Global Cyber Attacks Blamed On Russia Right Before Spiking Internet Outages Occur – Live Attack Map Shows Attacks From Within

Twitter went down worldwide, came back up and then went down again, with Down Detector racking up over 6,000 reports in one hour, but Twitter wasn’t alone in suffering outages, as multiple communications networks also saw a spike in reports overnight, with the live outage maps from different companies showing the same geographical locations being hit.

April18CyberAttacksATT.jpg

April18CyberAttacksATT.jpg

April18CyberAttacksVerizon.jpg

April18CyberAttacksVerizon.jpg

Also noteworthy is the spikes in outage complaints for the telecommunications companies occurred around the same time.

April18CyberAttacksSpikeATT.jpg

April18CyberAttacksSpikeATT.jpg

April18CyberAttacksSpikeVerizon.jpg

April18CyberAttacksSpikeVerizon.jpg

RUSSIA, RUSSIA, RUSSIA!!!

Interestingly enough, it appears the mainstream media, on behalf of U.S. and UK officials, converged on warning their audiences that a global cyber attack was imminent and of course it was being blamed on Russia. The warning of course had nothing to do with actual outages, but highlighted an “unprecedented” joint alert from the U.S. and UK, that Russia was “stepping up” efforts to hack networks through routers, in retaliation for the Syria conflict.

The warning on Monday came from the U.S. Department of Homeland Security and Federal Bureau of Investigation and Britain’s National Cyber Security Center. It included advice to companies about how to protect themselves and warned specifically of attacks on routers, the devices that channel data around a network. 

“Russian state-sponsored actors are using compromised routers to conduct spoofing ‘man-in-the-middle’ attacks to support espionage, extract intellectual property, maintain persistent access to victim networks and potentially lay a foundation for future offensive operations,” according to a joint statement. “Multiple sources including private and public-sector cybersecurity research organizations and allies have reported this activity to the U.S. and U.K. governments.”

Just take a look at how all the media networks converged on that narrative within the last 24 hours.

April18CyberAttacks5Search.jpg

April18CyberAttacks5Search.jpg

That was just a portion of page one, it continues on subsequent pages, making it very clear that the media really, really wants people to know that Russia is conducting “cyber attacks.” While the warnings focused on the hacking of networks and data breaches, USA Today highlights the “targets included government and private organizations, including internet service providers.

According to the BCI Horizon Scan Report (2018), the top three concerns by businesses are 1) Cyber attack; 2) Data breach, and; 3) Unplanned IT and telecom outage.

Over the last 24 hours we have hit the trifecta of reports tapping into the top fears with the overwhelming push by the media over “global cyber attacks,” to include “date breaches,” and the overnight spike in telecom outage reports.

If I was the cynical type, I might think we were all being herded toward one specific “narrative,” where ultimately, the masses will start caring about Russia again.

For two years the media has been screaming about Russia. Russian collusion! Russia/Syria! Russia election interference! Russian bots! The problem for the liberal media is, as was admitted on CNN in January 2018, while they continue to be apoplectic about Russia on a daily basisAmericans  they speak to, don’t care about Russia.

Source Article from http://govtslaves.info/2018/04/global-cyber-attacks-blamed-on-russia-right-before-spiking-internet-outages-occur-live-attack-map-shows-attacks-from-within/

01-16-18 — Theo Chino on the Int’l Conference on Cyber-security – Colin Cantrell – (MP3/VIDEO)

Guests
Theo Chino

Topics
Bitcoin

Hour 1-2 – Theo Chino (NY Bit Licence Lawsuit) provides a re-cap on the International Conference on Cyber-security he recently attended; also an update on Morpheus and Bitcoin


Hour 3 – Colin Cantrell (Nexus Developer) comes in studio to talk about on the Nexus digital currency



CALL IN TO SHOW: 602-264-2800



-30-



Feature Article  •  Global Edition
Freedom’s Phoenix
Declare Your Independence APP now on Google Play 
Donna Hancock

   Listen to any recent show of “Declare Your Independence” at the click of a button!

 

 


 


Janaury 16th, 2018


Declare Your Independence with Ernest Hancock


on LRN.FM / Monday – Friday


9 a.m. – Noon (EST)


Studio Line: 602-264-2800 


 







2018-01-16 Hour 1 Theo Chino from Ernest Hancock on Vimeo.


Hour 1


Theo Chino


Chino v. Dept. of Financial Services, Index # 101880-15 challenging New York’s bitcoin regulation…


Article 78  Against NYDFS – A Lawsuit Against the Executive Branch Overreach


https://www.article78againstnydfs.com/


================================


Other Webpages:


@theochino (Twitter)


BIO: Royal Pain in the Ass for a Better World.


French:  


Spanish: 


Bitcoin:  


Geek: 


 


==========================



Theo’s previous interviews on the Declare Your Independence with Ernest Hancock Radio Show:


https://www.freedomsphoenix.com/Guest-Page.htm?No=01451


==========================


 



http://iccs.fordham.edu/


Overview


More than 2,000 professionals from 60 countries around the world met at the International Conference on Cyber Security 2009, 2010, 2012, 2013, 2015 and 2016 to discuss the world’s greatest emerging cyber threats. This January 2018, the Federal Bureau of Investigation and Fordham University will collaborate again to host the seventh International Conference on Cyber Security (ICCS 2018) in New York City, the information center of the world. ICCS 2018 will be another unparalleled opportunity bringing together global leaders in emerging cyber threat analysis, operations, and enforcement. With the number of cyber threats escalating worldwide, the need for comprehensive security analysis, assessment, and actions have reached a critical juncture. Join us at ICCS 2018 for a firsthand opportunity to discover and share critical intelligence on issues shaping the future of cyber security.


ICCS 2018 will consist of three days, filled with 50 unique lectures from keynote, distinguished, plenary, and parallel speakers in the disciplines of emerging technologies, operations and enforcement, and real life experiences. Also included are a Cyber Security Tutorial, a Law Enforcement Workshop, panel discussions, sponsors’ exhibitions, and exceptional networking opportunities. 



2018 Program & Schedule



·         10:00am – 1:00pm


o    ?Registration Opens for Law Enforcement Workshop and Cyber Security Tutorial


·         1:00pm – 6:00pm


o    Registration Opens for the International Conference on Cyber Security


·         1:00pm – 4:00pm


o    Law Enforcement Workshop (LEW)


·         1:00pm – 4:00pm


o    Cyber Security Tutorial (CST)


·         4:00pm – 7:00pm


o    Welcoming Reception


o    Distribution of Conference Materials


·         8:00am – 5:00pm


o    Registration Open for International Conference on Cyber Security


o    Sponsor Exhibits / Coffee / Water / Snacks / General Information?


·         8:00am – 9:00am


o    Continental Breakfast?


