It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
That attack on the Oldsmar, Florida, water system in February was intended to distribute contaminated water to residents "and that should have gripped our entire country,” Mayorkas said.
It’s no surprise that it didn’t. USA TODAY and others reported on that hack, but it came amid a flurry of reports of other, bigger cyberattacks such as the SolarWinds intrusion of U.S. government agencies, technology firms like Microsoft and cybersecurity companies. .
But Mayorkas and other cybersecurity experts say the Oldsmar intrusion was just one of many indications that malicious hackers increasingly are targeting critical parts of the nation's infrastructure – everything from hospitals and water supplies to banks, police departments and transportation – in ways that could injure or even kill people.
Like Mayorkas, private-sector computer security experts recently have begun issuing warnings that so-called cyber-physical security incidents involving a wide range of critical national infrastructure targets could potentially lead to loss of life. Those include oil and gas manufacturing and other elements of the energy sector, as well as water and chemical systems, transportation and aviation and dams.
A year ago, the FBI, DHS and the Department of Health and Human Services issued a warning about such attacks on hospitals, describing the tactics, techniques, and procedures used by cybercriminals to infect systems with ransomware for financial gain.
“CISA, FBI, and HHS have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers,” the alert said. “CISA, FBI, and HHS are sharing this information to provide warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats.”
Several nations, including Iran, Russia and China have penetrated key elements of U.S. critical infrastructure, but there have been few instances of them taking any action.
Several nations, including Iran, Russia and China
originally posted by: Zcustosmorum
Several nations, including Iran, Russia and China
Those trusty scapegoats are always at hand
originally posted by: Nickn3
Prevent infection? It’s time to put a condom on that computer.
www.independent.co.uk...
originally posted by: Silcone Synapse
a reply to: elementalgrove
If they play this right-they don't even need to do a false flag.
The combination of ageing and overloaded infrastucture,lack of government support,the firing of workers due to vax mandates could easily lead to serious failures of critical systems.
But now they have "killware" cyber attacks to blame when something happens.
We told you!
Its those scary russian computer nerds again,honest!
originally posted by: Nickn3
Prevent infection? It’s time to put a condom on that computer.
www.independent.co.uk...
originally posted by: MichiganSwampBuck
a reply to: elementalgrove
Four months of food is a good start for prepping.
I use the rule of three, three days (on foot bug out preps), three weeks (shelf use or for car bug out), three months (bug in for normal emergencies), and three years (the long haul bug in plan). Not that I have all that covered, but it's what I work toward.
I've been using 12v DC for years to power devices that run on 12v. Last spring I bought a $100 solar panel and finally hooked it up this fall. I currently use a single car battery that holds a charge well, but isn't that great.
I want to get it to the point where I can run my security system and some lights. Right now I just charge devices, run radios and a small inverter with that power. I have a gas generator I can run the whole place on, but it's loud and can't be run continuously, plus it only as good as the gas you can get to run it.
The panel charges up to 6 amps, just right for a car battery. It won't work on rainy and super cloudy days, but it keeps the battery charged and I don't need to worry about a plug in charger.
originally posted by: imitator
Mayorkas is a lying dog... anything he says to watch out for means his corrupt administration is behind it.
They spent billions on cyber security this year, which translates into bigger cyberattacks by our government. There is no doubt the Biden admin is itching to turn out the lights.
Exactly, they telegraph their plans as "potential threats, seed the narrative they will blast on a 24 hr news cycle basis and viola people believe whatever they are told.
originally posted by: Terpene
a reply to: elementalgrove
Soon we hit the 4 month mark for the cyber security meeting polygon.
which coincidentally is baked by the WEF...
Fortunately their grasp has been weakening and the FF as of late have been getting eviscerated by the digital warriors and alt tech/media platforms!
Administration launched a 100-day initiative to improve cybersecurity across the electric sector with others to follow. On July 28, the President issued a National Security Memorandum establishing voluntary cybersecurity goals that clearly outline our expectations for owners and operators of critical infrastructure.
develop a new framework to improve the security and integrity of the technology supply chain.
The Biden Administration also announced the formal expansion of the Industrial Control Systems Cybersecurity Initiative to a second major sector: natural gas pipelines. The Initiative has already improved the cybersecurity of more than 150 electric utilities that serve 90 million Americans.
originally posted by: HawkeyeNation
As someone on the Healthcare side I can validate the increase we've had against us. We've had to implement 2 zero day vulnerability patches within the last 90 days and expect it to continue at a rate we have never seen before. For perspective, maybe a once a year type of thing.