The perverse coupling of surveillance and exhibitionism forms a cornerstone of American technocracy. Most Americans, be they liberals or libertarians, are unnerved by government agents, corporate data-miners, or high-tech Peeping Toms probing their personal details. And yet invasive, weirdly intimate technologies multiply like digital cockroaches, all but devouring the expectation of privacy taken for granted only a generation ago. Progress is simply too en vogue to resist.
Reality television brings a glamorous air to perpetual surveillance. The genre has enjoyed immense popularity over the last decade—comprising nearly a fifth of new broadcast programs this season—with cameramen poking into American life’s every facet. From moneyed luxury’s heights to the working-class struggle’s dregs, everyone’s in line for their 15 minutes of fame.
Consequently, the art of living on film is continually refined. But the recent success of TLC’s Sister Wives sounds an ominous warning as to who may be watching behind the camera’s prying eye. Immediately after the show’s premiere—which revealed a renegade Mormon polygamist’s fecund lifestyle—Utah authorities launched an investigation on Kody Brown and his four wives, with bigamy charges pending.
The risk of one’s private life going public is all-too-familiar to celebrities and politicians, but these days everyone gets their chance to shine in the searchlight. Social networks, YouTube, Twitter, and the blogosphere have captured and amplified a narcissistic culture of exhibition. Driven by Mark Zuckerberg’s philosophy that “a world that’s more open and connected is a better world,” Facebook now claims over 500 million users—making it the world’s third most-populous “nation.” In less than two decades, it became normal to display one’s personal details online—from romantic relationships and family photos to political affiliation and business activities. Even if you choose not to have your personality digitized, chances are that someone you know will do it for you. AVG Security estimates that 92% of American babies have their picture on the Internet. Anonymity is practically dead, with a Facebook memorial in the online graveyard.
Aside from being a smorgasbord for typical stalkers—and be honest, who hasn’t gone profile-trolling?—social networking also has market analysts and government agents licking their chops. It has become a common practice for law-enforcement agencies—from the Boston PD to the Department of Homeland Security—to “friend” suspect individuals and monitor their posts. If investigators want to dig deeper, our electronic communications’ trusted stewards—AT&T, Google, Yahoo!, Verizon, etc.—regularly provide access to private communications under the Patriot Act. On the corporate end, The Wall Street Journal recently examined the unethical activities of Web-based “listening services” that scrape forums for biographical information—including sensitive medical issues such as HIV, depression, and impotence—to craft more effective marketing techniques apparently geared toward human frailties. Illicit scraping aside, the practice of selling a client’s “anonymized” personal information is now routine. Inquiring minds want to know, and they know whom to ask.
“Just as the religious man learns to accept the fact that God watches his every move, so may the child of technocracy consider the Electric Eye to be a normal aspect of modern life.”
And who could blame them? For entities that depend on psychological profiling to investigate and manipulate an otherwise inscrutable population—authority figures whose sympathies rarely lie with nonconformity or dissent—the human soul’s digitization is a dream come true. Whether we pour our deepest selves into public profiles or private emails, our personal lives have become fodder for cybersharks.
Wired magazine covers a vast array of disturbing digital-surveillance projects. For instance, In-Q-Tel—the CIA’s investment arm—recently teamed up with Google to fund Recorded Futures. Like Visible Technologies before it, Recorded Futures crawls “open source” Web information—sites, blogs, news outlets, Twitter accounts, etc.—for patterns of interest. Along with monitoring current activities, Recorded Futures has the ambitious goal of predicting future behaviors based on “invisible links” between individuals and organizations. Though presumably directed toward noble goals such as combating terrorism and organized crime, the overarching scale of the analysis allows for more questionable directions. For an agency that has historically sought to infiltrate disruptive political movements and initiate disinformation campaigns, the possibilities are phenomenal. But why would Google, whose support of Obama’s tech-savvy campaign is a matter of public record, be involved? Their candid CEO, Eric Schmidt, says of his search users: “They want Google to tell them what they should be doing next.”
While it is hardly surprising that intelligence agencies would want to gather intelligence, a conscientious citizen can only be as comfortable with corporate surveillance and government’s growing powers as his or her good faith will allow. Not that anyone is asking permission.
The Google “WiSpy” scandal that came to light last May hardly inspires confidence. Apparently, their Street View vehicles gathered more than uninvited photographs as they patrolled the Western world’s every inch. Since 2007, they’ve been scooping up “payload data,” including web-surfing activity and private emails, from open Wi-Fi networks. When the German government pressed them for an explanation, Google claimed it was all a big “mistake” and insisted they will delete the data—unlike their Gmail account holders’ detailed profiles.
When Eric “Don’t Be Evil” Schmidt says, “We know where you are. We know where you’ve been. We can more or less know what you’re thinking about,” you can be sure that he means it. Given the ambiguous (at best) motives of history’s most powerful individuals, I find these developments quite chilling.
Add to this surveillance cameras’ proliferation in public areas—tens of thousands in New York City, half a million in London’s “ring of steel,” cameras on traffic lights nationwide, in shopping malls, in nightclubs, in schools, in nurseries—and you get the funny feeling that you’re being watched.
