Author Topic: Lockheed Martin exposes insanity of Smart Grids...then offers to militarize them  (Read 9197 times)

0 Members and 1 Guest are viewing this topic.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Lockheed Martin exposes insanity of Smart Grids...then offers to militirize them

Lockheed Martin Says "Smart Grid" Will Allow China to Hack U.S. Power
Jason Mick (Blog) - October 5, 2010 8:20 AM
chunkymonster.. on Oct 7 at 9:52 AM

An old fashioned grid may be inefficient, but it may be easier to secure than a "smart grid". Much of the benefits of a smart grid come from internet connectivity, and that connectivity opens the door to attacks.
Coincidentally Lockheed Martin happens to sell security software.

Lockheed Martin's General Manager of Energy & Cyber Services, Kenneth Van Meter, speaking with green-power site Smart Planet voiced some dire warnings about the United States' push to adopt a "smart grid".  According to Mr. Van Meter, the transition poses a glaring threat to the security of the U.S.

He comments, "Right now if I wanted to cut off the power to your house, I’d climb the pole, and there’s a manual switch. Everything’s physical. Once we have a smart grid in place I could do that from China."

"The sheer volume of interactive devices on two-way networks is the biggest risk. By the end of 2015 we will have 440 million new hackable points on the grid. Nobody’s equipped to deal with that today."

When asked about the worse case scenario he remarks:

There are three. The one everyone thinks about is the neighborhood kid or someone in another country turning off the power to the neighborhood or the hospital in the middle of night. While no one wants that to happen, it’ll be detected pretty quickly, so it’s not a disaster.

The second potential problem has to do with voltage control. If you want to optimize the amount of power the electrical company has, you want to engage in voltage control, where you have devices along the line from the substation. You can adjust the voltage, everyone gets the right voltage, and everyone’s appliances are running more efficiently. Putting in those devices is expensive, and now those become hackable points–because if you can control them, then someone else can control them. So if your power is out, that would be highly inconvenient. But what if they ran the voltage up and down on your house and when it was fixed, the voltage-sensitive equipment like your computer and high-definition TV didn’t work any more?

Third: If you can cause rapid problems in the grid to occur in the right places at scheduled times, you could destabilize the whole grid, black out whole cities or states and cause massive damage. Sometimes this happens accidentally, but it could also happen because someone makes it happen. Some of the devices are very expensive and therefore there are few spares. Substation-sized transformers, for example, aren’t even made in this country anymore and sometimes it can take two years to get one.
Coincidentally, Mr. Van Meter's company sells security solutions to utilities, so his reason for evangelizing about the smart grid's insecurity may not be purely altruistic.  And Lockheed Martin has had its own security woes recently, with Chinese spies reportedly breaking into servers used in the company's F-35 Lightning II fighter project.

Nonetheless, the points raised are largely valid.  Virtually every large piece of software (Windows, Linux, OS X, Internet Explorer, Safari, Firefox, Adobe Flash, etc.) created has had vulnerabilities that have been found and exploited.  Its unlikely to think that the software that governs the grid will be free of similar vulnerabilities.

A web-connected grid, like Google Grid or Microsoft Hohm, sounds great on paper, but it introduces a pressing need for security, as people from all over the world can now try to attack the power infrastructure remotely.  And where a typical cyberattack may merely deny people access to a website, or damage their personal computers, an attack on the grid could literally prove deadly.  So Lockheed Martin may be a bit biased, but they're probably right, in this case.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Optimus

  • Globalist Destroyer
  • Global Moderator
  • Member
  • *****
  • Posts: 12,802
They are adding water to the smart grid now with "smart water meters".
“The Constitution is not an instrument for the government to restrain the people,
it's an instrument for the people to restrain the government.” – Patrick Henry

>>> Global Gulag Media & Forum <<<

Offline lee51

  • Member
  • *****
  • Posts: 1,732
We just got our new "smart meter" put in yesterday.  Now they can shut off our electricity at any time. Hackers can do the same.
Plus they can keep track of how much electricity we use. It was UPA that hired the guy to put this in.

