DHS Fears a Modified Stuxnet Could Attack U.S. Infrastructure | |
Anonymous Coward User ID: 1107716 United States 07/27/2011 11:01 AM Report Abusive Post Report Copyright Violation | AHHHH! here is the false flag, the reason why Soros bailed, the reason the markets stumbled. They give up and plan on attacking the grid. If so, communities must prepare to: a) disconnect the control panels from the net b) get the grid back up c) keep the grid back up d) fly fuel into all the nuclear reactors that shut down. They only have 7 days fuel on site. Even worse, many use shitbox generators which may fail. I say BRING IT. We can do this. PURGE that corruption out of OUR system. |
Anonymous Coward User ID: 1107716 United States 07/27/2011 11:07 AM Report Abusive Post Report Copyright Violation | The testimony comes in the wake of accusations that the U.S. was itself responsible, along with Israel, for developing and unleashing Stuxnet into the wild Quoting: Blowback is a bitch 619959Typical British elite, blame the USA and Israel so they sheep look at them. This is a BRITISH ELITE plan/virus. They built the reactors in Japan, they refuse to allow Japan help, they removed iodine from American's diets by forcing the FDA to add Boride into all dairy products in the USA, they modified the EPA...etc. Try to kill Americans with radiation at the expense of the Japanese. If anything, get the world pissed at America and Israel. FAIL We know who the assholes are behind the curtain. Best go run and hide...on another planet because this one is far too small...Babylon. Notice, no more "Mystery" before Babylon... |
Least Servant User ID: 1062754 United States 07/27/2011 11:11 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1063460 United States 07/27/2011 11:23 AM Report Abusive Post Report Copyright Violation | |
Bear Ridge Trading Post User ID: 1110914 United States 07/27/2011 11:29 AM Report Abusive Post Report Copyright Violation | I'm an author living a self-sustaining life off-grid in the mountains of Southern Colorado. [link to www.HomeSurvivalist.com] or [link to www.BearRidgeTradingPost.com] Everyone should prepare now for global economic collapse, diminished food supply and power disruptions. |
Anonymous Coward User ID: 1282080 United States 07/27/2011 11:31 AM Report Abusive Post Report Copyright Violation | |
Phennommennonn Forum Administrator User ID: 1483248 United States 07/27/2011 11:36 AM Report Abusive Post Report Copyright Violation | DHS Fears a Modified Stuxnet Could Attack U.S. Infrastructure Quoting: Blowback is a bitch 619959One year after the discovery of a sophisticated worm that was used to attack centrifuges in Iran’s nuclear program, the U.S. Department of Homeland Security told Congress it fears the same attack could now be used against critical infrastructures in the U.S. DHS “is concerned that attackers could use the increasingly public information about the code to develop variants targeted at broader installations of programmable equipment in control systems. Copies of the Stuxnet code, in various different iterations, have been publicly available for some time now,” Bobbie Stempfley, acting assistant secretary for the DHS Office of Cybersecurity and Communications, told the House Subcommittee on Oversight and Investigations (.pdf) on Tuesday. The testimony comes in the wake of accusations that the U.S. was itself responsible, along with Israel, for developing and unleashing Stuxnet into the wild, thereby making it possible for the hackers, nation-state attackers and terrorists that DHS fears, to now repurpose the malware for use against critical infrastructure systems in the U.S. Stuxnet, considered to be the first cyberweapon discovered in the wild, was found on a computer in Iran in June 2010 and was believed to have been launched in June 2009. Although Stuxnet was designed to attack a specific system, researchers like Ralph Langner have pointed out that the malware could be easily tweaked to attack other industrial control systems around the world. According to Langner, an attacker would need “zero insider information and zero programming skills at the controller level in order to perform a Stuxnet-inspired attack” against other control systems. Blowback is a bitch.... <50% [link to www.wired.com] link fail.....404 error www.wired.com/threatlevel/2011/07/dhs-fearsdont_use_thisnet-attacks/ ^^^^^^^^^^^^^^^^^ see the bot link edit??? go to google for the articles under the title DHS Fears a Modified Stuxnet Could Attack U.S. Infrastructure Last Edited by Phennommennonn on 07/27/2011 11:37 AM political correctness is a doctrine.... fostered by a delusional, illogical minority...... and rabidly promoted by an unscrupulous mainstream media; which holds forth the proposition that it is entirely possible to pick up a turd by the clean end. |
