FAQFAQ   SearchSearch   MemberlistMemberlist  Chat Chat  UsergroupsUsergroups  CalendarCalendar RegisterRegister   ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

Troubling False Flag Internet Wars?

 
Post new topic   Reply to topic    9/11, 7/7, Covid-1984 & the War on Freedom Forum Index -> General
View previous topic :: View next topic  
Author Message
Disco_Destroyer
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 05 Sep 2006
Posts: 6342

PostPosted: Tue Sep 28, 2010 6:23 pm    Post subject: Troubling False Flag Internet Wars? Reply with quote

Looks like we could be seeing a set up of some sort re. this Stuxnet nonsense

http://www.911forum.org.uk/board/viewtopic.php?t=19662

Queue the US religious hysteria Surprised


Link


but for me more troubling is the announcement of a live operation Surprised

http://www.federalnewsradio.com/?nid=35&sid=2064207

Cyber Storm III uses Internet to attack itself
September 28, 2010 - 7:00am

Quote:
By Max Cacas
Reporter
Federal News Radio

In places like Arlington, Va.; Washington, D.C.; across the U.S. and around the world, a global cybersecurity exercise is underway designed to test the limits not only of the "network of networks," but the ingenuity of the people charged with protecting it.

Welcome to Cyber Storm III.

This is the third time that the Department of Homeland Security, in conjunction with other federal agencies, is holding this global cybersecurity exercise. Previous Cyber Storm exercises were conducted in 2006, and again in 2008. For the first time, DHS will manage its response to Cyber Storm III from its new National Cybersecurity and Communications and Integration Center.

Normally, this facility, located in a nondescript office building in Arlington is classified and closed to the public. But the NCCIC recently opened its doors for an inside look to let DHS officials brief the media on Cyber Storm III, a worldwide cybersecurity response exercise that has been underway since late Monday.

Brett Lambo, the director of the Cybersecurity Exercise Program with DHS's National Cybersecurity Division, is the architect, or game master for this global cybersecurity exercise.

"The overarching philosophy," he told reporters in a recent briefing at the NCCIC, "is that we want to come up with something that's a core scenario, something that's foundational to the operation of the Internet."

Cyber Storm III includes many players in places across the U.S. and around the world:

Seven federal departments: Homeland Security, Defense, Commerce, Energy, Justice, Treasury and Transportation.
Eleven states: California, Delaware, Illinois, Iowa, Michigan, Minnesota, North Carolina, New York, Pennsylvania, Texas, Washington, plus the Multi-State Information Sharing and Analysis Center (ISAC). This compares with nine states that participated in Cyberstorm II.
Twelve international partners: Australia, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden, Switzerland, and the United Kingdom (up from four countries that participated in Cyber Storm II).
DHS officials also say 60 private sector companies will participate in Cyber Storm III, up from 40 who participated in Cyber Storm II. Firms include banking and finance, chemical, communications, defense industrial, information technology, nuclear, transportation and water.

Lambo said to preserve the exercise's value as a vigorous test of cybersecurity preparedness, exact details of the scenario which participants will deal with over the next three days are secret. However, he did share some of the broad parameters of the scenario he helped write, and which he will administer.

"In other exercises, you do have specific attack vectors; you have a denial of service attack, you have a website defacement, or you have somebody dropping a rootkit," he said. "But we wanted to take that up a level to say, 'All of those things can still happen, and based on what you do, if you're concerned about the availability of infrastructure, we can look at what happens when the infrastructure is unavailable.'"

Lambo said another way to look at the scenario is that it builds upon what they learned from previous exercises.

"In Cyber Storm I, we attacked the Internet, in Cyber Storm II, we used the Internet as the weapon, in Cyber Storm III, we're using the Internet to attack itself," he said.

Lambo added under normal circumstances, the Internet operates based on trust that a file, or a graphic, or a computer script is what it says it is, and comes from a trusted source. But what if that source was not what it said it was, or the source has a malicious intent?

"What we're trying to do is compromise that chain of trust," he said, in further explaining in broad strokes of the Cyber Storm III exercise scenario.

Lambo and his colleagues at the Cyber Storm control center also will introduce new, and hopefully unexpected conditions to the scenario to further test participants.

"We have the ability to do what we call dynamic play," he said. "If we get a player action coming back into the exercise that is either different from what we expected it to be, if it's something we'd like to chase down further, or if it's something we'd like to pursue, we have the ability to write injects on the fly."

