Cybersecurity Lie Exposed: Power Plants Are Not Connected To The Internet
Upcoming SlideShare
Loading in...5
×
 

Cybersecurity Lie Exposed: Power Plants Are Not Connected To The Internet

on

  • 354 views

Primary justification behind

Primary justification behind
internet takeover bill that would
hand Obama power to shut down
world wide web is completely
fraudulent

Statistics

Views

Total Views
354
Views on SlideShare
353
Embed Views
1

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 1

http://pinterest.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution-NonCommercial LicenseCC Attribution-NonCommercial License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cybersecurity Lie Exposed: Power Plants Are Not Connected To The Internet Cybersecurity Lie Exposed: Power Plants Are Not Connected To The Internet Document Transcript

  • Cybersecurity Lie Exposed: Power Plants AreNot Connected To The InternetPaul Joseph WatsonInfowars.comTuesday, August 10, 2010Primary justification behindinternet takeover bill that wouldhand Obama power to shut downworld wide web is completelyfraudulentSenator Joe Lieberman’s draconianInternet takeover legislation, the 197-page Protecting Cyberspace as aNational Asset Act, is beingpromoted as a vital tool to protectvulnerable infrastructure hubs fromterrorist attacks, but as a recent WallStreet Journal report makes clear,large industrial power and waterplants are not even connected to thepublic Internet.Lieberman has been busy over thelast several months pushing the cybersecurity agenda, with a bill that would hand President Obama thepower to shut down parts of the world wide web for at least four months with no congressionaloversight in the event of a cyber attack on critical infrastructure systems in the U.S.However, the primary purpose of cybersecurity and Lieberman’s legislation is to combat a problem thatdoesn’t exist.As a recent Wired News article highlighted, power grid and drinking water systems, “Are rarelyconnected directly to the public internet. And that makes gaining access to grid-controlling networks achallenge for all but the most dedicated, motivated and skilled — nation-states, in other words.”The article explains that it would take a gargantuan national effort on behalf of a nation state, utilizing aplethora of national resources, to even begin to attempt taking down complex power and water systems.This isn’t merely a case of a rag-tag terrorist group hacking into a website via their laptops.Fresh food that lasts from eFoods Direct“Even in places like the United States, where there isn’t much you cannot find online, you’re not goingto be able to get the depth and detail you need to turn off the lights with a simple network connection,”writes Michael Tanji.Indeed, the only way to hack into or infect the vast majority of sophisticated infrastructure systems isby means of a virus contained on an external USB hard drive physically inserted on site, as a recentcase reported on by the Wall Street Journal involving the German engineering giant Siemens AGproved.
  • Siemans provides industrial control system software that is used to monitor large automated plants –from manufacturing to power generation to water treatment. A recent attempt to steal data from one oftheir clients, a German manufacturing company, was carried out by means of a virus loaded onto aUSB data stick which was then inserted into one of the computers on the manufacturing plant’snetwork. The hack attack had nothing to do with the Internet, because like almost all major plants, theGerman company did not have its control systems hooked up to the public Internet.We are constantly told that the Internet needs to be subject to government control becausecyberterrorists could hack in and bring down the national power grid. However, the vast majority of theU.S. power infrastructure is not connected to the Internet. It will only be connected to the Internet if thegovernment accelerates the implementation of “smart grid” technology, so in this sense, thegovernment itself is leaving the power grid more vulnerable to hackers by its own programs.While the public facade of cybersecurity is supposed to be about protecting crucial infrastructure hubs,which as we have documented are not even at risk from hackers using the public Internet, the realagenda behind the program is about handing government control over the Internet so that it is in abetter position to censor its critics.(ARTICLE CONTINUES BELOW)During an appearance with CNN’s Candy Crowley, Lieberman let slip the real motive behind thecybersecurity agenda when he stated, “Right now China, the government, can disconnect parts of itsInternet in case of war and we need to have that here too.”The problem with this statement is that the Communist Chinese government does not disconnect partsof the Internet because of genuine security concerns, it habitually does so only to oppress and silencevictims of government abuse and atrocities.China has exercised its power to shut down the Internet, something that Lieberman wants to introducein the U.S., at politically sensitive times in order to stem the flow of information about governmentabuse of its citizens. During the anti-government riots which occurred in July 2009, the Chinesegovernment completely shut down the Internet across the entire northwestern region of Xinjiang fordays. In several regions, the authorities completely cut off the Internet for nearly a year, with manyareas only now slowly starting to come back online. Major news and discussion portals used by theMuslim Uighurs in the area remain blocked. Similarly, Internet access in parts of Tibet is routinelyrestricted as part of government efforts to pre-empt and neutralize unrest.In addition, the Chinese government routinely orders Twitter and Facebook-like services to “purge sitesof politically “sensitive” words and expressions.”If this is the kind of Internet Lieberman wants the United States to move towards then it should beresisted at every turn because such a system has no place in a supposedly free country. The fact thatproponents of cybersecurity are hyping a completely manufactured menace, the false notion thathackers could should down power and water plants via the public Internet, strongly indicates that thetrue purpose of the program is being deliberately hidden to prevent more Americans from discoveringits actual intended role – to give the government the power to regulate and suffocate free speech on theworld wide web.COMMENT: The Article Above Explains That The Nation Power Grid Is Not Connected To TheInternet So Theirs Absolutely No Chance A Hacker Can Hack Our Power Grid So Why DoesObama Want To Be In Charge Of The Internet Their Are Many Reasons Why But The MainReason Why Is So The Government Can False Flag Attack The Internet And Blame It OnHackers When In Reality The Government Them Selves Are The Ones Doing The Hacking SeeThe Sinister Mind Of The Evil Demons In Control Of This Planet The More They Hack The
