discussed. But what is known is that those who fill the dimmed rooms full of wires, cables, computers, and detection gear are diligently trying to guard against the unthinkable: Attacks on power grids, water treatment facilities, financial institutions, and even traffic lights that could bring large sections of the country to a standstill.

Followed by chaos.

The lab’s director of cybersecurity, Scott Cramer, admits that the task at hand is a difficult one and that the United States is playing catch-up, of sorts. He describes the cybersecurity work as “bolting on” protections for infrastructure control systems that are decades old with the belief that many of them have already been infiltrated by malicious actors — nation-states and non-state actors alike — who are waiting for the time to launch attacks.

“This is no joke — there are vulnerabilities out there,” Cramer told the AP. “We’re pretty much in reaction mode right now.”

That’s not hyperbole. A recently released report from the President’s National Infrastructure Advisory Council lays out a similarly dire warning. After interviewing “dozens of senior leaders and experts” as well as conducting an in-depth review of existing studies and statues, the NIAC “found that existing national plans, response resources, and coordination strategies would be outmatched by a catastrophic power outage,” the report noted.

…click on the above link to read the rest of the article…

Catastrophic Cyberattacks Threaten Big Oil

Catastrophic Cyberattacks Threaten Big Oil

Servers

There are over a million oil and gas wells in the United States. There are also several hundred thousand miles of pipelines. Digitization is on the rise in the notoriously conservative oil and gas industry as companies wake up to the cost and operational efficiency boost that sensors and algorithms can offer them. Meanwhile, cybercriminals are keeping ahead of the learning curve, but oil and gas is largely pretending not to notice them.

Energy companies—including E&Ps, pipeline operators, and utilities—spend less than 0.2 percent of their revenues on cybersecurity, two security consulting firms have calculated. This compares with three times this portion of revenues spent on cybersecurity by financial services providers and banks.

True, banks and their likes deal directly with people’s money, so it would make sense to be extra careful. Also, the financial services industry has been under growing pressure from alternative service providers, so it has had to become flexible and open to new tech to stay ahead of the competition.

Oil and gas producers, on the other hand, don’t seem to see themselves a likely target of a cyberattack even though such attacks against the industry have been growing in frequency. Symantec, according to Bloomberg, is tracking as many as 140 cybercriminal groups that target the energy industry. That’s up from 87 in 2015.

Last year, Deloitte reported that the energy industry was the second most popular target for cyberattacks in 2016. Almost three-quarters of U.S. oil and gas companies, the consultancy said, had a cyber incident in that year, yet only a tiny majority cited cyber risk as a major concern in their annual reports. This is what makes the cybersecurity situation in oil and gas very worrying.

…click on the above link to read the rest of the article…

Falsehoods and Lies: Inciting War Is a War Crime

Falsehoods and Lies: Inciting War Is a War Crime

Falsehoods and Lies: Inciting War Is a War Crime

The torrent of reckless false accusations against Russia made by the US and its NATO allies is hitting warp speed.

This week saw more baseless allegations of Russian cyber attacks on American elections and British industries.

There were also crass claims by US officials that Russia was behind so-called sonic attacks on American diplomats in Cuba.

Then a Dutch foreign minister was forced to resign after he finally admitted telling lies for the past two years over alleged Russian plans for regional aggression.

Elsewhere, US Secretary of State Rex Tillerson claimed this week during a tour of the Middle East that “the primary goal” of his nation’s involvement in Syria is “to defeat” Islamic State (Daesh) terrorism.

This is patently false given that the US forces illegally occupying parts of Syria are launching lethal attacks on Syrian armed forces who are actually fighting Islamic State and their myriad terrorist affiliates.

Meanwhile, US ambassador to the United Nations Nikki Haley accused Russia of blocking peace efforts in Syria – another audacious falsehood to add to her thick compendium of calumny.

Perhaps the most barefaced falsehood transpired this week when French President Emmanuel Macron candidly admitted that his government did not have any proof of chemical weapons being used in Syria.

“Today, our agencies, our armed forces have not established that chemical weapons, as set out in treaties, have been used against the civilian population,” said Macron to media in Paris.

His admission follows that of US Defense Secretary James Mattis who also fessed up earlier this month to having no evidence of chemical weapons being deployed in Syria.

“We have other reports from the battlefield from people who claim it’s been used,” said Mattis to reporters at the Pentagon. “We do not have evidence of it.”

…click on the above link to read the rest of the article…

Cyberattacks: The Biggest Threat To OPEC

Cyberattacks: The Biggest Threat To OPEC

Cyber Attack

Oil and cybersecurity in one sentence certainly makes for a thrilling read, and there will be an increasing amount of information on the topic as the Internet of Things expands and the global oil industry adopts automation and digital technology.

