– Anonymous takes down New York Stock Exchange; media pretends cyber attack was technical incompetence ‘glitch’ (Natural News, July 9, 2015):
Demonstrating America’s extreme vulnerability to activist-driven hackers who are trying to make a point, the New York Stock Exchange was shuttered for most of the day yesterday, stalling out hundreds of billions of dollars in trades.
The lying mainstream media, of course, has rolled out a pathetic (yet hilarious) cover story on all this, claiming there was no hack. Instead, the NYSE is just wholly incompetent and can’t run its own computer systems reliably, we’re told.
– MSM covers up massive cyber attack on America; WSJ, NYSE, United Airlines all under attack (Natural News, July 9, 2015):
A pair of “glitches” that occurred in the IT systems of the New York Stock Exchange and United Airlines Wednesday look an awful lot like a cyber attack, according to some experts and observers, though officially, thus far, the glitches are not being described in that manner.
As reported by Breitbart News, the United Airlines snafu Wednesday morning forced the company to ground or delay about 3,500 flights for as long as two hours. Not long after, a “technical glitch” forced the NYSE to halt all trading, with few details being provided.
– Is This What The First World Cyber War Looks Like: Global Real Time Cyber Attack Map (ZeroHedge, July 8, 2015):
After a series of cyber failures involving first UAL, then this website, then the NYSE which is still halted, then the WSJ, some have suggested that this could be a concerted cyber attack (perhaps by retaliatory China unhappy its stocks are plunging) focusing on the US. So we decided to look at a real-time cyber attack map courtesy of Norsecorp which provides real time visibility into global cyber attacks.
What clearly stands out is that for some reason Chinese DDOS attacks/hackers seem to be focusing on St. Louis this morning.
Whether this is related to the series of suspicious cyber failures today, is so far unclear, although if there is a connection at least there is a way to keep track of the first global cyberwar in real-time.
– Cyber attack hits 4 million current, former U.S. federal workers (Reuters, June 4, 2015):
Hackers breached the computers of the U.S. government agency that collects personnel information for federal workers in a massive cyber attack that compromised the data of about 4 million current and former employees, U.S. officials said on Thursday.
A U.S. law enforcement source told Reuters a foreign entity or government was believed to be behind the cyber intrusion against the Office of Personnel Management (OPM), and media reports said authorities suspected it originated in China.
– Obama chides Sony’s decision to nix film, says US must retaliate and pass cyber act (RT, Dec 19, 2014):
Sony Pictures Entertainment should have touched base with the White House before deciding to cancel the release of a controversial movie, United States President Barack Obama said Friday.
Weighing in on the major Sony scandal only hours after federal investigators attributed the recent hack to North Korea, Pres. Obama said the Hollywood studio was wrong to pull “The Interview,” a satirical film containing a plot to kill North Korean Pres. Kim Jong Un that was scheduled to be released on Christmas Day.
At the same time, though, Obama said the attack should serve as a wake-up call to Congress and prompt lawmakers in Washington, DC to get serious about implementing cybersecurity legislation in the wake of what is only the latest hack to be endured by a major American company.
– China Publishes Data Claiming US Is World’s Largest Cyber Attacker (ZeroHedge, May 20, 2014):
Well that didn’t take long. Having already responded angrily to the US charging 5 military officers with cyber espionage, China has published details of the US cyber attacks:
- *CHINA CALLS U.S. THE BIGGEST ATTACKER OF CYBER SPACE: XINHUA
From 3/19 to 5/18, they claim to have found 135 host computers in the US carrying 563 phishing pages targeting Chinese sites that directly controlled 1.18 million computers. But Jay Carney said earlier that “the US does not engage in economic espionage.”
As Xinhua reports,
– The Most Evil And Disturbing NSA Spy Practices To-Date Have Just Been Revealed (Liberty Blitzkrieg, March 12, 2014):
In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party.
– From Glenn Greenwald’s latest article: How the NSA Plans to Infect Millions of Computers with Malware
The latest piece from Greenwald and company on the unconstitutional spy practices of the NSA may represent the most dangerous and disturbing revelations yet. It’s hard for shadiness at the NSA to surprise me these days, but there was only one word that kept repeating over and over in my head as I read this: EVIL.
As a quick aside, Greenwald points out in the quote above how spam emails are used by the NSA to bait you into clicking dangerous links. This is a timely revelation considering I received one such email yesterday from a friend of mine. The email was sent to a wide list of let’s say “liberty-minded people” and webmasters associated with very popular sites. The link seemed shady so I texted him to ask if he had sent it. He hadn’t.
– Cyber attack that sent 750k malicious emails traced to hacked refrigerator, TVs and home routers (The Age/AFP, Jan 20, 2014):
Call it the attack of the zombie refrigerators.
Computer security researchers say they have discovered a large “botnet” which infected internet-connected home appliances and then delivered more than 750,000 malicious emails.
Possibly related info:
– Arnie Gundersen On U.S. Gov’t Buying 14 Million Potassium Iodide Pills (Used During Nuclear Disasters)
– DHS insider gives final warning (Canada Free Press, Dec 29, 2013):
Under the cover and amid the distraction of the Christmas bustle, I had my last “official” contact with a source inside the Department of Homeland Security known as “Rosebud” in my writings. My source is leaving his position, retiring along with numerous others choosing to leave this bureaucratic monstrosity.