Of course, it is practically impossible for all of these cameras to be monitored effectively. Unless you could somehow entice private citizens to assist in the process…
On October 4, Internet Eyes went live in the UK. The program’s participants—13,000 so far—are given access to CCTV feeds of retail outlets nationwide. Their mission is to spot shoplifters and antisocial behavior. A £1,000 prize is offered for the snoop with the most busts. If the program is successful, perhaps average citizens could be enlisted for other mass-surveillance projects. Of course, high-tech surveillance equipment has been marketed to the general public for years. Aside from office security cameras, popular Internet monitoring software—with clever names such as SpyAgent, SpecterPro, and IamBigBrother—enables any corporate manager to sift through his employees’ emails and Web searches.
For the average Joe, companies such as BrickHouse Security offer a wide range of equipment for DIY spook operations. Anyone can order high-resolution cameras disguised as common electrical outlets, air filters, smoke detectors, or sunglasses—all for $200. You can watch your kids, your spouse, or the guy next door. Every week a new perv gets caught installing recording devices in a women’s bathroom. So what are the chances that some weirdo has filmed your bodily functions in action—picking your nose, having sex, or vigorously masturbating in a hotel room? Think of it this way: How many people have a burning curiosity and 200 bucks to blow?
Even if you don’t mind Big Brother watching you, the swarms of Little Brothers in His shadow ought to ring your alarm bells. Or maybe you don’t care. Maybe you’ve been told to smile for the camera since you were knee-high to a tripod. Group photos mean friendship, and sex tapes make you famous. Just as the religious man learns to accept the fact that God watches his every move, so may the child of technocracy consider the Electric Eye to be a normal aspect of modern life.
I would never be so paranoid as to insist that every watcher behind the camera is purely evil. To the extent that technology is neutral, a surveillance state’s rise is only as insidious as the uses to which it is put. After all, who would argue against identifying criminals, improving products, or securing personal property?
And yet, as I contemplate undesirable citizens’ fate during the 20th century’s herd-culling upheavals—Hitler’s Germany, Stalin’s Russia, Mao’s China, or Pol Pot’s Cambodia—the unprecedented ability to cultivate public opinion in real time, while tracking otherwise anonymous individuals, lifts my neck hairs. Big Brother is a silent observer in an era of tolerance and open discourse. But if the national mood is consumed by distrust and volatility, the All-Seeing Eye may burn right through you.
Illusionati the powerful new documentary film by Matthew Kazee begins to look beyond the veil of control. Detailing the evolution of the Illuminati controlling the first printing press to the modern day version of Mainstream Media. False Flag Terrorism, Mind Control, Mass Media Propaganda, Secrets of Hollywood and the Anti War Movement are just a few of the subjects that the movie showcases.
Modern graphics and animation stand out as the “Hive Mind” is disabled to bring you a “Pirate Transmission” from within the media matrix. A stand out cast of speakers which include Ed Asner, Jordan Maxwell, Jack Blood, Jason Bermas, Eben Rey, Mark Dice, Matt Conner, Doug Owen, Cindy Sheenhan and many more.
The first in a “Trilogy of Truth” which will look beyond the veil and expose the world wide mind. Independently made by Matthew Kazee, Illusionati is a roller coaster ride of information and shocking realities.
10.06.10 Google CEO: “We Know Where You Are. We Know Where You’ve Been. We Can More Or Less Know What You’re Thinking About.”
|Published on 10-06-2010
Source: Business Insider
Google CEO Eric Schmidt really has a knack for expressing relatively benign ideas in a way that makes him and his company look incredibly creepy.
The Atlantic has posted video of the full interview in which Eric talked about ‘the creepy line’, and it is chock full of unsettling sound bytes. In particular, he had the following to say on privacy:
With your permission, you give us more information about you, about your friends, and we can improve the quality of our searches. We don’t need you to type at all. We know where you are. We know where you’ve been. We can more or less know what you’re thinking about.
That sounds absolutely terrifying. And it’s too bad. Eric is clearly extremely bright and has a lot of interesting things to say in this interview about technology, the rise of China, the role of lobbyists in crafting legislation, and more. He’s just not very good at choosing his words.
10:10 Stepping over the Edge: The Globalist can’t help but radiate a “sinister force” as they claim to be “saving” Earth
This is from the 10:10 Carbon Tax Corporations
10.10.10 Illusionati Ships from the Doc to Begin to See Beyond the Veil and Expose the World Wide Mind Control System
Check out the Official Illusionati Website Click the Banner BelowStart Slide Show with PicLens Lite
Most people in the independent research communities are well aware of P.N.A.C, the neo-con think tank Project for a New American Century. Headed once by Dick Cheney and fueled by Fox News, no “disbanded” think tank was able to predict the future like P.N.A.C. In September of 2000 they released a manifesto for “Transformation of America”, and after the cold ended with the biggest arms race in human history, they thought it was the perfect time to radically “Transform” the military and start a new arms race. Technology.
Most people who are familiar with this subject all remember the same thing, the founding principle:
The history of the 20th century should have taught us that it is important to shape circumstances before crises emerge, and to meet threats before they become dire. The history of the past century should have taught us to embrace the cause of American leadership.”
