↓ Archives ↓

Archive → July 12th, 2017

Republican National Hispanic Assembly of Illinois would like to invite you to: A Book Signing Reception With The Honorable Alberto R. Gonzales!

The Republican National Hispanic Assembly of Illinois would like to invite you to:
A Book Signing Reception With The Honorable Alberto R. Gonzales!
 
Our sponsors have made possible an exclusive opportunity to attend this wonderful event at new ticket rate of $60 when you enter the promo code RNHA15!
 
At the signing reception you will also have the opportunity to see our very own dedicated, hard-working, Lt. Governor Evelyn Sanguinetti and the outstanding radio talk show host/entrepreneur, Dan Proft!
 
Inline image

Inline image

We are excited to see you there! See the attached flyer for more information.

Source: Will County News

‘Nightmare’ silent bomb could destroy America

‘Nightmare’ silent bomb could destroy America

64 Shares

title

Just seven minutes before midnight on December 17, 2016 we caught our first glimpse of the power of this weapon. That’s the day a bomb hit.

The strange thing about this bomb, though, was that you could be standing right next to the trigger and you wouldn’t have heard or felt a thing. No big blast. No flash of light. No big burst of fire. Nothing.

That night, terrorists set lose a piece of malicious software that shut down an entire section of a city. Once they set it lose, a chain reaction occurred miles away. It started with a burst of pre-programmed commands transmitted through the local power grid.

Within seconds, one circuit breaker after another popped, which shut down all the electricity on the western side of this city with a population of 3 million. Before long, the entire area was in complete darkness.

Nothing connected to the grid worked.

To the media, this was nothing more than a simple power outage. So they ignored it. It wasn’t a bomb that toppled buildings or killed massive numbers of people.

You see this hacker attack on the electrical grid happened in Kiev, Ukraine, not America. So no one here paid it any mind. After all, why should that affect us?

But this was the second attack that disrupted Ukraine’s power grid. As I wrote to you then, the first was a test, a probe to see if it would work. This one worked. The terrorists, whoever they are, are making progress. With each test, their ability to shut down civilization improves and becomes more deadly. If they can develop a software bug that shuts down large sections of the U.S. grid, massive blackouts will ensue.

As usual, the Democrats, Republicans, and the mainstream media are all bamboozled. They’re chasing Russia, North Korea, and Donald Trump, thinking all of them are the biggest threat the U.S. has ever faced. They’re missing the beginning of one of the biggest war stories of the last 100 years.

This threat could be more devastating than a nuclear bomb, and almost no one is paying attention. I did however find a New York Times report that said, “Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States…”

In typical “nothing to see here” fashion, The Times writes: “In a joint statement with the F.B.I., a spokesman for the Department of Homeland Security said, ‘There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks.’”

The FBI/Homeland Security report indicates an “advanced persistent threat” actor was responsible. To you and me, that means they were government-backed hackers.

Protection

As these hacker attacks were going on, President Trump signed an executive order to strengthen the cybersecurity defenses of federal networks and critical infrastructure.

The order specifically requires government to work with public corporations to mitigate risks and help defend critical infrastructure organizations “at greatest risk of attacks that could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.”

I discovered that we do have companies working very diligently to make sure this never happens inside the United States.

What happened in the Ukraine is simply a testing ground for much bigger and more serious attacks, like the powerful ransomware cyber attack that started in Russia and Ukraine before spreading to Western Europe last week. It was a variant of the “WannaCry” ransomware.

Two separate security firms have analyzed the malware responsible for the Kiev blackout. One of these firms, Maryland-based Dragos, dubbed the new malware “CrashOverride.” They, along with Slovakia-based firm ESET, identify this malware as a genuine cyber weapon.

According to their researchers, this program has the ability to “map out a power station’s control network and, with minimal human guidance, issue malicious commands directly to critical equipment.”

This type of weapon is rare. We saw it only once before when the Stuxnet virus attacked Iran’s nuclear program in 2010. CrashOverride is the first to target civilians. What’s more, these researchers say this designers of this program built it to attack an entire nation’s power supply. Dragos CEO Robert Lee says this malware wasn’t built as a one-time weapon.

