It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

South Korean Workers Killed At Nuke-Plant Threatened By Hackers

page: 1
13

log in

join
share:

posted on Dec, 26 2014 @ 03:57 PM
link   
My Prior-Speculation for: Shutdown to NK's Internet

AND

Currently it's Speculation ... ( or coincidence? )

HOWEVER

Cyber war strike? Three South Korean workers killed at nuke plant threatened by hackers

For the moment, all evidence is speculative and circumstantial.

This could have just been a terrible accident, coincidentally occurring after threats leveled against the South Korean nuclear power industry by hackers who may have been freelance environmental extremists.

Some will laugh at the notion that such a convenient disaster could have occurred coincidentally, while others – particularly those who remain skeptical that the North Korean government had a direct role in the Sony attack – will caution against drawing conclusions based solely on the denial that random misfortune is possible.

It’s a safe guess that those South Korean standby security teams are going to have an even less relaxing holiday week than they thought.

-
OPINION: Stay Tuned

( and/or alert )

-
UPDATE / ADDITIONALLY:

Dec 26, 2014 - US, Japan and S.Korea to share intel on N. Korea

Officials from Washington, Tokyo and Seoul will sign a trilateral intelligence-sharing pact in an effort to strengthen their surveillance network on the nuclear-armed pariah state of North Korea, Seoul officials said.
...
According to the agreement, to be signed on Monday, South Korean and Japanese officials will share intelligence on Pyongyang's nuclear and missile programs, via Washington, South Korea’s Defense Ministry said in a statement, AP reported.
...
Seoul believes North Korea has made progress in its efforts to develop and produce nuclear missiles that are capable of reaching US territory, or US military bases that are located in both South Korea and Japan.

.

edit on 26-12-2014 by FarleyWayne because: (no reason given)




posted on Dec, 26 2014 @ 04:28 PM
link   
a reply to: FarleyWayne

Star and Flag!


From the source article ...


Students of the First Cyber War should by now be familiar with the shadow dances of deniability and separation conducted by hostile regimes, and the converse possibility that the work of independent digital vandals could be mistakenly attributed to foreign powers with aligned interests… especially if said foreign powers make a point of applauding when something goes kablooey. Nobody’s wearing a uniform or marching under a flag in this new brand of warfare.


Lots to learn in the new age of warfare!


edit on 26 12 2014 by IBlewMyLastFuse because: (no reason given)



posted on Dec, 26 2014 @ 06:02 PM
link   
2015 is going to be very very interesting. So many wars are being fought worldwide it's already WW3.
Our paths shall be revealed to those whose eyes are open



posted on Dec, 26 2014 @ 06:11 PM
link   
a reply to: FarleyWayne

You have to wonder if an individual hacker is doing this and than covering their tracks by leaving a signature related to a particular country. I'm far from being a computer geek, but I'm sure there are people out there that have the technical know how to manipulate a hack so it can't be traced back to the source. Nothing like waging a one man war against a particular country or creating hostilities that could result in a war.



posted on Dec, 26 2014 @ 06:57 PM
link   
My OPINION Regarding ALL Industrial Plants:

MAXIMUM-EXPOSURE should be LIIMITED to Monitor-ONLY-Computers-with-2nd-Network-Cards and ONLY connected via:

Internet-Connection -> VPN -> Monitoring-Computers-with-2nd-Network-Cards including the following RESTRICTIONS:

1. Monitoring-Computer(s) are NEVER part of the PRIMARY-DOMAIN.

2. Monitoring-Computer(s) have NO Controlling-Software Installed.

3. Monitoring-Computers have NO Internet-Access ... ( i.e. no internet browsing ).

4. None of the PRIMARY-DOMAIN Computers should have ANY access to ANY VPN ... NOR have any Internet-Connection ( i.e. no internet browsing ) ... ( an exception for external-remote-access might be to consider secured-n-logged-dial-up; i.e. ISDN or POTS; however there remains some risk here ).

5. Internet-Connected-Computers SHOULD be a 3rd-(and separate)-Network ... (consider a linux-type here; for an example: linuxmint.com; sorry for the inconvienience and probable extra expense).

6. Transmitting information between these 3-Networks MUST be a MANUAL-OPERATION .... (i.e. external storage devices such as thumb-drives, portable-drives)

-
OPINIONS:

Any Network-Agent (of any capacity) should be able to ...

Get-the-Drift ???


( i.e. anything less is now ... seriously-risky-behavior )
.

edit on 26-12-2014 by FarleyWayne because: (no reason given)



posted on Dec, 27 2014 @ 05:24 AM
link   
When the latest round of hacking hit the MSM, and millions of gamers around the world were affected, the news stations were all over it like a rabid dog.

