Gramercy Images News

A Financial Novelty weblog

Archive for the ‘security’ tag

The Risks We Face As A Nation

without comments

The original American patriots were those individuals brave enough to resist with force the oppressive power of King George . . . Patriotism is more closely linked to dissent than it is to conformity and a blind desire for safety and security.

Liberty is lost through complacency and a subservient mindset. When we accept or even welcome automobile checkpoints, random searches, mandatory identification cards, and paramilitary police in our streets, we have lost a vital part of our American heritage. America was born of protest, revolution, and mistrust of government. Subservient societies neither maintain nor deserve freedom for long.

Failure of government programs prompts more determined effort, while the loss of liberty is ignored or rationalized away . . . whether is it is the war on poverty, drugs, terrorism . . . or the current Hitler of the day, an appeal to patriotism is used to convince the people that a little sacrifice of liberty, here or there, is a small price to pay . . . The results, though, are frightening and will soon become even more so.

– Ron Paul

| Gramercy Images |

The Mike Rivero Show – Hours One and Two

without comments

What Really Happened

Justin TV

Mike blows open the “lesbian Syrian Blogger”, aka 40 year old Tom MacMaster Georgia USA.

China dumping US treasuries, and who’d be dumb enough to buy these? The FED of course, those printing presses hard at work enslaving the grandchildren to the spectre of compound interest . . .

World Justice Project Rule of Law

Common Sense People, we need more of it. What really happened, news without the corporate/political interests and their compliant media-whores.

<a href=""><img src="" alt="Play" style="border:0px;" /></a>


Posted without any claim to copyright under the “fair use” doctrine for non-profit and educational purposes only. Any valid claim to take down, please just message me first and I’ll take it down myself, though I hope they don’t.

Lockheed Martin’s Hack Attack

without comments

Conspiring or incompetent, Lockheed Martin must be shown the door.

Editorial by Tony Cartalucci
Bangkok, Thailand May 31, 2011 – Lockheed Martin has claimed, and the US Department of Defense has confirmed, that the megalithic defense contractor has suffered a “cyber incident.” Lockheed Martin is claimed to be a defense contractor American national security depends on. If this private corporation really is bestowed with such a grave responsibility and it was incompetent enough to put sensitive information and systems onto the public Internet, it should immediately have such responsibilities stripped away and perhaps undergo a vigorous investigation in regards to its criminal negligence in handling sensitive state secrets. At the very least, all contracts should be canceled and new contractors immediately found – ones capable of isolating sensitive information from the public Internet.

Instead, the war profiteering corporation and the extralegal, extraterritorial global corporate-financier steering committees it is a member of, are using the attack to add to the growing call to institute increasing control over the Internet. It is yet another suspicious incident that has corporate-funded pundits calling for increased “cyber security” and lending further justification for the completely unjustified existence of government agencies like the “Department of Homeland Security.”

Our politicians then parrot verbatim the think-tanks and their corporate media talking points declaring that cyber security must take center stage – not the gross incompetence of corporations that have uncontested, undue access and influence over the American tax payers’ money. The next step will be increased legislation giving the government and their corporate handlers more control over how the public uses the Internet – all based on and citing incidents like Lockheed Martin’s recent cyber security breach.

Defying Common Sense

Even on a personal level, private, confidential information is safest when it is kept solely on a closed system, disconnected from the Internet. Any information put on the Internet must be assumed to be at potential risk and suitable contingencies must be put in place to deal with that information falling into the wrong hands. If that information must absolutely not fall into the wrong hands, it must then be entirely isolated from the Internet.

Scientists who worked on America’s most sensitive defense projects historically would live and work sequestered at research facilities. They would not bring their briefcases full of national secrets to the local cafe, ride the city buses, nor talk about such information on public telephone networks. It is hard to believe that today, such corporations, many born from these WWII and Cold War defense projects, have suddenly forgotten the value of closed, controlled systems where secret research and sensitive projects are isolated from the public in all manners.

A documentary covering the Manhattan Project. Starting at 24:45, security regarding the secret project is discussed.

The recent “hack” then is the result of at least two possibilities. First, it may be yet another attempt to scare the ignorant, uneducated masses into giving up more of their freedom and liberty for the sake of “security.” “Security” being just a pretense for handing the corporate-financier elite yet another monopoly. If this is not an orchestrated event, it may just be utter incompetence. Either way, corporations like Lockheed Martin, the politicians whose leashes they hold, and the media machines that manage the public for them have outlived their usefulness. They have become as great a threat to our nation as any external enemy, either out of incompetence or unmitigated avarice.