Well, sure nothing "smart" about this stuff.   >:(


  • Guest

It's late right now but I'll try to explain this real quick (this is damned complicated to articulate).

OK 1st without the engineered economic crisis/non-existent energy crisis they could NEVER roll out something like the Smart Grid--it would not be sellable PERIOD.

You have all of the criminalization of even being alive shame on you for hurting the Earth, for breathing, etc.

So the public has been sold on 100% illegitimate need to save energy, when everyone could burn all the energy they want period, forever.

Now here's the thing that clicked in my mind that I never thought of before:

I had always simply thought of false flag cyber attacks, and fake energy crisis IN AND OF THEMSELVES being used to justify the smart grid.

That is not the case here after reading this.

Watch the Smart Grid get rolled out at incredible speed nationwide, even before the bonafide GIG itself, because they don't need the full blown GIG to run the SG.

It may also be the case that they will need somewhat more time to fully implement internet 2 than we think, although probably not much.

Therefore, you roll out the Smart Grid FIRST.  Now keep in mind the Smart Grid at this point was always a problem reaction solution tool for the aforementioned.

Here's where the difference comes into play:

The Smart Grid is even more vulnerable to false flag cyber attacks than the existing power grid, because it is COMPLETELY CENTRALIZED, in the same fashion as how CS will be as well.

So now they can use what was already a problem reaction solution vehicle already, FOR A SUBSEQUENT PROBLEM REACTION SOLUTION SCENARIO--CREATING THE NEED FOR INTERNET 2 TO KEEP THE NEW "SMART" POWER GRID SAFE.  To word this another way--the rollout of the Smart Grid is actually serving THE EXACT SAME PURPOSE AS A FALSE FLAG TERROR ATTACK--one that will be completely oblivious to everyone because no one will get it.  Why be really obvious like Mumbai, 7/7, and 9/11 again, when you can roll out something that isn't even an attack, that gets no one killed, but fully moves toward massively enslaving us all just the same?  

This is highly probable because it allows them a relatively low--key way to finalize the GIG, and when that is done, then they can kill 80+% of the population without anyone along the way having posed any significant resistance to them because they kept everyone discombobulated with thinking that somehow they were participating in a process to help save the Earth, and feel "responsible" suddenly, and not "guilty" from the subconscious demonization of living off of the Earth as God had intended--until the AI machines come to wipe us all out.  Read this article and you will understand how I came to this conclusion about the Smart Grid.

Obama Calls for Cybersecurity Review

After a string of breaches and data leaks, president orders two-month interagency review to shore up computing infrastructure.

February 10, 2009
By Kenneth Corbin:

On the heels of a number of high-profile data leaks, President Obama has ordered an immediate two-month review of the federal government's various cybersecurity programs -- a move that could set the stage for a shakeup of the nation's sprawling network security activities.

Heading the interagency review will be Melissa Hathaway, a former consultant with Booz Allen Hamilton who worked under the director of national intelligence in the Bush administration.

Hathaway will be tasked with coordinating with the relevant agencies, Congress and the private sector to evaluate how the government's cybersecurity initiatives are being managed, and develop a framework to streamline the far-flung operations.

"The national security and economic health of the United States depend on the security, stability, and integrity of our nation's cyberspace, both in the public and private sectors," John Brennan, Obama's assistant for counterterrorism and homeland security, said in a statement. "The president is confident that we can protect our nation's critical cyber infrastructure while at the same time adhering to the rule of law and safeguarding privacy rights and civil liberties."

The review could lay the groundwork for a substantial overhaul of the government's cybersecurity activities, which have been spread across numerous agencies and come under fire for repeated breaches and data leaks in government systems.

As part of his homeland-security agenda, Obama has said he plans to create a position of national cyber adviser, who would report to the president and work with the agencies to develop a coordinated cyber-security policy.

The 60-day interagency review could be Hathaway's job tryout for that position, observers said.

"She's really well-qualified for this," said James Lewis, a senior fellow at the Center for Strategic International Studies (CSIS), a Washington think tank. "She was one of the two or three people who pushed cybersecurity in the Bush administration."