·         9:00am – 10:00am


o    Opening Ceremony


§  Christopher A. Wray, Director, Federal Bureau of Investigation


§  Joseph M. McShane, S.J., President, Fordham University


§  William F. Sweeney, Jr., Assistant Director in Charge, Federal Bureau of Investigation, New York Division


§  Session Chair: William F. Baker, President Emeritus, Channel Thirteen/WNET, Claudio Acquaviva, S.J. Chair and Journalist in Residence, Fordham University


·         10:00am – 10:45 am


o    Distinguished Speaker | Disinformation, Manipulation and the New Age of Warfare


§  Jared Cohen


§  CEO of Jigsaw, Advisory to the Executive Chairman, Alphabet Inc.


·         10:45am – 11:00 am


o    Coffee Break?: Sponsored by Cyxtera


·         11:00 am – 11:30 am


o    e-Estonia is it for e-Everybody?


§  Erkki Koort, Deputy Secretary General, Internal Security Policy, Estonia


·         11:30 am – 12:30 pm


o    Distinguished Panel | Insider Risk and Critical Pathway Analysis


§  Ed Stroz


§  Co-Founder and President Stroz Friedberg (an Aon Company), Moderator


§  Lonny Anderson


§  Executive Vice President, Feddata


§  Paul Calatayud


§  Regional Chief Security Officer, Palo Alto Networks – the Americas


§  Edward Shaw, Ph.D.


§  Clinical Psychologist and Founder, Insider Risk Group


·         12:30pm – 1:30pm


o    Lunch:  Sponsored by DELL EMC


·         ?1:30pm – 2:00pm


o    Parallel Sessions


o    Panel | Blockchain and Security


§  Anthony G. Vigilante; Managing Director and Head of the Global Information Technology, MacKay Shields, Moderator


§  Joseph Lubin, Founder and CEO, ConsenSys


§  Mike Maloney, Vestchain


§  Benjamin Nadareski, Global Business Development Team, R3


§  Joel Weight. CTO,  Medici Venture


§  Benjamin Elliott, Supervisory Special Agent, FBI


o    “Operation Bayonet:”  The International Effort to Dismantle AlphaBay


§  Special Agent Nicholas G. Phirippidis


o    ?Identifying Social Network Users from their Online Behavior


§  Marina Gavrilova, Department of Computer Science, University of Calgary


o    The “Hidden Empires” of Malware


§  Dave Herrald, Security Architect, Splunk


§  Ryan Kovar, Staff Security Strategiest, Splunk


·          


·         2:00pm – 2:30pm


o    Parallel Sessions


o    Panel | Blockchain and Security  (Continues)


o    Operation Harbor … The hunt for the operator of Mirai’s Botnet #14


§  Mirko Manske, First Detective Chief Inspector, BKA


o    Attack Detection at Scale: Applying Machine Learning to Threat Detection


§  Michael Clifford, Principal Security and Data Scientist, Noblis


o    Current Technologies and Policies for Securing Law Enforcement Data in the Cloud and Locally


§  Scott Crouch, Co-Founder and CEO, Mark 43


§  Steve Okano, Vice President of Engineering and Product, Mark 43


·          


·         2:30pm – 2:45pm


o    Coffee Break: Sponsored by Cyxtera


·         2:45pm – 3:30 pm


o    Distinguished Speaker |The Web PKI in Practice and Malpractice


§  Bruce Maggs, Pelham Wilder Professor of Computer Science, Duke University, and Vice President for Research, Akamai Technologies


·          


·         ??3:30 pm – 4:15pm


o    Distinguished Speaker | How to Take a Cyber Punch and Keep Going:  The Case for Resiliency


§  Brigadier Gen. Gregory J. Touhill, Ret., President, Cyxtera Federal Group


·         ?4:15 pm – 4:30pm


o    Coffee Break: Sponsored by Cyxtera


·         ?4:30pm – 5:30pm


o    Distinguished Panel | The Human Element: Thinking Like the Enemy to Beat Them (At Their Own Game)


§  Richard T. Jacobs, Assistant Special Agent in-Charge, Cyber Branch, FBI-NY, Moderator


§  Louis E. Bladel III, Executive Director, Fraud Investigations & Dispute Services, Ernst & Young, LLP


§  Steve Hill, Managing Director, Global Operational Technology Risk, Credit Suisse


§  Marshall L. Miller, Litigation Department, Wachtell, Lipton, Rosen & Katz


·         5:30pm – 7:30pm


o    Reception:  Sponsored by Cyxtera


·         8:00am – 5:00pm


o    Registration Continues:


§  International Conference on Cyber Security (ICCS)


o    Sponsor Exhibits / Coffee / Water / Snacks / General Information?


·         8:00am – 9:00am


o    Continental Breakfast?


·         9:00am – 10:00am


o    Keynote Address


§  John O. Brennan


§  Former Director, Central Intelligence Agency


·         10:00am – 11:15am


o    Distinguished Panel | Secrecy and Defense


§  Michael J. Sulick, Former Director National Clandestine Service, moderator


§  General John M. Keane, US Army, Ret., President GSI Consulting, former Undersecretary United States Army


§  Ambassador Giampiero Massolo, CEO Fincantieri, S.P.A., and former Director – General, Department of Intelligence Security, Italy


§  Jeffrey A. Tricoli, Section Chief, Cyber Division, Federal Bureau of Investigation


·         11:15am – 11:30am


o    Coffee Break: Sponsored by Noblis


·         11:30am – 12pm


o    Distinguished Speaker | NIST – Advancing Cybersecurity Priorities


§  Matthew Scholl, Chief of the NIST Computer Security Division, Information Technology Lab


·         12pm – 12:30pm


o    Cross-Border Alliances


§  Cyrus R. Vance, Jr., District Attorney, New York County


·         12:30m – 1:30pm


o    Lunch Sponsored by DELL EMC


·         1:30– 2:00pm


o    Parallel Sessions


o    Panel | Cyber Security: An International Problem in Need of International Solutions


§  Marek Rusinkiewicz, Moderator


§  A Min Tjoa, professor, Vienna University of Technology, Austria


§  Wojciech Cellary, professor, Poznan University of Economics and Business, Poland


§  Leon S.L. Wang, distinguished professor and president, National University of Kaohsiung, Taiwan


o    Electro-Magnetic Pulse


§  Rien Chy, Operations Manager. Teaching and Learning Environment Department, Fordham University


§  Thaier Hayajneh, Director, Fordham Center on Cybersecurity


§  Damianos (Tom) Pinou, Director, Data Center Operations. BITS


o    The Perfect Host: Avalanche Infrastructure and GozNym Malware


§  Samantha Shelnick, Special Agent, Federal Bureau of Investigation


§  Brian Stevens, Special Agent, Federal Bureau of Investigation


o    Incident Response:  The Right Way and the Wrong Way


§  Bart R. McDonough, CEO and Founder, Agio


§  Ray Hillen, Managing Director of Cybersecurity, Agio


·         2:00 – 2:30pm


o    Parallel Sessions


o    Panel | | Cyber Security: An International Problem in Need of International Solutions (continues)


o    The continued encryption of mobile devices: or, what other shenanigans is Apple up to?