– From the Project’s founding Statement of Principles Project for a New American Century
On page 51 of the document states the true of “Transformation” and how it need to be thrust upon the country in its darkest hour:
Further, the process of transformation, even if it brings revolutionary change, is likely to be a long one, absent some catastrophic and catalyzing event – like a new Pearl Harbor. Domestic politics and industrial policy will shape the pace and content of transformation as much as the requirements of “current missions”.
One year to the month P.N.A.C got their “Christmas Wish List” on the night of 9.11.10. Maybe we should look and see what they didn’t get but intend to, as it is the most “top secret” mission. On the same page as the “new Pearl Harbor”, page 51, it reads:
• Control of space and cyberspace. Much as control of the high seas – and the protection of international commerce – defined global powers in the past, so will control of the new “international commons” be a key to world power in the future. An America incapable of protecting its interests or that of its allies in space or the “infosphere” will find it difficult to exert global political
• Pursuing a two-stage strategy for of transforming conventional forces. In exploiting the “revolution in military affairs,” the Pentagon must be driven by the enduring missions for U.S. forces. This process will have two stages: transition, featuring a mix of current and new systems; and true transformation, featuring new systems, organizations and operational concepts. This process must take a competitive approach, with services and joint-service operations competing for new roles and missions. Any successful process of transformation must be linked to the services, which are the institutions within the Defense Department with the ability and the responsibility for linking budgets and resources to specific missions.
The “revolution in military affairs” was 9.11.01, all the people who shut up were rewarded…. while the real hero’s like Lt. Col. Anthony Shaffer were humiliated and nearly had their lives destroyed by hurting his family with “disgrace”. Thankfully for the Shaffer family, the D.O.D.’s “disgrace” is God’s “Grace” and they were restored as the American Hero’s, this time the entire family.
The problem we are facing now is the Left/Right paradigm, and the illusion of control. There is a vital reason many people don’t read the entire “Rebuilding America’s Defenses” document, its long and boring, like Government… which by is supposed to be a “capitol” letter like the G in “God” or in “god we trust”, a “trust” is money… why do you think Jesus turned over the “money changer’s” table? Money is the root of all evil, that why it is green the color of “envy” of what? Nature… something “globalists” are now trying to control. Computers are starting to fail in this control. There is one thing that P.N.A.C. was clear about it was their own “fear”. The Enter Net or The Enter Web… to “them” it was getting out of control.
The most important section of the manifesto are entitled “Cyberpace, or ‘Net-War’”, where they decide to classify ‘outer space” and ‘cyber space’ as to be governed by the same laws and tactics of control.
If outer space represents an emerging
medium of warfare, then “cyberspace,” and
in particular the Internet hold similar
promise and threat. And as with space,
access to and use of cyberspace and the
Internet are emerging elements in global
commerce, politics and power. Any nation
wishing to assert itself globally must take
account of this other new “global
The Global Commons is now under attack from binary code. All of this is happening as the SPACECOM is testing the take over viruses to see if they can survive it. What was P.N.A.C. so afraid of? The Enter Net.
‘U.S. armed forces to remain
preeminent and avoid an Achilles Heel in
the exercise of its power’
The Internet is also playing an increasingly important role in warfare and human political conflict. From the early use of the Internet by Zapatista insurgents in Mexico to the war in Kosovo, communication by computer has added a new dimension to warfare. Moreover, the use of the Internet to spread computer viruses reveals how easy it can be to disrupt the normal functioning of commercial and even military computer networks. Any nation which cannot assure the free and secure access of its citizens to these systems will sacrifice an element of its sovereignty and its power. Although many concepts of “cyber-war” have elements of science fiction about them, and the role of the Defense Department in establishing “control,” or even what “security” on the Internet means, requires a consideration of a host of legal, moral and political issues, there nonetheless will remain an imperative to be able to deny America and its allies’ enemies the ability to disrupt or paralyze either the military’s or the commercial sector’s computer networks. Conversely, an offensive capability could offer America’s military and political leaders an invaluable tool in disabling an adversary in a decisive manner.
Taken together, the prospects for space
war or “cyberspace war” represent the truly
revolutionary potential inherent in the notion
of military transformation. Page 57 Rebuilding America’s Defenses September 2000
Now we are beginning to see why the binary code makers are banding together to resist the machine, because they know how many numbers there are 10. The 10 Commands. The numbers are a warning system. Now the computer viruses are the being launched not by some 13 year old kid in China… but by “intel” agents around the world. Israeli Mossad taking the blame for the “Stuxnet” virus… Stuck Net…. come on who come up with this stuff?
More importantly for the U.S. the “Cyber-Storm” drill is completed on 10.01.10. Cheat codes for the internet?Start Slide Show with PicLens Lite
10.01.10 EFF: “government-mandated back doors” in communications systems would be a “recipe for disaster.”
A digital rights group expressed concern on Monday over reports that the Obama administration is drawing up legislation to make it easier for US intelligence services to eavesdrop on the Internet.
The New York Times reported Monday that the White House intends to submit a bill to Congress next year that would require all online services that enable communications to be technically capable of complying with a wiretap order.
The Times said it would require encrypted email transmitters like BlackBerry, social networks like Facebook and services like Skype to provide the capability to intercept and unscramble encrypted messages.
