Author Topic: NWO/MIC planning to attack U.S. /w Stuxnet, blame patsies & usher in tyranny  (Read 7111 times)

0 Members and 1 Guest are viewing this topic.

Offline Effie Trinket

  • member
  • Member
  • *
  • Posts: 2,293
http://www.wired.com/threatlevel/2011/07/dhs-fears-stuxnet-attacks/

DHS Fears a Modified Stuxnet Could Attack U.S. Infrastructure
By Kim Zetter     July 26, 2011  |  5:51 pm



One year after the discovery of a sophisticated worm that was used to attack centrifuges in Iran’s nuclear program, the U.S. Department of Homeland Security told Congress it fears the same attack could now be used against critical infrastructures in the U.S.

DHS “is concerned that attackers could use the increasingly public information about the code to develop variants targeted at broader installations of programmable equipment in control systems. Copies of the Stuxnet code, in various different iterations, have been publicly available for some time now,” Bobbie Stempfley, acting assistant secretary for the DHS Office of Cybersecurity and Communications, told the House Subcommittee on Oversight and Investigations (.pdf) on Tuesday.

The testimony comes in the wake of accusations that the U.S. was itself responsible, along with Israel, for developing and unleashing Stuxnet into the wild, thereby making it possible for the hackers, nation-state attackers and terrorists that DHS fears, to now repurpose the malware for use against critical infrastructure systems in the U.S.

Stuxnet, considered to be the first cyberweapon discovered in the wild, was found on a computer in Iran in June 2010 and was believed to have been launched in June 2009.

Private researchers who spent months digging through the code, discovered that the sophisticated malware was designed to target a specific industrial control system made by Siemens, and replace legitimate commands in the system with malicious ones. But Stuxnet wasn’t out to destroy just any Siemens system – it sought out the specific system believed to be installed at Iran’s nuclear enrichment plant at Natanz. Any system that didn’t have the same configuration as the system Stuxnet targeted would go unharmed.

Although Stuxnet was designed to attack a specific system, researchers like Ralph Langner have pointed out that the malware could be easily tweaked to attack other industrial control systems around the world. According to Langner, an attacker would need “zero insider information and zero programming skills at the controller level in order to perform a Stuxnet-inspired attack” against other control systems.

Langner and others have vocally criticized DHS and ICS-CERT for failing to provide adequate information about Stuxnet in a timely manner. But in its testimony to Congress, DHS touted the efforts it made to analyze Stuxnet after its discovery and provide government and private entities with the information they needed to mitigate the affects of a Stuxnet infection.

“To date, ICS-CERT has briefed dozens of government and industry organizations and released multiple advisories and updates to the industrial control systems community describing steps for detecting an infection and mitigating the threat,” DHS claimed in its testimony.

The testimony came just one day after the surprise news that one of the nation’s top cybersecurity czars resigned abruptly and mysteriously from his job. Randy Vickers had been director of U.S.-CERT (Computer Emergency Readiness Team), a division of DHS that is responsible, in part, for coordinating the defense of federal networks and working with the private sector to mitigate cyberattacks against the nation’s critical infrastructure. Vickers resigned July 22, effectively immediately, according to an e-mail that Stempfley reportedly sent to DHS staff. Vickers’ Linked-in profile had already been changed to indicate his departed status from US-CERT by the time the news went public. DHS did not give any reason for Vickers’ abrupt departure.

Photo courtesy Office of Presidency of the Republic of Iran
_______________________
http://www.godlikeproductions.com/forum1/message1575175/pg1

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Here are a few people that would have access to false flag operations in the cyber world:

http://www.wbresearch.com/cybersecurity/AboutOurSpeakers.aspx

So how many cyber "chiefs" have resigned because they refused to false flag the US? This is like #5.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
And when the false flag occurs, they will say: "if only we had the power to monitor social networks"

guess what, they always had this power, they were set up to be controlled and contained platforms to begin with.

NSA regards all social media as government owned weapons to use any way it likes
http://mobile.informationweek.com/80256/show/
Posted on Wednesday Jul 27th at 5:21pm


The National Security Agency (NSA) aims to use social media and improved data sharing as part of an enhanced strategy to fight organized crime in the United States and abroad.

The White House has launched the Strategy to Combat Transnational Organized Crime to step up its efforts to fight this type of crime by better integrating diverse work from various agencies that collect intelligence data and track and investigate these types of criminals.

The new plan is the result of a year-long study of the current state of these types of crimes, the most comprehensive of its kind in 15 years, according to a White House blog post.

The feds in general have been working across various agencies that are responsible for crime investigations and the protection of the general public--such as the FBI, Department of Homeland Security, and the Department of Defense--to better share information. Often agencies with different responsibilities for investigation don't communicate effectively with each other, a problem the federal government has been trying to remedy through the use of technology.

The same is the case with those investigating organized crime, and the new strategy aims to fix that by coordinating information sharing among various organizations and specialized intelligence centers that are responsible for handling these types of crimes.

This will involve the Cyber Crimes Center to coordinate the collection and analysis of intelligence regarding various aspects of the threat from transnational organized crime, according to the strategy, which is posted online.

The plan also includes the NSA coordinating with the interagency International Organized Crime Intelligence and Operations Center (IOC-2) to use existing resources and databases of the Organized Crime Drug Enforcement Task Force Fusion Center (OCDETF) and the Drug Enforcement Agency's Special Operations Division to share intelligence and produce leads for investigators and prosecutors working across the United States, according to the plan.

The IOC-2, formed in 2009, collects information from law-enforcement agencies and federal prosecutors to fight organized crime, while the OCDETF--set up 2006--serves as a central warehouse for drug and financial intelligence as well as provides cross-agency analysis and integration of that data.

Social networks also will play a role in helping the NSA track organized criminals. Through the federal Open Source Center, which provides intelligence information from around the world, the NSA will use social media, among other online outlets, to develop profiles of individuals, companies and institutions linked to transnational organized crime networks, according to the plan.

What industry can teach government about IT innovation and efficiency. Also in the new, all-digital issue of InformationWeek Government: Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Download it now. (Free registration required.)
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Femacamper

  • Member
  • *****
  • Posts: 10,398
  • TRUNEWS
    • TRUNEWS
The algorithms, blogs, social bookmarking sites, ratings sites, etc. are all being used to shift public opinion and what we focus on. Digg and Reddit focus on popularity...stories that are buried down are viewed less important, even though the information may be incredible. Worse yet, armies of government trolls have infiltrated all the major sites and even the minor ones to an extent. Bottom line, they are trying to change our opinions. Solution? Opt out of their game. Do things your way.