DefDog: Is DHS Stupid, Dishonest, or Both? + RECAP

Corruption, Government, IO Impotency, Military

Is this more of the same as the alleged attack planning on the Saudi

Stuxnet Clone Found Possibly Preparing Power Plant Attacks

Security researchers have detected a new Trojan, scarily similar to the infamous Stuxnet worm, which could disrupt computers controlling power plants, oil refineries and other critical infrastructure networks.

The Trojan, dubbed “Duqu” by the security firm Symantec, appears, based on its code, to have been written by the same authors as the Stuxnet worm, which last July was used to cripple an Iranian nuclear-fuel processing plant.

“Stuxnet source code is not out there,” wrote F-Secure cybersecurity expert Mikko Hyppönen on his firm's blog. “Only the original authors have it. So, this new backdoor was created by the same party that created Stuxnet.”

. . . . . . .

This new entry into the Stuxnet family comes just after the Department of Homeland Security (DHS) issued a bulletin warning that the notorious hacking group Anonymous may soon start looking to bring down or disrupt industrial control facilities. Posted yesterday (Oct. 18) to, the unclassified bulletin assesses Anonymous' ability to compromise SCADA systems that run power plants, chemical plants, oil refineries and other industrial facilities.

Government officials did not blame Anonymous for any such hacks, and the bulletin says that based on available information, Anonymous has “a limited ability to conduct attacks” on industrial control systems.

The group's agenda could change, however. The DHS document cites several recent actions, including Anonymous' cyberattack on the websites and servers of biotech seed company Monsanto, as proof that Anonymous could “develop capabilities to gain access and trespass on control system networks very quickly.”

Read full article.

Phi Beta Iota:  We realize DHS will not be held responsible for being stupid or dishonest or both, but for the record:

1.  Stuxnet is said to be an Israeli/US operation against Iran.  If it is out within the USA, there are two possibilities, both equally viable; a) the Israelis are doing their usual mayhem against the US which they consider like a Christian girl, as in “shicksas don't count;” and b) it got away from NSA/Cyber-Command or NSA/Cyber-Command is setting the stage for a false flag attack to increase or protect its grossly excessive budget.

2.  Anonymous is not after critical infrastructures–Anonymous, like Wikileaks and OccupyWallStreet (OWS) is after institutionalized secular corruption, in which context Monsanto makes perfect sense….along with the Federal Reserve, the International Monetary Fund, and the World Bank.

3.  Robert Steele, Bill Caelli, Winn Schwartau, and Jim Anderson all told Marty Harris at the National Information Infrastructure (NII), in writing, in 1994, what needed to be done, and were ignored.  The fact that the US Government has been both ignorant and dishonest all these years about the total vulnerability of all SCADA (Supervisory Control and Data Acqusition) systems is not something that can be blamed on Anonymous.

See Also:

1994 Sounding the Alarm on Cyber-Security

2011 Cyber-Command or IO 21 + IO Roots

Cofer Black: Hackers Evil, Pay Me… + Hackers RECAP

Cyber-Virus Proliferation: USG as “Main Enemy”

DefDog: Cyber-Command Can’t Find Ball…

DefDog: US Army Blows Intelligence Computing (Again)…

FBI Wages Its Own Cyberwar on Zombie PCs

Future of Information Operations (IO) — Potpourri

IMF: Cyber-Militia Flexing Its Muscles?

Gunnar Peterson on Robert Garigue’s Last Briefing

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Journal: Cyber-Heist 2nd Generation

Journal: Information Security Seven Guiding Principles

Journal: Life in Industrial-Era Cyber-space–a Snap-Shot

Journal: Pentagon as VERY Slow Learner….

Journal: Reflections on Integrity UPDATED + Integrity RECAP

Journal: Strong Signals–Las Vegas as Next 9/11

Journal: US Public Health InfoTech NOT….

Journal: Who Controls (and Secures) the Internet?

Mario Profaca: US Lacks Cyber-Intelligence + RECAP

Reference: Advanced Cyber-IO (First Cut)

Reference: Bruce Schneier on Cyber War & Cyber Crime

Reference: Empire of Lies & Secrecy

Reference: Joe Nye on Cyber-Power

Review: Cyberpower and National Security

Robert Garigue & Robert Steele: From Old IO to New IO

Robert Garigue: Carleton University Research Page

Robert Garigue: Early Work on Information Warfare (1995)

Robert Garigue: Evolution of Cyber-Space

Robert Garigue: Feedback for Dynamic System Change

Robert Garigue: Information Security MANDATE

Robert Garigue on Advanced Information Operations

Robert Garigue: Role of the Chief Information Security Officer

Robert Garigue: Security as the Guarantor of Values Executed by Systems–Security as Truth & Trust

Robert Garigue: Security Services versus IT Processes

Robert Garigue: Standards Toward Interoperability

Robert Garigue: Strategic Evolution of Information Security

Robert Garigue: Structuring Risks (Role of Security)

Robert Garigue: The Evolving Role of the Chief Information Security Officer within the new structures of Information Systems

Robert Garigue: The New Information Security Agenda–Managing the Emerging Semantic Risks

Robert Garigue: The Next Long Wave of Innovation

Robert Garigue: Three Information Security Domains–the Physical (Old), the Process (Current), and the Content (Future)

Robert Garigue: Truth & Trust as Security Requirements

Robert Garigue: When Everything Else is Distributed….

Robert Steele: Ignored 1994, Ignored 2011–Deja Vu

Robert Steele: Secrecy, Self-Restraint, & Democracy Done in By Elites and “Experts”

Rules for Governing Cyber-Conflict

TDL-4 Rules–Industrial Era Governments Helpless

Search: cybersecurity 1994

Search: Steele USMC C4I 1990′s

Undersea Cables: The Achilles Heel of our Economies

US Arms Industry Bleeding Secrets–This Is Not New

Who’s Who in Cyber-Intelligence: Robert Garigue

Financial Liberty at Risk-728x90