Home » Posts tagged 'cyber warfare'

Tag Archives: cyber warfare

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

Will There Be a 2024 Presidential Election?

WILL THERE BE A 2024 PRESIDENTIAL ELECTION?

“All tyrannies rule through fraud and force, but once the fraud is exposed, they must rely exclusively on force.” ― George Orwell

Vanessa E. Thompson on Twitter: "Just a reminder..." / TwitterEvil Assad, Evil Gaddafi, Now Evil Putin: How the West Sells War (and Makes a Killing) | Groupe Gaulliste Sceaux

“Every war when it comes, or before it comes, is represented not as a war but as an act of self-defense against a homicidal maniac.” ― George Orwell

The smell of tyranny is in the air. The level of propaganda, disinformation, and mistruth has reached astounding heights, as the ruling oligarchy/Deep State/globalist cabal are thrashing about violently because their frauds are being exposed on a daily basis. This shift to the tyranny of force has massive implications for everyone on the planet. When every quote from Orwell’s 1984 applies every day to everything swirling around us, you begin to realize we are in the midst of a dystopian nightmare which gets more ghoulish by the day.

The last two years have been a fraud of epic proportions, conducted by a cadre of evil money titans, their financial, media, and medical apparatchiks, with the objective of tearing down our existing social and economic structure and “resetting” the world where they own everything and you own nothing, eat bugs, and provide the slave labor needed to keep society functioning. Of course, this will be after they dispose of tens of millions of useless eaters through their Covid/Vaxx scheme, global war, and mass starvation.

The past two weeks have denoted a remarkable transformation in the pushing of the fraudulent fearmongering narrative about a relatively non-lethal flu, vaccine mandates, masking and shaming those with the common sense to rely on their immune systems, to trying to provoke a world war over a border dispute with absolutely no relevance or strategic value to our country, other than to further enrich the military industrial complex and the parasites and leeches in government, finance, media and war making industry who live for and love war.

…click on the above link to read the rest of the article…

Russian Hackers Target U.S. Energy Infrastructure

Russian Hackers Target U.S. Energy Infrastructure

comtech

Russia has been trying to interfere with U.S. energy markets and influence U.S. energy policy by using Russian operatives to troll social media platforms with divisive and inflammatory posts, a report by House Republicans has revealed.

The report—issued by the United States House of Representatives Committee on Science, Space, and Technology—includes examples of Russian-propagated content on Facebook, Twitter, and Instagram, targeting U.S. energy markets and domestic energy policy.

“Russian-sponsored agents funneled money to U.S. environmental organizations in an attempt to portray energy companies in a negative way and disrupt domestic energy markets,” the report said.

“Documents that the American social media companies produced for the Committee confirmed that Russian agents were exploiting American social media platforms in an effort to disrupt domestic energy markets, suppress research and development of fossil-fuels, and stymie efforts to expand the use of natural gas,” the Republicans’ report says.

“By posting content that supports positions held by both liberals and conservatives alike, the Russians used social media to instigate and inflame discord in the United States. Russian social media manipulators intentionally injected foreign propaganda into American political discourse. These Russian agents are only interested in creating discord in America while hiding behind an anonymous and misleading social media pseudonym, as demonstrated by the highly divisive, often contradictory posts provided in this report.”

The Chairman of the U.S. House Science, Space, and Technology Committee, Lamar Smith (R-Texas) said in a statement, commenting on the report:

“Russia benefits from stirring up controversy about U.S. energy production. U.S. energy exports to European countries are increasing, which means they will have less reason to rely upon Russia for their energy needs. This, in turn, will reduce Russia’s influence on Europe to Russia’s detriment and Europe’s benefit.

…click on the above link to read the rest of the article…

How to Prepare for a Cyber Attack

How to Prepare for a Cyber Attack

There is a lot of debate on whether Wednesday’s computer issues that shut down the New York Stock Exchange, the Wall Street Journal, and United Airlines were just a very strange coincidence (very strange) or a deliberate cyber attack.