It is time America replaced these aged, embedded parasites, obstacles of progress, sponges soaking up the brightest talent the nation has to offer and wringing it out into buckets of greedy, stagnant muck. Their missiles, warplanes, and ships are most certainly impressive, unrivaled even. But the price we have paid to procure this achievement is subservience to a despotic corporate-financier elite that has permeated and infected our government on all levels, as bad or worse than any invading foreign power could ever hope to achieve.

There may be the argument that no other corporation can do what Lockheed, or other parasitic war profiteering corporations like Boeing, Northrop, or Raytheon can do. Certainly this may be the case, but we must ask ourselves why our nation, with its vast resources, doesn’t turn out annual graduate classes full of engineers, designers, rocket and nuclear scientists all capable of meeting local and national needs both civilian and military in nature. It is because the global elite have created a system so interdependent and monopolized on a global scale that only those that control it (them) can manage it and excel within it.

Americans like President Dwight Eisenhower or General Smedley Butler warned us long ago that the blurring line between corporatism and the American government was a grave threat to our nation’s future. Decades later, with the nation under astronomical, mathematically inescapable debt, endless war, rotting infrastructure, and a sabotaged education system, is there any doubt that their warnings should have been heeded? Can we still heed them? We can and we must.

Throw off these corporations by boycotting and replacing them. For corporations like Lockheed Martin who we are told we “depend” on and cannot live without, their incompetence/conspiring as they bleed the American nation dry negates any benefit they supposedly grant us. In actuality, we cannot survive their continued existence.

For ways to battle the globalists by achieving self-sufficiency and freedom through independence please read on:

Destroying the Globalists
Alternative Economics
The Lost Key to Real Revolution
Boycott the Globalists
Naming Names: Your Real Government

Lockheed Martin’s Hack Attack

[Land Destroyer]

On The United Kingdom Police State and The Refusal To Remain A Prisoner Within It

without comments

An announcement by Philip Brennan concerning the UK Police State and his desire to leave the country while he still has the chance to do so.

Philip Brennan | | 24 May 2011:

Due to unexpected fortuitous circumstances, I am now able to purchase a small property in Bulgaria with a quarter acre of land. Friends of mine already have property out there, and we are planning a permanent exodus out of the United Kingdom Police State.

We are not leaving because of immigration, like what most of the Main Stream Media would claim. We are leaving because we are sick and tired of living in what was once a great country, but is now a Stasified society where you cannot even go to the store without being picked up and spied upon by numerous CCTV cameras, where Habeas Corpus can be suspended at any time for any reason, and where the police can stop and search without reasonable suspicion that you might, just might, be in the commission of a criminal offence.

“Corruptissima re publica plurimae leges (The more corrupt the state, the more numerous the laws.)” – Cornelius Tacitus (55-117 A.D.)

What will happen to I do not know. I could decide to carry on the fight from abroad, or I could decide to run a blog on life on a smallholding in Bulgaria. I have not decided yet. What I will do is add a couple of years hosting prepaid so that this site will still be up for the next three years.

Over the past couple of years I have, hopefully, taught my readership to be suspicious of the Main Stream Media, and to double check all facts rather than just accept that the BBC / ITV are telling the truth on all that they report. Now I have to tell you that you should be equally discerning about what the Alternative News Media reports, because they are just as prone to disinformation as the Main Stream Media.

ALL Media is Propaganda.

What you have to discern is whether it is propaganda for good, or for ill.

Now talking about the BBC, I would like to say that it is the worst state propaganda outfit going, and that you’re all paying to be propagandised to without even realising it, but then, few are familiar with the roots of the BBC. The BBC was formed out of Wellington House at the end of World War One. Wellington House, from 1913 to 1920, was the propaganda wing of the British Empire’s war effort, and published all the propaganda needed to fight the First World War on the home and foreign fronts. Once you understand this, you will realise why there is often a discrepancy between what is reported on the BBC World Service news, and what is reported on the domestic radio and television stations.