He said those injects could include new attacks.

The Cyber Storm exercise will be conducted primarily using secure messaging systems like e-mail or text messages to relay intersects to participants and that the simulated attacks are not being conducted over a live or a virtual network now in operation on the Internet, he said.

For the U.S. government, Cyber Storm III also offers the opportunity to test the DHS' National Cyber Incident Response Plan.

"We want to focus on information sharing issues,:" he said. "We want to know how all of the different organizations are compiling, acting on, aggregating information that they're sharing, especially when you're thinking about classified lines coming into the unclassified domain. There's a concept called tearlining, in which we take classified information, and get it below the tearline, so that those without security clearances and get it, and act on it."

The Cyber Storm III exercise is expected to conclude by Oct. 1.

(Copyright 2010 by FederalNewsRadio.com. All Rights Reserved.)

not to mention the constant Alien encounter stuff we're to expect in coming days Very Happy

_________________
'Come and see the violence inherent in the system.
Help, help, I'm being repressed!'


“The more you tighten your grip, the more Star Systems will slip through your fingers.”


www.myspace.com/disco_destroyer
Back to top
View user's profile Send private message Visit poster's website
Disco_Destroyer
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 05 Sep 2006
Posts: 6342

PostPosted: Tue Sep 28, 2010 6:37 pm    Post subject: Reply with quote

Not saying this is connected but Shocked dodgy timing but hey I'm not believing a word of the MSM Stuxnet nonsense, all I know is some crazies are upto something Surprised

Quote:
Kola Nuclear Power Plant no. 3 reactor shuts down after a control failure


http://hisz.rsoe.hu/alertmap/woalert_read.php?glide=NC-20100928-27988- RUS

Another malfunction shuts down the No. 3 reactor at the Kola ...
MURMANSK – The No. 3 reactor block of the embattled Kola Nuclear Power Plant was shut down today by its automatic switch off in what is a seeming series of ...
http://www.bellona.org/articles/articles_2010/Another_kola_shutdown
BREAKING w/ CONFIRMATION!!! Nuclear Alert at Russian Powerplant ...
11 posts - 4 authors - Last post: 18 minutes ago
Kola Nuclear Power Plant no. 3 reactor shuts down after a control failure: [link to hisz.rsoe.hu]. Quoting: Anonymous Coward 1086360 ...
http://204.74.214.194/forum1/message1204892/pg1

_________________
'Come and see the violence inherent in the system.
Help, help, I'm being repressed!'


“The more you tighten your grip, the more Star Systems will slip through your fingers.”


www.myspace.com/disco_destroyer
Back to top
View user's profile Send private message Visit poster's website
Disco_Destroyer
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 05 Sep 2006
Posts: 6342

PostPosted: Tue Sep 28, 2010 6:55 pm    Post subject: Reply with quote

http://www.godlikeproductions.com/forum1/message1204547/pg1


if you can put up with the twaddle but some points are quite humorous lol

_________________
'Come and see the violence inherent in the system.
Help, help, I'm being repressed!'


“The more you tighten your grip, the more Star Systems will slip through your fingers.”


www.myspace.com/disco_destroyer
Back to top
View user's profile Send private message Visit poster's website
TonyGosling
Editor
Editor


Joined: 25 Jul 2005
Posts: 18335
Location: St. Pauls, Bristol, England

PostPosted: Tue Sep 28, 2010 10:39 pm    Post subject: Reply with quote

not substantial enough for news disco
moved to general

_________________
www.lawyerscommitteefor9-11inquiry.org
www.rethink911.org
www.patriotsquestion911.com
www.actorsandartistsfor911truth.org
www.mediafor911truth.org
www.pilotsfor911truth.org
www.mp911truth.org
www.ae911truth.org
www.rl911truth.org
www.stj911.org
www.v911t.org
www.thisweek.org.uk
www.abolishwar.org.uk
www.elementary.org.uk
www.radio4all.net/index.php/contributor/2149
http://utangente.free.fr/2003/media2003.pdf
"The maintenance of secrets acts like a psychic poison which alienates the possessor from the community" Carl Jung
https://37.220.108.147/members/www.bilderberg.org/phpBB2/
Back to top
View user's profile Send private message Visit poster's website MSN Messenger
Disco_Destroyer
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 05 Sep 2006
Posts: 6342

PostPosted: Tue Sep 28, 2010 11:59 pm    Post subject: Reply with quote

?? Either this is real or it isn't
Maybe this is truly the reason they boast on MSM?
Maybe it is as real as Trade wars?