anonimalle User ID: 1484552 United States 07/27/2011 11:43 AM Report Abusive Post Report Copyright Violation | DHS Fears a Modified Stuxnet Could Attack U.S. Infrastructure Quoting: Blowback is a bitch 619959One year after the discovery of a sophisticated worm that was used to attack centrifuges in Iran’s nuclear program, the U.S. Department of Homeland Security told Congress it fears the same attack could now be used against critical infrastructures in the U.S. DHS “is concerned that attackers could use the increasingly public information about the code to develop variants targeted at broader installations of programmable equipment in control systems. Copies of the Stuxnet code, in various different iterations, have been publicly available for some time now,” Bobbie Stempfley, acting assistant secretary for the DHS Office of Cybersecurity and Communications, told the House Subcommittee on Oversight and Investigations (.pdf) on Tuesday. The testimony comes in the wake of accusations that the U.S. was itself responsible, along with Israel, for developing and unleashing Stuxnet into the wild, thereby making it possible for the hackers, nation-state attackers and terrorists that DHS fears, to now repurpose the malware for use against critical infrastructure systems in the U.S. Stuxnet, considered to be the first cyberweapon discovered in the wild, was found on a computer in Iran in June 2010 and was believed to have been launched in June 2009. Although Stuxnet was designed to attack a specific system, researchers like Ralph Langner have pointed out that the malware could be easily tweaked to attack other industrial control systems around the world. According to Langner, an attacker would need “zero insider information and zero programming skills at the controller level in order to perform a Stuxnet-inspired attack” against other control systems. Blowback is a bitch.... <50% [link to www.wired.com] What a farce he/she/they/it are Behind every myth lies a mystery, and every legend holds an echo of the truth …… Que Sera Sera "For not by numbers of men nor by measure of body but by valor of soul is war decided" Bilisarius " At the siege of Vienna in 1683 Islam seemed poised to overrun Christian Europe. We are in a new phase of a very old war." Gates of Vienna. "May we smite our enemies to the darkest chamber of hell, for we wish only to live in peace, and they desire only to put their boot upon our neck." |
WizzleDizzle User ID: 1428239 United States 07/27/2011 11:55 AM Report Abusive Post Report Copyright Violation | F Quoting: Anonymous Coward 1282080A L S E F L A G 3000 survival books, manuals, guides and more in one place! [link to www.armageddononline.org] Your source for disaster news, preparedness, survival, future scenarios and more! |
Anonymous Coward (OP) User ID: 619959 Canada 07/27/2011 12:28 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward (OP) User ID: 619959 Canada 07/27/2011 12:31 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1484853 United States 07/27/2011 12:31 PM Report Abusive Post Report Copyright Violation | |
murder the cia User ID: 1398320 Sweden 07/27/2011 12:31 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1399523 United States 07/27/2011 12:32 PM Report Abusive Post Report Copyright Violation | |
2342 User ID: 1477888 United States 07/27/2011 01:15 PM Report Abusive Post Report Copyright Violation | DHS Fears a Modified Stuxnet Could Attack U.S. Infrastructure Quoting: Blowback is a bitch 619959One year after the discovery of a sophisticated worm that was used to attack centrifuges in Iran’s nuclear program, the U.S. Department of Homeland Security told Congress it fears the same attack could now be used against critical infrastructures in the U.S. DHS “is concerned that attackers could use the increasingly public information about the code to develop variants targeted at broader installations of programmable equipment in control systems. Copies of the Stuxnet code, in various different iterations, have been publicly available for some time now,” Bobbie Stempfley, acting assistant secretary for the DHS Office of Cybersecurity and Communications, told the House Subcommittee on Oversight and Investigations (.pdf) on Tuesday. The testimony comes in the wake of accusations that the U.S. was itself responsible, along with Israel, for developing and unleashing Stuxnet into the wild, thereby making it possible for the hackers, nation-state attackers and terrorists that DHS fears, to now repurpose the malware for use against critical infrastructure systems in the U.S. Stuxnet, considered to be the first cyberweapon discovered in the wild, was found on a computer in Iran in June 2010 and was believed to have been launched in June 2009. Although Stuxnet was designed to attack a specific system, researchers like Ralph Langner have pointed out that the malware could be easily tweaked to attack other industrial control systems around the world. According to Langner, an attacker would need “zero insider information and zero programming skills at the controller level in order to perform a Stuxnet-inspired attack” against other control systems. Blowback is a bitch.... <50% [link to www.wired.com] link fail.....404 error www.wired.com/threatlevel/2011/07/dhs-fearsdont_use_thisnet-attacks/ ^^^^^^^^^^^^^^^^^ see the bot link edit??? go to google for the articles under the title DHS Fears a Modified Stuxnet Could Attack U.S. Infrastructure Now if stuxnet was designed to "think" AI per say, Skynet in the Terminator Series might become a reality. Last Edited by 2342 on 07/27/2011 01:17 PM www.youtube.com/clandestinetimelord |
