A marketplace for speech.
82,435 Hours of Speech
help
help
516,093 Transcriptions
add title (free)
add title (free)
406 Sources
add source €0.99
add source €0.99
Search:
Newsbud
Title: More Fake News: Russia Targets US Power Grid
Published: 2017-01-06
Source: https://www.youtube.com/watch?v=7iQbTDPJIp0
Title: More Fake News: Russia Targets US Power Grid
Published: 2017-01-06
Source: https://www.youtube.com/watch?v=7iQbTDPJIp0
1/31
we begin with our top story yet another cyber attack in the U. S. with possible ties to Russia this time the target is an electric utility in Vermont Burlington electric says malware code associated with the Russian hacking operation was found in one of its computers the company said it discovered the possible breach after the department of homeland security issued an alert to utility companies Thursday night2/31
it's not known when the code entered the computer of the Vermont utility but the discovery underscores just how vulnerable the nation's electric Glick grid is to potential hackers this episode should highlight the urgent need for federal government to vigorously pursue and put to an end the sort of Russian meddling I call upon the federal government to conduct a full and complete investigation of this incident and3/31
undertake remedies to ensure this never happens again if fake news is going to be effective it have to scare the American people the prospect of Russia taking down the power grid in the winner is pretty scary one officials in Vermont discovered malware on the laptop at Burlington electric the story went viral homeland security and intelligence officials said the code used by hackers is same code used4/31
in other grisly step operation grisly step is a name used by the government to identify the Russian campaign to disrupt the two thousand and sixteen election both the supposed Russian attempt to influence the election and the Vermont power grid attacked her fake news there is no evidence Russia tried to hack the election and the malware found on the laptop is not linked to Russia Vermont senator5/31
Patrick Leahy blamed the Russians posted to Senate website on December thirtieth saying Russians are behind the Vermont has he said they're trying to manipulate the graded shut down in the middle of winter the Washington post the grand master of establishment propaganda and fake news said Russia is responsible it reported code associated with Leslie Stapp was detected on the Vermont power grid system in fact I suppose6/31
it code was discovered on a laptop not connected to the power grid system the post later published an editor's note saying it incorrectly reported Russian hackers had gained access to the system the correction didn't stop the corporate media however from repeating the unsubstantiated accusation Russia is attacking America according to IT and cybersecurity experts the malware found on the Vermont electric laptop came from an outdated Ukrainian7/31
hacking tool word fancy cybersecurity firm that specializes in protecting web sites running wordpress published reports soon after the post ran with the Russian hack the station the company trains them our call to an outdated donation ware called P. A. asks weird fence also examined IP addresses provided by the department of homeland security and the director of national intelligence most came from unknown sources followed by the8/31
United States and Russia fifteen percent of the IP addresses are linked to a Tor exit node these are used by people who want to remain anonymous online or defense concluded the attacks probably didn't originate in Russia in two thousand thirteen it was reported Tories encryption was no match for the NSA towards funding came from the department of defense other contributors include the US state department and9/31
the National Science Foundation Tory admits it's software allowing users to go online anonymously may be compromised by the NSA well this is just emerged the German media people using toll and the cool projects basically what it does is it allows you to hide what web pages you looking out at protect emails that you send and now it several of the uses of the total of the10/31
operators of the toll projects have released a line of code from the NSA's infamous X. key school program that's the and the the software they use to look at what people are doing online now this coat shows to IP addresses here in Germany and and they ought to IP addresses that actually operate told that what they say is happening is at anybody that logs on to11/31
toll and has to use one of the service go straight into a database by the NSA and is labeled as an extremist evidence the software was compromised surfaced in two thousand and fourteen according to security researchers in a German television documentary the NSA used its X. key score database to capture information about people who use Tor and other privacy cyst the US government's use the threat12/31
of enemies attacking infrastructure numerous times since nine eleven terrorists criminals and other countries are getting ready for major cyber attacks against the United States speaking at a security conference in aspen Colorado justice department officials warned terrorists have said openly they want to use electronic attacks to do as much damage as possible to American infrastructure early last year department of homeland security intelligence report downplayed the threat13/31
of a cyber attack against the U. S. electrical grid three months later the DHS and the FBI began a nationwide program warning of the dangers utilities face from cyber attacks like the one used against Ukraine's power rated two thousand and seven DHS previously said the majority of malicious cyber attacks against energy companies are low level cybercrime that is likely opportunistic in nature rather than specifically aimed14/31
at the sector and it's financially or ideologically motivated and is not meant to be destructive it also said the over use of the term cyber attack risks what it calls alarm fatigue the report contradicts statements made by admiral Mike Rogers commander of the cyber command who warned that a major cyber attack by nation states against critical infrastructures poses a major security threat he said it was15/31