Seth Schoen, staff technologist at the San Francisco-based Electronic Frontier Foundation (EFF), said requiring “government-mandated back doors” in communications systems would be a “recipe for disaster.”
“Throughout the 1990s, EFF and others fought the ‘crypto wars’ to ensure that the public would have the right to strong encryption tools that protect our privacy and security — with no back doors and no intentional weaknesses,” Schoen said in a blog post.
“We fought in court and in Congress to protect privacy rights and challenge restrictions on encryption, and to make sure the public could use encryption to protect itself,” he said.
“For a decade, the government backed off of attempts to force encryption developers to weaken their products and include back doors, and the crypto wars seemed to have been won,” Schoen said.
“Now the government is again proposing to do so, following in the footsteps of regimes like the United Arab Emirates that have recently said some privacy tools are too secure and must be kept out of civilian hands,” he said.
“Intentionally weakening security and including back doors is a recipe for disaster,” Schoen said. “‘Lawful intercept’ systems built under current laws have already been abused for unlawful spying by governments and criminals.
“Trying to force technology developers to include back doors is a recipe for disaster for our already-fragile online security and privacy,” Schoen said.
“It takes a page from the world’s most repressive regimes’ Internet-control playbook. This is exactly the wrong message for the US government to be sending to the rest of the world,” he said.
The Times said federal law enforcement and national security officials are seeking the new regulations because extremists and criminals are increasingly communicating online rather than using phones.
“We’re talking about lawfully authorized intercepts,” Federal Bureau of Investigation general counsel Valerie Caproni told the newspaper.Start Slide Show with PicLens Lite
10.10.10 Illusionati Ships to begin to de veil the mind control system Check out this article entitled “Art as a Weapon”by AberyJane inspired by a pre-screening of the new film by Matthew Kazee
AberyJanes Thoughts on Protesting
Before Reading this, I want people to understand that I am not inciting violence. However there is always a time and a place for that. Im encouraging people to get organized and stand up for themselves. Im tired of seeing protesters getting their asses kicked and not doing a damn thing about it. So READ ON!
After having watched the documentary “Illusionatti” by Matt Kazee, it was the ending that shocked me the most. The last hour and 45 minutes had footage from the G20 summit in Pittsburg. Many clips showed protesters who were peacefully rallying against the summit and marching down the street. Then all hell breaks loose when the Riot Police show up.
Now, Riot Police have been around for a very long time. We have seen clips and video of their tactics, weapons, and intimidation. Once these men turned cattle ranchers show up on the scene, it becomes a confusing herd mentality amongst the protesters. Nobody knows what to do, how to act, or even follow their directions until the police start clubbing on their shields for their battle call. That battle call sends emotional trauma to those protesting as the noise is intimidating and fearful. Think of it as a battle drum. Something is defiantly coming and its big.
Eventually it’s the Riot Police who incite the riots and not the protesters. They use confusion tactics in order to justify beating on innocent people. The days of flowers in guns is no longer probable as these people are trained to reign you in. Remember that they are doing their job. I don’t like it any more than you do, but it’s the truth. They don’t care who you are or how many children you have or what you fight for.
I ask that people who are planning on protesting do a very large research project. First, start with Ghandi. He was the KING of protesting. Watch his tactics and his moves. He was a very smart man. Why? Because he studied his enemy. Almost every part of his tactics will still work today. When you protest, the people you are protesting against aren’t actually getting touched by you. You are being vocal. That’s the important thing. Another important aspect about protesting is your numbers! We were taught at a very young age that theres safety in numbers. If theres 1000 riot police and 6000 of you, You out number them 6 to 1. So ask yourself, who can be the real bully? Yes, they may have rubber bullets and man sticks and shields, but one person verses six aren’t good odds if youre that one person.
Organization is absolute key during a protest. For every 1000 people, you need 10 leaders for that group. This is mainly communication. Remember, you are going into battle. A police scanner is also needed. You need to keep track of your enemy. The only thing that stands between you and protesting is the police. Know their positions at all times and know the gear that they carry. Most of the time theyre in their riot gear. It’s the usual helmet, shield, rubber bullet gun, clubs, pepper spray and tear gas. General rule for winning a battle, is dress like your enemy. Protective gear is sold all over the place at military surplus stores and at a good price. So go get your armor. Plus its easy to wear under your clothes.
So everybody who reads this understand, the riot police are there to protect themselves, and you should do the same. There is no violent attempt perceived by using protective gear. Besides, youre there for a peaceful protest and these idiots show up like Darth Vader at a Trek Fest. NOT COOL. I would also go as far as to carry essentials in your back pack. These include, ear plugs, goggles for that nasty tear gas and pepper spray, your own pair of handcuffs and yes, a club. Now you ask why handcuffs and a club. The reasoning is very simple, Darth Vader wants your soul. His perception is that he’s looking for a fight and he will start one himself. How many protesters have we seen just get randomly clubbed? Fight fire with fire. Remember your numbers? Any one of those riot police get out of hand, its called Citizens Arrest. Use it! Take said Jango Fett clone to a safe location. If he struggles, make him uncomfortable and have somebody stay with him so he doesn’t reach for said weapons. This is where your club comes in handy. Its also a way to fend off said police. Once you start, it’s a domino effect. I know what you are thinking. You came for a peaceful protest, but its also your job to keep others from harm. Is it okay for the Vader Police to beat up on somebody who’s just standing there? Really? HELL NO! Youre already there to have your voice heard, these idiots show up on your scene even though you have that permit to protest. Don’t stand there like a tard wondering what the hell to do! Vader made the first move, you do the rest. Its called standing up for yourself.
