The U.S. power grid appears to have been hit with multiple power outages affecting San Francisco, New York and Los Angeles.
Officials report that business, traffic and day-to-day life has come to a standstill in San Francisco, reportedly the worst hit of the three major cities currently experiencing outages.
Power companies in all three regions have yet to elaborate on the cause, though a fire at a substation was the original reason given by San Francisco officials. Continue reading
A new report authored by a consortium of government and private organizations in Britain has revealed the existence of a computer hacking operation, allegedly based in China, that is said to be “one of the largest ever” such campaigns globally. The operation is believed to have compromised sensitive information from an inestimable number of private companies in Southeast Asia, Europe and the United States. The report was produced by a consortium of public and private organizations, including BAE systems and the London-based National Cyber Security Centre, an office of the United Kingdom’s signals intelligence agency, the Government Communications Headquarters. It details the outcome of Operation CLOUD HOPPER, which was launched to uncover the cyber espionage activities. Continue reading
Was there Russian influence during the 2016 election process? Sure. However, not as people think.
Moscow is engaged in what’s called the “scissor strategy”. In America’s case, both sides of the scissor blades represent the right-wing and left-wing of America. When the blades meet (conflict), America (material being cut) is destroyed. You can plainly see this in today’s media where CNN/MSNBC/ABC et al represent the left-wing of society, whereas (although it’s a false right) Fox News represents the right-wing base.
It’s interesting to note that Fox is a false right in the sense that it may represent the second side of the same coin in an information warfare campaign against the American people. Some of the anchors, hosts and reporters may be genuine, but the owners of Fox News are not. They consistently undermined Trump, the outside and anti-establishment candidate and constantly favored the progressive-socialists (aka RINOs) in the Republican party.
This is where it gets complicated, but for those with discernment, they see right through it.
Experts reveal methods, motivations behind Moscow’s cyber attacks
Russia is engaged in wide-ranging information warfare operations aimed at undermining the United States, and the federal government has few defenses against the attacks, information specialists told a Senate hearing last week.
Moscow’s large-scale operations include the covert attempt to sway the 2016 presidential election and dissemination of false news reports to sow confusion and weaken American democracy, according to testimony before the Senate Select Committee on Intelligence Thursday.
The committee hearing was called as part of an investigation into the Russian campaign to influence the 2016 election. Continue reading
Another large part of the problem is that the United States has become reactive and not proactive.
Congress told reforms needed to counter foreign disinformation from Russia, China
Foreign nations including China and Russia along with the Islamic State are conducting information warfare against the United States and the federal government is ill prepared to counter it, information warfare experts told Congress on Wednesday.
“To date, there is not a single individual in the U.S. government below the president of the United States who is responsible and capable of managing U.S. information dissemination and how we address our adversaries in the information environment,” said Michael Lumpkin, until recently the director of the State Department’s Global Engagement Center that seeks to counter online terrorist propaganda. Continue reading
FISA warrant could have been obtained through staged hacking(INTELLIHUB) — Among the startling revelations coming out through the Wikileaks “Vault 7” release is the shocking fact that the CIA has the ability to “misdirect attribution” of a hack, effectively making it look as if a country such as Russian was the culprit when in reality it was forces within the Central Intelligence Agency itself.
According to the Wikileaks documents, a group within the CIA’s Remote Devices Branch, code-named UMBRAGE, collects and maintains a massive library of attack techniques stolen from other countries, including the Russian Federation.
“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from,” reads the Wikileaks release. “UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.” Continue reading
The US intelligence agency, the CIA, has used the American consulate in Frankfurt as a covert base to carry out digital spy operations, Wikileaks revealed on Tuesday (7 March).
The Center for Cyber Intelligence Europe, based in the German city, was the base for CIA hackers covering Europe, the Middle East, and Africa, Wikileaks said. The information is based on documents from the agency’s internal discussion forum.
As we all know by now:
Thousands of documents belonging to the United States Central Intelligence Agency, which were released on Tuesday by the international anti-secrecy website WikiLeaks, are almost certainly genuine. They reveal an entire universe of technical intelligence collection methods used by the CIA to extract information from digital applications and electronic devices, ranging from flash drives to smart screen televisions. WikiLeaks named the collection Vault 7, and said that it consists of nearly 8,000 web pages and 1,000 attachments. It also said that its editors redacted hundreds of pages of computer code, in order to prevent the public release of advanced cyberweapons that are allegedly used by the CIA to sabotage electronic devices and systems. Continue reading
How did a country smaller than El Salvador with a population of eight million and few natural resources become a military superpower within a few decades?