§  Stephen Flatley


§  Senior Forensic Examiner, FBI, New York


o    Lessons from a Cyber Range:  1 Year at the IBM X-Force Command Center


§  Christopher C. Crummey, Executive Director, IBM Security X-Force Evangelism and Outreach


·         2:30 – 2:45 p.m.


o    Coffee Break, Sponsored by Noblis


·          


·         2:45pm – 3:15pm


o    Censored Planet:  Measuring Internet Censorship Globally and Continuously


§  Benjamin Vandersloot, Computer Science and Engineering Department, University of Michigan


·         3:15 pm – 3:45pm


o    Cyber Security Fusion Centers –Reaching their Full Potential


§  Larry Zelvin, Global Head of Cyber Security, Citi


·         3:45pm – 4:15pm


o    Keynote Address


§  Scott Smith, Assistant Director, Cyber Division, Federal Bureau of Investigation


·         4:15 pm – 4:30 pm


o    Coffee Break, Sponsored by Noblis


·         4:30 pm – 5:30pm


o    Distinguished Panel | International Law Enforcement


§  Tom Grasso, FBI Cyber Division, Moderator


§  Mark Flynn, Royal Canadian Mounted Police


§  Michiel Kok, Dutch NHTCU


§  Will Lyne, National Crime Agency


§  Heiko Lohr, BKA, Germany


§  Steve Wilson, Europol Cyber Crime Center (EC3)


·         5:30pm – 7:30pm


o    Reception, Sponsored by IBM Security


·         8:00am – 3:00pm


o    Registration Continues:


§  International Conference on Cyber Security (ICCS)


o    Sponsor Exhibits / Coffee / Water / Snacks / General Information?


·         8:00am – 9:00am


o    Continental Breakfast?


·         9:00am – 9:45am


o    Keynote Address


§  Rob Joyce, Special Assistant to the President and Cyber Security Coordinator, the White House


·         9:45am – 11:00 am


o    Distinguished Panel | Connectivity and Cyber Safety in Natural Disaster Zones.


§  Jake Schmitter, Senior Manager, North American Electric Reliability Corporation, moderator


§  Adam Marlatt, Founder Global Disaster Immediate Response Team


§  Keith Robertory, Director Embedded in FEMA, American Red Cross


§  Michael R. Singerr, AVP, Technology Security AT&T Chief Security Organization


§  Ron Snyder, Senior Network Engineer, Cisco Tactical Operations


·         11:00am


o    Coffee Break: Sponsored by Noblis


·         11:00a.m. – 11:30 a.m.


o    Targeting the Corporate Crown Jewels:  A View from In-House Counsel


§  Paul Rosen, Partner, Crowell & Moring, Moderator


§  Lynn Haaland, SVP, Deputy General Counsel, Global Compliance and Ethics, PepsiCo


§  Kevin Rothman, Chief Technology Counsel, American Express


·         11:30 am – 12:30 p.m.


o    Distinguished Panel | Critical Infrastructure: SWOT – Strengths, Weaknesses, Opportunities and Threats


§  William F. Sweeney, Jr., Assistant Director in Charge, FBI-NY, Moderator


§  Cameron Chehreh, COO/CTO, Dell EMC Federal


§  Max Everett, Chief Information Officer, Department of Energy


§  Kevin L. Perkins, Vice President and CSO, Exelon


§  Marc Schneider, Principal Cybersecurity Engineer, MITRE


·         12:30pm – 1:30pm


o    Lunch sponsored by DELL EMC


o    ??1:30 pm – White Hat Sendoff




 

Source Article from https://www.freedomsphoenix.com/Media/233032-2018-01-16-01-16-18-theo-chino-on-the-intl-conference-on.htm?EdNo=001&From=RSS

01-16-18 — Theo Chino on the International Conference on Cyber-security — LISTEN LIVE on LRN.FM

Guests
Theo Chino

Topics
Bitcoin

Hour 1-2 – Theo Chino (NY Bit Licence Lawsuit) provides a re-cap on the International Conference on Cyber-security he recently attended; also an update on Morpheus and Bitcoin


Hour 3 – Headline News



CALL IN TO SHOW: 602-264-2800



-30-



Feature Article  •  Global Edition
Freedom’s Phoenix
Declare Your Independence APP now on Google Play 
Donna Hancock

   Listen to any recent show of “Declare Your Independence” at the click of a button!

 

 


 


Janaury 16th, 2018


Declare Your Independence with Ernest Hancock


on LRN.FM / Monday – Friday


9 a.m. – Noon (EST)


Studio Line: 602-264-2800 


 







Hour 1


Theo Chino


Chino v. Dept. of Financial Services, Index # 101880-15 challenging New York’s bitcoin regulation…


Article 78  Against NYDFS – A Lawsuit Against the Executive Branch Overreach


https://www.article78againstnydfs.com/


================================


Other Webpages:


@theochino (Twitter)


BIO: Royal Pain in the Ass for a Better World.


French:  


Spanish: 


Bitcoin:  


Geek: 


 


==========================



Theo’s previous interviews on the Declare Your Independence with Ernest Hancock Radio Show:


https://www.freedomsphoenix.com/Guest-Page.htm?No=01451


==========================


 



http://iccs.fordham.edu/


Overview


More than 2,000 professionals from 60 countries around the world met at the International Conference on Cyber Security 2009, 2010, 2012, 2013, 2015 and 2016 to discuss the world’s greatest emerging cyber threats. This January 2018, the Federal Bureau of Investigation and Fordham University will collaborate again to host the seventh International Conference on Cyber Security (ICCS 2018) in New York City, the information center of the world. ICCS 2018 will be another unparalleled opportunity bringing together global leaders in emerging cyber threat analysis, operations, and enforcement. With the number of cyber threats escalating worldwide, the need for comprehensive security analysis, assessment, and actions have reached a critical juncture. Join us at ICCS 2018 for a firsthand opportunity to discover and share critical intelligence on issues shaping the future of cyber security.


ICCS 2018 will consist of three days, filled with 50 unique lectures from keynote, distinguished, plenary, and parallel speakers in the disciplines of emerging technologies, operations and enforcement, and real life experiences. Also included are a Cyber Security Tutorial, a Law Enforcement Workshop, panel discussions, sponsors’ exhibitions, and exceptional networking opportunities. 