Also, you have to remember that both the Tavistock Military Psyops War School and Wellington House were the precursors to the Tavistock Institute of Human Relations (1947 to present), and because all three are a part of the British Secret Intelligence Service (along with MI5, MI6, MI10 and GCHQ), the BBC is embedded within the Secret Intelligence Service, and the Secret intelligence Service are embedded within the BBC.

The so-called independent media are no better.

“The Central Intelligence Agency owns everyone of any significance in the major media.” – William Colby, former Director of the CIA (2004)

“Think of the press as a great keyboard on which the government can play.” – Josef Goebbels, Propaganda Minister of the Third Reich

It is the same in the UK – the Secret Intelligence Service owns everyone of any significance in the UK major media, which is the great keyboard on which the government can play.

I no longer have any time for Alex Jones, David Icke, or any other such “Alternative News Media”, because I have caught them red handed spreading disinformation about the current events in the Maghreb and Arabian Peninsula. Having many contacts on the ground with which I can double check information means that not much gets past me these days.

One of the few activists I implicitly trust, because he has proven himself to be trustworthy, is Brian Gerrish. His web site, the UK Column, is always worth reading, and the forums attached to the site are a great place to gather information, although I would say that you should critically examine everything that is posted on these boards.

I still have a lot of respect for Charlie Veitch, even though he does get some things wrong at times. Being wrong about something and deliberately spreading disinformation are two entirely different things, and the former can always be forgiven. The latter cannot be forgiven.

Over the coming three to four months I will be busy with procuring a small property in Bulgaria, and making plans to move out there. I have seen a lovely cottage in the same village as a friend’s property, but we are still making enquiries to see if it is still up for sale. If it is still on the market I will fly over to Bulgaria to take a very hard look at it, and if I think it is right for me, I will buy it. Otherwise, I will keep looking.

I will keep you posted on this should I have further news.

Philip Brennan. A Free Man on the Land in Lawful Rebellion under Article 61 of the Magna Carta and the 1689 Bill of Rights.

On the UK Police State and the refusal to remain a prisoner within it

[Philip Brennan]

Staggering Security Holes In Power, Water, and Oil Grid Infrastructure

without comments

IT security firm Mcafee’s recent protection report In the Dark: Crucial Industries Confront Cyberattacks [PDF] highlights the ever growing threat of digital attacks on the nation’s core infrastructure systems.

At one time, proprietary and locally controlled computers were responsible for monitoring and maintaining everything from electricity distribution to water treatment. But, as companies look to reduce costs and simplify command and control operations, critical infrastructure systems are being connected directly to the internet, making it much easier and much more likely that they could be attacked by foreign governments, hackers, or criminals.

This year, in a sequel report, we focused on the critical civilian infrastructure that depends most heavily on industrial control systems. As with the first report, we used survey data, research, and interviews to obtain a detailed picture of cyber risks in these sectors. The sectors on which this report focuses — power, oil, gas, and water — may well be the first targets for a serious cyberattack.

What we found is that they are not ready. The professionals charged with protecting these systems report that the threat has accelerated — but the response has not. Cyberexploits and attacks are already widespread. Whether it is cybercriminals engaged in theft or extortion, or foreign governments preparing sophisticated exploits like Stuxnet, cyberattackers have targeted critical infrastructure.

We found accelerating threats and vulnerabilities. For the second year in a row, IT executives in the critical infrastructure sector told us that they perceive a real and growing cyberthreat. Denialof- service attacks on energy networks increased. Extortion attempts were also more frequent in the CIP sectors. And hostile government infiltration of their networks achieved staggering levels of success.

Despite these vulnerabilities, many power companies are doubling down on the danger; they are implementing “smart grid” technologies that give their IT systems more control over the delivery of power to individual customers — or even to individual appliances in customers’ homes. Without better security, this increased control can fall into the hands of criminals or “hacktivists,” giving them the ability to modify billing information and perhaps even control which customers or appliances get electricity. But security is not a priority for smart grid designers; according to Woolsey, who two years ago chaired a group that published a report for the Department of Defense on grid vulnerabilities. Ninety to ninety-five percent of the people working on the smart grid are not concerned about security and only see it as a last box they have to check.

One of the more startling results of our research is the discovery of the constant probing and assault faced by these crucial utility networks. Some electric companies report thousands of probes every month. Our survey data lend support to anecdotal reporting that militaries in several countries have done reconnaissance and planning for cyberattacks on other nations’ power grids, mapping the underlying network infrastructure and locating vulnerabilities for future attack.