Lewis directed a project called the Commission on Cybersecurity for the 44th President, which culminated in a detailed list of policy recommendations released in December and presented to the Obama transition team.

Chief among those recommendations were a consolidation of the agencies dealing with cybersecurity, greater investment in security research, and a concerted effort to shore up the defenses for the nation's infrastructure against cyber threats.

Despite following some of the CSIS recommendations, the jury may still be out on whether the new moves will go far enough. Lewis and CSIS had hoped that an Obama-backed economic stimulus bill would have included provisions about cybersecurity. So far, dedicated cybersecurity spending has yet to materialize.

"It's a little disappointing to see the stimulus package doesn't say anything about making the infrastructure more secure," Lewis told  [Insert:  Is this a joke?  someone from CSIS saying that?  Like he gives a damn about real security?  Maybe he's queuing that there will be false flags.]

The economic stimulus bill currently under debate in Congress would allocate billions of dollars to a so-called smart grid, which would introduce Internet-like capabilities to the nation's power system. But without the proper defenses against cyber threats, the nation could pay a big price for the efficiency improvements a smart grid promises.

"If we build an electrical grid and don't pay any attention to cybersecurity, it's going to be a huge error," Lewis said.

[Insert:  Sounds like he's admitting that this is in fact what will occur, and there will be false flags.]

Still, Lewis said that the formation of review committee could be a good down payment on a more thorough revamping of the national cybersecurity regime.

"It says it will do one of the things that we thought was crucial -- which is come up with a strategy," Lewis said. "If they come out with a good strategy that really looks at the whole issue and not a part of it, we'll be better off."

Obama could wait until the review has concluded before he names his national cyber adviser. In addition to Hathaway, he is rumored to be considering candidates from the Department of Defense and the National Security Agency, as well as advisers from his campaign. No one from the private sector or the Homeland Security is believed to be on the short list.


  • Guest

Artificial Intelligence Helps JEA Optimize Water Resources

When management at JEA, the water, sewer and electric provider for Jacksonville, FL, was challenged by the St. Johns River Water Management District to reduce withdrawal of water from the area aquifer, they decided to do it in a big way - by using artificial intelligence.

In the past, JEA’s mode of operation has been to keep water tanks full and react to consumption after the fact. Reservoir water levels were kept constant regardless of use. When demand was high, wells were drawn down over time to levels that reduced their life. Pumps required frequent maintenance and used excessive energy because they switched off and on almost constantly.

While other utilities are investigating and experimenting with automated supervisory control − or artificial intelligence − of their pumping and distribution systems, JEA is believed to be the first to use such a system to directly operate a production well field.

Michael Eaton, Director of GIS and Engineering Systems, and Darren Hollifield, Manager of the Water South Grid Systems, stand in the High Service Pump Room at the Ridenour Water Treatment Plant.

JEA’s new system, Optimized System Controls of Aquifer Resources, or OSCAR, controls the water system in real time, creating what JEA refers to as Operations Optimization. This means the water system is monitored, regulated and adjusted every minute of the day, 365 days a year, creating a “just in time” water supply.

OSCAR regulates the pumping of water from the aquifer by evaluating data from a variety of sources. System Control and Data Acquisition (SCADA) is key to the optimization of this process. Idea Integration, the applications integration company, developed a system for JEA to extract and consolidate the required input data from SCADA and weather-related data. Idea also built the web application to display all forecasting and scheduling information for one of JEA’s two major grids in Jacksonville.

Using this data, JEA operators switch from reactive to proactive based on consumption forecasting. Energy consumption is then minimized while water generation is maximized during on-peak periods. Additionally, operations staff works with the software programs to develop optimized operating plans on an annual, weekly and daily basis, assuring up-to-date accuracy. Actual system conditions are compared to forecasts and operators are alerted to significant variations or equipment failures.

It would be impossible for a human operator to compare all these variables as frequently or with as much accuracy as the automated system. When needed, however, human operators can override the system to make adjustments for drought or other extreme conditions.