2018 Program & Schedule



·         10:00am – 1:00pm


o    ?Registration Opens for Law Enforcement Workshop and Cyber Security Tutorial


·         1:00pm – 6:00pm


o    Registration Opens for the International Conference on Cyber Security


·         1:00pm – 4:00pm


o    Law Enforcement Workshop (LEW)


·         1:00pm – 4:00pm


o    Cyber Security Tutorial (CST)


·         4:00pm – 7:00pm


o    Welcoming Reception


o    Distribution of Conference Materials


·         8:00am – 5:00pm


o    Registration Open for International Conference on Cyber Security


o    Sponsor Exhibits / Coffee / Water / Snacks / General Information?


·         8:00am – 9:00am


o    Continental Breakfast?


·         9:00am – 10:00am


o    Opening Ceremony


§  Christopher A. Wray, Director, Federal Bureau of Investigation


§  Joseph M. McShane, S.J., President, Fordham University


§  William F. Sweeney, Jr., Assistant Director in Charge, Federal Bureau of Investigation, New York Division


§  Session Chair: William F. Baker, President Emeritus, Channel Thirteen/WNET, Claudio Acquaviva, S.J. Chair and Journalist in Residence, Fordham University


·         10:00am – 10:45 am


o    Distinguished Speaker | Disinformation, Manipulation and the New Age of Warfare


§  Jared Cohen


§  CEO of Jigsaw, Advisory to the Executive Chairman, Alphabet Inc.


·         10:45am – 11:00 am


o    Coffee Break?: Sponsored by Cyxtera


·         11:00 am – 11:30 am


o    e-Estonia is it for e-Everybody?


§  Erkki Koort, Deputy Secretary General, Internal Security Policy, Estonia


·         11:30 am – 12:30 pm


o    Distinguished Panel | Insider Risk and Critical Pathway Analysis


§  Ed Stroz


§  Co-Founder and President Stroz Friedberg (an Aon Company), Moderator


§  Lonny Anderson


§  Executive Vice President, Feddata


§  Paul Calatayud


§  Regional Chief Security Officer, Palo Alto Networks – the Americas


§  Edward Shaw, Ph.D.


§  Clinical Psychologist and Founder, Insider Risk Group


·         12:30pm – 1:30pm


o    Lunch:  Sponsored by DELL EMC


·         ?1:30pm – 2:00pm


o    Parallel Sessions


o    Panel | Blockchain and Security


§  Anthony G. Vigilante; Managing Director and Head of the Global Information Technology, MacKay Shields, Moderator


§  Joseph Lubin, Founder and CEO, ConsenSys


§  Mike Maloney, Vestchain


§  Benjamin Nadareski, Global Business Development Team, R3


§  Joel Weight. CTO,  Medici Venture


§  Benjamin Elliott, Supervisory Special Agent, FBI


o    “Operation Bayonet:”  The International Effort to Dismantle AlphaBay


§  Special Agent Nicholas G. Phirippidis


o    ?Identifying Social Network Users from their Online Behavior


§  Marina Gavrilova, Department of Computer Science, University of Calgary


o    The “Hidden Empires” of Malware


§  Dave Herrald, Security Architect, Splunk


§  Ryan Kovar, Staff Security Strategiest, Splunk


·          


·         2:00pm – 2:30pm


o    Parallel Sessions


o    Panel | Blockchain and Security  (Continues)


o    Operation Harbor … The hunt for the operator of Mirai’s Botnet #14


§  Mirko Manske, First Detective Chief Inspector, BKA


o    Attack Detection at Scale: Applying Machine Learning to Threat Detection


§  Michael Clifford, Principal Security and Data Scientist, Noblis


o    Current Technologies and Policies for Securing Law Enforcement Data in the Cloud and Locally


§  Scott Crouch, Co-Founder and CEO, Mark 43


§  Steve Okano, Vice President of Engineering and Product, Mark 43


·          


·         2:30pm – 2:45pm


o    Coffee Break: Sponsored by Cyxtera


·         2:45pm – 3:30 pm


o    Distinguished Speaker |The Web PKI in Practice and Malpractice


§  Bruce Maggs, Pelham Wilder Professor of Computer Science, Duke University, and Vice President for Research, Akamai Technologies


·          


·         ??3:30 pm – 4:15pm


o    Distinguished Speaker | How to Take a Cyber Punch and Keep Going:  The Case for Resiliency


§  Brigadier Gen. Gregory J. Touhill, Ret., President, Cyxtera Federal Group


·         ?4:15 pm – 4:30pm


o    Coffee Break: Sponsored by Cyxtera


·         ?4:30pm – 5:30pm


o    Distinguished Panel | The Human Element: Thinking Like the Enemy to Beat Them (At Their Own Game)


§  Richard T. Jacobs, Assistant Special Agent in-Charge, Cyber Branch, FBI-NY, Moderator


§  Louis E. Bladel III, Executive Director, Fraud Investigations & Dispute Services, Ernst & Young, LLP


§  Steve Hill, Managing Director, Global Operational Technology Risk, Credit Suisse


§  Marshall L. Miller, Litigation Department, Wachtell, Lipton, Rosen & Katz


·         5:30pm – 7:30pm


o    Reception:  Sponsored by Cyxtera


·         8:00am – 5:00pm


o    Registration Continues:


§  International Conference on Cyber Security (ICCS)


o    Sponsor Exhibits / Coffee / Water / Snacks / General Information?


·         8:00am – 9:00am


o    Continental Breakfast?


·         9:00am – 10:00am


o    Keynote Address


§  John O. Brennan


§  Former Director, Central Intelligence Agency


·         10:00am – 11:15am


o    Distinguished Panel | Secrecy and Defense


§  Michael J. Sulick, Former Director National Clandestine Service, moderator


§  General John M. Keane, US Army, Ret., President GSI Consulting, former Undersecretary United States Army


§  Ambassador Giampiero Massolo, CEO Fincantieri, S.P.A., and former Director – General, Department of Intelligence Security, Italy


§  Jeffrey A. Tricoli, Section Chief, Cyber Division, Federal Bureau of Investigation


·         11:15am – 11:30am


o    Coffee Break: Sponsored by Noblis


·         11:30am – 12pm


o    Distinguished Speaker | NIST – Advancing Cybersecurity Priorities


§  Matthew Scholl, Chief of the NIST Computer Security Division, Information Technology Lab


·         12pm – 12:30pm


o    Cross-Border Alliances


§  Cyrus R. Vance, Jr., District Attorney, New York County


·         12:30m – 1:30pm


o    Lunch Sponsored by DELL EMC


·         1:30– 2:00pm


o    Parallel Sessions


o    Panel | Cyber Security: An International Problem in Need of International Solutions


