Congress warned North Korean EMP attack would kill ‘90% of all Americans’

 

Congress was warned Thursday that North Korea is capable of attacking the U.S. today with a nuclear EMP bomb that could indefinitely shut down the electric power grid and kill 90 percent of “all Americans” within a year.

At a House hearing, experts said that North Korea could easily employ the “doomsday scenario” to turn parts of the U.S. to ashes.

In calling on the Pentagon and President Trump to move quickly to protect the grid, the experts testified that an explosion of a high-altitude nuclear bomb delivered by a missile or satellite “could be to shut down the U.S. electric power grid for an indefinite period, leading to the death within a year of up to 90 percent of all Americans.”

Continue reading

Electromagnetic attack could claim 9 of 10 American lives

All one has to do is take out a mere nine substations and it’s lights out for America. As said in another article from 2012 in synch with today’s, up to 90% would perish as a result.

The culture of complacently sitting around and “hoping” things will magically fix themselves has taken the place of meaningful action — and, evidently, it takes possibility of hundreds of millions of Americans to perish in order to learn a lesson.

This makes America all the more ripe for picking by the Chinese, Russians and even the Iranians but isn’t prepared. It also seemingly doesn’t care.

 

An electromagnetic pulse attack can take down the nation’s electric power grid, plunge the country into darkness and claim 9 out of 10 American lives within a year.

That’s not a prediction coming from doomsdayers or a sci-fi film. It’s from Peter Vincent Pry, executive director of the EMP Task Force on National and Homeland Security, who served on several congressional commissions and on the staff of the House Armed Services Committee, and was a CIA intelligence officer from 1985-1995.

An EMP, in short, is a burst of energy that can fry electronics, including computers. If the burst is powerful enough, like a small nuclear weapon exploded above the U.S., it could potentially shut down the nation’s power grid for months, even years.

Within a year after such an attack, 9 out of 10 Americans would die from disease, starvation and civil unrest, Pry said. There would be no food, no clean water, no transportation to bring food in, no cell phones, no computers, no medicine. Continue reading

Power grid’s failing infrastructure at risk of cyberattack

Please see the source for the video.

 

Tuesday’s power failure in Washington has once again raised questions about the vulnerability of America’s electric power grid.

Fox News National Security Analyst KT McFarland spoke to experts Darren Hammell and Jonathan Pollet about potential threats. Continue reading

Securing Command — Strategic commander worried about cyber attacks on nuclear command and control

At times, news like this makes one wonder if it’s a strong case of déjà vu that was probably never fully admitted.

U.S. strategic nuclear weapons and the command systems that control them are vulnerable to cyber attacks although most are hardened against many types of electronic attacks, the commander of the U.S. Strategic Command said on Tuesday.

Air Force Gen. C. Robert Kehler said during a hearing of the Senate Armed Services Committee that nuclear weapons and the communications used to control them are older and thus less vulnerable to disruption by computer network attacks.

“However, we are very concerned with the potential of a cyber related attack on our nuclear command and control and on the weapons systems themselves,” Kehler said. “We do evaluate that.” Continue reading

UPDATE 3: U.S. probes cyber attack on water system

As written in a book called “Red Dragon Rising: Communist China’s Military Threat to America” in 1999, so it has become…

Book passage:

TARGETING AMERICA: THE REVOLUTION IN MILITARY AFFAIRS

Information warfare and electronic warfare are of key importance, while fighting on the ground can only exploit the victory. Hence, China is more convinced [than ever] that as far as the PLA is concerned, a military revolution with information warfare as the core has reached the stage where efforts must be made to catch up with and overtake rivals.1 —General Liu Huaqing, vice chairman of the Central Military Commission, 1995 On Wednesday night, June 16, 1999, officials at a California sanitation plant decided to check its computers for Year 2000 (Y2K) compliance. They were testing a back-up electrical system when they received a frantic midnight call from a park ranger: Raw, untreated sewage was pouring out of a manhole cover and spilling into a park.

