It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
On Wednesday, the Department of Energy, the Cybersecurity and Infrastructure Security Agency, the NSA, and the FBI jointly released an advisory about a new hacker toolset potentially capable of meddling with a wide range of industrial control system equipment.
More recently, the Russian hackers known as Sandworm, part of the Kremlin's GRU military intelligence agency, deployed a tool called Industroyer or Crash Override to trigger a blackout in the Ukrainian capital of Kyiv in late 2016.
The next year, Kremlin-linked hackers infected systems at the Saudi Arabian oil refinery Petro Rabigh with a piece of malware known as Triton or Trisis, which was designed to target its safety systems—with potentially catastrophic physical consequences—but instead triggered two shutdowns of the plant's operations.
PIPEDREAM (WIRED article)
CHERNOVITE’s PIPEDREAM Malware Targeting Industrial Control Systems (ICS)
PIPEDREAM is the seventh known industrial control system (ICS)-specific malware. The CHERNOVITE Activity Group (AG) developed PIPEDREAM. PIPEDREAM is a modular ICS attack framework that an adversary could leverage to cause disruption, degradation, and possibly even destruction depending on targets and the environment.
Dragos identified and analyzed PIPEDREAM’s capabilities through our normal business, independent research, and collaboration with various partners in early 2022. Dragos assesses with high confidence that PIPEDREAM has not yet been employed in the wild for destructive effects.
CHERNOVITE’s PIPEDREAM can execute 38 percent of known ICS attack techniques and 83 percent of known ICS attack tactics.1
PIPEDREAM accomplishes this far-reaching impact through a series of five components that Dragos labels:
✅ EVILSCHOLAR
✅ BADOMEN
✅ DUSTTUNNEL
✅ MOUSEHOLE
✅ LAZYCARGO
originally posted by: Thoughtful1
Caled I have another weird book cover and Gates is involved again. Since I am still locked out could you put it up for me if you get a chance? Thanks.
HAIL MARY by Andy Weir.
originally posted by: Thoughtful1
ya reply to: Caled
Thank you. Caleb call me crazy but HILLARY??? See the Capital H leave out the triangle. Next letter is I. Then L
Next line m=miss, triangle, a. Then r and y. >Hilary.
Why am I not surprised. Gates and Hillary fan club.
#1. Falling in a pit of fire/hell. Since they are satanists that is the inversion of heaven.
#2. The triangles.
#3. Ring of Fire. Think The Ring of Fire by Johnny Cash. "And it burns, burns burns, the ring of fire."
The patch. Gold circle device I was dealing with much earlier. That is no coincidence. But there must be something more important about that patch. Do you know what it means?
originally posted by: XtheMadnessNow
Shall we play a game? How about a nice game of heh-JEM-uh-nee.
DIME (Diplomatic, Information, Military, and Economic)
DIME is a framework that emerged from U.S. military academia for characterizing powers that a state may use to influence outcomes in the world.
The term "gray zone" might be new, but the phenomenon is not. Although many of the techniques used now are based on modern technology, notably cyber and networked communication, many are as old as history. What are now being called gray zone methods have been conducted in the past under such names as “political warfare,” “covert operations,” “irregular warfare,” “guerrilla warfare,” “active measures,” and the like.
The "White Cell" is the team of people administering and facilitating the game on behalf of the players.
We also see that these high-tech spies were able to penetrate one of Mr. Trump’s Wi-Fi routers. In all, the group assembled by tech executive Rodney Joffe snatched proprietary internet traffic from Trump Tower, Mr. Trump’s Central Park West apartment building and the Trump White House in early 2017.
What is impressive is the sheer effort by Clinton devotees in 2016 to take a mass of inconclusive data and try to convince themselves and the FBI that Mr. Trump was a Russian agent.
Mr. Durham branded the entire group under the heading of “co-conspirators” — a tag he did not apply in the original September 2021 indictment.
originally posted by: SideEyeEverything
For those of you interested in any spiritual bends as they relate to world events. I found this noteworthy.
originally posted by: Thoughtful1
a reply to: cimmerius
I am thinking that the Keystone is shipping container fleets/companies in general. Obviously we have the Evergreen connection.
Around July 3rd last year I made a brief post about the odd names of ships in the Maersk shipping line.
I should expand on this. Just a few names but to me it sounds like an army of ships.
#17 Searcher #98 Ocean Trader [human trafficking]
Here are some of the names so you can tell me what you think: Handler, Seeker, Supplier, Server, Attender, Chancellor, Beater, Battler, Helper, Dispatcher, Detector, Tracer, Tracker, LAUNCHER, Detector, Installer, Involver, Implementer, Mobilizer, Mover, Minder.
In what is a name game this sounds to me like a military operation. Ships named for specific functions hidden within the fleet of 708 container ships.