§  Marek Rusinkiewicz, Moderator


§  A Min Tjoa, professor, Vienna University of Technology, Austria


§  Wojciech Cellary, professor, Poznan University of Economics and Business, Poland


§  Leon S.L. Wang, distinguished professor and president, National University of Kaohsiung, Taiwan


o    Electro-Magnetic Pulse


§  Rien Chy, Operations Manager. Teaching and Learning Environment Department, Fordham University


§  Thaier Hayajneh, Director, Fordham Center on Cybersecurity


§  Damianos (Tom) Pinou, Director, Data Center Operations. BITS


o    The Perfect Host: Avalanche Infrastructure and GozNym Malware


§  Samantha Shelnick, Special Agent, Federal Bureau of Investigation


§  Brian Stevens, Special Agent, Federal Bureau of Investigation


o    Incident Response:  The Right Way and the Wrong Way


§  Bart R. McDonough, CEO and Founder, Agio


§  Ray Hillen, Managing Director of Cybersecurity, Agio


·         2:00 – 2:30pm


o    Parallel Sessions


o    Panel | | Cyber Security: An International Problem in Need of International Solutions (continues)


o    The continued encryption of mobile devices: or, what other shenanigans is Apple up to?


§  Stephen Flatley


§  Senior Forensic Examiner, FBI, New York


o    Lessons from a Cyber Range:  1 Year at the IBM X-Force Command Center


§  Christopher C. Crummey, Executive Director, IBM Security X-Force Evangelism and Outreach


·         2:30 – 2:45 p.m.


o    Coffee Break, Sponsored by Noblis


·          


·         2:45pm – 3:15pm


o    Censored Planet:  Measuring Internet Censorship Globally and Continuously


§  Benjamin Vandersloot, Computer Science and Engineering Department, University of Michigan


·         3:15 pm – 3:45pm


o    Cyber Security Fusion Centers –Reaching their Full Potential


§  Larry Zelvin, Global Head of Cyber Security, Citi


·         3:45pm – 4:15pm


o    Keynote Address


§  Scott Smith, Assistant Director, Cyber Division, Federal Bureau of Investigation


·         4:15 pm – 4:30 pm


o    Coffee Break, Sponsored by Noblis


·         4:30 pm – 5:30pm


o    Distinguished Panel | International Law Enforcement


§  Tom Grasso, FBI Cyber Division, Moderator


§  Mark Flynn, Royal Canadian Mounted Police


§  Michiel Kok, Dutch NHTCU


§  Will Lyne, National Crime Agency


§  Heiko Lohr, BKA, Germany


§  Steve Wilson, Europol Cyber Crime Center (EC3)


·         5:30pm – 7:30pm


o    Reception, Sponsored by IBM Security


·         8:00am – 3:00pm


o    Registration Continues:


§  International Conference on Cyber Security (ICCS)


o    Sponsor Exhibits / Coffee / Water / Snacks / General Information?


·         8:00am – 9:00am


o    Continental Breakfast?


·         9:00am – 9:45am


o    Keynote Address


§  Rob Joyce, Special Assistant to the President and Cyber Security Coordinator, the White House


·         9:45am – 11:00 am


o    Distinguished Panel | Connectivity and Cyber Safety in Natural Disaster Zones.


§  Jake Schmitter, Senior Manager, North American Electric Reliability Corporation, moderator


§  Adam Marlatt, Founder Global Disaster Immediate Response Team


§  Keith Robertory, Director Embedded in FEMA, American Red Cross


§  Michael R. Singerr, AVP, Technology Security AT&T Chief Security Organization


§  Ron Snyder, Senior Network Engineer, Cisco Tactical Operations


·         11:00am


o    Coffee Break: Sponsored by Noblis


·         11:00a.m. – 11:30 a.m.


o    Targeting the Corporate Crown Jewels:  A View from In-House Counsel


§  Paul Rosen, Partner, Crowell & Moring, Moderator


§  Lynn Haaland, SVP, Deputy General Counsel, Global Compliance and Ethics, PepsiCo


§  Kevin Rothman, Chief Technology Counsel, American Express


·         11:30 am – 12:30 p.m.


o    Distinguished Panel | Critical Infrastructure: SWOT – Strengths, Weaknesses, Opportunities and Threats


§  William F. Sweeney, Jr., Assistant Director in Charge, FBI-NY, Moderator


§  Cameron Chehreh, COO/CTO, Dell EMC Federal


§  Max Everett, Chief Information Officer, Department of Energy


§  Kevin L. Perkins, Vice President and CSO, Exelon


§  Marc Schneider, Principal Cybersecurity Engineer, MITRE


·         12:30pm – 1:30pm


o    Lunch sponsored by DELL EMC


o    ??1:30 pm – White Hat Sendoff




 

Source Article from https://www.freedomsphoenix.com/Media/233032-2018-01-16-01-16-18-theo-chino-on-the-international-conference-on.htm?EdNo=001&From=RSS

More cuts for Britain’s fading military as report concludes ‘cyber more important’

Military chiefs had hoped a national security review would decide extra cash should be given to the Ministry of Defence (MoD) in order to bolster its resources. But according to the paper, National Security Adviser Mark Sedwill claimed countering cyberattacks is more important than increasing defense capabilities.

Gavin Williamson, the new defence secretary replacing Michael Fallon, is due to meet Chancellor Philip Hammond to request an extra £2 billion (US$2.67 billion) a year to prevent further cuts to the already-strained department. He will make the request amid growing speculation of a Tory revolt against cost-saving plans that would see military personnel cut by 12,000 to 70,000.

International Trade Secretary Liam Fox has admitted there is a tense atmosphere among senior Tories over the government’s decision to slash the number of soldiers.

The minister for defense personnel, ex-soldier Tobias Elwood – hailed a hero in the Westminster attack as he ran to the rescue of killed PC Keith Palmer – has gone as far as threatening to resign amid suggestions of more cuts. He is understood to have expressed “deep discomfort” at proposals to cut resources.

“Former members of all three armed services, informed commentators, members of both Houses of Parliament and now a defense minister have all voiced their deepening anxieties about possible heavy cuts in the defense budget,” Elwood said, according to the Independent. “Reducing the army even further, cutting the Royal Marines and selling surface ships will fracture our defense capability.”

An MoD spokesman said: “We have the biggest defense budget in Europe and are one of very few countries to not only meet but exceed NATO’s 2 percent spending target.”

However, the MoD has been accused of “cooking the books” as items such as war pensions are also taken into account when calculating the UK’s spending on NATO.

“In the face of intensifying threats, we are contributing to the cross-government review of national security capabilities and looking at how we best spend the rising defense budget to protect our country,” the MoD spokesman added. “No decisions have been made and any discussion of the options is pure speculation.”