Study their riot tactics. We have this wonderful thing called the internet now. Videos, booklets, and even their gear is for sale online. Watch these clips over and over and ask yourself, how certain situations could have been prevented. Your police scanner comes in handy so you KNOW what their plans are, where theyre heading, and what your next move will be. Its like having an electric crystal ball in your pocket. Tell your other leaders whats up. The next thing you know, you’re being herded into a park surrounded by idiots in riot gear without these small items to help you along.
Fear. People don’t stand up for themselves and expect somebody else to make a bold move so they feel more comfortable. Fear is a pain in the ass and guess who has that on their side? The Riot Police. Remember that they are the ones geared out and not you. They have more to fear from your protesters, than you do from them. Always stand 10 to 20 feet back from them. Look them in the eye and let them know you mean business. What we’re doing here is turning the tables. You are intimidating them and not the other way around. You wanna freak out riot police, stay as quiet and calm as possible. Stand still, don’t talk to them, don’t talk amongst each other, just stand there. Its like the long awkward silence while youre on a date with that hot chick you’ve been working on for three months. You have nothing to say and neither does she. Heres the trick, to this, make sure the group is big and compact. Stay close to eachother. If the riot police start to move in on you with their battle rabble, you cant turn around. Start moving FORWARD. That’s right, I wrote it and its on the internet. This is also a good time to put in your ear plugs because the sound weapons are near at hand. Be prepared to be hit. Yes, men with clubs want to use those things. But again, safety in numbers. You have your own defence weapons in your backpack and numbers on your side. You are a tightly packed and motivated group. We as Americans have already lost our country to CEO’s and a corrupt government. What do you have left to loose when you have so much to gain. Fuck the government, fuck the police, youre here protesting and you are one pissed off American. Show those assholes that you will no longer be pushed around by brainwashed douchebags and take control of your own destiny. If you want to protest, do it right for gods sake! Drop that fear and drop that policeman on his ass. If he isn’t part of the solution he’s part of the problem.
This is the part where I recap. Small protests you aren’t going to need all this stuff. However, G20 summit is a big deal. You will need to prepare for something like this months in advance. Anybody who is planning on going should be in constant contact with a protest leader. This is the person who acquired the permit to protest.. Usually the person who got the permit to protest is the smartest as they knew how to aquire it. Its common sense. You must always be prepared for the worst. Contain your calm. Im going as far as saying lose the bullhorns. Silent protest is the scariest of protests because riot police cant hear slience. Signs will do. They state your intentions. Be prepared for the worst. Just because YOU think it cant happen to you, it can. Heres your checklist:
1. Ear plugs
2. Goggles or protective eyewear
4. Video camera (get as much on video as possible, the camera doesn’t lie)
5. Body armor (wear this under your clothes
6. Pepper spray
8. Form of communication
9. Police scanner
So protesters, if youre going to protest, please do it right. When you protest something as huge as the G20 summit or Bilderberg meetings, the world is watching you. Hopefully not watching you get your asses kicked. Im tired of seeing people make an attempt to stand up for themselves and fail miserably by making the same mistakes over and over again. The power is in the people and youre there to prove it. Show the world that you are one massive organized NWO ass kicking machine. There are more of you than there are of them. With organization and preparedness, maybe you will get that face to face meeting with the worlds douchebag elites The government and their “bodyguards” are the ones who are the home grown terrorists. Remember this one important fact, the victors write the history books.
This entry was posted on Friday, September 3rd, 2010 at 10:35 am and is filed under Abery’s Articles. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.Start Slide Show with PicLens Lite
2010 Cyber Storm III global cybersecurity exercise concludes on 10.01.10: All of at this coinsides with Mossad release of ‘Stuxnet Virus’
In places like Arlington, Va.; Washington, D.C.; across the U.S. and around the world, a global cybersecurity exercise is underway designed to test the limits not only of the “network of networks,” but the ingenuity of the people charged with protecting it.
Welcome to Cyber Storm III.
This is the third time that the Department of Homeland Security, in conjunction with other federal agencies, is holding this global cybersecurity exercise. Previous Cyber Storm exercises were conducted in 2006, and again in 2008. For the first time, DHS will manage its response to Cyber Storm III from its new National Cybersecurity and Communications and Integration Center.
Normally, this facility, located in a nondescript office building in Arlington is classified and closed to the public. But the NCCIC recently opened its doors for an inside look to let DHS officials brief the media on Cyber Storm III, a worldwide cybersecurity response exercise that has been underway since late Monday.
Brett Lambo, the director of the Cybersecurity Exercise Program with DHS’s National Cybersecurity Division, is the architect, or game master for this global cybersecurity exercise.