http://www.debka.com/article/9048/

Cyber attack on Iran expands: Tehran threatens long-term war in reprisal
DEBKAfile Exclusive Report September 27, 2010, 6:13 PM (GMT+02:00) Tags: Bushehr attacked cyber war Stuxnet

Stuxnet spreads to Bushehr an personal computers
Iran admitted Monday, Sept. 27 it was under full-scale cyber terror attack. The official IRNA news agency quoted Hamid Alipour, deputy head of Iran's government Information Technology Company, as saying that the Stuxnet computer worm "is mutating and wreaking further havoc on computerized industrial equipment."
Stuxnet was no normal worm, he said: "The attack is still ongoing and new versions of this virus are spreading."
Revolutionary Guards deputy commander Hossein Salami declared his force had all the defensive structures for fighting a long-term war against "the biggest and most powerful enemies" and was ready to defend the revolution with more advanced weapons than the past. He stressed that defense systems have been designed for all points of the country, and a special plan devised for the Bushehr nuclear power plant. DEBKAfile's military sources report that this indicates that the plant - and probably other nuclear facilities too - had been infected, although Iranian officials have insisted it has not, only the personal computers of its staff.
The Stuxnet spy worm has been created in line with the West's electronic warfare against Iran," said Mahmoud Liayi, secretary of the information technology council of the Industries Minister.
As for the origin of the Stuxnet attack, Hamid Alipour said: The hackers who enjoy "huge investments" from a series of foreign countries or organizations, designed the worm, which has affected at least 30,000 Iranian addresses, to exploit five different security vulnerabilities. This confirmed the impressions of Western experts that Stuxnet invaded Iran's Supervisory Control and Data Acquisition systems through "zero-day" access.
Alipour added the malware, the first known worm to target large-scale systems and industrial complexes control systems, is also a serious threat to personal computers.
DEBKAfile's Iranian and intelligence sources report that these statements are preparing the ground for Tehran to go beyond condemning the states or intelligence bodies alleged to have sponsored the cyber attack on Iranian infrastructure and military industries and retaliate against them militarily. Iran is acting in the role of victim of unprovoked, full-scale, cyber terror aggression.

http://www.debka.com/article/9038/

Iran is under cyber threat as Obama offers nuclear negotiations
DEBKAfile Exclusive Report September 23, 2010, 1:26 PM (GMT+02:00) Tags: cyber war Iran nuclear US-Israel

Deadly new Stuxnet, soldier in cyber war
By choosing US President Barack Obama and Iran's Mahmoud Ahmadinejad to deliver the opening addresses at the UN General Assembly session in New York Thursday, Sept. 23, the UN secretariat told the world that Iran's drive for nuclear bomb dominated world affairs at this time.
DEBKAfile's military and intelligence sources note in this regard the US press leaks appearing since Monday, Sept. 20, which maintain that the United States has embarked on a clandestine cyber war against Iran and that Israel has established elite cyber war units for this purpose.
According to our Washington sources, Obama has resolved to deal with the nuclear impasse with Iran by going after the Islamic republic on two tracks: UN and unilateral sanctions for biting deep into the financial resources Iran has earmarked for its nuclear program, and a secret cyber war which the US is conducting jointly with Israel for crippling its nuclear facilities.
In New York, quiet exchanges are ongoing with Ahmadinejad's delegation for renewing the Six Power talks on Iran's banned uranium enrichment program. he US offer to go back to the negotiating table was made against a background of deliberately leaked revelations by US security sources to US media regarding the recruitment of Israel military and security agencies of cyber raiders with the technical knowhow and mental toughness for operating in difficult and hazardous circumstances, such as assignments for stealing or destroying enemy technology, according to one report.
DEBKAfile's sources disclose that Israel has had special elite units carrying out such assignments for some time. Three years ago, for instance, cyber raiders played a role in the destruction of the plutonium reactor North Korea was building at A-Zur in northern Syria.
On Monday, too, the Christian Science Monitor and several American technical journals carried revelations about a new virus called Stuxnet capable of attacking and severely damaging the servers of large projects, such as power stations and nuclear reactors.
All the leaked reports agreed on three points:
1. Stuxnet is the most advanced and dangerous piece of Malware every devised.
2. The experts don't believe any private or individual hackers are capable of producing this virus, only a high-tech state such as America or Israel.
3. Although Stuxnet was identified four months ago, the only servers known to have been affected and seriously damaged are located in Iran.
Some computer security specialists report lively speculation that the virus was invented specifically to target part of the Iranian nuclear infrastructure, either the Bushehr nuclear plant activated last month or the centrifuge facility in Natanz.
DEBKAfile's sources add: Since August, American and UN nuclear watchdog sources have been reporting a slowdown in Iran's enrichment processing due to technical problems which have knocked out a large number of centrifuges and which its nuclear technicians have been unable to repair. It is estimated that at Natanz alone, 3,000 centrifuges have been idled.
None of the reports indicate whether other parts of Iran's nuclear program have been affected by Stuxnet or the scale of the damage it may have caused.

other top stories

-The first full-scale cyber attack on a state
-Hamas muscle-flexing sparks Gaza clash with Israeli troops
-More terror looms as direct talks collapse - one up for Hamas, Hizballah
-Direct Israel-Palestinian talks collapse after Abbas engages Hamas
-Tehran confirms its industrial computers under Stuxnet virus attack
-Violent Palestinain riots erupt in Jerusalem
-Hizballah mobilizes for a coup in Beirut, backed by Iran and Syria
-Mitchell to hand Assad Netanyahu's proposed Golan withdrawal map

_________________
'Come and see the violence inherent in the system.
Help, help, I'm being repressed!'


“The more you tighten your grip, the more Star Systems will slip through your fingers.”


www.myspace.com/disco_destroyer
Back to top
View user's profile Send private message Visit poster's website
Disco_Destroyer
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 05 Sep 2006
Posts: 6342

PostPosted: Wed Sep 29, 2010 12:15 am    Post subject: Reply with quote

Iran refutes malware infected N plant
Tue Sep 28, 2010 8:46AM
Share | Email | Print
http://www.presstv.ir/detail/144306.html
Iranian Foreign Ministry Spokesman Ramin Mehmanparast
Iran has rejected reports that a complicated cyber worm has damaged computer systems at the country's first nuclear power plant.


Iranian Foreign Ministry Spokesman Ramin Mehmanparast said in his weekly press conference on Tuesday that the report was part of the “soft war” and a “propaganda stratagem” against Iran.

According to the Iranian spokesperson, the new soft war is aimed at targeting the Islamic Republic's peaceful nuclear program.

“The Busheher plant is pursuing its activities based on a set timetable,” Mehmanparast said, adding that the plant will join the country's electricity grid within the next two months.

This comes after media reported that the Stuxnet, a computer worm that is viewed as potentially the most dangerous piece of computer malware discovered, has targeted industrial computers around the globe with Iran being the main target of the attack.

The complex worm reportedly identifies a specific facility's control network and then destroys it.

Experts say that the worm may have been created by a state-sponsored organization in the US or Israel to target specific control software being used in the Iranian industrial sector, including the Bushehr plant -- Iran's first nuclear power plant.

_________________
'Come and see the violence inherent in the system.
Help, help, I'm being repressed!'


“The more you tighten your grip, the more Star Systems will slip through your fingers.”


www.myspace.com/disco_destroyer
Back to top
View user's profile Send private message Visit poster's website
Disco_Destroyer
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 05 Sep 2006
Posts: 6342

PostPosted: Wed Sep 29, 2010 12:19 am    Post subject: Reply with quote

Ho Hum it's all as clear as mud.

Love the propaganda not!

Maybe that is the next plan make it such a minefield that even the truthers give up Neutral

_________________
'Come and see the violence inherent in the system.
Help, help, I'm being repressed!'


“The more you tighten your grip, the more Star Systems will slip through your fingers.”


www.myspace.com/disco_destroyer
Back to top
View user's profile Send private message Visit poster's website
Disco_Destroyer
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 05 Sep 2006
Posts: 6342

PostPosted: Wed Sep 29, 2010 12:29 pm    Post subject: Reply with quote

After much deliberation I can only come to the conclusion that it's propaganda to sure up a false flag internet attack therefore allowing the sheeple to point at Iran. There is no other logical sense for these ridiculous lies imo

Either that the MSM are just running out of lies and any touching on Truth is likely to send their world construct crashing to ground Very Happy

_________________
'Come and see the violence inherent in the system.
Help, help, I'm being repressed!'


“The more you tighten your grip, the more Star Systems will slip through your fingers.”


www.myspace.com/disco_destroyer
Back to top
View user's profile Send private message Visit poster's website
Thermate911
Angel - now passed away
Angel - now passed away


Joined: 16 Jul 2007
Posts: 1451
Location: UEMS

PostPosted: Wed Sep 29, 2010 7:01 pm    Post subject: Reply with quote

Disco_Destroyer wrote:
After much deliberation I can only come to the conclusion that it's propaganda to sure up a false flag internet attack therefore allowing the sheeple to point at Iran. There is no other logical sense for these ridiculous lies imo


Prez mandate to 'protect our infrastructure (what infrastructure?)' against wicked forces of Al Ciada', regretful necessitation cut net due to stuxnet boogaboo ?