From an operations standpoint, a consumption forecaster takes this data and uses a “neural network” to predict sub-grid hourly consumption. Gensym Corp. was responsible for the software that actually generates the daily forecast and daily schedule for water to be pumped from each well for every individual water plant in the same grid. Gensym used heuristic algorithms to generate the forecast values based on historical water consumption data as well as weather-related data.

Pumping is assigned to the water plant closest in proximity to the need, augmented by plants farther away when necessary to meet demand. Adjustments can also be made to control flow from wells that may be overextended, pumping from wells that have more available water supply. This “system scheduler” also assigns plant flow based on cost criteria, energy value and water quality.

This process allows savings in several areas:

− The value of the energy used for the system is maximized because water use is predicted ahead of time and pumping is scheduled for times of day when energy costs are lower.
− Groundwater supplies are better managed, ensuring supplies for future generations.
− Salt intrusion into wells has been reduced, increasing water quality.
− Chemical costs for treating water are minimized because water is treated as it is needed.
− Capital costs are minimized through better use of existing assets.

The ultimate result is minimized well production during on-peak hours and optimized reservoir storage. In addition, pump starts are greatly reduced, increasing efficiency and lowering maintenance costs. Savings in the initial trial applications for the expert system and optimizer include an estimated $1.4 million in capital expenses and $170,000 per year in operating expenses, plus an increased potential for energy sale opportunities.

JEA implemented the OSCAR system a year ago on its south grid in Jacksonville, incorporating 15 plants and six wells. JEA plans to expand the system throughout its network of more than 39 facilities. By enhancing and optimizing this existing network, JEA can meet the demands of its growing customer base and reduce the need to dig new wells, preserving Florida’s aquifer for future generations.


  • Guest
Here they admit that cybersecurity MUST enslave the entire population:

"At a roundtable with reporters on Wednesday, Alexander advocated creation of a "secure" network for government computer systems and those of critical sectors, such as the power grid.

That strategy - walling off critical computer networks from the rest of the Internet - "is probably where you're going to get to, and it makes a lot of sense," he said.

But some in industry were skeptical.

It would be impractical and "unbelievably expensive," said Joe Weiss, a cybersecurity expert. who has researched the issue.

"It would be very difficult to try to interconnect all these different companies, including the government," Weiss said. "This isn't just one entity where you walk a wire around Potomac Electric. You have all the neighboring utilities that you need to connect to. You would also have all the other major industrial operations - and with Smart Grid, conceptually, every homeowner. This is not simple."

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
But some in industry were skeptical.

It would be impractical and "unbelievably expensive," said Joe Weiss, a cybersecurity expert. who has researched the issue.

How scary is it that Joe Weiss a "CYBERSECURITY EXPERT" just learned was Stuxnet IS in September? How 'on the ball' is this EXPERT??? He's "researched this issue"? Really?

Stuxnet logbook, Sep 29 2010, 1100 hours MESZ

Historical document: Ralph informs Joe Weiss what Stuxnet is. Note the date of the email.


Stuxnet is a directed attack -- 'hack of the century'
Hamburg, Sep 13, 2010

German IACS security researcher Ralph Langner has successfully analyzed the Stuxnet malware that appeared to be a miracle. Stuxnet is a directed attack against a specific control system installation. Langner will disclose details, including forensic evidence, next week at Joe Weiss' conference in Rockville.

And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
How scary is it that Joe Weiss a "CYBERSECURITY EXPERT" just learned was Stuxnet IS in September? How 'on the ball' is this EXPERT??? He's "researched this issue"? Really?

How does one get to be a 'cybersecurity expert' in spite of apparently huge gaps in cybersecurity threat awareness?? Joe found out what the true nature of Stuxnet was on September 8, 2010....

Sophisticated stuxnet malware is approaching 18 months old
04 October 2010

Symantec has published an in-depth report on the Stuxnet malware in which it notes that, whilst the worm was first discovered in July, it is known to have existed at least one year prior and likely even before.

According to the report, the majority of infections were found in Iran and the worm contains a number of new and sophisticated features such as the ability to self-replicate through removable drives, exploiting a vulnerability that allows auto-execution.

And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40