Chinese hack U.S. weather systems, satellite network

It could soon be lights out for America. The banking system is compromised. The national power grid remains unguarded and vulnerable to attack — and one needs to knock out only nine substations to black the nation out indefinitely. The U.S. strategic nuclear forces are being cut while America reduces its own, thinking it’s taking ‘the moral high road’. Not one new nuclear weapon has been made since roughly 1989. Meanwhile, a military purge is wiping out critical senior military leadership across all branches. Ebola, which has the potential to wipe out entire populations is intentionally underreported, whitewashed or not reported at all. The U.S. Federal Reserve intervenes in the markets when the market shows signs of crashing. The White House can’t defend itself from people hopping over the fence.

If you’ve been following this site long enough, you’ll know this is just a small list of many failures indicating a perfect storm, or sword, rather, is coming to America.

In the meantime, the American shopping mall regime keeps rolling along and fighting over cheap Chinese goods on ‘Black Friday’ and continues following the Kardashians. Move along now, nothing to see here.

 

Hackers from China breached the federal weather network recently, forcing cybersecurity teams to seal off data vital to disaster planning, aviation, shipping and scores of other crucial uses, officials said.

The intrusion occurred in late September but officials gave no indication that they had a problem until Oct. 20, according to three people familiar with the hack and the subsequent reaction by the National Oceanic and Atmospheric Administration or NOAA, which includes the National Weather Service. Even then, NOAA did not say its systems were compromised.

Officials also said that the agency did not notify the proper authorities when it learned of the attack. Continue reading

Exclusive: Cyberattack leaves natural gas pipelines vulnerable to sabotage

For further information on SCADAs, please see the following Global Geopolitics entries that were ahead of the curve:

Red Dragon Rising: Communist China’s Military Threat to America” from 1999 is a highly recommended read. The United States is in more vulnerable than most people know, and longer than most people would have thought.

Cyberspies linked to China’s military targeted nearly two dozen US natural gas pipeline operators over a recent six-month period, stealing information that could be used to sabotage US gas pipelines, according to a restricted US government report and a source familiar with the government investigation.

From December 2011 through June 2012, cyberspies targeted 23 gas pipeline companies with e-mails crafted to deceive key personnel into clicking on malicious links or file attachments that let the attackers slip into company networks, says the Department of Homeland Security (DHS) report.

The report does not mention China, but the digital signatures of the attacks have been identified by independent cybersecurity researchers as belonging to a particular espionage group recently linked to China’s military.

The confluence of these factors –  along with the sensitive operational and technical details that were stolen – make the cyberbreaches perhaps among the most serious so far, some experts say. The stolen information could give an adversary all the insider knowledge necessary to blow up not just a few compressor stations but perhaps many of them simultaneously, effectively holding the nation’s gas infrastructure hostage. Nearly 30 percent of the nation’s power grid now relies on natural gas generation.

“This theft of key information is about hearing the footsteps get closer and closer,” says William Rush, a retired scientist formerly with the Gas Technology Institute who chaired the effort to create a cybersecurity standard applicable to the gas pipeline industry.

“Anyone can blow up a gas pipeline with dynamite. But with this stolen information, if I wanted to blow up not one, but 1,000 compressor stations, I could,” he adds. “I could put the attack vectors in place, let them sit there for years, and set them all off at the same time. I don’t have to worry about getting people physically in place to do the job, I just pull the trigger with one mouse click.Continue reading