Source Article from https://www.rt.com/uk/411063-mod-cuts-defence-cyber/?utm_source=rss&utm_medium=rss&utm_campaign=RSS

Hello Big Brother: How The Israelis Are Arming the World With Sophisticated Cyber-weapons

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 5,795 other followers

Source Article from https://theuglytruth.wordpress.com/2017/10/26/hello-big-brother-how-the-israelis-are-arming-the-world-with-sophisticated-cyber-weapons/

N. Korea stole cyber tools from NSA, carried out WannaCry ransomware attack – Microsoft chief

Microsoft President Brad Smith told ITV that he believed “with great confidence” that North Korea was behind the worldwide WannaCry cyberattack. 

READ MORE: WannaCry hackers have not withdrawn any ransom bitcoin, surveillance shows

“I think at this point that all observers in the know have concluded that WannaCry was caused by North Korea using cyber tools or weapons that were stolen from the National Security Agency in the United States,” Smith said. 

According to Smith, over the last six months the world has “seen threats come to life… in new and more serious way.”

“We need governments to come together as they did in Geneva in 1949 and adopt a new digital Geneva Convention that makes clear that these cyber-attacks against civilians, especially in times of peace, are off-limits and a violation of international law,” he added.

There has been speculation that North Korea may have played a significant role in the WannaCry ransomware attack in May. Shortly after the hack, Neel Mehta, a prominent Google security researcher, revealed a resemblance between the code used in what is said to be an early version of WannaCry ransomware, and that in a hacker tool attributed to the notorious Lazarus Group in a Twitter post.

Russian cyber security firm Kaspersky Lab explained in a blog post that Mehta drew parallels between “a WannaCry cryptor sample from February 2017” and “a Lazarus APT [Advanced Persistent Threat] group sample from February 2015.”

The Lazarus Group is believed to be behind high-profile hacking attacks on SWIFT servers of banks, including an attempt to steal $851 million from Bangladesh Central Bank in February 2016.

However, Kaspersky researches said that the apparent use by the WannaCry attackers of similar code is not enough to come to definitive conclusions about its origin, as there is the possibility of it being a false flag operation.

READ MORE: Putin: Malware created by intelligence services can backfire on its creators

“Attribution can always be faked, as it’s only a matter of moving bytes around,” another renowned researcher, Matthieu Suiche from Comae Technologies, said at that time, as cited by Cyberscoop. 

In May, a South Korean government-commissioned report produced by the Financial Security Institute (FSI) said that North Korea was responsible for the attack on Sony’s entertainment business in 2014, which erased vast amounts of data while disseminating emails and personal data of employees, in addition to leaking pirated copies of upcoming film releases.

Source Article from https://www.rt.com/news/406680-microsoft-nkorea-hack-wannacry/?utm_source=rss&utm_medium=rss&utm_campaign=RSS

Setting the stage? Cyber security researchers claim single hacker could bring down German elections with ‘one click’

    

The upcoming federal elections in Germany later in September are extremely vulnerable to hacking according to multiple cyber security researchers, who claim that even with prior warning, the elections could become a “total loss.”

“The number of possible attacks and the severity of the vulnerabilities exceed our worst fears,”said Linus Neumann, spokesperson for the white hat hacking group the Chaos Computer Club (CCC).

Neumann claims that a sophisticated hack is not even necessary, citing a “one-click compromise” to manipulate results.

In federal elections in Germany, votes are cast using pen and paper and are then initially counted by hand but results could be manipulated by hackers as the totals from each constituency are broadcast and tallied up at a national level, predominantly using a piece of software known as PC Wahl.

Martin Tschirsich, a 29-year-old IT scientist, discovered a glaring vulnerability in the PC Wahl software.

“At some point, the results need to be typed in somewhere. And from then on, a lot of things can happen digitally,” Tschirsich told Spiegel Online.

The final results are said to be more difficult to tamper with, although the preliminary figures can be falsified, creating a false impression.

“If the final result was manipulated, it would be discovered immediately,” Tschirsich conceded.

While each state has its own specific preliminary voting rules and employs various methods to transmit them using the PC Wahl or equivalent software, telephone or even fax, the president of the Federal Statistical Office (Destatis), Dieter Sarreither, claims such manipulation would be “extremely unlikely,” reports The Local.

Despite the advanced warning, as 61.5 million eligible voters go to the polls at approximately 70,000 polling stations across the country on September 24, the integrity of Germany’s quasi-digital voting system has been severely undermined before a single vote has been cast.

The CCC pulled no punches in their independent analysis of Tschirsich’s claims, asserting that there are “a number of security problems and multiple practicable attack scenarios” in which “a state-funded team of hackers is not even necessary” to change the “vote totals across electoral district and state boundaries.”

A separate analysis carried out in the Netherlands on its voting software, IVU.elect, yielded similarly damning results, the CCC said.

“It is simply not the right millenium to quietly ignore IT-security problems in voting… Effective protective measures have been available for decades, there is no conceivable reason not to use them,” Neumann said.

Source Article from https://www.sott.net/article/361427-Setting-the-stage-Cyber-security-researchers-claim-single-hacker-could-bring-down-German-elections-with-one-click

Putin approves major international agreement targeting cyber-crime

The presidential order on accepting the Russian government’s proposal to join the cooperation agreement on fighting crime in the sphere of digital technology was posted on the official Russian web portal for legal information on Monday.

In the course of treaty negotiations, the Russian Interior Ministry should be allowed to introduce changes to the document that are not of fundamental character,” reads a part of the order.

The first agreement on cooperation in countering cybercrime was signed in the Belarusian capital Minsk in 2001. Now that more than a decade has passed it is obvious that the document needs adjustments and in late 2014 the parliamentary assembly of the CIS passed a new model law on information and data security which was then forwarded to national parliaments for scrutiny. The main objective of the model law is introducing single definitions to various forms and aspects of cybercrime that would allow police in various CIS countries to coordinate their operations effectively. 

In April this year Russian media reported that the Foreign Ministry had prepared a new UN convention on countering digital crime because it believes the current document could potentially threaten the sovereignty of independent states. The draft has already been presented to UN experts.

Moscow sees the new draft as a necessary replacement for the Budapest Convention of 2001, developed by the Council of Europe.

Russia is the only nation participating in the Council of Europe not to have signed the Budapest Convention. The main reason for this is that paragraph 32 of the convention allows trans-border access to stored computer data during cyber-crime investigations by the intelligence services of various nations.

Earlier this month Russian Prosecutor General Yuri Chaika estimated the damage inflicted by cyber-criminals in Russia in the first 6 months of 2017 at over US$18 million. He also said that the number of crimes committed in Russia with use of modern data technology increased sixfold in just three years – from 11000 in 2013 to 66000 in 2016 with authorities having already registered 40000 such crimes in the first six months of 2017.