This isn’t the first possible cyber attack on the United States this year. Heck, it’s not even the first one this summer. On June 5, Reuters reported a breach occurred that comprimised the personal information of millions of federal employees, both current and former. This breach was traced back to a “foreign entity or government.”

Regardless of the origin of the so-called computer”glitches” that shut down Wall Street and a major airline, the events of Wednesday gave us just a tiny glimpse at how serious a cyber attack could be.

What exactly is a cyber attack?

A cyber attack is more than just shutting down the computer systems of a specified entity. It is defined as “deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyberattacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft.”

Technopedia lists the following consequences of a cyber attack:

  • Identity theft, fraud, extortion
  • Malware, pharming, phishing, spamming, spoofing, spyware, Trojans and viruses
  • Stolen hardware, such as laptops or mobile devices
  • Denial-of-service and distributed denial-of-service attacks
  • Breach of access
  • Password sniffing
  • System infiltration
  • Website defacement
  • Private and public Web browser exploits
  • Instant messaging abuse
  • Intellectual property (IP) theft or unauthorized access

Cyber attacks happen far more frequently than you might think. Check out this real-time map for a look at the almost constant seige.

 

…click on the above link to read the rest of the article…

The cyber blitzkrieg

The cyber blitzkrieg

The forces of the perfect storm of climate change, energy tsunamis and global economic bubbles in collision are complex and varied; each with their own levels of threat and urgency. In this milieu, it’s easy to over-fixate on the more visible threats and downplay the others.

Case in point: The Iranian nuclear showdown has dominated the news and polarized the geopolitical world. While frightening, it has overshadowed another “real-time” threat of growing proportions: cyber-warfare and cyber-security.

It’s not a new threat. Our personal computers are barraged with viral assaults. The cyber firewalls of such giants as J.P. Morgan, Target, Home Depot, SONY and Anthem Health are regularly penetrated – with the loss of sensitive information on tens of millions of Americans at a crack.

It’s bad enough when hackers and criminals do their dirty deeds; it’s downright dangerous when nation states organize and deploy their cyber-forces against other nations in a harmful manner.

Cyber-warfare has escalated into a new global battlefield with ill-defined “rules of the road.” The barriers to entry are low, and serious cyber-attacks can now be conducted by tiny nations and terrorist groups against any nation or company. It’s a perfect example of using asymmetric warfare to attack a far greater force using unconventional means. Though cyber forensics are improving, identifying the source of an attack is almost as difficult as deciding on a response.

James Clapper, the Director of National Intelligence, recently reported to congress that “Cyber threats to U.S. national and economic security are increasing in frequency, scale, sophistication, and severity of impact.” He went on to identify Russia as one of the most sophisticated cyber adversaries and that cyber threats, in general, would be more of an “ongoing series of low-to-moderate level of cyberattacks from a variety of sources over time…”  One can only imagine what he might say about this in a classified briefing.

 

…click on the above link to read the rest of the article…

‘Cyber warfare may have similar impact on security as nukes’ — RT Op-Edge

‘Cyber warfare may have similar impact on security as nukes’ — RT Op-Edge.

A country with professional computer programmers and access to intelligence gathering capabilities has great potential for affecting global security as nuclear weapons did 50 years ago, Dr. Duncan Earl, Chief Technology Officer of Qubitekk Inc. told RT.

RT: How big of a blow to global security are hackers able to deal?

Dr. Duncan Earl: I think it depends on how you define the term ‘hacker’. Most people think of a hacker as a loose group of computer programmers which have limited computational capabilities. So if you define a hacker that way there is not a big impact on global security that this group can have. However, if you describe a hacker, if you expand that to include nation states, where you can have a country with a very large number of computer programmers with access to supercomputers, with access to intelligence gathering capabilities – in that situation there is a huge potential for affecting global security. In fact, cyber-warfare is likely to have the impact on global security that nuclear weapons did 50 years ago.

RT: How can companies and strategically vital institutions such as nuclear plants defend themselves against hack attacks?

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress