The following is the transcript of Judge Jeanine Pirro’s opening statement regarding threats to our nation’s power grid.
Welcome to a special edition of Justice – I’m Judge Jeanine Pirro. Tonight – an hour long investigation into the dangers facing the U.S. power grid. What would it take to bring it down? And if our system did break down – how would you survive? And what would it be like in the dark? Continue reading
Consensus is growing that the U.S. electricity grid is vulnerable to both hacking and physical attacks, but protecting it remains a work in progress—especially given the spending that would be necessary by financially stretched utilities.
M. Granger Morgan, the head of engineering and public policy at Carnegie Mellon University, told CNBC that a physical attack on the grid poses a “much greater threat” than a cyberattack. Still, he added that vulnerabilities within the technological network of the power system itself require “real and urgent attenuation.” Continue reading
(Reuters) – Thousands of staff across dozens of London’s financial firms will be put through a “war game” scenario on Tuesday to test how well they can handle a major cyber attack.
In one of the largest exercises of its kind in the world, the test dubbed “Waking Shark II” will bombard firms with a series of announcements and scenarios, such as a major attack on computer systems hitting stock exchanges and unfolding on social media. Continue reading
Terror group is capable of hitting any house in Israel, according to home front defense minister
“According to an IDF worst-case scenario, Israel could find itself under attack from thousands of rockets that could last three weeks,” he said at a conference at Bar-Ilan University, according to Israel Radio. “The Hezbollah organization has over 200,000 missiles capable of hitting any house in Israel.” Continue reading
Another interesting factor in attacks on the U.S. critical infrastructure is the exploiting of SCADAS. It’s been evidenced quite a few times that these have been compromised.
Here is one such example: UPDATE 3: U.S. probes cyber attack on water system
More than 10,000 people in Arkansas were dumped into a blackout Sunday following an attack on that state’s electric grid, the FBI said today, the third such attack in recent weeks. In August, a major transmission line in the region, around Cabot, Ark., was deliberately cut.
The FBI said that two power poles had been intentionally cut in Lonoke County on Sunday, resulting in the outage.
The FBI said it would pay a $25,000 reward for information about the attacks.
And for good reason. The FBI suspects these attacks are linked with a third incident in September. Continue reading
Only days after the authorities gave UK-based banks a time limit to come up with cyberattack defence plans, details have emerged of a major stress test of current financial systems set for next month.
Dubbed ‘Operation Waking Shark 2′, according to The Daily Telegraph the test day will simulate a “severe” attack on payment providers, banks and markets to sniff out weaknesses in defence strategies, communications, and procedures. Continue reading
Outgoing Homeland Security Secretary Janet Napolitano warned her successor on Tuesday to move quickly to prepare for an inevitable large-scale cyberattack against the United States.
Napolitano, delivering her farewell address at the National Press Club, said her successor should move fast to strengthen the nation’s cyber defenses. Continue reading
While the possibility of anti-satellite weapons, jamming and cyber-attacks aimed at the U.S. military’s fleets of communication satellites is making them vulnerable to adversaries, declining defense budgets constitute an equal threat to the space architecture the services rely upon, according to a report released July 24.
Like the Maginot Line that gave the French a false sense of security prior to the German Blitzkrieg in World War II, the U.S. military has assumed since the end of the Cold War that no one would dare launch an physical attack on its satellites because that would violate international norms. Just as the Germans did away with such niceties and invaded France through a neighboring country, an adversary could go after one of the military’s biggest Achilles’ heels, its space-based communication system, said Todd Harrison, senior fellow for defense budget studies at the Center for Strategic and Budgetary Assessments, and author of a new report, “The Future of Milsatcom.” Continue reading
A senior Israeli official revealed on Saturday that Syria has attempted two weeks ago to launch a cyber attack against Haifa’s water system, in retaliation to the alleged Israeli attack in Damascus a month ago.
Yitzhak Ben-Yisrael, chairman of the National Council for Research and Development, said that Israeli critical infrastructures such as electricity, water and the stock exchange undergo hundreds of cyber attacks every minute. Continue reading
Chinese hackers “bombard” the Pentagon’s computer systems “by the millions each and every day” searching for a point of entry into the sensitive U.S. computing systems, according to officials speaking at an event on cybersecurity on Tuesday.
Former Attorney General Michael Mukasey and other high-level former U.S. officials warned during a discussion at The American Center for Democracy (ACD) that the U.S. government is woefully underprepared to combat and repel even the most benign type of cyber attack. Continue reading
North Korea has fallen victim to a massive cyber attack since Wednesday morning, a senior South Korean government official said. He added Seoul is trying to find out who is behind it.
“Internet resources of the country have come under a powerful hacker attack from abroad,” Russia’s ITAR-TASS news agency, which has a branch in Pyongyang, reported on Wednesday night. The country’s websites apparently all went offline until late Thursday afternoon. Continue reading
Chinese hackers have hit nearly every Washington institution, according to unnamed intelligence officials.
“The dark secret is there is no such thing as a secure unclassified network,” one said in a Newser report. “Law firms, think tanks, newspapers. If there’s something of interest, you should assume you’ve been penetrated.” Continue reading