Russia’ Hacking.

Robert Massimi.

The 80’s called and they want there foreign policy back is what Barack Obama told Mitt Romney in there last debate. Well the 2000’s are here and Russia is still our biggest foe. Out of touch Obama could have taken precautions that eliminated the problems that we face today but he did nothing about it only telling Putin in a meeting to cut it out. Yeah, that worked. Today, Russia and China continue to hack into our businesses, our military, our energy and peoples personal identifications.

Russia it appears will always be our enemy, China, however, was given there strength because we gave them a world stage by shipping our jobs there. Today China holds onto a vast amount of our debt and could pull the plug on that whenever they want to. We have let two Geo political foes get strong, one which has always been there, another one we created.

The big issue is how do we prevent this from continually recurring? We need to spend billions each year on cyber security and we still are at a loss. R&D, which corporations spend millions on is at a loss and a disadvantage. Companies who have facilities in China have to play by there rules and essentially allow China to see what they are doing by way of research and development. Nike makes sneakers for instance only to see a much cheaper knock off compete with there product. Other companies who went to China to produce goods cheaper are waking up to the fact that in the long run, maybe it was better to have stayed here.

The bottom line is that we need to reel in these countries that hack us and make them pay with stricked sanctions and other means to cripple there economies. We must invent full proof firewalls that protect business, the military and the government or all the research, brain power will be for naught.

Putin

Russia

China

U.S.Government

Trump

Hacking

Santions

Energy

.

https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=32&ndec=1&cid=8CUF1VN4G&prvid=23%2C28%2C29%2C33%2C51%2C56%2C59%2C69%2C72%2C74%2C76%2C77%2C80%2C82%2C106&rtime=82&https=1

<iframe src=”//www.googletagmanager.com/ns.html?id=GTM-W9SLGS” height=”0″ width=”0″ style=”display:none;visibility:hidden”></iframe>

March 15, 2018 / 12:26 PM / Updated 7 hours ago

In a first, U.S. blames Russia for cyber attacks on energy grid

WASHINGTON (Reuters) – The Trump administration on Thursday blamed the Russian government for a campaign of cyber attacks stretching back at least two years that targeted the U.S. power grid, marking the first time the United States has publicly accused Moscow of hacking into American energy infrastructure.

Power lines are seen at the Tahoe-Reno Industrial Center in McCarran, Nevada, September 16, 2014. REUTERS/Max Whittaker

Beginning in March 2016, or possibly earlier, Russian government hackers sought to penetrate multiple U.S. critical infrastructure sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing, according to a U.S. security alert published Thursday.

The Department of Homeland Security and FBI said in the alert that a “multi-stage intrusion campaign by Russian government cyber actors” had targeted the networks of small commercial facilities “where they staged malware, conducted spear phishing, and gained remote access into energy sector networks.” The alert did not name facilities or companies targeted.

The direct condemnation of Moscow represented an escalation in the Trump administration’s attempts to deter Russia’s aggression in cyberspace, after senior U.S. intelligence officials said in recent weeks the Kremlin believes it can launch hacking operations against the West with impunity.

It coincided with a decision Thursday by the U.S. Treasury Department to impose sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the 2016 U.S. presidential election and other malicious cyber attacks.

Russia in the past has denied it has tried to hack into other countries’ infrastructure, and vowed on Thursday to retaliate for the new sanctions.

‘UNPRECEDENTED AND EXTRAORDINARY’

U.S. security officials have long warned that the United States may be vulnerable to debilitating cyber attacks from hostile adversaries. It was not clear what impact the attacks had on the firms that were targeted.

But Thursday’s alert provided a link to an analysis by the U.S. cyber security firm Symantec last fall that said a group it had dubbed Dragonfly had targeted energy companies in the United States and Europe and in some cases broke into the core systems that control the companies’ operations.

Malicious email campaigns dating back to late 2015 were used to gain entry into organizations in the United States, Turkey and Switzerland, and likely other countries, Symantec said at the time, though it did not name Russia as the culprit.

The decision by the United States to publicly attribute hacking attempts of American critical infrastructure was “unprecedented and extraordinary,” said Amit Yoran, a former U.S. official who founded DHS’s Computer Emergency Response Team.