The broad spectrum of illegal actions committed with the help of the internet and communication devices inflict considerable material damage and also target the security of the state,” Chaika said as he addressed the summit of the heads of BRICS nation prosecutor services.

Source Article from https://www.rt.com/politics/401172-putin-approves-major-international-agreement/?utm_source=rss&utm_medium=rss&utm_campaign=RSS

Advisory panel says “cyber 9/11” against critical infrastructure is extremely likely — why you need to prepare for it NOW

Image: Advisory panel says “cyber 9/11” against critical infrastructure is extremely likely — why you need to prepare for it NOWImage: Advisory panel says “cyber 9/11” against critical infrastructure is extremely likely — why you need to prepare for it NOW

(Natural News)
An industry advisory group just issued the latest dire warning regarding America’s extremely vulnerable critical infrastructure: We are living in “a pre-9/11 moment” and we’re running short on time to dramatically improve cyber security before someone — a nation-state, a terrorist group or a lone actor — decimates it.

As reported by NextGov, a new report that has been approved by the Department of Homeland Security’s National Infrastructure Advisory Council (NIAC) warns that cyber destruction of computer systems that control vital infrastructure like power grids, dams, waterways, air traffic control, transportation and the financial sector is inevitable without immediate efforts by government and the private sector to substantially boost efforts to protect those systems.

If they fail to do so, they will have missed a “narrow and fleeting window of opportunity before a watershed, 9/11-level cyberattack,” the report notes [pdf].

In order to prevent such an attack and prepare to defend against cyber attack, government and industry should be working on segregated, highly secure communication networks that are only used for crucial command-and-control systems, according to the report.

In addition, the federal government must also significantly ease up on requirements regarding the sharing of critical cyber threat data with the private sector and with other government agencies, the authors of the report recommended. (Related: This government energy report concludes that our power grid is highly vulnerable to failures that would cause mass die-offs of U.S. citizens.)

NextGov defined that further:

That includes more rapidly declassifying cyber threat information gathered by intelligence agencies so it can be shared broadly throughout critical infrastructure sectors and speeding up the process for granting security clearances to industry cyber leaders so they can review cyber threat information classified at the secret and top-secret levels.

In a perfect world, every critical infrastructure system and facility would have at least a pair of employees who have been cleared to the highest intelligence levels by the government, according to a recommendation by NIAC member Robert Carr, who is chief executive of Heartland Payment Systems and co-chairman of the report.

The authors looked at hundreds of previous studies and conducted interviews with 38 cyber experts, most of whom were involved in the energy and financial services industries.

The NIAC was formed in the wake of the 9/11 attacks and is currently tasked with providing DHS recommendations on improving the security of critical U.S. infrastructure, whether the risk is physical or cyber-related.

Sixteen areas of critical infrastructure have been identified by DHS as being vital to the proper functioning of the country. Besides the energy and financial sectors, DHS has identified airports, chemical plants, gas and oil facilities, water treatment plants and other industries as crucial.

But here’s why this report really should matter to you: Very little of what the NIAC is recommending is new. In fact, as NextGov reports, 11 recommendations contained in the NIAC report have been made in the past.

What’s also not new is the fact that for years experts have been warning of the potential for a cyber attack — a massive one like NIAC is currently warning about — against critical infrastructure. In 2010, for instance, former federal government cyber czar Richard Clarke, warned in his book Cyber War that our country’s Internet-based, electronically controlled infrastructure was at risk of destruction.

As Natural News reported last year:

He said then that both state and non-state actors had developed the capability to hack into U.S. government and private-sector systems and cause a level of destruction never before seen.

Now, years later — and after the U.S. government has spent hundreds of billions of dollars on defending the country — experts are still warning that the nation’s cyber-connected infrastructure, and especially U.S. power grids, remains vulnerable.

Here we are again.

President Donald J. Trump has made improving our cyber defenses a priority. But honestly, it will probably take a cyber 9/11 to get government and the private sector motivated enough to actually adopt the recommendations that people keep making to improve cyber defenses.

And while the next attack will be thwarted, that first one won’t be.

You should, therefore, already be preparing for the worst.

J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel.

Sources include:

NextGov.com

NaturalNews.com

USAToday.com

<!–

–>

Source Article from http://www.naturalnews.com/2017-08-22-advisory-panel-says-cyber-911-against-critical-infrastructure-is-extremely-likely-why-you-need-to-prepare-for-it-now.html

BRACING FOR “CYBER 9/11”

[7/24/17  JAMES CORBETT]  As Al-CIA-da become the “good guys” (again), and I-CIA-SIS starts to crumble, and the latest boogeymen fail to strike a chord of panic in a boogeyman-weary public (remember the fearsome Khorasan Group, anyone?), it is safe to say that the old Global War on Terror (GWoT) paradigm is falling by the wayside. Lucky for the multi-trillion-dollar global terror-industrial complex, then, that the spiffy new cyberterror paradigm is waiting in the wings to take its place!

But just as the fading GWoT paradigm requires a steady stream of (perceived) threats in order to justify the bloated budgets of the US intelligence and security apparatus, so, too, does this new cyberterror paradigm require a constant flow of (perceived) online threats to justify the bloated budgets of the US cybersecurity forces. And just as in the GWoT, every “failure” of cyber-intelligence and every “inadvertent” proliferation of cyber-weaponry gives the newly-created US Cyber Command an excuse to expand its role and take even bolder action in its quest to “fight the net.”

The GWoT and all of its attendant ills have been built on the back of that “catalyzing event”— our “new Pearl Harbor,” 9/11. So, naturally, the new cybersecurity establishment is waiting breathlessly for the “cyber 9/11” that will justify the complete crackdown and government takeover of the internet.

Unsurprisingly, the “cyber 9/11” meme stretches back almost to 9/11 itself. Back in 2003, even as the Pentagon was feverishly drafting its plans to “fight the net” as if it were “an enemy weapons system,” Mike McConnell, the ex-director of the National Security Agency (NSA), was fear-mongering over the possibility of a cyber attack “equivalent to the attack on the World Trade Center” if a new institution were not created to oversee cybersecurity. Since then, report after report has continued to use the horror of 9/11 as a way of fueling public hysteria over cyberterrorism.

Of course, many of you reading this editorial will already know the reason for the cyberterror frenzy: There is a pre-planned solution waiting in the wings to be revealed to the public after they have been prompted to respond to the next (virtual) false flag provocation. We don’t have to speculate on this point. In 2008, Harvard law professor Lawrence Lessig told a technology conference that a cyber equivalent of the Constitution-destroying Patriot Act is on the shelf, ready to be rubber stamped into law. All it requires is a “cyber 9/11” to make such legislation politically viable.