More than 40 percent of the executives we interviewed expect a major cyberattack within 12 months — an attack, that is, that causes severe loss of services for at least 24 hours, a loss of life or personal injury, or the failure of a company.

Up until a couple years ago, the threat of total infrastructure failure existed only in the sphere of science fiction. Recently, however, the vulnerabilities of the physical hardware on power grids, water utility grids and other important infrastructure elements were made perfectly clear with the spread of the Stuxnet virus, which wrecked havoc on Iranian nuclear facilities. The virus, often referred to as malware, literally destroyed the physical centrifuges responsible for the enrichment of uranium by forcing them to spin out of control. All the while monitoring stations reported perfectly normal conditions.

The scary thing? Stuxnet isn’t isolated to just Iranian nuclear facilities:

Our data indicates that the Stuxnet virus did indeed have a global reach. Around 40 percent of respondents found Stuxnet on their computer systems. Stuxnet was more likely to appear in the electricity sector, where 46 percent of respondents found the malware.

Stuxnet was an extraordinary advance in sophistication over the kinds of malware used by the criminal underground. The Belarusian security firm that initially identified Stuxnet at first believed it to be a backdoor for hackers. But closer inspection revealed the complex nature of the virus. It features multiple exploits that were previously unknown, has Microsoft Windows driver modules that had been signed using genuine cryptographic certificates stolen from respectable companies, contains about 4,000 functions, and uses advanced anti-analysis techniques to render reverse engineering difficult. It is almost certainly the work of a government, not a criminal gang.

In fact, Stuxnet was the work of a government – reportedly two of them. It is believed that intelligence agencies within the United States and Israel are responsible for its conception.

What this shows is that advanced computer scripts and malware target not just personal computers, but highly advanced, purportedly secure critical systems. Those who would attack the nation’s infrastructure could bring these systems down for not just 24 hours using traditional denial-of-service attacks, but potentially weeks and months by executing programs that directly attack the grid’s hardware .

A cyberattack on the US grid would be devastating.

Imagine, for a moment, what such an attack on our water utility plants might look like. While water safety conditions monitored by engineers on remote computer systems attached to the internet might look perfectly normal on the surface, a malicious virus may be at work behind the scenes, controlling the delivery (or lack thereof) of water treatment chemicals into an entire city or region’s water supply.

A similar attack could occur on the electrical grid, sending surges to vital transformers across the nation. Because many of our systems are decades’ old, they could be overwhelmed, much like Iran’s Siemens-built centrifuges. In such a scenario, because of the lack of availability of the damaged equipment and the sheer size of such a widespread attack, it could take weeks or months to repair.

There are roughly 150 oil refineries in the United States, and most of them are likely running on similar hardware, from well known industry manufacturers. Is it that much of a stretch to consider the possibility that a coordinated attack on these systems could send pressure and a host of other control mechanisms in our refineries out of control – all the while engineers monitoring the systems notice nothing out of the ordinary? Such an attack, even if partially successful, could cripple the entire country.

As infrastructure is further centralized, our exposure to potentially catastrophic events continues to increase. Not only is much of our nation’s infrastructure hardware outdated, but the security on newly integrated 21st century smart-grids is lax at best.

We’ve seen coordinated attacks on our stock trading systems. We’ve seen that high security nuclear control systems can be compromised. We know that governments, cyber criminal extortion gangs, hackers and shadow intelligence agencies are actively working on viruses, malware and gaming scenarios designed specifically to crush utility infrastructures on a national scale.

The threat is real. It is present. If such an attack were ever executed there will be nothing emergency responders could do, especially in the case of a widespread, coordinated onslaught of the grid.


900 Seconds: Cyber Attack Wouldn’t Take Long to Bring Down the USA

Cyber Attack on U.S. Grid Would Be Devastating

Threat: ‘Within One Year 9 Out of 10 Americans Would Be Dead’

References: Steve Quayle, Security News Daily, Mcafee [pdf]

Staggering Security Holes In Power, Water, and Oil Grid Infrastructure; 40% of Utility Companies Expect to Be Attacked in the Next 12 Months

[SHTF Plan – When It Hits The Fan, Don’t Say We Didn’t Warn You]

Written by testudoetlepus

April 22nd, 2011 at 9:44 pm