T'would let The Crims off the hook for a breather, what?

Archive everything - 1st Oct could begin the big fake bye bye. For now...

Note URL before clicking:-
http://www.software.co.il/wordpress/2010/09/why-pentagon-cyber-strateg y-is-divorced-from-reality/

_________________
"We will lead every revolution against us!" - attrib: Theodor Herzl

"Timely Demise to All Oppressors - at their Convenience!" - 'Interesting Times', Terry Pratchett
Back to top
View user's profile Send private message
Disco_Destroyer
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 05 Sep 2006
Posts: 6342

PostPosted: Wed Sep 29, 2010 7:50 pm    Post subject: Reply with quote

http://thompson.blog.avg.com/2010/09/stuxnet-is-exactly-why-im-scared- of-facebook.html

STUXNET IS EXACTLY WHY I'M SCARED OF FACEBOOK SEPTEMBER 28, 2010
Hi folks,

Just over the last few days, lots of "awareness" has begun to grow about the Stuxnet worm. I didn't pay too much attention at first, thinking "Sigh, yet another worm... yawn", or words to that effect, but Stuxnet is _anything_ but "yet another worm".

It's a weapon.

Most worms are "I'm gonna show my buddies how smart I am" or "I really like Anna Kournikova" or "I'm gonna make a big political statement" or more recently, "I'm gonna build a big botnet and steal everyone's credit cards."

Stuxnet is different. It's a _weapon_.

Not even that is quite correct ... it's a _WEAPON!!_

Here are the basics...

(1) It's infected an unknown, but large, number of computers, mostly in Iran. That's kind of odd for starters.

(2) It uses at least four 0-day exploits to spread. That's remarkable. This writer can't think (so far) of any other worm that used more than one 0-day. There have been plenty that used multiple exploits, but not multiple 0-days. (There might well be, but I can't think of them)

(3) On most computers, it doesn't do much more than spread, but if it finds a computer being used as an Industrial Control Computer (ICC), such as might be used in, say, a nuclear power station, it behaves differently. It actually writes its own rootkit code into the Programable Logic Controller. This means it's hiding, but _it_ now controls whatever the ICC was controlling.

PLCs have different byte codes from a standard pc, so what this means is that the worm carried some extra byte codes, just for this purpose. This is astonishing!

What do they do then?... shut stuff down... melt stuff down... blow stuff up. Who knows?

What this really means is that this is beyond even a criminal gang. Without question, it requires state-level resources and significant technical prowess across multiple disciplines.

"So", I hear you asking "Now that it's been identified, they'll just remove it, right?", and the answer to that question is "Perhaps".

The problem is that no one knows quite how long this has been around, and no one knows what else they might have done before discovery.

There is a school of security thought that says that if an intruder is in your system long enough, you can't get them out again, because they know so much about the insides of your network.

For years now, malicious attacks have fallen into two broad sets..

(1) General web shotgun maliciousness, where the main target is someone's credit card, and

(2) Directed attacks, where gov or mil organizations are probed, with a view towards espionage (probably).

This is orders of magnitude more sophisticated and more dangerous than anything seen before.

So where does poor old Facebook come in? Remember, I like Facebook. It's fun, and not meant to be dangerous, but it _is_ dangerous.

The problem is that it's not clear what information leaks from Facebook. Even if they have it mostly nailed down, their programmers are human, and humans make mistakes. Just in the last week, Twitter and Orkut have suffered embarrassing XSS issues. And even if the software is perfect (that would be the first bug-less software in history, but that's beside the point) its users are human, and humans make mistakes.

The reason this matters is that if you want to target someone/ some organization with a directed attack, you need information about the victim.

Think about Facebook apps. Try to find out who is behind your favorite apps, and I bet that half the time, the owner is hidden behind some privacy protector service.

Bottom line is that, mostly, we have no idea who is collecting information from our profiles, and our contacts, and our photos.