“The overarching philosophy,” he told reporters in a recent briefing at the NCCIC, “is that we want to come up with something that’s a core scenario, something that’s foundational to the operation of the Internet.”
Cyber Storm III includes many players in places across the U.S. and around the world:
* Seven federal departments: Homeland Security, Defense, Commerce, Energy, Justice, Treasury and Transportation.
* Eleven states: California, Delaware, Illinois, Iowa, Michigan, Minnesota, North Carolina, New York, Pennsylvania, Texas, Washington, plus the Multi-State Information Sharing and Analysis Center (ISAC). This compares with nine states that participated in Cyberstorm II.
* Twelve international partners: Australia, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden, Switzerland, and the United Kingdom (up from four countries that participated in Cyber Storm II).
DHS officials also say 60 private sector companies will participate in Cyber Storm III, up from 40 who participated in Cyber Storm II. Firms include banking and finance, chemical, communications, defense industrial, information technology, nuclear, transportation and water.
Lambo said to preserve the exercise’s value as a vigorous test of cybersecurity preparedness, exact details of the scenario which participants will deal with over the next three days are secret. However, he did share some of the broad parameters of the scenario he helped write, and which he will administer.
“In other exercises, you do have specific attack vectors; you have a denial of service attack, you have a website defacement, or you have somebody dropping a rootkit,” he said. “But we wanted to take that up a level to say, ‘All of those things can still happen, and based on what you do, if you’re concerned about the availability of infrastructure, we can look at what happens when the infrastructure is unavailable.’”
Lambo said another way to look at the scenario is that it builds upon what they learned from previous exercises.
“In Cyber Storm I, we attacked the Internet, in Cyber Storm II, we used the Internet as the weapon, in Cyber Storm III, we’re using the Internet to attack itself,” he said.
Lambo added under normal circumstances, the Internet operates based on trust that a file, or a graphic, or a computer script is what it says it is, and comes from a trusted source. But what if that source was not what it said it was, or the source has a malicious intent?
“What we’re trying to do is compromise that chain of trust,” he said, in further explaining in broad strokes of the Cyber Storm III exercise scenario.
Lambo and his colleagues at the Cyber Storm control center also will introduce new, and hopefully unexpected conditions to the scenario to further test participants.
“We have the ability to do what we call dynamic play,” he said. “If we get a player action coming back into the exercise that is either different from what we expected it to be, if it’s something we’d like to chase down further, or if it’s something we’d like to pursue, we have the ability to write injects on the fly.”
He said those injects could include new attacks.
The Cyber Storm exercise will be conducted primarily using secure messaging systems like e-mail or text messages to relay intersects to participants and that the simulated attacks are not being conducted over a live or a virtual network now in operation on the Internet, he said.
For the U.S. government, Cyber Storm III also offers the opportunity to test the DHS’ National Cyber Incident Response Plan.
“We want to focus on information sharing issues,:” he said. “We want to know how all of the different organizations are compiling, acting on, aggregating information that they’re sharing, especially when you’re thinking about classified lines coming into the unclassified domain. There’s a concept called tearlining, in which we take classified information, and get it below the tearline, so that those without security clearances and get it, and act on it.”
The Cyber Storm III exercise is expected to conclude by 10.01.10
Was Stuxnet Built to Attack Iran’s Nuclear Program?
By Robert McMillan, IDG News
A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran’s Bushehr nuclear reactor.
People who read this also read:
That’s the emerging consensus of security experts who have examined the Stuxnet worm. In recent weeks, they’ve broken the cryptographic code behind the software and taken a look at how the worm operates in test environments. Researchers studying the worm all agree that Stuxnet was built by a very sophisticated and capable attacker — possibly a nation state — and it was designed to destroy something big.
Though it was first developed more than a year ago, Stuxnet was discovered in July 2010, when a Belarus-based security company discovered the worm on computers belonging to an Iranian client. Since then it has been the subject of ongoing study by security researchers who say they’ve never seen anything like it before. Now, after months of private speculation, some of the researchers who know Stuxnet best say that it may have been built to sabotage Iran’s nukes.
Last week Ralph Langner, a well-respected expert on industrial systems security, published an analysis of the worm, which targets Siemens software systems, and suggested that it may have been used to sabotage Iran’s Bushehr nuclear reactor. A Siemens expert, Langner simulated a Siemens industrial network and then analyzed the worm’s attack.
Experts had first thought that Stuxnet was written to steal industrial secrets — factory formulas that could be used to build counterfeit products. But Langner found something quite different. The worm actually looks for very specific Siemens settings — a kind of fingerprint that tells it that it has been installed on a very specific Programmable Logic Controller (PLC) device — and then it injects its own code into that system.
Because of the complexity of the attack, the target “must be of extremely high value to the attacker,” Langner wrote in his analysis.
Langner is set to present his findings at a closed-door security conference in Maryland this week, which will also feature a technical discussion from Siemens engineers. Langner said he wasn’t yet ready to speak to a reporter at length (“the fact of the matter is this stuff is so bizarre that I have to make up my mind how to explain this to the public,” he said via e-mail) but others who have examined his data say that it shows that whoever wrote Stuxnet clearly had a specific target in mind. “It’s looking for specific things in specific places in these PLC devices. And that would really mean that it’s designed to look for a specific plant,” said Dale Peterson, CEO of Digital Bond.
