The European Tribune is a forum for thoughtful dialogue of European and international issues. You are invited to post comments and your own articles.
Please REGISTER to post.
Im Juni 2022 fand in der Ostsee das #BALTOPS22 Manöver der #NATO statt.Dabei wurden neue #Seeminen u.a. durch Spezialisten der #USNavy im Bereich um #Bornholm getestet.Ob das irgendetwas mit der #Explosion der #Nordstream #Pipeline Is zu tun hat? Tja, wir wissen es nicht. pic.twitter.com/Gy8vBJxxsn— Dr. David Lütke (@DrLuetke) September 27, 2022
Im Juni 2022 fand in der Ostsee das #BALTOPS22 Manöver der #NATO statt.Dabei wurden neue #Seeminen u.a. durch Spezialisten der #USNavy im Bereich um #Bornholm getestet.Ob das irgendetwas mit der #Explosion der #Nordstream #Pipeline Is zu tun hat? Tja, wir wissen es nicht. pic.twitter.com/Gy8vBJxxsn
Symantech Research Labs among other ISVs received binary samples from multiple sources within their client networks—worldwide. Interviews with "cybersecurity" vendors recall decoding line by line: Immediate consensus attribute-free, self-executing routines confirmed state-sponsored dev. A month in, aside from counterfeit MSFT digital certificate traced to Taiwan, finding Siemens OS fragments and PLC hardware IDs in the code. Uncertain how to relate the significance of these keys, they resorted to "geopolitical news" reconnaisance to trace checksum operators to anamalous control system events anywhere that preceded the Iran reactor crash. Guess what? Multiple explosions of gas pipelines transiting Iran.
Now, I ask you. Is it any wonder Gazprom did not accept "refurbished" Nord Stream 1 turbines from Canada? Is it any wonder US Treasury, last Friday, licensed Starlink "internet" satellite service for "social media" users in Iran? Is gov.in now pushes for home-grown navigation system any wonder?
Malware infection of industrial control systems kills people.
The Paper: Yesterday, China's National Computer Virus Emergency Response Center released a new investigation report on the cyber attacks by the US National Security Agency (NSA). The report detailed how the NSA's Office of Tailored Access Operation (TAO) controls key infrastructure facilities in China and infiltrates into China's Northwestern Polytechnical University's internal network by using servers in countries such as the Netherlands and Denmark to host cyber weapons through stepping-stone attack via Japan, Germany, the ROK and other countries. This enabled the TAO [not that one, the other one] to steal sensitive data including user names and passwords, identification verification data, system logs, access information, files and documents, and network configuration, and information of people with sensitive identities. The US also secretly controls the telecom carriers < wipes tears > of at least 80 countries and conducts indiscriminate wiretapping on global telecom users. Do you have any comment?
Wang Wenbin: This is the third investigation report issued by the relevant Chinese institution this month on the US National Security Agency's malicious cyber attack on China's Northwestern Polytechnical University. It has revealed more evidence of massive cyber attacks by the US security agency against China. China has in recent weeks demanded explanation from the US and asked it to immediately stop illegal action through various channels. So far, however, the US has been silent. The US could not have been more bombastic and motivated when propagating the lies about "Chinese hackers", yet it has deliberately chosen to be blind and mute in the face of the solid evidence collected by the Chinese institution. What exactly is the US hiding from the world? ...
China has in recent weeks demanded explanation from the US and asked it to immediately stop illegal action through various channels. So far, however, the US has been silent. The US could not have been more bombastic and motivated when propagating the lies about "Chinese hackers", yet it has deliberately chosen to be blind and mute in the face of the solid evidence collected by the Chinese institution. What exactly is the US hiding from the world? ...
STUXNET US-Israel Cooperation Cyber Warfare on Iran | @BooMan by Oui on May 31, 2011 | F-secure Q&A analysis of stuxnet computer worm effects Siemens Process Controllers Apparently the stuxnet worm did most harm in the ultra-centrifuges plant at Natanz in Iran. (New York Times) - In early 2008 the German company Siemens cooperated with one of the United States' premier national laboratories, in Idaho, to identify the vulnerabilities of computer controllers that the company sells to operate industrial machinery around the world -- and that American intelligence agencies have identified as key equipment in Iran's enrichment facilities. Siemens says that program was part of routine efforts to secure its products against cyberattacks. Nonetheless, it gave the Idaho National Laboratory -- which is part of the Energy Department, responsible for America's nuclear arms -- the chance to identify well-hidden holes in the Siemens systems that were exploited the next year by Stuxnet. SIEMENS Automation Conference 2008 Control System Security Assessments (pdf) Presenters: Marty Edwards! Idaho National Laboratory Todd Stauffer, Siemens
F-secure Q&A analysis of stuxnet computer worm effects Siemens Process Controllers
Apparently the stuxnet worm did most harm in the ultra-centrifuges plant at Natanz in Iran.
(New York Times) - In early 2008 the German company Siemens cooperated with one of the United States' premier national laboratories, in Idaho, to identify the vulnerabilities of computer controllers that the company sells to operate industrial machinery around the world -- and that American intelligence agencies have identified as key equipment in Iran's enrichment facilities.
Siemens says that program was part of routine efforts to secure its products against cyberattacks. Nonetheless, it gave the Idaho National Laboratory -- which is part of the Energy Department, responsible for America's nuclear arms -- the chance to identify well-hidden holes in the Siemens systems that were exploited the next year by Stuxnet.
SIEMENS Automation Conference 2008 Control System Security Assessments (pdf)
Presenters: Marty Edwards! Idaho National Laboratory Todd Stauffer, Siemens
by Frank Schnittger - Feb 2 1 comment
by Frank Schnittger - Jan 26 3 comments
by Frank Schnittger - Jan 31 3 comments
by Frank Schnittger - Jan 22 3 comments
by Cat - Jan 25 61 comments
by Oui - Jan 9 21 comments
by Frank Schnittger - Jan 13 28 comments
by gmoke - Jan 20
by Oui - Feb 32 comments
by Frank Schnittger - Feb 21 comment
by Oui - Feb 225 comments
by Oui - Feb 14 comments
by Frank Schnittger - Jan 313 comments
by gmoke - Jan 29
by Oui - Jan 2731 comments
by Frank Schnittger - Jan 263 comments
by Cat - Jan 2561 comments
by Frank Schnittger - Jan 223 comments
by Oui - Jan 2110 comments
by Oui - Jan 21
by Oui - Jan 20
by Oui - Jan 1841 comments
by Oui - Jan 1591 comments
by Oui - Jan 145 comments
by Frank Schnittger - Jan 1328 comments
by Oui - Jan 1221 comments
by Oui - Jan 1120 comments