Some of these apps have millions of active users.

How many people access Facebook from work computers?

If we are paying attention to these events, Stuxnet makes us realize that the price of giving up too much information is not simply losing our savings.

We might lose something worse, like the power grid. And does anyone remember the China Syndrome?

Keep safe folks,

Roger




Quote:
As Chief Research Officer for AVG, Roger leads a global team of security researchers. He moved into his current position when his previous venture, Exploit Prevention Labs, was acquired by AVG in late 2007.
Prior to co-founding Exploit Prevention Labs in 2005, Roger headed the malware research operations for security industry leaders ICSA, PestPatrol and Computer Associates (CA).

_________________
'Come and see the violence inherent in the system.
Help, help, I'm being repressed!'


“The more you tighten your grip, the more Star Systems will slip through your fingers.”


www.myspace.com/disco_destroyer
Back to top
View user's profile Send private message Visit poster's website
Disco_Destroyer
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 05 Sep 2006
Posts: 6342

PostPosted: Wed Sep 29, 2010 8:04 pm    Post subject: Reply with quote

http://abcnews.go.com/Blotter/us-credible-specific-threat-terrorist-at tack/story?id=11747364

Ooh what is in the offing here Surprised Go to page and watch video, Germans in Pakistan linked to Hamburg Cell Surprised Personally blessed by old ghost OBL himself Very Happy

'Credible But Not Specific' Threat of New Terrorist Attack
Officials in Europe, US on High Alert for Commando-Style Raids After Capture of Suspected German Terrorist

US and European officials said Tuesday they have detected a plot to carry out a major, coordinated series of commando-style terror attacks in Britain, France, Germany and possibly the United States.

A senior US official said that while there is a "credible" threat, no specific time or place is known. President Obama has been briefed about the threat, say senior US officials.

Intelligence and law enforcement authorities in the US and Europe said the threat information is based on the interrogation of a suspected German terrorist allegedly captured on his way to Europe in late summer and now being held at Bagram Airfield in Afghanistan.

US law enforcement officials say they have been told the terrorists were planning a series of "Mumbai-style" commando raids on what were termed "economic or soft" targets in the countries. Pakistani militants killed 173 people with guns and grenades during the 2008 attacks in Mumbai, India.

In testimony before Congress last week, Homeland Security Secretary Janet Napolitano said, "We are all seeing increased activity by a more diverse set of groups and a more diverse set of threats."

Officials in France have put the country on high alert for a terror attack and authorities in Paris shut down the Eiffel Tower for the second time in two weeks today after what was termed a "false alarm."

No bomb was found but officials in France are taking no chances, given what they believe is a very real threat.

"We currently have reached a spike in the threat of an attack, which is unquestionable," said the head of the French National Police last week. He also said France was at particular risk from al Qaeda's North African affiliate.

The new threat to France, and to Germany and Britain and the U.S., is coming from Pakistan, according to intelligence officials. The captured German reportedly said several teams of attackers, all with European passports, had been trained and dispatched from training camps in Waziristan and Pakistan. Officials say the German claimed the attack plan had been approved by Osama Bin Laden.

US intelligence officials said they believed an attack on American soil was more likely to come from terrorists connected to the al Qaeda group in Yemen, known as AQAP, al Qaeda of the Arabian Peninsula.

But an official of the New York Police Department said while the most specific information was about Europe, NYPD intelligence officers were following the new information closely. "Nobody here is letting their guard down, the NYPD is watching," the official said.

CLICK HERE TO READ A NEW YORK TIMES' ARTICLE THAT DISCUSSES THE THREAT AND CLICK HERE TO READ A WALL STREET JOURNAL ARTICLE

_________________
'Come and see the violence inherent in the system.
Help, help, I'm being repressed!'


“The more you tighten your grip, the more Star Systems will slip through your fingers.”


www.myspace.com/disco_destroyer
Back to top
View user's profile Send private message Visit poster's website
Thermate911
Angel - now passed away
Angel - now passed away


Joined: 16 Jul 2007
Posts: 1451
Location: UEMS

PostPosted: Thu Sep 30, 2010 8:34 am    Post subject: Reply with quote

Quote:
A senior US official said that while there is a "credible" threat, no specific time or place is known.


Yeah right - blah blah blah! Where have we heard this before? Then there's the real story of
Der Bader Meinhof Komplex...

