home.social

#nationstate — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #nationstate, aggregated by home.social.

  1. House Panel Scrutinizes Anthropic's Mythos Amid Cyber Risk Concerns

    A recent closed-door briefing by Anthropic showed lawmakers firsthand how its advanced AI model, Mythos, can swiftly identify and reason through software vulnerabilities, highlighting the urgent need for federal agencies to access cutting-edge US models to stay ahead of cyber threats. This live demo reinforced the importance of…

    osintsights.com/house-panel-sc

    #Ai #CyberRisk #EmergingThreats #HomelandSecurity #NationState

  2. UAE Deploys 'Cope Cages' to Shield Energy Sites from Iranian Drone Threats

    The UAE is taking bold steps to safeguard its energy sites from Iranian drone threats, with recent images revealing the deployment of metal "cope cages" around oil tanks near Dubai International Airport. This innovative defense strategy is the UAE's latest move to bolster its air defenses, which have already intercepted over 2,000 UAVs fired by Iran.

    osintsights.com/uae-deploys-co

    #EmergingThreats #NationState #Uav #Iran #Uae

  3. UAE Deploys 'Cope Cages' to Shield Energy Sites from Iranian Drone Threats

    The UAE is taking bold steps to safeguard its energy sites from Iranian drone threats, with recent images revealing the deployment of metal "cope cages" around oil tanks near Dubai International Airport. This innovative defense strategy is the UAE's latest move to bolster its air defenses, which have already intercepted over 2,000 UAVs fired by Iran.

    osintsights.com/uae-deploys-co

    #EmergingThreats #NationState #Uav #Iran #Uae

  4. DOJ Unveils Legal Basis for Nationwide Voter Data Collection Efforts

    The Trump administration just dropped a bombshell with a new legal opinion that paves the way for nationwide voter data collection, sparking heated debate over federal oversight in election administration. But not everyone is buying it - Vermont's Secretary of State dismissed the memo as mere fantasy.

    osintsights.com/doj-unveils-le

    #NationState #VoterDataCollection #ElectionAdministration #FederalOversight #CivilRightsAct

  5. UAE Deploys Homegrown Counter-Drone Tech in Iran Conflict

    The UAE successfully countered over 80-85% of incoming drones using its homegrown counter-drone technology during the recent Iran conflict, showcasing the country's reliance on locally developed solutions. This locally grown tech, including jammers and spoofers, allowed for an immediate response, operating from day one without delays.

    osintsights.com/uae-deploys-ho

    #CounterdroneTechnology #EmergingThreats #NationState #Uav #Iran

  6. UAE Deploys Homegrown Counter-Drone Tech in Iran Conflict

    The UAE successfully countered over 80-85% of incoming drones using its homegrown counter-drone technology during the recent Iran conflict, showcasing the country's reliance on locally developed solutions. This locally grown tech, including jammers and spoofers, allowed for an immediate response, operating from day one without delays.

    osintsights.com/uae-deploys-ho

    #CounterdroneTechnology #EmergingThreats #NationState #Uav #Iran

  7. NATIO

    youtube.com/watch?v=yf0oamK_-SI

    Instead of providing human rights, protections, nationalism has locked the world into an escalation trap, at a time we need to cooperate more than ever. ...

    #Nationalism #Fascism #HumanRights #Nasions #Disease #Einstein #NationState #Future #Politics #Civilization

  8. Fast16 Malware Exposes Pre-Stuxnet Cyber Warfare Roots

    Meet fast16, a sneaky malware framework that's been around since 2005 - five years before the infamous Stuxnet - and is designed to quietly sabotage high-precision software by subtly altering numerical results. This stealthy approach can cause systems to fail, wear out faster, or produce false conclusions, making it a chilling…

    osintsights.com/fast16-malware

    #IndustrialControlSystems #MalwareOperations #NationState #CyberWarfare #Stuxnet

  9. Iran Accuses US of Using Backdoors to Disrupt Networking Gear

    Iranian media is accusing the US of sneaking backdoors into networking gear to disrupt operations amid the ongoing war, with Chinese state media echoing the claims globally. But what's really at stake when these explosive cyber-accusations make international headlines?

    osintsights.com/iran-accuses-u

    #NationState #CyberWarfare #Backdoors #Botnets #Iran

  10. Iran Accuses US of Using Backdoors to Disrupt Networking Gear

    Iranian media is accusing the US of sneaking backdoors into networking gear to disrupt operations amid the ongoing war, with Chinese state media echoing the claims globally. But what's really at stake when these explosive cyber-accusations make international headlines?

    osintsights.com/iran-accuses-u

    #NationState #CyberWarfare #Backdoors #Botnets #Iran

  11. FBI Disrupts APT28's Router-Based Espionage Operations

    The FBI recently disrupted a sneaky espionage operation run by APT28, a Russian GRU-linked group notorious for its broad reach, by cutting off their access to a network of routers they used as a launching pad for further attacks. This bold move effectively severed the group's tremendous access, putting a stop to their clever tactics.

