“I gave (Putin) a list, if I’m not mistaken I don’t have it in front of me, 16 specific entities, 16 defined as critical infrastructure” that Putin should not cyberattack, Biden said.
We have questions.
Did Biden make Putin pinky swear, cross his heart and hope to die if he attacks items on the list anyway?
Does that list allow Putin a free hand to go and cyberattack anything in the United States that isn’t on it? “You didn’t put it on list, comrade, so we hack it,” Putin chuckles as he text Xi with a string of laughing emojis.
On what planet is it a good idea to give a potential adversary a list of things you do not want him to attack?
When you play Risk, the classic game of world conquest, do you give your competitors a list of countries you don’t want them to attack? Would you expect them to abide by that?
When you play Stratego, the classic strategy war game of intrigue, do you tell your opponent where your spies and bombs are? Do you honestly expect to win if you do that?
When you run for office, do you go meet with your competitor and hand them a list of the skeletons in your closet with a plea not to go after them? Would you expect any of those items to not end up in the media within a nanosecond?
Remember that Solarwinds hack last December? Remember how the Government blamed the Russians – again? Well, it turns out the hackers were working from within the United States.
So, why haven’t these ‘Russian’ hackers been arrested?
Why haven’t the FBI, NSA, or the Cybersecurity and Infrastructure Agency, (CISA) identified anyone responsible? In fact, none of these alphabet agencies even detected the cyberattack.
If it wasn’t for FireEye, a private cybersecurity company, the hack would have gone unnoticed and the perpetrators would still be accessing data…
The Solarwinds hack was huge, affecting nine Federal Agencies and over 100 private companies. Microsoft’s President called it “the largest and most sophisticated attack the world has ever seen” and the work of “at least 1,000 very skilled, very capable engineers”.
All the people it took to carry this out, and we’re supposed to believe there’s no trail of evidence that could lead to the perpetrators. The truth is, investigators know exactly where to look.
The hackers used Amazon cloud servers.
We live in an age of global deception and delusion of Biblical proportions. Lying is a way of life. Deceiving is taken to the level of an art form. Debauchery and corruption are everywhere.
The slick propaganda that promises to eliminate poverty, create wonderful jobs with dignity and bring lasting peace to the world has more in common with a pile of horse manure than lasting solutions.
I stated in early 2020 that the Great Panic of 2020 (read, “pandemic”) was the start of Technocracy’s coup d’état. It was global in scope, horribly damaging to the global economy and ripped the fabric of societal status quo to shreds. All of this was supposedly caused by an unseen enemy. And now, the “scientists” behind it, like Dr. Anthony Fauci, are proven to be frauds and hucksters whose science has been discredited as “pseudo-science” at best.
May I remind you that global warming is also an unseen enemy of the same magnitude? The corrupt and bastardized data supporting global warming is as fraudulent and deceptive as that of COVID-19. Lies abound. Fabricated computer models spit out megatons of buffalo chips to tell us we are all going to die when the polar ice caps melt and the seas rise.
I have also warned that there will be other attacks of deception to solidify the global Technocrat takeover.
The Technocrats are delivering.
Two major back-to-back hacking episodes have suddenly appeared to underscore the need for a universal ID system and total control over the Internet. First, the Colonial Pipeline was shut down causing massive fuel shortages on the East Coast. Second, the largest meat producer in the world is hacked bringing production to a halt. Gas prices go up. Meat shortages threaten availability. All thanks to an invisible enemy (the hackers) who we are told are some dark, deep-state entity trying to destroy America.
Let’s pause and remember that the Great Panic of 2020 was preceded by a global pandemic simulation called Event 201, sponsored by the World Economic Forum. This is a fact, not speculation. Event 201 scripted the pandemic response almost to the letter. They were prepared and in control.
A cyberattack that crippled fuel supplies on the East Coast of the US and sent gas prices soaring could have been an inside job conducted by American spooks, rather than foreign hackers, a prominent Russian IT expert has claimed.
After a massive systems failure caused the Colonial Pipeline to shut down, Natalya Kaspersky, the founder and former CEO of security software firm Kaspersky Lab, as well as one of Russia’s wealthiest women, made the explosive suggestions in an interview with RIA Novosti on Friday. She alleges that the US’ top foreign intelligence agency, the CIA, has a crack team of digital warriors who are able to masquerade as overseas hacking groups.
According to her, the group, known as UMBRAGE, is adept at hiding its online footprints. The existence of the team first came to light in a series of documents published by WikiLeaks in 2017 and subsequently picked up by American media. At the time, USA Today said that the shadowy operatives “may have been cataloguing hacking methods from outside hackers, including in Russia, that would have allowed the agency to mask their identity by employing the method during espionage.”