2342 User ID: 1477888 United States 07/27/2011 01:17 PM Report Abusive Post Report Copyright Violation | The article is on wired.com, you just have to search for it. 404 strikes again. Bust out the 528 instead. Last Edited by 2342 on 07/27/2011 01:18 PM www.youtube.com/clandestinetimelord |
2342 User ID: 1477888 United States 07/27/2011 01:22 PM Report Abusive Post Report Copyright Violation | The article is on wired.com, you just have to search for it. 404 strikes again. Bust out the 528 instead. Quoting: 2342Read the article and it states the top cybersecurity czar resigned immediately after a testimony by DHS. Why would the Top Brass resign mysteriously? “To date, ICS-CERT has briefed dozens of government and industry organizations and released multiple advisories and updates to the industrial control systems community describing steps for detecting an infection and mitigating the threat,” DHS claimed in its testimony. The testimony came just one day after the surprise news that one of the nation’s top cybersecurity czars resigned abruptly and mysteriously from his job. Randy Vickers had been director of U.S.-CERT (Computer Emergency Readiness Team), a division of DHS that is responsible, in part, for coordinating the defense of federal networks and working with the private sector to mitigate cyberattacks against the nation’s critical infrastructure. Vickers resigned July 22, effectively immediately, according to an e-mail that Stempfley reportedly sent to DHS staff. Vickers’ Linked-in profile had already been changed to indicate his departed status from US-CERT by the time the news went public. DHS did not give any reason for Vickers’ abrupt departure. www.youtube.com/clandestinetimelord |
nzreva User ID: 1063963 United States 07/27/2011 01:31 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1472072 United States 07/27/2011 01:41 PM Report Abusive Post Report Copyright Violation | |
2342 User ID: 1477888 United States 07/27/2011 01:44 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1472072 United States 07/27/2011 01:44 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1472072 United States 07/27/2011 01:49 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1437659 United States 07/27/2011 02:22 PM Report Abusive Post Report Copyright Violation | yeah right... Translation: We want to fear monger so people will be okay with us controlling every aspect of their lives. DHS fuck off you ineffectual worthless nazi thugs. Go watch the border already. Stop arming drug runners you fucking turds. |
Anonymous Coward User ID: 1400299 Netherlands 07/27/2011 03:21 PM Report Abusive Post Report Copyright Violation | |
Pleeb User ID: 1346883 United States 07/27/2011 03:44 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1359625 United States 07/27/2011 03:45 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1450292 United States 07/27/2011 03:51 PM Report Abusive Post Report Copyright Violation | What? Janet Napolitano's Chertoff Group double sided Turbo Clitulator and Chertoff Group Recto Expandulator will malfunction? I guess thats what happens when you buy overseas! I suppose gaping orifices would be a inconvenience especially when a bowel movement is not tapered and just drops in the toilet bowl with a splashing kerrrplunk! Then janet's carpet muncher lesbo partner may find it distasteful to hear a moist queef belch at each breath and mesmerized by a wiggling swollen scabbed clit whip lashing her nose. |
dollop of tennessee User ID: 1300042 United States 07/27/2011 03:55 PM Report Abusive Post Report Copyright Violation | Considering nuke energy plants, nuke weapons, electric plants, etc... etc... are not hooked up to the internet and that Stuxnet type viruses have to be loaded directly into those computers (just like in Iran) then color me very unimpressed with the DHS fear-mongering, as usual. The Federal Government is the biggest congenital liar on planet earth. |
Anonymous Coward User ID: 1485080 United States 07/27/2011 04:21 PM Report Abusive Post Report Copyright Violation | Considering nuke energy plants, nuke weapons, electric plants, etc... etc... are not hooked up to the internet and that Stuxnet type viruses have to be loaded directly into those computers (just like in Iran) then color me very unimpressed with the DHS fear-mongering, as usual. Quoting: dollop of tennessee 1300042Neither was Iran's nuclear facility that was infected. The virus infected many networks and personal computers and personal storage devices around the globe, but was designed to stay dormant until it recognized the system it was designed to infect. It was speculated that one of the engineers at the nuclear facility would have connected an infected laptop to the network at the nuclear facility, and that's how the system is penetrated. Same situation would apply here for our infrastructure to be effected.... All it would take is one laptop, thumb driver, portable hard-drive to be infected and then connected to an internal computer at one of these networks, for the virus to spread. Do you honestly believe that our country has implemented, 100%, the necessary safeguards to prevent such an event from happening? I don't. We can't even prevent Pentagon computers from being breached by Chinese hackers... |
Anonymous Coward User ID: 1416341 Canada 07/27/2011 05:32 PM Report Abusive Post Report Copyright Violation | |