“I have never seen anything like this,” said Yoran, now chief executive of the cyber firm Tenable, said.

A White House National Security Council spokesman did not respond when asked what specifically prompted the public blaming of Russia. U.S. officials have historically been reluctant to call out such activity in part because the United States also spies on infrastructure in other parts of the world.

News of the hacking campaign targeting U.S. power companies first surfaced in June in a confidential alert to industry that described attacks on industrial firms, including nuclear plants, but did not attribute blame.

An electrical line technician works on restoring power in Vilonia, Arkansas April 29, 2014. REUTERS/Carlo Allegri

“People sort of suspected Russia was behind it, but today’s statement from the U.S. government carries a lot of weight,” said Ben Read, manager for cyber espionage analysis with cyber security company FireEye Inc.

ENGINEERS TARGETED

The campaign targeted engineers and technical staff with access to industrial controls, suggesting the hackers were interested in disrupting operations, though FireEye has seen no evidence that they actually took that step, Read said.

A former senior DHS official familiar with the government response to the campaign said that Russia’s targeting of infrastructure networks dropped off after the publication in the fall of Symantec’s research and an October government alert, which detailed technical forensics about the hacking attempts but did not name Russia.

The official declined to say whether the campaign was still ongoing or provide specifics on which targets were breached, or how close hackers may have gotten to operational control systems.

“We did not see them cross into the control networks,” DHS cyber security official Rick Driggers told reporters at a dinner on Thursday evening.

Driggers said he was unaware of any cases of control networks being compromised in the United States and that the breaches were limited to business networks. But, he added, “We know that there is intent there.”

It was not clear what Russia’s motive was. Many cyber security experts and former U.S. officials say such behavior is generally espionage-oriented with the potential, if needed, for sabotage.

Russia has shown a willingness to leverage access into energy networks for damaging effect in the past. Kremlin-linked hackers were widely blamed for two attacks on the Ukrainian energy grid in 2015 and 2016, that caused temporary blackouts for hundreds of thousands of customers and were considered first-of-their-kind assaults.

Senator Maria Cantwell, the top Democrat on the Senate Energy and Natural Resources Committee, asked the Trump administration earlier this month to provide a threat assessment gauging Russian capabilities to breach the U.S. electric grid.

It was the third time Cantwell and other senators had asked for such a review. The administration has not yet responded, a spokesman for Cantwell’s office said on Thursday.

Last July, there were news reports that the Wolf Creek Nuclear Operating Corp, which operates a nuclear plant in Kansas, had been targeted by hackers from an unknown origin.

Spokeswoman Jenny Hageman declined to say at the time if the plant had been hacked but said that there had been no operational impact to the plant because operational computer systems were separate from the corporate network. Hageman on Thursday said the company does not comment on security matters.

John Keeley, a spokesman for the industry group the Nuclear Energy Institute, said: “There has been no successful cyber attack against any U.S. nuclear facility, including Wolf Creek.”

Reporting by Dustin Volz and Timothy Gardner, additional reporting by Jim Finkle; Editing by Tom Brown, Alistair Bell and Cynthia Osterman

1284 : 618

  • narrow-browser-and-phone
  • medium-browser-and-portrait-tablet
  • landscape-tablet
  • medium-wide-browser
  • wide-browser-and-larger
  • medium-browser-and-landscape-tablet
  • medium-wide-browser-and-larger
  • above-phone
  • portrait-tablet-and-above
  • above-portrait-tablet
  • landscape-tablet-and-above
  • landscape-tablet-and-medium-wide-browser
  • portrait-tablet-and-below
  • landscape-tablet-and-below

 


https://vars.hotjar.com/rcj-99d43ead6bdf30da8ed5ffcb4f17100c.html

Advertisements

Author: nobullwithragingrobert

Was a drama critic at Manhattan College. Wrote professionally for Bergen News, Sun Bulletin . Alpha Sigma Lambda, Beta Theta. Has seen over 600 shows worldwide, has published both on Theater and Politics. Avid reader on many subjects and writers. Chief Drama critic for Metropolitan magazine. Writes for Jerrick media, American conservative, The City Journal and Reason magazine. Has produced shows both on and off Broadway.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s