Later it was estimated that four million gallons of sewage had been released. A computer had mistakenly closed a gate that should have remained open to control the transfer of sewage. A programmer’s error fifteen years earlier seems to have been the culprit. It cost taxpayers about $100,000 to clean up the mess.2 This is just one of a number of unfortunate accidents that have occurred as businesses and governments test for Y2K compliance. But Y2K accidents are just that—accidents. Suppose, however, that a competent and motivated hostile force was able to manipulate modern computer systems. Such a force could conceivably do the following:
• Change the dose levels in prescription medicines at pharmaceutical plants so that thousands of people would be poisoned3

• Infiltrate the manufacturing process for baby food so that the standard components would be increased by 400 percent—to toxic levels4

• Taint the processed-food industry for restaurants, hotels, hospitals, and retirement homes

• Subtly change airport radar signals so that air traffic controllers would unknowingly put passenger planes on the same flight path

• Open the electronic gates and fences at a number of jails and prisons around the country simultaneously, overwhelming law enforcement officials5

• Stage a surprise attack on many of the automated gasoline refineries in the nation, causing enormous, out-of-control fires that would inundate emergency officials and lead to immediate gasoline rationing6

• Contaminate the city water systems, turn the valves backwards at the sewer systems, shut down the electric power grid, and overload the natural gas pipeline system

• Loot bank accounts, transferring all funds overseas7

• Attack individuals’ identities, eliminating their Social Security records, Veterans Department records, driver’s license numbers, bank accounts and credit card numbers, and so on8

All of these are examples of what is known as “information warfare,” or more specifically “offensive information warfare.” Is there something to this, or is it just the product of an overactive imagination? The concept of information warfare—and in particular, offensive information warfare—is perhaps America’s most highly guarded military secret today.9 Most experts in the field believe that the United States is currently the world’s information warfare leader.10But the interconnected nature of modern American society makes the United states “the most vulnerable country in the world” for this sort of warfare, according to the former director of the National Security Agency, our premier electronic warfare agency.“Every one of the examples above has either been tried successfully or will be within the capability of hostile forces in a short period of time, and every one is of deep concern to the American government.12The problem is real.More alarming, the Chinese People’s Liberation Army has the world’s largest information warfare program, after the United States.13
The article:

* Researcher cites report from Illinois State Police
* Says report shows computer was hacked from Russia
* Says water pump was damaged
* Motives of attacker unclear (Adds reaction from cyber security expert)

Nov 18 (Reuters) – Federal investigators are looking into a report that hackers managed to remotely shut down a utility’s water pump in central Illinois last week, in what could be the first known foreign cyber attack on a U.S. industrial system.

The Nov. 8 incident was described in a one-page report from the Illinois Statewide Terrorism and Intelligence Center, according to Joe Weiss, a prominent expert on protecting infrastructure from cyber attacks.

The attackers obtained access to the network of a water utility in a rural community west of the state capital Springfield with credentials stolen from a company that makes software used to control industrial systems, according to the account obtained by Weiss. It did not explain the motive of the attackers.

He said that the same group may have attacked other industrial targets or be planning strikes using credentials stolen from the same software maker.

The U.S. Department of Homeland Security and the Federal Bureau of Investigation are examining the matter, said DHS spokesman Peter Boogaard.

“At this time there is no credible corroborated data that indicates a risk to critical infrastructure entities or a threat to public safety,” he said, declining to elaborate further. An FBI spokesman in Illinois did not return phone calls seeking comment.

SCADA SECURITY

Cyber security experts said that the reported attack highlights the risk that attackers can break into what is known as Supervisory Control and Data Acquisition (SCADA) systems. They are highly specialized computer systems that control critical infrastructure — from water treatment facilities, chemicals plants and nuclear reactors to gas pipelines, dams and switches on train lines.

The issue of securing SCADA systems from cyber attacks made international headlines last year after the mysterious Stuxnet virus attacked a centrifuge at a uranium enrichment facility in Iran. Many experts say that was a major setback for Iran’s nuclear weapon’s program and attribute the attack to the United States and Israel.

In 2007, researchers at the U.S. government’s Idaho National Laboratories identified a vulnerability in the electric grid, demonstrating how much damage a cyber attack could inflict on a large diesel generator. (To see video that was leaked to CNN: here)

Lani Kass, who retired in September as senior policy adviser to the chairman of the U.S. Joint Chiefs of Staff, said the United States should take the possibility of a cyber attack seriously.
“The going in hypothesis is always that it’s just an incident or coincidence. And if every incident is seen in isolation, it’s hard — if not impossible — to discern a pattern or connect the dots,” Kass told Reuters.
“Failure to connect the dots led us to be surprised on 9/11,” she said, describing the Sept. 11, 2001 hijacking attacks as a prime example in which authorities dismissed indicators of an impending disaster and were caught unaware.

Representative Jim Lanvevin, a Democrat from Rhode Island, said that the report of the attack highlighted the need to pass legislation to improve cyber security of the U.S. critical infrastructure.

“The stakes are too high for us to fail, and our citizens will be the ones to suffer the consequences of our inaction,” he said in a statement.

Continue Reading Article: UPDATE 3-U.S. probes cyber attack on water system (Reuters)