only a matter of time before a nation state or a terrorist group takes down the power grid like the attack in Ukraine Ukrainian authorities blamed Russia and network of bot nets for taking down the power grid Russian hacking to influence the American election has dominated the news but we've also noticed a hacking attack that could be a future menace to America last weekend parts of the16/31
Ukrainian capital Kiev went dark Holly Williams reports that Russia appear to have figured out how to crash a power grid with the click the two thousand and fifteen bill Clinton's former secretary of defense William Cohen said it is only a matter of time before a malicious cyber attack targeted the power grid in America a former CI a analyst added that a terror attack could wipe out17/31
the nation's power grid and kill as many as nine out of ten Americans two thousand and twelve former CIA bars James ballsy and others began pressuring state legislatures to force private sector companies to protect logical infrastructure against the catastrophic effect of an E. and P. or electro magnetic pulse the assumption is that North Korea or rogue elements within the government bull staging EMP and plunge civilization18/31
into the dark ages despite the hype and the Washington post's misleading story the fact is not one power station or network has been taken down by cyber attack rooms do more damage than Russians are ISIS terrorists they are responsible for an estimated two hundred power outages a year in the United states according to Sean McBride the lead analyst of critical infrastructure for eyesight it's easier to19/31
hack a laptop computer or a phone a power grid network buried in the avalanche of scary news stories about possible cyber attacks on critical infrastructure is the fact the US government is the biggest buyer of grey market tools also used by malicious hackers the tools are used primarily for offensive not defensive purposes according to a Reuters report posted in two thousand and thirteen fence contractors agency20/31
spend tens of millions of dollars a year on exploits produced by the cyber weapons industry in one instance the NSA repurposed a crime wave exploit kit developed by Russian hackers in another it reused malware developed by China the extent of the government's hacking activity was revealed last year when espionage tools created by the NSA's elite group of hackers showed up online government officials blame the Russians21/31
for the theft while others said the software was either intentionally or mistakenly released hackers from the shadow broker said they swiped the tools from the equation group secret cyber attack operation run out of the NSA I cover group is said to be the most sophisticated hacking group in the world according to the cyber security and anti virus provider Kaspersky lab's the NSA hackers are responsible for22/31
over five hundred malware infections in at least forty two countries in may be responsible for tens of thousands of more the targets included Iran Russia Pakistan Afghanistan India Syria and Mali so earlier today Ochs first came out the statement and they said that over the last %HESITATION brown decade and a half they've been my %HESITATION among dozens of different groups one that they're now calling equation23/31
now that that's an internal name given by Kaspersky in order to identify these actors in particular now according to Kaspersky %HESITATION the so called equation group has been responsible for infecting upwards of tens of thousands of computers going back to at least two thousand one perhaps as early as nineteen ninety six two thousand and ten the Stuxnet cyber weapon was discovered on any Ronnie and network24/31
controlling uranium centrifuges at than the taunts facility the warm change the speed of the centrifuges making enrichment impossible do you think it was an act of war I I would not call call it an act of war look at given my own background gave I mean I've got this whole universe of things between peace and war there called covert actions the following year Obama's coordinator for25/31
arms control and weapons of mass destruction said the administration was glad the Iranians were having problems with centrifuges he also acknowledge the US role in developing Stuxnet a two hundred and ten report by the telegraph revealed Israeli involvement and said the idea of considered the operation one of its greatest achievements Israel's unit eighty two hundred is believed produce malware in two thousand and thirteen the former26/31
NSA contractor Edward Snowden told a German newspaper the U. S. in Israel collaborated on the development of Stuxnet and a report published the previous year documented the NSA's role in creating the cyber weapon uhhuh we did steps it's so fucking close to still on the air it was huge multinational inter agency operates in October CIA and NSA director Michael Hayden admitted the U. S. hacks worn27/31
election the difference he told the heritage foundation is that the US doesn't weaponize attacking and Russia does we don't know for sure if the NSA and the CIA engage in electronic hacking of election results we do know however that between nineteen forty seven and nineteen eighty nine it tried to change foreign governments by covertly funding advising and spreading propaganda for its preferred candidates often doing so28/31
beyond a single election cycle it is also organizing orchestrated violent crews and the assassination of foreign leaders the CIA is a hit man for the ruling elite it's done their dirty work since the late nineteen forties propaganda machine is produced disinformation outright lies in bogus news stories for more than sixty years its report on baseless Russian hacking may be considered part of a soft coup effort29/31
to disqualify trump and install Clinton although it appears elements in the intelligence community sabotage Clinton do her carelessness with national security secrets the problem is not the portables voting for trump or the imaginary threat of white supremacists or even the dubious prospect of Russians hacking are supposedly democratic ally the national security state has swayed elections in one way or another for decades spite its best efforts30/31
the ruling elite were not able to swing the election this time as they have done repeatedly in the past it will now use the corporate media to attack the new president and work on scandals that can be used to impeach if you find the geo political report informative please consider making a contribution to news by we are one hundred percent people funded and don't take money