“It’s a nightmare,” Lee told the news media. “The malware in its current state would be usable for every power plant in Europe. This is a framework designed to target other places.” Even worse, there were aspects of the malware that the terrorists didn’t use in the Kiev attack. So its potential is significantly greater than what we’ve seen.

CrashOverride is a significant escalation in the electronic arms race. But it’s only the beginning. The terrorists are on to our grid system. They know how it operates and they now know how to attack it. Remember, this is only a glimpse into the real threat. Any coming attack on the U.S. will make CrashOverride look tiny in comparison.

But you can be prepared. Like you, I’m always interested in protecting my life, property, and wealth. When I looked into just how vulnerable our grid is, and I discovered how old and ineffective our system is, I also found that our government is, thanks to Trump’s order, working with companies to do something about it.

In my research I uncovered three companies that are at the forefront of unlocking new technologies that will protect and strengthen our electric grid and its protections.

These companies are the best hope I’ve found for stopping a catastrophic failure caused by hackers, or a cyber-attack, because they are working for America instead of only themselves. Shocking, I know, and that’s why I recommend you take a look at a special report I’ve prepared. These aren’t fly-by-night companies that are here today and gone tomorrow. They are profitable, have strong balance sheets, and generate real shareholder value, which means you too can profit at the same time you’re helping protect our great country.

You must know about these companies today, because those who want to attack America are looking directly at America’s electric grid. To learn more about the real threat the U.S. faces from terrorist hackers, just how devastating a massive attack could be, and how these companies can protect both our national grid system and your wealth, just follow this link right now.

Source: Will County News

GOP Senator Urges Department of Justice To Do This To Comey

GOP Senator Urges Department of Justice To Do This To Comey

The chairman of the House National Security Subcommittee is calling on the Department of Justice to launch a formal investigation into former FBI Director James Comey’s alleged leak of classified information, according to an exclusive interview with the Washington Free Beacon in which the lawmaker also called on the Trump administration to purge all former Obama administration holdovers from government.

Rep. Ron DeSantis (R., Fla.), a member of the House Committee on Oversight and Government Reform and chair of its National Security subcommittee, is urging Attorney General Jeff Sessions to launch a full scale investigation into Comey’s handling of a series of potentially classified memos that were leaked to the press earlier this year.

Comey admitted in testimony before Congress that he leaked these memos in order to spur an investigation into the Trump administration’s alleged collusion with Russia during the 2016 campaign. Reports alleging these memos contained classified information has riled congressional Republicans and spurred new calls for an investigation into Comey.

DeSantis also called on the Trump administration to purge all former Obama administration officials still working in the government, claiming that the holdovers and their allies outside the White House are responsible for an unprecedented series of national security leaks aimed at damaging the Trump administration’s national security apparatus. 

 

Originally published by the Free Beacon.

Source: Will County News

Dark Web Threat Analytics using multiple API’s

Built with Geoweb 3d

Dark Web Threat Analytics using multiple API’s

Tracking your business, brand, talent or interest in the dark web will provide early alerting to breaches, compromises and threats faced today.

When does 1 + 1 = 11 ? Integrating multiple API’s into event operations will uncover critical elements of information and synthesize actionable intelligence.

In this example we have integrated & automated the threat intelligence of dark web data by automating the analytics through multiple application programming interfaces (API’s) implemented with SitScape zero programming interface.

Dark Web + PAEISys threat analysis + Natural Language Processing  + IBM Watson +  Google Translate + Combined Results + Data Visualization + GeoWeb 3D GIS + Adaptive Alerting = Actionable Intelligence.

Using micro services, such as PAEISys, this unique service will ingest unstructured data from multiple sources (OSINT, SIGINT, IDS, CCTV, GEOINT…) adding additional structured metadata based on the original documents. End results are structured information aligned into 6 categorical fields (location/coordinates, types of threats spoken, impacted sector/industries, impacted emergency support functions, and the identity of companies/groups and people) making the unstructured data ready for data exploitation.

The effective use of intelligence from dark web depends largely on getting it to the right people quickly, securely, and presented in a format that makes sense to strategic and operational decision makers.

Dark web analysis assumes that operations, organizational, and international connections matter because they transmit behavior, attitudes, information, or goods. Dark web analysis offers the methodology to analyze information; it tells us how to conceptualize dark web and how to analyze. By using Threat analytics, Natural Language Processing, Data Visualization, and other API’s we can better understand the wealth of information in the dark web.