In The Weapon Wizards: How Israel Became a High-Tech Military Superpower (St. Martin’s Press, 2017), authors Yaakov Katz and Amir Bohbot explain this remarkable phenomenon. Calling on their experience as Israel Defense Forces (IDF) veterans and seasoned national security analysts, they present an intriguing and engrossing account of Israel’s defense capabilities development. From a country lacking bullets and aircraft, Israel transformed itself into one of the most effective militaries in the world and the sixth-largest arms exporter globally. Today, Western powers, including the U.S., France, the UK, Russia and China, all come to Israel to learn and establish joint ventures. Continue reading
Defense minister: New force ‘stronger’ than past counter propaganda efforts
Russia disclosed this week that it has strengthened its information warfare forces amid U.S. charges of influence operations aimed at swaying the outcome of the 2016 election.
Defense Minister Sergei Shoigu revealed information capabilities in an assessment of Russia’s military power provided to Russian officials on Wednesday in Moscow.
“Over this time, information operations forces have been formed, which are much more efficient and stronger than the counter propaganda department,” Shoigu said. He did not elaborate on what is regarded as one of the Russian military’s more secret capabilities. Continue reading
Tehran strategy seeks takeover of oil-rich U.S. ally
After a four-year hiatus, Iran recently resumed destructive cyber attacks against Saudi Arabia in what U.S. officials say is part of a long-term strategy by Tehran to take over the oil-rich kingdom and regional U.S. ally.
Late last month, the Saudi government warned in a notice to telecommunications companies that an Iranian-origin malicious software called Shamoon had resurfaced in cyber attacks against some 15 Saudi organizations, including government networks. Continue reading
It’s just basic human nature, but no one likes to look over their shoulder to see an eager competitor gaining on them no matter what the situation is, right?
Well, while we have the world’s finest, most powerful military, we have some potential enemies, “frenemies,” etc. who are trying to catch up to us with their development and deployment of cutting-edge military weapons.
There’s reason to be unsettled. Continue reading
IRAN has performed a series of missile and radar tests in a bid to “showcase its power” to Donald Trump.
In a bullish retaliation to Trump’s decision to impose sanctions on the country yesterday, Iran’s Revolutionary Guards said the aim of the drill in the Semnan province was to “showcase the power of Iran’s revolution and to dismiss the sanctions”.
Iranian state media reported the drill would test tech military equipment including homemade missile systems, radars, command and control centres and cyber warfare systems. Continue reading
President Donald Trump will “rebuild” America’s vast military, boost its anti-missile capabilities and prioritize defeating the Islamic State group, according to the first policy statements published on the White House website Friday.
Published moments after Trump was inaugurated president, the statements say he will end limits on Pentagon spending agreed by Congress and the Obama administration, and will soon release a new budget proposal outlining his vision for the military. Continue reading
Washington Free Beacon senior editor Bill Gertz discussed his new book, iWar: War and Peace in the Information Age, on Friday with Rush Limbaugh on his radio show.
“As somebody who knows about cyber wars and cyber security, how do you, Bill Gertz …? How do you process this stuff? How do you react to it?” Limbaugh asked. “Because you know whether some of this stuff is true, legitimate or not. So how do you deal with it yourself?”
Gertz responded by calling developments in the cyber domain an “amazing phenomenon” and discussed how cyber will dominate the current “information age” society, where people are under assault from all quarters. Continue reading
Meanwhile, President Obama is pushing America closer to war with Russia based on faulty intelligence, or what’s likely worse: fabricated intelligence.
The FBI may have been forced into a misstep when investigating whether Russia hacked the Democratic National Committee — the agency never directly examined the DNC servers that were breached.
Instead, the FBI had to rely on forensic evidence provided by third-party cybersecurity firm CrowdStrike, which the DNC hired to mitigate the breach.
“The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed,” the agency said on Thursday in a statement. Continue reading