This specific target may well have been Iran’s Bushehr reactor, now under construction, Langner said in a blog posting. Bushehr reportedly experienced delays last year, several months after Stuxnet is thought to have been created, and according to screen shots of the plant posted by UPI, it uses the Windows-based Siemens PLC software targeted by Stuxnet.
Peterson believes that Bushehr was possibly the target. “If I had to guess what it was, yes that’s a logical target,” he said. “But that’s just speculation.”
Langner thinks that it’s possible that Bushehr may have been infected through the Russian contractor that is now building the facility, JSC AtomStroyExport. Recently AtomStroyExport had its Web site hacked, and some of its Web pages are still blocked by security vendors because they are known to host malware. This is not an auspicious sign for a company contracted with handling nuclear secrets.
Tofino Security Chief Technology Officer Eric Byres is an industrial systems security expert who has tracked Stuxnet since it was discovered. Initially he thought it was designed for espionage, but after reading Langner’s analysis, he’s changed his mind. “I guessed wrong, I really did,” he said. “After looking at the code that Ralph hauled out of this thing, he’s right on.”
One of the things that Langner discovered is that when Stuxnet finally identifies its target, it makes changes to a piece of Siemens code called Organizational Block 35. This Siemens component monitors critical factory operations — things that need a response within 100 milliseconds. By messing with Operational Block 35, Stuxnet could easily cause a refinery’s centrifuge to malfunction, but it could be used to hit other targets too, Byres said. “The only thing I can say is that it is something designed to go bang,” he said.
Whoever created Stuxnet developed four previously unknown zero-day attacks and a peer-to-peer communications system, compromised digital certificates belonging to Realtek Semiconductor and JMicron Technology, and displayed extensive knowledge of industrial systems. This is not something that your run-of-the-mill hacker can pull off. Many security researchers think that it would take the resources of a nation state to accomplish.
Bushehr is a plausible target, but there could easily be other facilities — refineries, chemical plants or factories that could also make valuable targets, said Scott Borg, CEO of the U.S. Cyber Consequences Unit, a security advisory group. “It’s not obvious that it has to be the nuclear program,” he said. “Iran has other control systems that could be targeted.”
Iranian government representatives did not return messages seeking comment for this story, but sources within the country say that Iran has been hit hard by the worm. When it was first discovered, 60 percent of the infected Stuxnet computers were located in Iran, according to Symantec.
Now that the Stuxnet attack is public, the industrial control systems industry has come of age in an uncomfortable way. And clearly it will have more things to worry about
“The problem is not Stuxnet. Stuxnet is history,” said Langner in an e-mail message. “The problem is the next generation of malware that will follow.”
For the record I don’t think anything is going to happen with UFO’s on October 7-13, I think that they are conditioning us for an event in the future. Only the shadow knows.
A Tsunami of truth is beginning to trickle out of binary code across the net. It is not anything new, it was designed by DARPA to follow all patterns of “intelligence”. In result of that monolithic effort to create giant web that catches and stores all information, thousands of jobs created and billions of dollars spent to “transform” our nation and military in an effort to “connect the dots”. Did it work? At the same time the technology was coming online, our elected officials were dismantling the bill rights and beginning to pen a new “Declaration of the United Nations”.
Now we are being told by every one from Larry King to the Vatican that the Aliens are getting ready to make CONTACT. The internet is a buzz about the Vatican appointing ambassador to greet the “Aliens” if they arrived.
‘The Vatican and United Nations ready for Alien contact?
Lets first look at the United Nations new appointed position to the “United Nations Office for Outer Space Affairs” and the naming of Mazlan Othman to be Alien – UFO ambassador in case contact is made.
This United Nations office is responsible for promoting international cooperation in peaceful uses of outer space. UNOOSA is also going to be responsible for the implementation of the Secretary-General’s responsibilities under all international space laws. It also will be responsible for the United Nations Registry of Objects sent into Space as well.
Mazlan Othman is a Malaysian astrophysicist that will be the official “Greeter” to any contacted species from space. Some people would argue that this type of appointment should be the responsibility of a high ranking official such as a president of some other world leader, but this is a unanimous decision on the part of the united nations for this job to be carried out by Othman. She does have a background in science and other space related credentials like overseeing the Malaysian national space program, and she saw over the training and flight of Malaysia’s first astronaut. Mazlan Othmans job as within UNOOSA includes possible issues that may involve space technology, and the preparedness and protocols if an asteroid or comet was on a direct collision course with Earth. One U.N. peer out of the UK, a Professor Richard Crowther, said
“Ms. Othman is absolutely the nearest thing we have to a ‘take me to your leader’ person”.
Next I think I will touch on the Vatican and some of the things coming out of it.
This story is even strange for me to read. It seems the Vatican’s astronomer says he’d love to ‘baptize an alien’. Yes… You read that correctly. He wants to baptize an alien if we make contact. Dr Consolmagno, is the curator of the little known Pope’s meteorite collection, and he is a trained astronomer as well as a planetary scientist at none other than the Vatican’s own private observatory.’
