“Stuxnet, it is a weapon, it’s not ‘like’ a weapon,” says German computer security expert Ralph Langner, who was the first to identify how the virus worked. “It is a weapon because it was designed to cause physical damage.”
“Malicious code could theoretically be used to manipulate the controls of pipelines, water purification systems, power generators and other critical infrastructure, resulting in real-world physical damage. That could mean blackouts or disruptions to an entire city’s water supply. In short, it could be catastrophic.”
“Pretty interesting petition considering that not just one or two, but several of the mass shooters and others who suddenly attempted to break into the White House in the last couple of years all have one thing in common: they all either claimed they were being attacked with directed energy weapons by the government and hearing voices directed into their heads with such weapons — technology that indeed exists — or that they could suddenly magically hear Obama’s voice in their heads telepathically in the weeks leading up to these events.”
“It was revealed that the State Department had played a close role in the film, and particularly the decision to keep the final and extremely gruesome death scene. The emails between Sony’s CEO and a security consultant also suggest that the US government itself had supported the idea of using The Interview as propaganda against North Korea.”
“The health insurer, billed as the second largest in the country, announced late Wednesday that it had suffered a breach that may have exposed data on as many as 80 million current and former customers, including names, Social Security numbers, birth dates, addresses and income data. Data for employees of Anthem Blue Cross were also in the database the hackers breached.”
“These Facebook warriors will be using similar atypical tactics, through non-violent means, to fight their adversary. This will mainly be achieved through “reflexive control,” an old Soviet tactic of spreading specifically curated information in order to get your opponent to react in the exact way you want them to. It’s a pretty tricky trick, and the British army will be doing just that with 1,500-person (or more) troop using Twitter and Facebook as a means to spread disinformation, real war truths, and “false flag” incidents as well as just general intelligence gathering. The 77th battalion will reportedly begin operations in April.”
A LYING-brigade. With hackers. I don’t like that much.
“They grew up on Google and wear ponytails. We need to look at ways to bring them into the Army without necessarily going through the same training procedures as our combat troops,” the US commander added.
“Addressing the future cyber regiments recruiters, the expert emphasizes that they should provide the talented youths with new and exciting opportunities, as well as get prepared for inevitable “frictions” and cultural “clashes” with the “Google” generation. The recruiters should choose the best and brightest among the candidates, since “the pain is only worth the gain for going after truly extraordinary talent,” the expert stresses.”
“The suspected mastermind of the online drug emporium Silk Road is facing the prospect of spending the rest of his life in prison after a jury returned a guilty verdict at the end of a four-week trial that revealed a plethora of detail about US investigations into the use of the bitcoin digital currency for drug trafficking and other crimes.”