For this contact, my source took unprecedented measures to be certain that our contact was far off the radar of prying government eyes and ears. I was stunned at the lengths he employed, and even found myself somewhat annoyed by the inconvenience that his cloak-and-dagger approach caused. It was necessary, according to my source, because all department heads under FEMA and DHS are under orders to identify anyone disclosing any information for termination and potential criminal prosecution.
– Big Banks Are Being Hit With Cyberattacks “Every Minute Of Every Day” (Economic Collapse, Dec 4, 2013):
What would you do if you logged in to your bank account one day and it showed that you had a zero balance and that your bank had absolutely no record that you ever had any money in your account at all? What would you do if hackers shut down all online banking and all ATM machines for an extended period of time? What would you do if you requested a credit report and discovered that there were suddenly 50 different versions of “you” all using the same Social Security number? Don’t think that these things can’t happen. According to Symantec, there was a 42 percent increase in cyberattacks against U.S. businesses last year. And according to a recent report in the Telegraph, big banks are being hit with cyberattacks “every minute of every day”. These attacks are becoming more powerful and more sophisticated with each passing year. Most of the time the general public never hears much about the cyberattacks that are actually successful because authorities are determined to maintain confidence in the banking system. But if people actually knew the truth about what was going on, they would not have much confidence at all.
– Stuxnet infected Russian nuclear plant (SC Magazine, Nov 8, 2013):
Jumped airgap, Kaspersky boss says.
Stuxnet had ‘badly infected’ the internal network of a Russian nuclear plant after the sophisticated malware caused chaos in Iran’s uranium facilities in Natanz.
The malware, widely considered to have been developed by the US Government as a means to disrupt Iran’s uranium enrichment plans, had crossed a physically separated ‘air-gapped’ network in the Russian plant after it was carried across on a USB device.
Eugene Kaspersky, the charismatic boss of the Russian antivirus company bearing his name, said a staffer at the unnamed nuclear plant informed him of the infection.
– Big Sis Says Cyber Attack WILL Bring Down Power Grid: ‘When Not If’ (Activist Post, Aug 30, 2013)
Lawrence Lessig, a respected Law Professor from Stanford University told an audience at this years Fortune’s Brainstorm Tech conference in Half Moon Bay, California, that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.
Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.
This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
Schematically, Alexander’s empire consists of the following: virtually every piece in America’s information intelligence arsenal.
Snowden exposed the U.S. government illegally and unconstitutionally spying on its citizens, …
… gets charged for spying.
Now that makes perfect sense, doesn’t it?
– China’s Xinhua news agency condemns US ‘cyber-attacks’ (BBC News, June 23, 2013):
China’s official Xinhua news agency has condemned the US over continuing revelations about Washington’s surveillance activities by intelligence fugitive Edward Snowden.
In a commentary, it said the US had turned out to be the “biggest villain in our age”.
Xinhua says the latest allegations in the South China Morning Post, along with previous disclosures, are “clearly troubling signs”.
“They demonstrate that the United States, which has long been trying to play innocent as a victim of cyber-attacks, has turned out to be the biggest villain in our age,” says Xinhua.
“It owes too an explanation to China and other countries it has allegedly spied on. It has to share with the world the range, extent and intent of its clandestine hacking programs.”
Xinhua says the Snowden developments provide support for China’s position on cybersecurity.
“Both the United States and China, together with many other countries, are victims of hacking. For the uncharted waters of the Internet age, these countries should sit down and talk through their suspicions,” says Xinhua.
“With good intentions, they can even work for the establishment of certain rules that help define and regulate Internet activities and mechanisms that can work out their differences when frictions do arise.”
– China slams US as world’s biggest villain for cyber espionage (PressTV, June 23, 2013):
China’s official news agency has slammed the United States as the world’s “biggest villain” following new revelations about Washington’s cyber espionage against Chinese companies and institutions.
“These, along with previous allegations, are clearly troubling signs. They demonstrate that the United States, which has long been trying to play innocent as a victim of cyber attacks, has turned out to be the biggest villain in our age,” said a commentary published in the Xinhua news agency on Sunday.
With his revelations exposing the extent of potential, and actual, pervasive NSA surveillance over the American population, Edward Snowden has done a great service for the public by finally forcing it to answer the question: is having Big Brother peek at every private communication and electronic information, a fair exchange for the alleged benefit of the state’s security. Alas, without further action form a population that appears largely numb and apathetic to disclosures that until recently would have sparked mass protests and toppled presidents, the best we can hope for within a political regime that has hijacked the democratic process, is some intense introspection as to what the concept of “America” truly means.
However, and more importantly, what Snowden’s revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war: an unprecedented cyber war, where collecting, deciphering, intercepting, and abusing information is the only thing that matters and leads to unprecedented power, and where enemies both foreign and domestic may be targeted without due process based on a lowly analyst’s “whim.”
It has also put spotlight on the man, who until recently deep in the shadows, has been responsible for building America’s secret, absolutely massive cyber army, and which according to a just released Wired profile is “capable of launching devastating cyberattacks. Now it’s ready to unleash hell.”
Meet General Keith Alexander, “a man few even in Washington would likely recognize”, which is troubling because Alexander is now quite possibly the most powerful person in the world, that nobody talks about. Which is just the way he likes it.
– A list of the U.S. weapons designs and technologies compromised by hackers (Washington Post, May 28, 2013):
Weapon designs and technologies compromised
The following is reproduced from the nonpublic version of the Defense Science Board report “Resilient Military Systems and the Advanced Cyber Threat”:
Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation
Terminal High Altitude Area Defense
Patriot Advanced Capability-3
Extended Area Protection and Survivability System (EAPS)