The personal data, including phone numbers and emails, of more than 500 million Facebook users has been leaked online. The social media company claims that the data was obtained through a vulnerability that has since been fixed.
A user in a low-level hacking forum published the personal data of over 533 million Facebook users. The leaked data includes Facebook IDs, full names, phone numbers, email address, and other personal identifiable information. It affects Facebook users from 106 countries, including data on over 33 million users in the US and 11 million users in the UK.
Business Insider verified the authenticity of the leaked data by matching several of known user’s phone numbers to the Facebook IDs listed.
A Facebook spokesperson said that the data was illegally obtained via a vulnerability that was fixed back in 2019. Whether or not the data is a few years old, it could still be used by cybercriminals for identity theft and other scams.
On Feb. 16, less than two weeks after a mysterious attacker made headlines around the world by hacking a water treatment plant in Oldsmar, Florida, and nearly generating a mass poisoning, the city’s mayor declared victory.
“This is a success story,” Mayor Eric Seidel told the City Council in Oldsmar, a Tampa suburb of 15,000, after acknowledging “some deficiencies.” As he put it, “our protocols, monitoring protocols, worked. Our staff executed them to perfection. And as the city manager said, there were other backups. … We were breached, there’s no question. And we’ll make sure that doesn’t happen again. But it’s a success story.” Two council members congratulated the mayor, noting his turn at the press conference where the hack was disclosed. “Even on TV, you were fantastic,” said one.
Get Our Top Investigations
Subscribe to the Big Story newsletter.Email address:
“Success” is not the word that cybersecurity experts use to describe the Oldsmar episode. They view the breach as a case study in digital ineptitude, a frightening near-miss and an example of how the managers of water systems continue to downplay or ignore years of increasingly dire warnings.
The experts say the sorts of rudimentary vulnerabilities revealed in the breach — including the lack of an internet firewall and the use of shared passwords and outdated software — are common among America’s 151,000 public water systems.
“Frankly, they got very lucky,” said retired Adm. Mark Montgomery, executive director of the federal Cyberspace Solarium Commission, which Congress established in 2018 to upgrade the nation’s defenses against major cyberattacks. Montgomery likened the Oldsmar outcome to a pilot landing a plane after an engine caught fire during a flight. “They shouldn’t celebrate like Tom Brady winning the Super Bowl,” he said. “They didn’t win a game. They averted a disaster through a lot of good fortune.”
A town in Florida has been target of a hack which briefly altered chemicals in its water supply to “potentially damaging levels” according to local media reports. Federal and local authorities are currently investigating the computer network intrusion which happened last Friday morning, the alarming details of which are emerging Monday.
Plant operators overseeing the small city of Oldsmar’s water supply began observing strange activity on their monitors. That’s when technicians noticed that sodium hydroxide levels (or lye), which is used to treat the city’s water in small amounts in order to control acidity while removing heavy metals, was being remotely pushed higher.
Technicians noticed the chemical levels being subject of unauthorized external manipulation in real-time and immediately moved to restore the sodium hydroxide input to its safe, correct levels. The AP detailed based on local reporting: “A plant worker first noticed the unusual activity at around 8 a.m. Friday when someone briefly accessed the system.”
“At about 1:30 p.m., someone accessed it again, took control of the mouse, directed it to the software that controls water treatment and increased the amount of sodium hydroxide,“ the report continued.
The hacker or hackers have yet to be uncovered and apprehended.
If you’re using an Android device—or in some cases an iPhone—the Telegram messenger app makes it easy for hackers to find your precise location when you enable a feature that allows users who are geographically close to you to connect. The researcher who discovered the disclosure vulnerability and privately reported it to Telegram developers said they have no plans to fix it.
The problem stems from a feature called People Nearby. By default, it’s turned off. When users enable it, their geographic distance is shown to other people who have it turned on and are in (or are spoofing) the same geographic region. When People Nearby is used as designed, it’s a useful feature with few if any privacy concerns. After all, a notification that someone is 1 kilometer or 600 meters away still leaves stalkers guessing where, precisely, you are.
Stalking made simple
Independent researcher Ahmed Hassan, however, has shown how the feature can be abused to divulge exactly where you are. Using readily available software and a rooted Android device, he’s able to spoof the location his device reports to Telegram servers. By using just three different locations and measuring the corresponding distance reported by People Nearby, he is able to pinpoint a user’s precise location.