That pundit in your previous post is quite right to zero in on Farcebook. Then there's g00gle & Micro$haft:-

http://www.bibliotecapleyades.net/sociopolitica/sociopol_internetgoogl e03.htm

I think the weirdest facet of stuxnet is how it is triggered - by identifying a specific processor's MAC address. So whose bright idea was it to insist on a unique code for each CPU? Intel & Microsoft: so who exactly has direct access to all these millions of MACS?

Beats me why otherwise aware people still use these elitist products when there are so many open source alternatives around.

Eg: Diaspora instead of Farcebook & MySpace
Status.net instead of Twitter
Ubuntu Linux instead of Windoze or g00gle Chrome
Ekiga instead of Skype
Empathy instead of MSNMessenger
Soundcloud instead of Bandcamp & LastFm
AMD instead of Intel

etc

Which reminds me: Why is this website still allowing g00gle to profile us all? It just doesn't add up...

_________________
"We will lead every revolution against us!" - attrib: Theodor Herzl

"Timely Demise to All Oppressors - at their Convenience!" - 'Interesting Times', Terry Pratchett
Back to top
View user's profile Send private message
Disco_Destroyer
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 05 Sep 2006
Posts: 6342

PostPosted: Thu Sep 30, 2010 9:24 pm    Post subject: Reply with quote

looks like more propaganda but:

http://www.breitbart.com/article.php?id=CNG.f6fba55ad8f5e329c0c25bad9a a7b8d3.651&show_article=1

Stuxnet 'cyber superweapon' moves to China
Sep 30 07:16 AM US/Eastern

A computer virus dubbed the world's "first cyber superweapon" by experts and which may have been designed to attack Iran's nuclear facilities has found a new target -- China.
The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media reported this week.

Stuxnet is feared by experts around the globe as it can break into computers that control machinery at the heart of industry, allowing an attacker to assume control of critical systems like pumps, motors, alarms and valves.

It could, technically, make factory boilers explode, destroy gas pipelines or even cause a nuclear plant to malfunction.

The virus targets control systems made by German industrial giant Siemens commonly used to manage water supplies, oil rigs, power plants and other industrial facilities.

"This malware is specially designed to sabotage plants and damage industrial systems, instead of stealing personal data," an engineer surnamed Wang at antivirus service provider Rising International Software told the Global Times.

"Once Stuxnet successfully penetrates factory computers in China, those industries may collapse, which would damage China's national security," he added.

Another unnamed expert at Rising International said the attacks had so far infected more than six million individual accounts and nearly 1,000 corporate accounts around the country, the official Xinhua news agency reported.

The Stuxnet computer worm -- a piece of malicious software (malware) which copies itself and sends itself on to other computers in a network -- was first publicly identified in June.

It was found lurking on Siemens systems in India, Indonesia, Pakistan and elsewhere, but the heaviest infiltration appears to be in Iran, according to software security researchers.

A Beijing-based spokesman for Siemens declined to comment when contacted by AFP on Thursday.

Yu Xiaoqiu, an analyst with the China Information Technology Security Evaluation Centre, downplayed the malware threat.

"So far we don't see any severe damage done by the virus," Yu was quoted by the Global Times as saying.

"New viruses are common nowadays. Both personal Internet surfers and Chinese pillar companies don't need to worry about it at all. They should be alert but not too afraid of it."

A top US cybersecurity official said last week that the country was analysing the computer worm but did not know who was behind it or its purpose.

"One of our hardest jobs is attribution and intent," Sean McGurk, director of the National Cybersecurity and Communications Integration Center (NCCIC), told reporters in Washington.

"It's very difficult to say 'This is what it was targeted to do,'" he said of Stuxnet, which some computer security experts have said may be intended to sabotage a nuclear facility in Iran.

A cyber superweapon is a term used by experts to describe a piece of malware designed specifically to hit computer networks that run industrial plants.

"The Stuxnet worm is a wake-up call to governments around the world," Derek Reveron, a cyber expert at the US Naval War School, was quoted as saying Thursday by the South China Morning Post.

"It is the first known worm to target industrial control systems."

_________________
'Come and see the violence inherent in the system.
Help, help, I'm being repressed!'


“The more you tighten your grip, the more Star Systems will slip through your fingers.”


www.myspace.com/disco_destroyer
Back to top
View user's profile Send private message Visit poster's website
Thermate911
Angel - now passed away
Angel - now passed away


Joined: 16 Jul 2007
Posts: 1451
Location: UEMS

PostPosted: Fri Oct 01, 2010 2:32 pm    Post subject: Reply with quote

Breitbart? Propaganda indeed but stuxnet would seem somewhat more than flah...

