« on: May 10, 2010, 07:33:10 AM » | Quote |
U.S. should prepare for a cyber attack that will ruin the country in just 15 MINUTES, expert warns
Richard Clarke
Former head of counterterrorism security has warned of an impending cyber attack
The U.S. should prepare for a cyber attack that could cause destruction on the scale of 9/11 in less than 15 minutes, a leading anti-terrorism expert has warned.
Richard Clarke, a former adviser to both Bill Clinton and George W. Bush, suggests that the lack of security in place against such an attack could lead to an[size=14pt] 'electronic Pearl Harbor'.[/size]
Writing in his new book Cyber War: The Next National Security Threat, penned with Robert Knake, Mr Clarke says: 'The biggest secret about cyber war may be that at the very same time the U.S. prepares for offensive cyber war, it is continuing policies that make it impossible to defend effectively from cyber attack.'
In the book, Mr Clarke suggests that a cyber attack would first target the Pentagon's computer network, before affecting the rest of the country's electrical grids.
He writes: 'It could blow up pipelines. It could damage electrical power grids. It could confuse financial records, so that we would not know who owned what.'
Mr Clarke says the cyber war could be started by an enemy country of the U.S. or a lone hacker.
He insists that while the U.S. government has introduced measures to protect the country's computer networks, they will not be enough to prevent the attack.
More...
* Investigators seek terror links and financial backer of failed Times Square bomber
* Osama bin Laden is 'alive, well, and hunting falcons in Iran', documentary claims
Mr Clarke, who warned of the dangers of terrorist group Al-Qaeda during his time as the former head of counterterrorism security, also said the cyber attack could have similar consequences to 9/11.
However, U.S. President Barack Obama's administration appears to disagree with Mr Clarke's prediction.
Howard Schmidt, Obama's recently appointed cyber expert, said in an interview with Wired.com in March: 'There is no cyber war. I think that is a terrible metaphor and I think that is a terrible concept.
'As for getting into the power grid. I can't see that that's realistic.'
Read more: http://www.dailymail.co.uk/news/worldnews/article-1275001/U-S-prepare-cyber-attack-ruin-country-just-15-MINUTES-expert-warns.html#ixzz0nWsBYcPk
Ha Ha hacking you say? Unprotected govt networks? Just the ones they want to FF.
The rest are protected by BEEFED up versions of this!!!
http://www.techguardsecurity.com/docs/poliwall_data.pdf
Simplified Traffic Management and Configuration
PoliWall™ provides simplified network security and communications traffic management by acting as a transparent bridge between a firewall and an external network. Its Layer 2 operation makes the PoliWall invisible on the network. Through the incorporation of VLAN (802.1Q) technology, your network protection can be extended to multiple networks in the enterprise. Its filtering can be configured to protect groups of devices, servers and services.
Installing the Poliwall is easily accomplished by placing it ahead of the firewall in an existing network configuration. Network configuration changes to accomodate the PoliWall are eliminated.
*HIPPIE™ Country Code/IP Address Filter
PoliWall features a unique filtering capability through its HIPPIE filter (High-speed Internet Protocol Packet Inspection Engine). This filter enables a network administrator to block entire countries, Internet Registries, network ranges or any combination in seconds. Just click on a country using the HIPPIE global map to either accept or block them in your filter, or select countries from a list.
HIPPIE filters are easy to create and manage, have unlimited grandularity across the entire IP address space and can process packets at wire speeds. The PoliWall collects statistics by country or by filter about attacks or attack origins.
A Significant Advancement in Cyber-Security in a Cost-Effective Package
Built-in Graphical User Interface (GUI)
PoliWall’s menu-driven interface is straight-forward and intuitive, allowing easy configuration and management.
IPv4 and IPv6 Addressing Capabilities
While IPv4 addresses are currently the most common addressing protocol, the PoliWall meets future IT infrastructure needs and Federal government requirements by providing IPv6 addressing capability in its configuration.
Robust Role-Based Access Control
PoliWall features a hierarchical control permission system which allows the administrator a fine grandular control of designated areas of the PoliWall.
Comprehensive Logging Utility
PoliWall maintains a 200+ GB rotating log history indexed for quick access. The logs collect data on command history, system operations and network activity. Poliwall logs can also be exported to an external server.
High Volume Traffic Capability
PoliWall supports fast Ethernet and gigabit Ethernet to process large amounts of data quickly
Not being on the Internet =/= not being able to cyber attacked.
The definition of cyber involves there mere use of digital transmission from point A to point B.
You don't have to use any known protocols to transfer data, you don't need an ethernet cable or ANY physical OR 802.X wireles signal to transfer data.
All they need is Riconosciuto's backdoored enterprise architecture software on a machine and it can be cyber attacked through the air even if it is air gapped (not physically connected to anything that transfers or receives data).
To solve the problem:
Destroy all PROMIS based software worldwide
Destroy all interoperable hardware and other software on every system, worldwide.
Revert back to 100% proprietary, non-interoperable systems for all infrastructure and all govt./corporate computers worldwide.
Stop using inherently backdoorable code like CORBA/Agile, UML.
Arrest everyone that works for EDS and Object Management Group, and seize and liquidate both companies assets.
The definition of cyber involves there mere use of digital transmission from point A to point B.