    osintsights.com/fbi-disrupts-a

    #Apt28 #Russia #Gru #EspionageOperations #NationState

  12. We Are Witnessing The Return of Empires & The END of Nations

    Nearly all of us on Earth live within a 'nation-state'. Nation-states are an invisible and seemingly inevitable and eternal part of the infrastructure that forms our society: the water we swim in. Rarely do we pause to consider how this global system of nation-states came into being, and what might replace it after it's gone

    youtu.be/Mo88imJNWkU?si=c2kiW6

    #AaronBastani #RanaDasgupta #democracy #WorkersRights #NationState #WorldOrder

  13. 𝑯𝒂𝒏𝒏𝒂𝒉 𝑨𝒓𝒆𝒏𝒅𝒕 - 𝑪𝒉. 9: 𝑻𝒉𝒆 𝑫𝒆𝒄𝒍𝒊𝒏𝒆 𝒐𝒇 𝒕𝒉𝒆 𝑵𝒂𝒕𝒊𝒐𝒏-𝑺𝒕𝒂𝒕𝒆 𝒂𝒏𝒅 𝒕𝒉𝒆 𝑬𝒏𝒅 𝒐𝒇 𝒕𝒉𝒆 𝑹𝒊𝒈𝒉𝒕𝒔 𝒐𝒇 𝑴𝒂𝒏

    youtu.be/0lMIRmv8uCk

    Reading guide and more at waywordsstudio.com/project/are

    #democracy #readingguide #arendt #hannaharendt #theoriginsoftotalitarianism #reflections #chapterreflections #history #literacy #totalitarianism #dictatorship #tyranny #antisemitism #imperialism #ww2 #holocaust #oligarchy #refugees #stateless #nationstate #humanrights

  14. Of course, now we know who was behind #Stuxnet -- #Israel and the #CIA -- thanks!

    Why the #StuxnetWorm is like nothing seen before

    By Paul Marks
    27 September 2010

    "Stuxnet is the first worm of its type capable of attacking #CriticalInfrastructure like #PowerStations and #ElectricityGrids: those in the know have been expecting it for years. On 26 September, #Iran’s state news agency reported that computers at its #Bushehr #NuclearPowerPlant had been infected.

    Why the fuss over Stuxnet?

    "#ComputerViruses, worms and #trojans have until now mainly infected PCs or the servers that keep e-businesses running. They may delete key system files or documents, or perhaps prevent website access, but they do not threaten life and limb.

    "The Stuxnet worm is different. It is the first piece of #malware so far able to break into the types of computer that control machinery at the heart of industry, allowing an attacker to assume control of critical systems like #pumps, #motors, #alarms and #valves in an industrial plant.

    "In the worst case scenarios, safety systems could be switched off at a nuclear power plant; fresh water #contaminated with effluent at a #SewageTreatmentPlant, or the valves in an #OilPipeline opened, contaminating the land or sea.

    “'Giving an attacker control of industrial systems like a #dam, a sewage plant or a power station is extremely unusual and makes this a serious threat with huge real world implications,' says Patrick Fitzgerald, senior threat intelligence officer with Symantec. 'It has changed everything.'

    Why is a different type of worm needed to attack an industrial plant?

    "Industrial machinery is not controlled directly by the kind of computers we all use. Instead, the equipment used in an industrial process is controlled by a separate, dedicated system called a programmable logic controller (#PLC) which runs supervisory control and data acquisition software (#SCADA).

    "Running the SCADA software, the PLC controls the process at hand within strict safety limits, switching motors on and off, say, and emptying vessels, and feeding back data which may safely modify the process without the need for human intervention – the whole point of industrial automation.

    So how does a worm get into the system?

    "It is not easy because they do not run regular PC, Mac or Linux software. Instead, the firms who sell PLCs each have their own programming language – and that has made it tricky for hackers to break it.

    "However there is a way in via the Windows PC that oversees the PLC’s operations. Stuxnet exploited four vulnerabilities in Microsoft Windows to give a remote hacker the ability to inject malicious code into a market-leading PLC made by German electronics conglomerate Siemens.

    "That’s possible because PLCs are not well-defended devices. They operate for many years in situ and electronic access to them is granted via well-known passwords that are rarely changed. Even when Stuxnet was identified, Siemens opposed password changes on the grounds that it could cause chaos as older systems tried to communicate using old passwords.

    Where did the initial Stuxnet infection come from?

    "It appears to have first arrived in Iran on a simple #USBMemoryStick, says Fitzgerald. His team in Dublin, Ireland has been analysing Stuxnet since it was first identified by a security team in Belarus in June.

    "The first of the four Windows vulnerabilities allowed executable code on a USB stick to spread to a PC. The USB may have been given to an Iranian plant operative – or simply left somewhere for an inquisitive person to insert into their terminal.

    "Says Fitzgerald: 'It then spreads from machine to machine on the network, exploiting a second vulnerability to do so, and reports back to the attacker on the internet when it finds a PC that’s running Siemens SCADA software. The attacker can then download a diagram of the industrial system set-up the SCADA controls.'

    "The next two Windows vulnerabilities lets the worm escalate its privilege levels to allow the attacker to inject Siemens PLC format computer code – written in a language called STL – into the PLC. It’s that code which is capable of performing the skulduggery: perhaps turning off alarms, or resetting safe temperature levels.

    How do we know where Stuxnet is active?

    "Symantec monitored communications with the two internet domains that the worm swaps data with. By geotagging the IP addresses of Stuxnet-infected computers in communication with the attacker, Fitzgerald’s team found that 58.8 per cent of infections were in Iran, 18.2 per cent in #Indonesia, 8.3 per cent in #India, 2.6 per cent in #Azerbaijan and 1.6 per cent in the US.

    Who is behind the worm?

    "No one knows. It is however very professionally written, requiring what Fitzgerald calls 'a broad spectrum of skills' to exploit four new vulnerabilities and develop their own SCADA/PLC set-up to test it on.

    "This has some commentators suggesting that a #NationState with plenty of technical resources may have been behind Stuxnet. But computer crime is a billion dollar business so such an effort is not beyond extortionists.

    "Stuxnet comprises a 600-kilobyte file and it has not yet been fully analysed."

    Read more:
    newscientist.com/article/dn195

    #StuxnetVirus #MalwareAttack #Cyberattack #CyberWarfare