I am interested in the fact that the attacked PLCs are of Siemens manufacture. From personal experience with this aryan combine anything is possible. So who held the MAC codes?

http://redactednews.blogspot.com/2010/10/cyber-storm-iii-tests-us-on-c yber.html

Quote:
The fact that Stuxnet appears designed to attack a certain type of Siemens industrial control computer, used widely to manage oil pipelines, electrical power grids and many kinds of nuclear plants, may be telling. Just last year officials in Dubai seized a large shipment of those controllers — known as the Simatic S-7 — after Western intelligence agencies warned that the shipment was bound for Iran and would likely be used in its nuclear program.

“What we were told by many sources,” said Olli Heinonen, who retired last month as the head of inspections at the International Atomic Energy Agency in Vienna, “was that the Iranian nuclear program was acquiring this kind of equipment.”

Also, starting in the summer of 2009, the Iranians began having tremendous difficulty running their centrifuges, the tall, silvery machines that spin at supersonic speed to enrich uranium — and which can explode spectacularly if they become unstable. In New York last week, Iran’s president, Mahmoud Ahmadinejad, shrugged off suggestions that the country was having trouble keeping its enrichment plants going.

Yet something — perhaps the worm or some other form of sabotage, bad parts or a dearth of skilled technicians — is indeed slowing Iran’s advance.


Another point being lost in the hype and paranoia is the unpalatable (to any would be net censors) fact that stuxnet does not need the net to propagate - does just fine through usb sticks...

_________________
"We will lead every revolution against us!" - attrib: Theodor Herzl

"Timely Demise to All Oppressors - at their Convenience!" - 'Interesting Times', Terry Pratchett
Back to top
View user's profile Send private message
Thermate911
Angel - now passed away
Angel - now passed away


Joined: 16 Jul 2007
Posts: 1451
Location: UEMS

PostPosted: Fri Oct 01, 2010 6:47 pm    Post subject: Reply with quote

Here we go - again:-

In the Telegraph, no less, and we know where their agenda lies...

http://www.telegraph.co.uk/news/worldnews/middleeast/israel/8034987/Is raeli-cyber-unit-responsible-for-Iran-computer-worm-claim.html

Quote:
... ... ... Elizabeth Katina, a researcher at the Royal United Services Institute, said the possibility of a copycat attack on British or American electricity networks or water supplies had been elevated by the release of Stuxnet.

"Critical national infrastructure is at greater risk because this shows groups on the outside of governments how to do it," she said. "It's more likely now that the northeast of England power grid can be shut down* until someone decides to start it up again."


* what is this about?

As for Royal United Services Institute:-
http://www.sourcewatch.org/index.php?title=Royal_United_Services_Insti tute_for_Defence_Studies

_________________
"We will lead every revolution against us!" - attrib: Theodor Herzl

"Timely Demise to All Oppressors - at their Convenience!" - 'Interesting Times', Terry Pratchett
Back to top
View user's profile Send private message
Disco_Destroyer
Trustworthy Freedom Fighter
Trustworthy Freedom Fighter


Joined: 05 Sep 2006
Posts: 6342

PostPosted: Mon Oct 04, 2010 12:04 pm    Post subject: Reply with quote

Probably FEAR to force the new Internet Bill in US with a sledgehammer!
_________________
'Come and see the violence inherent in the system.
Help, help, I'm being repressed!'


“The more you tighten your grip, the more Star Systems will slip through your fingers.”


www.myspace.com/disco_destroyer
Back to top
View user's profile Send private message Visit poster's website
Thermate911
Angel - now passed away
Angel - now passed away


Joined: 16 Jul 2007
Posts: 1451
Location: UEMS

PostPosted: Tue Oct 05, 2010 9:25 am    Post subject: Reply with quote

But why did RUSI's Katina single out 'the northeast of England power grid'? I have yet to find any direct connection, pardon the pun.

Fylingdales, maybe?
http://www.fas.org/spp/military/program/nssrm/initiatives/fyling.htm

_________________
"We will lead every revolution against us!" - attrib: Theodor Herzl

"Timely Demise to All Oppressors - at their Convenience!" - 'Interesting Times', Terry Pratchett
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic   Reply to topic    9/11, 7/7, Covid-1984 & the War on Freedom Forum Index -> General All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group