You don't have to use any known protocols to transfer data, you don't need an ethernet cable or ANY physical OR 802.X wireles signal to transfer data.
All they need is Riconosciuto's backdoored enterprise architecture software on a machine and it can be cyber attacked through the air even if it is air gapped (not physically connected to anything that transfers or receives data).
To solve the problem:
Destroy all PROMIS based software worldwide
Destroy all interoperable hardware and other software on every system, worldwide.
Revert back to 100% proprietary, non-interoperable systems for all infrastructure and all govt./corporate computers worldwide.
Stop using inherently backdoorable code like CORBA/Agile, UML.
Arrest everyone that works for EDS and Object Management Group, and seize and liquidate both companies assets.
And just to be clear, the solution AI is proposing would not only actually protect major infrastructure from attack, it is 1,000x less invasive to American society including the corporate world than what has already been done and what is being proposed.
As far as the Internet connection, the main thing that detaching from the Internet would do is remove blame on the Internet as the cause of an attack. This is why they will never remove this "feature".
This is actually 100% on the money.
The Elbit chip which Israeli Scientists developed for EX mossad Rafi Aidan (Research him) Can run on dormant electricity for 6 months on a computer. Plagued computers with Elbit Chips can withdraw ALL information for the Computer hardrive or memory storage system like SSDs. THe Elbit Chip if needed can transmit the information via Satellite or on Airplane with a Antenna receiver.
The Elbit chip which Israeli Scientists developed for EX mossad Rafi Aidan (Research him) Can run on dormant electricity for 6 months on a computer. Plagued computers with Elbit Chips can withdraw ALL information for the Computer hardrive or memory storage system like SSDs. THe Elbit Chip if needed can transmit the information via Satellite or on Airplane with a Antenna receiver.
Why would anyone who's security conscious ok a system with something like that in it? lol
But.. EVEN with that, proper shielding around the data center would prevent that. If HIGH security is a real issue, no RF should be able to penetrate the walls of the data center. Either by a lot of concrete or grounded copper mesh in the walls.
I wasn't even aware of those at all.
But here's info on it: http://www.fromthewilderness.com/free/pandora/052401_promis.html
"A close examination of the Promis saga actually leads to more than a dozen deaths which may well be why so many people avoid it. And many of those deaths share in common a pattern where, within 48 hours of death, bodies are cremated, residences are sanitized and all files disappear."
I bet they KNOW there are major holes in this old code.
Why would anyone who's security conscious ok a system with something like that in it? lol
But.. EVEN with that, proper shielding around the data center would prevent that. If HIGH security is a real issue, no RF should be able to penetrate the walls of the data center. Either by a lot of concrete or grounded copper mesh in the walls.
I wasn't even aware of those at all.
But here's info on it: http://www.fromthewilderness.com/free/pandora/052401_promis.html
"A close examination of the Promis saga actually leads to more than a dozen deaths which may well be why so many people avoid it. And many of those deaths share in common a pattern where, within 48 hours of death, bodies are cremated, residences are sanitized and all files disappear."
I bet they KNOW there are major holes in this old code.
But.. EVEN with that, proper shielding around the data center would prevent that. If HIGH security is a real issue, no RF should be able to penetrate the walls of the data center. Either by a lot of concrete or grounded copper mesh in the walls.
I wasn't even aware of those at all.
But here's info on it: http://www.fromthewilderness.com/free/pandora/052401_promis.html
"A close examination of the Promis saga actually leads to more than a dozen deaths which may well be why so many people avoid it. And many of those deaths share in common a pattern where, within 48 hours of death, bodies are cremated, residences are sanitized and all files disappear."
I bet they KNOW there are major holes in this old code.
Most business, IT, or government ifnrastructure do not have proper shielding in their domain. The added cost of adding such devices like cages would make business application and management quite unreasonable. Which is why the NSA or other government agencies including international ones still do not have radio frequency blocking components. Farraday cages, but supersized ones would prevent Elbit chips for distributing radio frequency signals out of the building. But the Cost would be quite prohibitive.
But, on your merit, you are correct with your assertion that elbit chips can be countered. One problem is that Most people, even in IT don't even realize that the chip is on the computer. The chip is so small that it can embed itself into the motherboard, or mainframe. I remember this information through the Michael Ruppert Article about the Canadian Royal Mountain Police investigation of their PROMIS laid computer sold by international vendors like Rafi Aidan
could possibly be laced with a spyware component into their GeoMatics research computers.
Cyberterror false flags used to promote scientific dictatorship (cyberterrorism is a racket)
By their own admission, the NWO has been planning to use central controlled algorythm rules based systems to imprison humanity. All cyberterrorism is controlled by government agencies used to acquire more and more power. Interoperability is the key to true national security. IBM, GE, Mitre, Booz Allen Hamilton, Ptech, Rand, Carlyle, SAIC, and others by their own admission are furthering the Bilderberg depopulation and enslavement agenda through "smart power" creating an electronic prison planet.
The only cyber terrorists are those working for revolving door DoD agencies/DoD
Jay Rockefeller-Evidence of Psychosis: I OWN THE INTERNET/OBAMA CAN PULL PLUG
Dissenters To Be Detained As “Enemy Belligerents”?
The Pentagon's Cyber Command: Civilian Infrastructure is a "Legitimate" Target
New U.S. Push to Regulate Internet Access
No comments:
Post a Comment