Now with the return of V for public consumption and a new series that features a ringer for Obama and family. NBC’s EvEnt is a conspiracy based drama dealing with a secret “Alien Agenda” that the Obama character wants to tell the world and the CIA decides to attempt an assassination. The assassination attempt is NOT the EvEnt.
Now a ‘newly-published book by a retired NORAD officer predicts October 13, 2010 as the tentative date for a fleet of extraterrestrial vehicles to hover for hours over the earth’s principal cities. Author says the event to be the first in a series intended to avert a planetary catastrophe resulting from increasing levels of carbon-dioxide in the earth’s atmosphere dangerously approaching a “critical mass.”
Winnipeg, MB (PRWEB) September 13, 2010 — A newly-published 352-page book by a retired Air Force officer, Stanley A. Fulham, tentatively predicts October 13, 2010 as the date for a massive UFO display over the world’s principal cities. According to the author, the aliens will neither land nor communicate on that date; they are aware from eons of experience with other planets in similar conditions their sudden intervention would cause fear and panic.
The book, Challenges of Change (3rd ed.), reports this event will be the initial interaction in a process leading to mankind’s acceptance of the alien reality and technologies for the removal of poisonous gases from the earth’s atmosphere in 2015, if not sooner.’ New World Order Report
“Just before he [Wernher von Braun] died, he gave an interview to Carol Rosin, in which he basically said that in order to sustain the military-industrial complex that first a false threat of terrorists would be created and used on the public and then asteroids and finally a false alien threat.”
Wernher von Braun was a German-American rocket scientist, engineer and space architect, becoming one of the leading figures in the creation of rocket technology in Germany and the United States. He was a member of the Nazi party and a commissioned SS officer. Wernher von Braun was said to be the preeminent rocket engineer of the 20th century. After the war, he and some of his rocket team were taken to the United States as part of the then-secret Operation Paperclip. In 1955, ten years after entering the country, von Braun became a naturalized U.S. citizen. Von Braun worked on the US Army intermediate range ballistic missile (IRBM) program before his group was assimilated by NASA, under which he served as director of the newly formed Marshall Space Flight Center and as the chief architect of the Saturn V launch vehicle, the superbooster that propelled the Apollo spacecraft to the Moon. According to one NASA source, he is “without doubt, the greatest rocket scientist in history. His crowning achievement … was to lead the development of the Saturn V booster rocket that helped land the first men on the Moon in July 1969.” He received the 1975 National Medal of Science
U.S. Nuclear Weapons Have Been Compromised by Unidentified Aerial Objects
* Twitter Tweet This
* LinkedInShare on LinkedIn
* Facebook Share on Facebook
Wed Sep 15, 2010 11:44am EDT
U.S. Nuclear Weapons Have Been Compromised by Unidentified Aerial Objects
WASHINGTON, Sept. 15
Ex-military men say unknown intruders have monitored and even tampered with American nuclear missiles
Group to call on U.S. Government to reveal the facts
WASHINGTON, Sept. 15 /PRNewswire-USNewswire/ — Witness testimony from more than 120 former or retired military personnel points to an ongoing and alarming intervention by unidentified aerial objects at nuclear weapons sites, as recently as 2003. In some cases, several nuclear missiles simultaneously and inexplicably malfunctioned while a disc-shaped object silently hovered nearby. Six former U.S. Air Force officers and one former enlisted man will break their silence about these events at the National Press Club and urge the government to publicly confirm their reality.
One of them, ICBM launch officer Captain Robert Salas, was on duty during one missile disruption incident at Malmstrom Air Force Base and was ordered to never discuss it. Another participant, retired Col. Charles Halt, observed a disc-shaped object directing beams of light down into the RAF Bentwaters airbase in England and heard on the radio that they landed in the nuclear weapons storage area. Both men will provide stunning details about these events, and reveal how the U.S. military responded.
Captain Salas notes, “The U.S. Air Force is lying about the national security implications of unidentified aerial objects at nuclear bases and we can prove it.” Col. Halt adds, “I believe that the security services of both the United States and the United Kingdom have attempted—both then and now—to subvert the significance of what occurred at RAF Bentwaters by the use of well-practiced methods of disinformation.”
The group of witnesses and a leading researcher, who has brought them together for the first time, will discuss the national security implications of these and other alarmingly similar incidents and will urge the government to reveal all information about them. This is a public-awareness issue.
Declassified U.S. government documents, to be distributed at the event, now substantiate the reality of UFO activity at nuclear weapons sites extending back to 1948. The press conference will also address present-day concerns about the abuse of government secrecy as well as the ongoing threat of nuclear weapons.
WHO: Dwynne Arneson, USAF Lt. Col. Ret., communications center officer-in-charge
Bruce Fenstermacher, former USAF nuclear missile launch officer
Charles Halt, USAF Col. Ret., former deputy base commander
Robert Hastings, researcher and author
Robert Jamison, former USAF nuclear missile targeting officer
Patrick McDonough, former USAF nuclear missile site geodetic surveyor
Jerome Nelson, former USAF nuclear missile launch officer
Robert Salas, former USAF nuclear missile launch officerStart Slide Show with PicLens Lite