Total Chaos: Cyber Attack Fears As MULTIPLE CITIES HIT With Simultaneous Power Grid Failures: Shockwave Of Delays In San Francisco, Los Angeles, New York

The U.S. power grid appears to have been hit with multiple power outages affecting San Francisco, New York and Los Angeles.

Officials report that business, traffic and day-to-day life has come to a standstill in San Francisco, reportedly the worst hit of the three major cities currently experiencing outages.

Power companies in all three regions have yet to elaborate on the cause, though a fire at a substation was the original reason given by San Francisco officials. Continue reading

New report details one of history’s “largest ever” cyber espionage operations

 

A new report authored by a consortium of government and private organizations in Britain has revealed the existence of a computer hacking operation, allegedly based in China, that is said to be “one of the largest ever” such campaigns globally. The operation is believed to have compromised sensitive information from an inestimable number of private companies in Southeast Asia, Europe and the United States. The report was produced by a consortium of public and private organizations, including BAE systems and the London-based National Cyber Security Centre, an office of the United Kingdom’s signals intelligence agency, the Government Communications Headquarters. It details the outcome of Operation CLOUD HOPPER, which was launched to uncover the cyber espionage activities. Continue reading

U.S. Ill-Prepared to Stop Widespread Russian Information Warfare

Was there Russian influence during the 2016 election process? Sure. However, not as people think.

Moscow is engaged in what’s called the “scissor strategy”. In America’s case, both sides of the scissor blades represent the right-wing and left-wing of America. When the blades meet (conflict), America (material being cut) is destroyed. You can plainly see this in today’s media where CNN/MSNBC/ABC et al represent the left-wing of society, whereas (although it’s a false right) Fox News represents the right-wing base.

It’s interesting to note that Fox is a false right in the sense that it may represent the second side of the same coin in an information warfare campaign against the American people. Some of the anchors, hosts and reporters may be genuine, but the owners of Fox News are not. They consistently undermined Trump, the outside and anti-establishment candidate and constantly favored the progressive-socialists (aka RINOs) in the Republican party.

This is where it gets complicated, but for those with discernment, they see right through it.

 

Clint Watts testifies before the Senate Intelligence Committee March 30 / Getty Images

 

Experts reveal methods, motivations behind Moscow’s cyber attacks

Russia is engaged in wide-ranging information warfare operations aimed at undermining the United States, and the federal government has few defenses against the attacks, information specialists told a Senate hearing last week.

Moscow’s large-scale operations include the covert attempt to sway the 2016 presidential election and dissemination of false news reports to sow confusion and weaken American democracy, according to testimony before the Senate Select Committee on Intelligence Thursday.

The committee hearing was called as part of an investigation into the Russian campaign to influence the 2016 election. Continue reading

Trump set up? The CIA’s UMBRAGE group can stage RUSSIAN hacking

FISA warrant could have been obtained through staged hacking

(INTELLIHUB) — Among the startling revelations coming out through the Wikileaks “Vault 7” release is the shocking fact that the CIA has the ability to “misdirect attribution” of a hack, effectively making it look as if a country such as Russian was the culprit when in reality it was forces within the Central Intelligence Agency itself.

According to the Wikileaks documents, a group within the CIA’s Remote Devices Branch, code-named UMBRAGE, collects and maintains a massive library of attack techniques stolen from other countries, including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from,” reads the Wikileaks release. “UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.” Continue reading

CIA used Frankfurt consulate to spy on Europeans

Protest against US dragnet surveillance tactics revealed by Edward Snowden (Photo: Valentina Pop)

 

The US intelligence agency, the CIA, has used the American consulate in Frankfurt as a covert base to carry out digital spy operations, Wikileaks revealed on Tuesday (7 March).

The Center for Cyber Intelligence Europe, based in the German city, was the base for CIA hackers covering Europe, the Middle East, and Africa, Wikileaks said. The information is based on documents from the agency’s internal discussion forum.

The leaked documents included a guide for CIA hackers on how to prepare for their trip to Germany. Continue reading

Files released by WikiLeaks show advanced CIA collection methods

As we all know by now:

 

Thousands of documents belonging to the United States Central Intelligence Agency, which were released on Tuesday by the international anti-secrecy website WikiLeaks, are almost certainly genuine. They reveal an entire universe of technical intelligence collection methods used by the CIA to extract information from digital applications and electronic devices, ranging from flash drives to smart screen televisions. WikiLeaks named the collection Vault 7, and said that it consists of nearly 8,000 web pages and 1,000 attachments. It also said that its editors redacted hundreds of pages of computer code, in order to prevent the public release of advanced cyberweapons that are allegedly used by the CIA to sabotage electronic devices and systems. Continue reading

How Israel Became a High-Tech Military Superpower

How did a country smaller than El Salvador with a population of eight million and few natural resources become a military superpower within a few decades?