The tradecraft consists of understanding the interdependencies within dark web data and how this interplays with real life. The dark web is not just one platform; a true and complete picture can only be formed when looking at multiple networks – including emerging platforms.

This may range from simple analysis conducted on an incident to in-depth strategic analysis products creating a daily brief and weekly summary of threats, risks, or “findings” for each operation. Other applications include pre-event monitoring, political tempo, criminal tempo, and other semantic based operations.

An approach often utilized is to monitor dark web and allow customers to access a customized dashboard highlighting the summary of threats, risks, or findings for each desired operation. This provides actionable intelligence for the decision maker to affect real world conditions while allowing the Dark web Intelligence Analyst to be focused on extracting authoritative and relevant data.

Examples of different levels of dark web monitoring with which we can produce analytical products:

Basic monitoring

  • Using traditional products, off the shelf, to determine when and where to monitor dark web sites.
  • Utilizing relevant locations, we produce reports of dark web discussion/posts related to each location.

Proactive Monitoring

  • Surveying trends to identify important issues specific sectors (Transportation, Financial, Talent and Brand management).
  • Filtering by related business related keywords, intellectual property and/or hashtag.
  • Creating reports on trends, relevant discussion, time and geography for tracking and anomaly reporting.
  • Providing notifications that an event is imminent.
  • Developing trend data from multiple operations on anomalies, problems, and safety concerns.
  • Mapping of areas of highest concern.
  • Reviewing photos and analyzing videos to communicate hazards relating to a given operation.
  • Monitoring messages between actors to establish situational awareness.
  • Collaborating to identify the sources of hazard control verification failures.

Active Engagement

  • Social engagement means participating in conversations that happen on dark web sites.
  • Documenting data about a community or a large organization that can be used to create intelligence pictures (e.g., physical characteristics, demographic features).
  • Crowdsourcing, or obtaining content by soliciting information from a large group of people.
  • Investigating and reporting on potential threats to specific locations.
  • Investigating and reporting on potential threats to high profile meetings or planned special events
  • Collaborating on preparations for exercises, drills, and hazard control tests.

Not just text, we can automatically analyze pictures, videos and audio that can identify locations, behavior and other real time events.

Kant Consulting Group provides expert assessments of current and future technologies, with an emphasis on integration and operational use, cyber security and interoperability.

We are skilled in coordinating and managing relationships with internal and external stakeholders, industry analysts, partners, consultants, and directing technical teams.

Source: Will County News

Trump News July 12, 2017

President Donald J. Trump’s Administration is working tirelessly with the Senate to bring relief to the American people from the devastating effects of Obamacare. Americans are suffering under the limited choices and high costs brought on by Obamacare, and the President is committed to solving this problem once and for all by repealing and replacing the disastrous law. As Obamacare continues to implode on itself, the time to fix this broken system is now.

TODAY’S EVENTS

1:00 PM: Vice President Pence participates in the Senate Republican Policy Lunch

2:00 PM: President Trump and Vice President Pence meet with Secretary of State Rex Tillerson, Secretary of the Treasury Steven Mnuchin, Secretary of Defense James Mattis, and National Security Advisor H.R. McMaster

2:00 PM: Press Briefing with Principal Deputy Press Secretary Sarah Sanders

PHOTO OF THE DAY

Vice President Mike Pence and Retired United States Army Staff Sergeant Travis Mills of the 82nd Airborne | July 10, 2017 (Official White House Photo by D. Myles Cullen)

OBAMACARE FACT OF THE DAY

FACT: Only 141 issuers filed to sell plans on Healthcare.gov during the upcoming enrollment period – down from 281 just two years ago.

WHITE HOUSE UPDATES

Yesterday, President Trump issued a statement on the liberation of Mosul.

Yesterday, Vice President Pence met with Prime Minister Youssef Chahed to reaffirm the United States’ support for Tunisia.

Yesterday, President Trump announced key additions to his Administration.

WEST WING READS

Each day we put together a list of the top news stories the West Wing is reading and share them with you. Sign up to receive this daily update from the West Wing.

Source: Will County News