In effect, the advisors, agents and experts in the cybersecurity industry are waiting for a spectacular cyberterror attack to justify a crackdown on the internet. Their plans include “identity management” schemes like fingerprinting for internet access, which would put an end to the free internet.

So if we know the psychopaths in power need a cyber 9/11 to spring their iPatriot Act on the internet, the obvious questions are: Would the US and its cronies really do something like this? And who would be blamed?

The first question is easy enough to answer: Yes. Yes, they would do this. Case in point: Stuxnet.

Stuxnet was a computer worm that the US and Israel jointly created to target Iran’s uranium enrichment facilities at Natanz. And as we have since learned, Stuxnet was only one part of a much larger cyberattack against Iran, jointly launched by the US and Israel and dubbed “NITRO ZEUS.” Although Stuxnet was intended to be the cyber equivalent of a precision-guided bomb, only capable of damaging the specific computer systems it was intended to target, it quickly escaped the computer systems at Natanz and spread across the internet. Oops. Hope that kind of cyberweaponry doesn’t end up in the hands of one of our “enemies.” That might lead to a cyber 9/11!

And wouldn’t you know it? Other attempts to contain the tools in the Pentagon’s cyber-armory have been similarly unsuccessful.

In 2016 it was revealed that the NSA had not only found security vulnerabilities in numerous software and hardware products but, in direct contradiction to its earlier assurances, had failed to inform the vendors of these problems so they could properly secure their product. Instead, the NSA has been hoarding those exploits so it can gain backdoor access to the computer systems of targeted governments and individuals. As cybersecurity researchers warned at the time, this practice ultimately increases the likelihood that these vulnerabilities will be discovered by criminals, hackers and terrorists somewhere down the line. With the spread of the WannaCry ransomware of 2017, itself made possible by an exploit stolen from the NSA, these fears were realized.

Boy, sure hope this technology doesn’t end up in the hands of the enemies! They might use it to inflict a Cyber Pearl Harbor attack on us!

And who are the enemies, exactly?

Why, the Russians, of course! It’s the Russians! It’s always the Russians! Did you stub your toe on a chair this morning? The Russians rearranged your furniture while you were sleeping! Only mismatched socks left in your sock drawer? That’s because the Russians were rummaging through there last night! And if you get hacked? Well you better believe that’s the Russians!

In fact, even if you don’t get hacked, you can just say it was Russian hackers, and millions will believe you unquestioningly. Just ask Hillary and the DNC.

As we’ve already seen, the “intelligence reports” that have been released so far detailing Russian “election hacking” have been completely evidence-free exercises in political mendacity (but I repeat myself). In fact, we’re not even taking the intelligence agencies’ word for it, because they are taking the DNC’s word for it. Never forget: The DNC refused to hand over its servers to the FBI for examination.

Now, to be fair, it is possible to imagine a universe without contradiction in which the Russians hacked into the DNC to expose their emails to the world. I mean, there’s no evidence whatsoever that that’s what happened, but it’s not impossible to imagine it happening. However, as the meme-sphere has rightly pointed out, even if that did happen, it only means that the Russians rigged the election by exposing how the DNC rigged the election. Hmmm…seems the “I’m Still With Her” crowd haven’t quite thought this one through.

Of course, this isn’t about only the DNC hack or the Podesta spearphishing. Rather, this is a now-familiar cycle in which the #fakenews MSM identifies a hack, worm or cyberattack, immediately blames the Russians in ALL CAPS headlines on the front page, and buries the inevitable retraction in small print at the bottom of page B27 (or the internet equivalent thereof). If you think I’m joking, read MoonOfAlabama’s excellent summary of how this has happened over and over and over and over and over again in the past year.

But as ludicrous as the neo-McCarthyite hysteria has become in recent months, perhaps it reached peak pitch last month in the Qatar crisis. Readers of my column about that crisis will remember how this latest spat in the Gulf (ostensibly) started: The Qatari Emir threw shade at the UAE, Bahrain, Egypt and the Saudis, accusing them of smearing the Qataris and their Muslim Brotherhood/Iranian/Hamas/Hezbollah allies and friends. Or at least that’s what was reported in a curious little piece on the Qatari News Agency website—a piece that was yanked down within half an hour.

The Qataris’ immediate explanation for this swiftly-retracted report? Hackers had broken in and planted the story on their site. Things being what they are, the FBI immediately turned around and blamed those dastardly Russian hackers, and the government’s lapdog MSM dutifully regurgitated this unproven assertion without challenge.

The Russians? The Russians planted a fake news story on the QNA website in order to get the Saudis mad at the Qataris? Really?

No, not really. I know you’re not going to believe this, but the self-same FBI that so confidently pointed the finger at Russia now believes with absolute confidence that it was in fact the UAE that hacked the QNA site. I mean, let’s be clear: The feds are probably wrong about this assertion, too, but it just goes to show how seriously we should take their finger-pointing.

All this flip-flopping raises the question of how the FBI—or the CIA, for that matter—determines culpability for a cyber attack in the first place. There are a number of methods for doing this, of course, from the ridiculously circular (“We attributed this type of attack to Group X in the past, so it must be Group X this time!”) to the just plain ridiculous (“Look! Russian language and references to old KGB chiefs! Clearly those sneaky Russkies forgetting to hide their tracks!”). But then the CIA’s secret tool for disguising their own hacks to look like it came from another country’s government gets exposed, and we’re back to credulously taking the word of the spooks as gospel when they say they never have and never would use such a deceptive tactic (pinky swear!).

In part, the unreliable intel points to the fundamental problem of attribution in the age of cyberterror. It’s one thing to attribute a physical attack to an enemy. In the wake of a bombing or hijacking or other physical attack, there is at least some forensic evidence left behind, some money trail for investigators to follow. I mean, those records can be faked, too, of course, but at least there’s something for outside investigators to scrutinize. But in the cyber sphere, there’s nothing at all for anyone to examine. The only people who have any chance of figuring out what actually happened during a cyberattack are the ones with direct access to the server logs, and even those logs can be corrupted, faked or manipulated in various ways. In the end, it amounts to: “Trust the intelligence agencies! Have they ever lied to you?”

If I really have to answer that question for you, you’re probably not a true Corbett Reporteer. If you do know that the intelligence agencies have lied to you, that they have created and spread cyberweapons in the past, that false flag attacks are used to blame political enemies, and that Russia is being set up to take the fall for the upcoming “Cyber 9/11,” then you’ll know what to think when you see the big New Pearl Harbor 2.0 unfolding before you.

RELATED: Take the quiz: which of these 3 drinks reverses hair loss?

But your friends and neighbors probably won’t. Perhaps you can share some of this information with them before events unfold, so they’ll be forewarned about what’s coming.

Source Article from http://govtslaves.info/bracing-cyber-911/