In The Weapon Wizards:  How Israel Became a High-Tech Military Superpower (St. Martin’s Press, 2017), authors Yaakov Katz and Amir Bohbot explain this remarkable phenomenon.  Calling on their experience as Israel Defense Forces (IDF) veterans and seasoned national security analysts, they present an intriguing and engrossing account of Israel’s defense capabilities development.  From a country lacking bullets and aircraft, Israel transformed itself into one of the most effective militaries in the world and the sixth-largest arms exporter globally.  Today, Western powers, including the U.S., France, the UK, Russia and China, all come to Israel to learn and establish joint ventures. Continue reading

Russia Reveals Information Warfare Troops

Russian Defense Minister Sergei Shoigu / AP

 

Defense minister: New force ‘stronger’ than past counter propaganda efforts

Russia disclosed this week that it has strengthened its information warfare forces amid U.S. charges of influence operations aimed at swaying the outcome of the 2016 election.

Defense Minister Sergei Shoigu revealed information capabilities in an assessment of Russia’s military power provided to Russian officials on Wednesday in Moscow.

“Over this time, information operations forces have been formed, which are much more efficient and stronger than the counter propaganda department,” Shoigu said. He did not elaborate on what is regarded as one of the Russian military’s more secret capabilities. Continue reading

Iran Renews Destructive Cyber Attacks on Saudi Arabia

AP

Tehran strategy seeks takeover of oil-rich U.S. ally

After a four-year hiatus, Iran recently resumed destructive cyber attacks against Saudi Arabia in what U.S. officials say is part of a long-term strategy by Tehran to take over the oil-rich kingdom and regional U.S. ally.

Late last month, the Saudi government warned in a notice to telecommunications companies that an Iranian-origin malicious software called Shamoon had resurfaced in cyber attacks against some 15 Saudi organizations, including government networks. Continue reading

‘Missiles will fall on their HEADS’ Iran threatens Donald Trump in ‘showcase of POWER’

IRAN has performed a series of missile and radar tests in a bid to “showcase its power” to Donald Trump.

In a bullish retaliation to Trump’s decision to impose sanctions on the country yesterday, Iran’s Revolutionary Guards said the aim of the drill in the Semnan province was to “showcase the power of Iran’s revolution and to dismiss the sanctions”.

Iranian state media reported the drill would test tech military equipment including homemade missile systems, radars, command and control centres and cyber warfare systems. Continue reading

Trump aims for ‘unquestioned’ US military dominance

 

President Donald Trump will “rebuild” America’s vast military, boost its anti-missile capabilities and prioritize defeating the Islamic State group, according to the first policy statements published on the White House website Friday.

Published moments after Trump was inaugurated president, the statements say he will end limits on Pentagon spending agreed by Congress and the Obama administration, and will soon release a new budget proposal outlining his vision for the military. Continue reading

Gertz: U.S. Must Go on the ‘Offensive’ During the Information Age

 

Washington Free Beacon senior editor Bill Gertz discussed his new book, iWar: War and Peace in the Information Age, on Friday with Rush Limbaugh on his radio show.

“As somebody who knows about cyber wars and cyber security, how do you, Bill Gertz …? How do you process this stuff? How do you react to it?” Limbaugh asked. “Because you know whether some of this stuff is true, legitimate or not. So how do you deal with it yourself?”

Gertz responded by calling developments in the cyber domain an “amazing phenomenon” and discussed how cyber will dominate the current “information age” society, where people are under assault from all quarters. Continue reading

FBI dispute with DNC over hacked servers may fuel doubt on Russia role

Meanwhile, President Obama is pushing America closer to war with Russia based on faulty intelligence, or what’s likely worse: fabricated intelligence.

 

fbi headquarters at night

FBI Headquarters in Washington D.C. Credit: FBI

 

The FBI may have been forced into a misstep when investigating whether Russia hacked the Democratic National Committee — the agency never directly examined the DNC servers that were breached.

Instead, the FBI had to rely on forensic evidence provided by third-party cybersecurity firm CrowdStrike, which the DNC hired to mitigate the breach.

“The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed,” the agency said on Thursday in a statement. Continue reading

PLA’s hacking hotel

American military intelligence has identified a hotel complex that is serving as an ersatz headquarters for a Chinese military hacking unit. China is basically hiding its operations cyberattack units in plain sight.

 

U.S. military intelligence has identified a headquarters for a Chinese military hacking unit — inside two Beijing hotels.

According to an open-source intelligence report produced by the Army’s Asian Studies Detachment, “the Headquarters/Jintang and Seasons Hotel appear to be located in the same or at least adjacent buildings, both of which are, according to available information, owned by or connected to the People’s Liberation Army 4th Department.”

The Fourth Department, known as 4PLA, until recently was part of the military’s General Staff Department and is also known as the Electronic Countermeasures and Radar Department. The unit was reorganized into a new PLA service called the Strategic Support Force. The roll of the department is to conduct offensive electronic warfare and information warfare, including offensive cyberattacks. Continue reading