  • More Outcry From People For Government To Do Something About It So In The End TheGovernment Gets What It Wants More Power More Control Of The Internet To Squash FreedomOf Speech On The Web And To Put A End To Patriots Exposing Their Atrocities CommittedAgainst Humanity This Is The True Reason Why The Government Want To Control The NetObamas A Piece Of Trash Hes Working For These Globalist He Knows Full Well What HesDoing Hes Being Told What To Do Step By Step Dont Ever Forget That He Knows !!!!!!!!!!!!!!And Thats What Makes Him A Lunatic Below Is A Article Of A Secret Directive Obama SignedBelow Read ItObama’s Secret Directive Paves Way ForContinued Military Cyber OffensiveSteve WatsonInfowars.comNov 15, 2012Administration has long been attacking other nations with malware viruses that are alsoinfecting, compromising US infrastructureFollowing yesterday’s defeat of the draconian cybersecurity legislation in the Senate, it was revealedthat back in mid October, president Obama signed off on a secret directive that will enable the USmilitary to use newly created computer viruses to attack any organisation or country deemed to be acyber threat. The president has already proved the willingness to carry out such attacks, as new detailssurrounding the 2010 stuxnet attack revealed earlier this year.The Washington Post cited several US officials speaking under anonymity in a report on thedevelopment last night.“The new directive is the most extensive White House effort to date to wrestle with what constitutes an“offensive” and a “defensive” action in the rapidly evolving world of cyberwar and cyberterrorism.”
  • the report states.“What it does, really for the firsttime, is it explicitly talks about howwe will use cyber-operations,” asenior administration official said.“Network defense is what you’redoing inside your own networks. . .Cyber-operations is stuff outside thatspace, and recognizing that you couldbe doing that for what might becalled defensive purposes.”“An example of a defensive cyber-operation that once would have beenconsidered an offensive act, forinstance, might include stopping a computer attack by severing the link between an overseas server anda targeted domestic computer.” the report continues.Essentially, in the same way the Bush administration employed terms such as “pre-emptive” whenconsidering the invasion of Iraq, the Obama administration has shrouded it’s cyber policies in languagethat legally allows the military to go on the offensive – except this time the battle ground is cyberspace,which the Pentagon has defined as another military domain to be dominated.The Washington Post even acknowledges that the Stuxnet virus was developed by the US inconjunction with Israel and was unleashed on Iran in 2010. Remarkably, however, it spins this fact onits head suggesting that “If an adversary should turn a similar virus against U.S. computer systems,whether public or private, the government needs to be ready to preempt or respond.”As we initially reported in September 2010, the evidence suggested that the Stuxnet virus, designedto damage centrifuges at Iran’s nuclear facilities, was created and deployed by the US and Israel.The idea was immediately branded a wild conspiracy theory by sections of the corporate media, who pinned the blame on Russia or China, before it was finally revealed in January 2011 by The New York Times that the wild “conspiracy theorists” were actually spot on. The newspaper quoted intelligence and military experts as saying Israel has tested the effectiveness of the Stuxnet computer worm, which apparently shut down a fifth of Iran’s nuclear centrifuges in November and helped delay its ability to make its first nuclear weapons, reported AFP. The virus caused extensive damage to the Bushehr reactor, leading to the risk of a new Chernobyl-style nuclear disaster, according to Russian officials. In June of this year, it was revealed in a new book citing senior Washington sources that Stuxnet formed part of a “wave” of digital attacks on Iran code named “Olympic Games”. According to the anonymous officials, the virus was created with the
  • assistance of a secret Israeliintelligence unit. It was Obamahimself who gave the order tounleash the cyber attack on Iran.The president also decided not toshut the program down when it wasknown that it had beencompromised.Of course, the virus escaped ontothe internet and has spread aroundthe world, exposing the program. Itwas reported this week that largecompanies in the US, including Oilgiants Chevron, saw their systemshit by Stuxnet. Computer expertsbelieve that a “programming error”was responsible for the spread ofthe worm, yet many believe that a more sinister plot was afoot, such as a potential false flag operation,to be blamed on Iran, or an effort to corrupt the free internet.The Washington Post also reported earlier this year, that the United States and Israel were alsoresponsible for jointly developing the Flame virus, a huge malware assault that monitored Iran’scomputer networks.Researchers at Kaspersky Labs, announced that the Russian cyber security software companydiscovered a similarity between a subset of the code used in Flame and code used in the Stuxnet virus.In September, it was revealed that three more new viruses had been created by the US and deployedin Lebanon and Iran to conduct espionage. Researchers working for both Kaspersky and Symantecseparately discovered distinct similarities to Stuxnet and the closely related Flame virus.The fact that these viruses have been pinpointed as potential threats to US government and privateinfrastructure, underscores the certainty that the US has sought to exploit the threat of cyber-attackslaunched by their own cybersecurity departments.We have seen a constant push by the executive and legislative branches to censor and regulate theInternet domestically in the name of cybersecurity.Obama’s newly revealed “secret directive”, and his impending executive order on cybersecurity merelyrubber stamp and continue the all out offensive that his administration and the intelligence and militaryoutfits under his command have been pursuing for some time.Obama Placed Embargo on Press Over Secret Cyber Security Executive Order ARTICLEBELOWhttp://www.infowars.com/obama-placed-embargo-on-press-over-secret-cyber-security-executive-order/http://www.infowars.com/