This can only be a contrived effort by agencies, to place a message of fear in the minds of the public.

The outcome can only be guessed at this time, but I suspect that we are about to have our Internet freedoms taken away from us.

Watch this space...



posted on Dec, 27 2014 @ 06:39 AM
link   
a reply to: FarleyWayne

The logical hing to do, from the outset, would be to have ALL critical infrastructure sitting on internal LANs only, with absolutely NO connection to the outside world... ever! I mean, the solution to external hacks or the threats of them is simple, isn't it?
Why would infrastructure control systems even need any remote access in the first place? Ok, there may be times when access from a safe place, for disaster operations and safety evacs may be needed away from the plant / control hub, but these should be planned anyway and hardwired into the LAN as a contingency anyway.
For me, security planning and contingency go hand in hand, so I wonder why so many critical infrastructure systems, and those that plan and implement them, seem not to be able to follow simple rules and safeguards?

Of course, it doesn't help that for years the government(s) and their agencies have worked with the manufacturers to leave backdoors in the hardware and software systems - for fighting terrorism of course! These back doors, thus known to those agencies are open to abuse by many within those agencies, and also there to be found by determined external elements.

I fear the actions of those government agencies a lot more than I do the cyber criminals out to make a buck.



posted on Dec, 27 2014 @ 08:15 AM
link   
Well Russia is getting tired of being pushed around by the Zionist bankers who control the USA and are making a bigger effort to upgrade their nuclear weapons than they are to build nuclear power plants all over the world.

I for one don't blame them and we can all thank the USA for making Russia move in this direction and if Russia can improve on ICBM that can hit Zionist central then we in Europe might be spared if Isreal does not use the Samon Option that involves nuking Europe.



posted on Dec, 27 2014 @ 09:41 AM
link   
a reply to: Britguy


The logical [t]hing to do, from the outset, would be to have ALL critical infrastructure sitting on internal LANs only, with absolutely NO connection to the outside world... ever! I mean, the solution to external hacks or the threats of them is simple, isn't it?
I Agree.


Why would infrastructure control systems even need any remote access in the first place? Ok, there may be times when access from a safe place, for disaster operations and safety evacs may be needed away from the plant / control hub, but these should be planned anyway and hardwired into the LAN as a contingency anyway.
For the same reason a Rural-Medical-Practitioner MAY need a Specialist ... ( i.e. medical-video-conferences )


For me, security planning and contingency go hand in hand, so I wonder why so many critical infrastructure systems, and those that plan and implement them, seem not to be able to follow simple rules and safeguards?
Everyone is on the Cheapest-Drop-Dead-Time-Schedule ... ( i.e. short-cutting )


Of course, it doesn't help that for years the government(s) and their agencies have worked with the manufacturers to leave backdoors in the hardware and software systems - for fighting terrorism of course! These back doors, thus known to those agencies are open to abuse by many within those agencies, and also there to be found by determined external elements.

I'll start by saying that I have NO 1st-Hand Knowledge Here ... I can ONLY Speculate:

I can only SUSPECT that our U.S. Folks have worked with Software-n-Hardware-Vendors to incorporate (a multitude of?) "backdoors" into Information-Technology Products-n-Services ... ( especially since 9/11/2001? ).

We read about the Snowden-Leaks and others ... HOWEVER ... How many leaks have gone UN-Published and what did they really get?

I can IMAGINE that these "backdoors" have been around for so long that they are now ... Loose and Out-of-Control?

( i.e. nobody knows who or what anyone has ... (( includes governments, corporations and/or individuals)) )



I fear the actions of those government agencies a lot more than I do the cyber criminals out to make a buck.
To be the SAFEST ??? ... Do NOT Omit Anyone Anywhere.

-
DISCLOSURE: Just My Opinions.
.

edit on 27-12-2014 by FarleyWayne because: (no reason given)



posted on Dec, 27 2014 @ 05:42 PM
link   
a reply to: FarleyWayne

I'd take a deep breath and relax on this one, folks. The chances that these deaths were caused by any kind of hack are virtually nil. Think infinitesimally small.

You got three workers who got into a vapor release. The only automatic system that could do this would be pressure relief valves and those would be piped to atmosphere at a safe elevation.

Most likely cause : somebody did a line break on a live line by mistake or opened a valve they shouldn't have. If whatever gas that got them was heavier than air it could have been from a line leak somewhere else in the plant that settled into a low spot or confined space that these guys entered.

Not believing this hype building link to hackers. (not the OP, the article. I appreciate the post.)




top topics



 
13

log in

join