OPEC is no exception in this digitalization drive, but unlike its non-OPEC counterparts, the cartel has emerged as much more vulnerable to cybersecurity threats.

An analysis of data collected from 134 countries by the International Telecommunication Union has revealed that some of the world’s biggest oil producers, including Iraq, Saudi Arabia, Venezuela, Iran, and the UAE, are lacking in the cybersecurity department. This means that, compared to European producers and the United States, OPEC members are pretty much unprepared for a major cyberthreat.

What is the likelihood of such a threat actually materializing? Well, the general opinion in cybersecurity circles is that everything that can be hacked will be hacked at some point. Saudi Arabia’s oil and gas industry, for example, has been a favorite target for numerous attacks over the last few years, including the Shamoon virus, which in 2012 wiped clean the disks of more than 30,000 computers at Aramco, and according to reports from the cybersecurity industry, reared its ugly head again in 2016.

Overall, about half of all cyberattacks in the Middle East target the oil and gas industry, which suggests the answer to the above question is “Pretty high,” but the worse thing is that this likelihood is only going to get higher in the future. Related: Brent Spikes As This Major Pipeline Breaks Down

Middle Eastern producers are following in the footsteps of their non-OPEC counterparts in adopting digital technology and automation to improve efficiencies in the post-2014 world, where efficiency has come to the fore in oil and gas. The problem, of course, is that the more you digitalize, the more vulnerable you become to attacks through digital channels.

…click on the above link to read the rest of the article…

Cyberattacks & the Vulnerability of a Cashless Society

QUESTION: Cyberattacks vs. Cash elimination – an argument against eliminating cash. Hello Mr. Armstrong, it is quite apparent that no government, no financial institution, Anti-virus software developer, or either ‘whatever’ is is really capable to stop cyberattacks. Now these people want to eliminate cash, make larger cash amounts illegal. So theoretically these cyber attackers could/ maybe will, eventually just stop the whole economy. Nobody may even be able to buy food. So instead of eliminating cash, should it not be policy people carry at least a month’s worth of expenses in cash? Your reply should be quite interesting to us, your readership!

Best,

AP

ANSWER: The WannaCry ransom attack is actually variant from a February 2015 sample attributed to the Lazarus Group, a Kaspersky-tracked actor tied to the North Korean government. Parts of the code go beyond shared code. It appears to be written by the same programmer.

Let’s get something straight here. At the core of those responsible is really the NSA and Microsoft itself. The attack exploited a Windows networking protocol to spread within networks, and while Microsoft released a patch nearly two months ago, it’s become very clear that patch didn’t reach all users particularly because institutions often do not install patches fearing that proprietary software may not function.

If behind the curtain we have government demanding back-doors into iPhones and computer so they can listen to everything everywhere, well guess what – so can everyone else. Patches will work for individual users, but not major institutions. Trying to upgrade their operations is a real effort. They are slow to act and thus vulnerable.

…click on the above link to read the rest of the article…

NATO places 300,000 troops on high alert, ready to attack Russia over fictional “cyber attacks” and “propaganda”

NATO places 300,000 troops on high alert, ready to attack Russia over fictional “cyber attacks” and “propaganda”

As the world remains fixated on the outcome of Tuesday’s US elections, NATO continues its aggressive troop build up around Russia.

With each passing day, the constant NATO activity is looking more and more like a preparation for full scale conflict with Russia. Something that would become a very real possibility should Hillary Clinton make it to the White House.

Secretary General of NATO, Jens Stoltenberg announced that NATO member nations are at this very moment putting hundreds of thousands of troops in a state of high alert, in an effort to deter the fantasy threat from Russia.

Stoltenberg said…

“We have seen Russia being much more active in many different ways.”

“We have seen a more assertive Russia implementing a substantial military build-up over many years; tripling defence spending since 2000 in real terms; developing new military capabilities; exercising their forces and using military force against neighbours.”

“We have also seen Russia using propaganda in Europe among NATO allies and that is exactly the reason why NATO is responding. We are responding with the biggest reinforcement of our collective defence since the end of the Cold War.”

The UK’s Examiner reports

Adam Thomson, the outgoing permanent representative to Nato, estimates that at present, it would take the military alliance 180 days to deploy a force of 300,000, and that speeding up this rate is of top importance.

The measures come in response to Russia flexing its military might abroad, allegedly conducting cyber attacks on Washington and holding nuclear war drills at home.

Last week, Moscow was seen as deliberately antagonising Nato by sending hundreds of paratroopers to a Serbian airbase despite Nato holding disaster relief exercises just 150 miles away in Montenegro.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress