An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
Category Archives: government fraud spending collusion
In an 800-page document dump, the U.S. government revealed critical vulnerabilities.
On Friday, December 19, the FBI officially named North Korea as the party responsible for a cyber attack and email theft against Sony Pictures. The Sony hack saw many studio executives’s sensitive and embarrassing emails leaked online. The hackers threatened to attack theaters on the opening day of the offending film, The Interview, and Sony pulled the plug on the movie, effectively censoring a major Hollywood studio. (Sony partially reversed course, allowing the movie to show in 331 independent theaters on Christmas Day, and to be streamed online.)
Technology journalists were quick to point out that, even though the cyber attack could be attributable to a nation-state actor, it wasn’t particularly sophisticated. Ars Technica’s Sean Gallagher likened it to a “software pipe bomb.”
But according to cybersecurity professionals, the Sony hack may be a prelude to a cyber attack on United States infrastructure that could occur in 2015, as a result of a very different, self-inflicted document dump from the Department of Homeland Security in July.
Here’s the background: On July 3, DHS, which plays “key role” in responding to cyber attacks on the nation, replied to a Freedom of Information Act (FOIA) request on a malware attack on Google called “Operation Aurora.”
Unfortunately, as Threatpost writer Dennis Fisher reports, DHS officials made a grave error in their response. DHS released more than 800 pages of documents related not to Operation Aurora but rather the Aurora Project, a 2007 research effort led by Idaho National Laboratory demonstrating how easy it was to hack elements in power and water systems.
Oops.
The Aurora Project exposed a vulnerability common to many electrical generators, water pumps, and other pieces of infrastructure, wherein an attacker remotely opens and closes key circuit breakers, throwing the machine’s rotating parts out of synchronization causing parts of the system to break down.
In 2007, in an effort to cast light on the vulnerability that was common to many electrical components, researchers from Idaho National Lab staged an Aurora attack live on CNN. The video is below.
The Aurora vulnerability affects much more than rotating equipment inside power plants. It affects nearly every electricity system worldwide and potentially any rotating equipment—whether it generates power or is essential to an industrial or commercial facility.
The article was written by Michael Swearingen, then manager for regulatory policy for Tri-County Electric Cooperative (now retired), Steven Brunasso, a technology operations manager for a municipal electric utility, Booz Allen Hamilton critical infrastructure specialist Dennis Huber, and Joe Weiss, a managing partner for Applied Control Solutions.
Weiss today is a Defense Department subcontractor working with the Navy’s Mission Assurance Division. His specific focus is fixing Aurora vulnerabilities. He calls DHS’s error “breathtaking.”
The vast majority of the 800 or so pages are of no consequence, says Weiss, but a small number contain information that could be extremely useful to someone looking to perpetrate an attack. “Three of their slides constitute a hit list of critical infrastructure. They tell you by name which [Pacific Gas and Electric] substations you could use to destroy parts of grid. They give the name of all the large pumping stations in California.”
The publicly available documents that DHS released do indeed contain the names and physical locations of specific Pacific Gas and Electric Substations that may be vulnerable to attack.
Defense One shared the documents with Jeffrey Carr, CEO of the cybersecurity firm Taia Global and the author of Inside Cyber Warfare: Mapping the Cyber Underworld. “I’d agree…This release certainly didn’t help make our critical infrastructure any safer and for certain types of attackers, this information could save them some time in their pre-attack planning,” he said.
Perpetrating an Aurora attack is not easy, but it becomes much easier the more knowledge a would-be attacker has on the specific equipment they may want to target.
* * *
In a 2011 paper for the Protective Relay Engineers’ 64th Annual Conference, Mark Zeller, a service provider with Schweitzer Engineering Laborites lays out—broadly—the information an attacker would have to have to execute a successful Aurora attack. “The perpetrator must have knowledge of the local power system, know and understand the power system interconnections, initiate the attack under vulnerable system load and impedance conditions and select a breaker capable of opening and closing quickly enough to operate within the vulnerability window.”
“Assuming the attack is initiated via remote electronic access, the perpetrator needs to understand and violate the electronic media, find a communications link that is not encrypted or is unknown to the operator, ensure no access alarm is sent to the operators, know all passwords, or enter a system that has no authentication.”
That sounds like a lot of hurdles to jump over. But utilities commonly rely on publicly available equipment and common communication protocols (DNP, Modbus, IEC 60870-5-103,IEC 61850, Telnet, QUIC4/QUIN, and Cooper 2179) to handle links between different parts their systems. It makes equipment easier to run, maintain, repair and replace. But in that convenience lies vulnerability.
In their Power Magazine article, the authors point out that “compromising any of these protocols would allow the malicious party to control these systems outside utility operations.”
Defense One reached out to DHS to ask them if they saw any risk in the accidental document dump. A DHS official wrote back with this response: “As part of a recent Freedom of Information Act (FOIA) request related to Operation Aurora, the Department of Homeland Security (DHS) National Programs and Protection Directorate provided several previously released documents to the requestor. It appears that those documents may not have been specifically what the requestor was seeking; however, the documents were thoroughly reviewed for sensitive or classified information prior to their release to ensure that critical infrastructure security would not be compromised.”
Weiss calls the response “nonsense.”
The risk posed by DHS accidental document release may be large, as Weiss argues, or nonexistent, as DHS would have you believe. But even if it’s the latter, Aurora vulnerabilities remain a key concern.
Perry Pederson, who was the director of Control Systems Security Program at DHS in 2007 when the Aurora vulnerability was first exposed, said as much in a blog post in July after the vulnerability was discovered. He doesn’t lay blame at the feet of DHS. But his words echo those of Weiss in their urgency.
“Fast forward to 2014. What have we learned about the protection of critical cyber-physical assets? Based on various open source media reports in just the first half of 2014, we don’t seem to be learning how to defend at the same rate as others are learning to breach.”
* * *
In many ways the Aurora vulnerability is a much harder problem to defend against than the Sony hack, simply because there is no obvious incentive for any utility operator to take any of the relatively simple costs necessary to defend against it. And they are simple. Weiss says that a commonly available device installed on vulnerable equipment could effectively solve the problem, making it impossible to make the moving parts spin out of synchronization. There are two devices on the market iGR-933 rotating equipment isolation device (REID) and an SEL 751A, that purport to shield equipment from “out-of-phase” states.
To his knowledge, Weiss says, Pacific Gas and Electric has not installed any of them anywhere, even though the Defense Department will actually give them away to utility companies that want them, simply because DOD has an interest in making sure that bases don’t have to rely on backup power and water in the event of a blackout. “DOD bought several of the iGR-933, they bought them to give them away to utilities with critical substations,” Weiss said. “Even though DOD was trying to give them away, they couldn’t give them to any of the utilities because any facility they put them in would become a ‘critical facility’ and the facility would be open to NERC–CIP audits.”
Aurora is not a zero-day vulnerability, an attack that exploits an entirely new vector giving the victim “zero days” to figure out a patch. The problem is that there is no way to know that they are being implemented until someone, North Korea or someone else, chooses to exploit them.
Can North Korea pull of an Aurora vulnerability? Weiss says yes. “North Korea and Iran and are capable of doing things like this.”
Would such an attack constitute an act of cyber war? The answer is maybe. Speaking to reporters at the Pentagon on Friday, Pentagon Press Secretary Rear Adm. John Kirby said “I’m also not able to lay out in any specificity for you what would be or wouldn’t be an act of war in the cyber domain. It’s not like there’s a demarcation line that exists in some sort of fixed space on what is or isn’t. The cyber domain remains challenging, it remains very fluid. Part of the reason why it’s such a challenging domain for us is because there aren’t internationally accepted norms and protocols. And that’s something that we here in the Defense Department have been arguing for.”
Peter Singer, in conversation with Jason Koebler at Motherboard, says that the bar for actual military engagement against North Korea is a lot higher than hacking a major Hollywood movie studio.
“We didn’t go to war with North Korea when they murdered American soldiers in the 1970s with axes. We didn’t go to war with North Korea when they fired missiles over our allies. We didn’t go to war with North Korea when one of their ships torpedoed an alliance partner and killed some of their sailors. You’re going to tell me we’re now going to go to war because a Sony exec described Angelina Jolie as a diva? It’s not happening.”
Obama said Friday that there would be some sort of response to the hack, but declined to say what. “We have been working up a range of options. They will be presented to me. I will make a decision on those based on what I believe is proportional and appropriate to the nature of this crime,” he said.
Would infrastructure vandalism causing blackouts and water shutdowns constitute an act of war? The question may be moot. Before the United States can consider what sort of response is appropriate to cyber attacks, it must first be able to attribute them.
The FBI was able to finger North Korea for the hack after looking at the malware in the same way a forensics team looks for signs of a perpetrator at the scene of the crime. “Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,” according to the FBI statement. (Attribution has emerged as a point of contention in technology circles, with many experts suggesting that an inside hack job was more likely.)
An Aurora vulnerability attack, conversely, leaves no fingerprints except perhaps a single IP address. Unlike the Sony hack, it doesn’t require specially written malware to be uploaded into a system—malware that could indicate the identity of the attacker, or at least his or her affiliation. Exploiting an Aurora attack is simply a matter of gaining access, remotely, possibly because equipment is still running on factory-installed passwords, and then turning off and on a switch.
“You’re using the substations against whatever’s connected to them. Aurora uses the substations as the attack vector. This is the electric grid being the attack vector,” said Weiss, who calls it “a very, very insidious” attack.
The degree to which we are safe from that eventuality depends entirely on how well utility companies have put in place safeguards. We may know the answer to that question in 2015.
After the Paris attack(s), 4 since December, the dialogue has morphed to no-go zones as designed by Islamists in many towns, states and Western cultured countries.
Do you ever wonder why Muslims pray on the public streets and not in the mosques? It is an ‘in your face’ action.
Just in France there are more than 700 of them, more on that later as France is aware of them and is allegedly working to reclaim them. In a raw language translation from French to English:
“It‘storespondcloselytotheconcernsofourcitizens,oftenamongthepoorest“,insistsManuelValls, former DeputyMayorof Evry (Essonne). Theprefectsofthesefifteenfirst‘testzones”must,by mid-September,tomakeknowntheprecisecontoursandtheobjectivesofsecurity,–number oftwoorthreemaximum–meet. Here,thedecline in burglariesorthefightagainstdrugtrafficking,thenoccupationsofbuildingshallsortheflightsin the snatch. “Itistobringdecision-makingatthelevelofstakeholdersin the field,supportsaclose associate ofthe Minister ofthe Interior. Thecontoursoftheseareas can beadaptedatanytimebecausewemustbeasreactiveasoffenders. »
Focuson hotspots
AlainBauer,criminologist–formeradviser to NicolasSarkozyandalsoveryclose to ManuelValls-,thisnewdevicecouldbe likenedto“experimentsalreadycarried outintheUnited Statesandthe Canada. “Intheyears1990-2000,theAmericansandCanadiansfoundthat arealeffectivepolicyagainstcrimeswastofocusonaseriesofhotspots(hotspotsinEnglish).“Itcomesthentodeploypoliceforceshighlymobileandadaptableinacoherentterritory. There,forthefirsttimeinFrance,itapproximatesthisspiritthere. WeleavetheTheologyforpragmatism. »
Specifically,thisdevicewill be basedonan“operationalcell”ledbytheprefect,associated with theProsecutoroftheRepublic–ifthelatterwishes-,tocoordinateallofthesecurityforcesinthearea concerned. Police,CRS,gendarmes,investigatorsof the judicialpoliceandintelligenceserviceswill bethusmobilized.A‘coordinationcell’secondofthevariouspartners (municipalpolicies,associations,Education…)itwill be,overseenbyoneormorelocalelected representatives. Thiscell,whichmustbethenarrowestpossibleforgreaterefficiency,aimstodriveallpreventionactionsagainstdelinquency,such astheimplementationofmeasuresaimedatpreventingtherecurrenceofminors.
Remainsunknown:howwill havetheZSP?“Evenifthefuturecreationsofpostswill bedeployed,as a priority,ontheseareas,wewillmobilizeexistingresources,”stressedtheMinistry of theInterior, whichis“notdeprivecertainsectorsforthebenefitofthis new feature. Withoutwaiting for theresultsofthe experiment,ManuelVallsalreadyplanstodeploy“aquarantineto otherpriorityareasofsecurity”bysummer2013.
For a list of the no-go zones just in France click here, there are 751 of them throughout the country. My friend Steve Emerson at the Investigative Project explained on Sean Hannity last night how not only France but all of Europe has passed the point of diminishing returns to reclaim their own sovereignty. He is right and this has been fact for years, but it IS coming to America unless we advance this debate and immigration.
What is chilling is the entire Obama administration through the U.S. State Department has been coaching Muslims overseas through embassies including France.
BONDY, France — The residents of this poor, multiracial Paris suburb say they have been abandoned. For 30 years, they say, the French authorities have written off Bondy and neighborhoods like it, treating their inhabitants as terminal delinquents and ignoring their potential.
This, residents note, is not the approach taken by the U.S. Department of State.
“We’re waiting for the president of the Republic, for his ministers,” said Gilbert Roger, the mayor of Bondy. “And we see the ambassador of the United States.”
The U.S. Embassy in Paris has formed a network of partnerships with local governments, advocacy groups, entrepreneurs, students and cultural leaders in the troubled immigrant enclaves outside France’s major cities.
Begun in the wake of the Sept. 11 attacks as part of an effort to bolster the image of the United States within Muslim communities across the globe, American outreach in these hard neighborhoods — often referred to collectively as the “banlieues,” or suburbs — has grown in scale and visibility since the election of Barack Obama.
France is home to between 5 million and 6 million Muslims, Europe’s largest Muslim population, and the banlieues have long been considered potential incubators for religious extremism. But anti-American sentiment, once pervasive in these neighborhoods, seems to have been all but erased since the election of Obama, who has proved a powerful symbol of hope here and a powerful diplomatic tool.
Many suggest the Americans’ warm reception is a measure of these communities’ sense of abandonment. Others say it is the presence of Obama in the White House. Whatever the case, the United States is now more popular in the banlieues than at any time in recent memory, say French and American officials.
Much of the embassy’s outreach is meant to dispel “mistruths” about the United States, the ambassador, Charles H. Rivkin, said in an interview, adding: “It’s easier to hate something you don’t understand.”
With an annual public affairs budget of about $3 million, the Paris embassy has sponsored a variety of urban renewal projects, music festivals and conferences. Since Obama’s election, the Americans have helped organize seminars for minority politicians, coaching them in electoral strategy, fund-raising and communications.
The International Visitor Leadership Program, which sends 20 to 30 promising French entrepreneurs and politicians to America for several weeks each year, now includes more minority participants, and Muslims in particular. The embassy began a similar program for French teenagers.
Rivkin, 48, an entertainment executive and the youngest American ambassador to France in nearly 60 years, has taken a strong interest in the banlieues. Earlier this year, he thrilled a group of students in Bondy when he arrived with the actor Samuel L. Jackson, one of several entertainment industry contacts he has called upon in France. In Los Angeles, Rivkin cultivated ties between the family media and hip-hop worlds; in Paris, he has hosted local rappers at the Hotel Rothschild, his official residence.
Officials insist the outreach is not meant solely to curry favor for the United States; the Americans also see an emerging group of political and business elites in these neighborhoods. The embassy is “trying to connect with the next generation of leaders in France,” Rivkin said. “That includes the banlieues.”
Few French leaders speak in such hopeful terms.
Residents “have the sense that the United States looks upon our areas with much more deference and respect,” said Roger, the Bondy mayor. For electoral reasons, he said, French politicians exaggerate the violence and criminality here.
Ministerial excursions to the banlieues often entail a crushing police presence and vows to crack down on crime. President Nicolas Sarkozy, who as interior minister pledged to clean up one of these cities with a high-pressure hose, typically spends his time here consulting with law enforcement officials.
Although often criticized as not serious about stemming the violence, poverty and unemployment that plague the banlieues, the French government commits $5 billion annually to these cities, according to Fadela Amara, the secretary of state for urban policy. Since 2003, she said, the state has pledged more than $16 billion to a nationwide urban reconstruction program.
Residents and local politicians say this is nowhere near enough, although they add that money alone will not solve the problems.
“Do you know what it means to give recognition in the suburbs?” asked Aziz Senni, 34, the founder of a taxi service and an investment fund dedicated to spurring economic development in the banlieues, where he was raised. “It’s worth as much as gold.”
A Moroccan-born Muslim, Senni traveled to the United States in 2006 as a participant in the visitor program. He was effusive in his praise for the outreach and the optimism it has spread. “Never has France had this type of approach,” he said.
Senni spoke of feeling “stigmatized” by French leaders. A law banning the full facial veil, a government-led “debate on national identity” and a recent proposal to revoke French nationality from certain criminals “of foreign origin” have been widely felt as attacks on immigrants and Muslims here.
“The emerging elite in the suburbs doesn’t see itself in the way it’s being treated by French society,” said Nordine Nabili, 43, who directs the newly opened Bondy branch of a journalism school, ESJ Lille; he hosted Rivkin and Jackson there in April.
“You’re the future,” Jackson told the students.
Nabili said: “I don’t think people tell them that enough.” He worries the Americans may be raising hopes too high, however. Beyond good feelings, he said, “there really needs to be a true policy.”
Rivkin called such concerns unfounded. “From my vantage point, this embassy has not been peddling false dreams,” he said. “Anything is possible, if you put your mind to it and work hard enough.”
Widad Ketfi, 25, was among the students who met Rivkin and Jackson earlier this year. “We won’t be disappointed,” she insisted. The American attention is proof that “these young people are succeeding,” she said, that “we’re not invisible.”
Islamic State has their sights on taking over both Lebanon and Jordan. Iran is controlling this whole objective. The West and allies are doing almost nothing to stop this mission.
Iran’s weapons industries are at the service of Hezbollah, while Hezbollah tries to acquire precision-guided rockets and missiles for future attacks on strategic Israeli sites.
The Middle East is increasingly becoming an area where it is harder for actors to exercise control over their situations or to control events.
Despite Israel’s deterrence, the risk of an inadvertent clash between Israel and Hezbollah is rising
The new year holds many new dangers and few opportunities, as Israel’s two near enemies, Hezbollah in Lebanon on its northern front and Hamas in Gaza on its west, continue their large-scale armament programs, and prepare for a future day when they will fight another war with Israel.
Although neither Hezbollah nor Hamas has an interest in sparking a war with Israel any time soon — when they stand to suffer widespread, lasting, and crippling damage from any such clash — both are nevertheless preparing in earnest.
Hezbollah, armed with over 100,000 rockets and missiles, can rain down an unprecedented number projectiles on Israel. In addition, Hamas and Hezbollah are planning cross-border raids by sending highly trained murder squads, in order to take their fight into Israeli territory, as Hamas began doing this past summer through the tunnels it built for that purpose in Gaza.
With the region in chaos, and each side arming and training itself for when hostilities break out, the risk of a localized incident inadvertently igniting a wider clash — or simply an error in judgment — appears to have grown significantly.
Even though Hezbollah, acting under Iranian orders, is neck deep in its involvement in the Syrian civil war, and is stretched across Syria and Lebanon, its pace of preparations for war with Israel continues unaffected. The Syrian conflict has even given it some new tools, which it can deploy against Israel, such as improved ability to coordinate ground maneuvers. This build-up of offensive abilities represents the most serious challenge to Israel’s security in the immediate vicinity.
Hezbollah combat units, battle-hardened from fighting in the Syrian civil war, now have improved capabilities to deploy against Israel.
This does not mean that the Lebanese Shi’ite terror organization is seeking an all-out war at this moment — in fact, the opposite seems true.
Its actions seem designed to keep a confrontation with Israel on a low flame for the time being, while it focuses on Syria. Despite its extremist ideology, Hezbollah would not gain much from prompting Israel to unleash waves of devastating firepower on its assets across Lebanon.
Nonetheless, any “error” or misjudgment by Hezbollah could end up triggering a sequence of events that could well lead to war. Should that happen, there are no guarantees that the conflict would remain limited to Lebanon and Israel. Other arenas, such as Gaza and Syria, could easily be sucked in as well.
The Middle East is increasingly becoming an area where it is harder for actors to exercise control over their situation or to control events.
Israel still remains the most powerful side in the Middle East, and as it is now preparing to deal with growing semi-state guerilla-terrorist forces on its borders, it has to ready for itself for the possibility that a conflict on one border will quickly spread to another. In the past, it was believed that such conflicts could be short-lived, but the duration of future clashes may be lengthier than many have previously believed.
As its military continues assessing the challenges across the borders, Israel remains prepared for all eventualities.
The State of the Union speech is right around the corner and Barack Obama flying Air Force 1 into overdrive pushing items he wants to take credit for including lower gas prices.
The Veterans Affairs system is still broken. Though the House and Senate passed the start of good reform last year, the bureaucracy still needs major reforms so that veterans get the care they need in time. But the President still hasn’t taken the time to offer a long-term plan to fix the VA. President Obama needs to change his priorities.
It’s time for the White House to stop blocking bipartisan bills that the people want and get to work on real solutions and genuine reform. Don’t drive past the problems, Mr. President. Start helping us fix them.
In the first two days of the new Congress, President Obama has already issued three veto threats against bipartisan bills. Despite the bills having strong support on both sides of the aisle, President Obama has indicated that he will veto bills restoring the 40-hour workweek under Obamacare, approving the Keystone XL pipeline, and delaying a part of the flawed Dodd-Frank regulations.
President visits Ford’s Michigan Assembly Plant today
“I would strongly advise American consumers to continue to think about how you save money at the pump because it is good for the environment, it’s good for family pocketbooks and if you go back to old habits and suddenly gas is back at $3.50, you are going to not be real happy,” the President told The Detroit News in a phone interview, ahead of his visit to Ford’s Michigan Assembly Plant today.
“The American people should not believe that … demand for oil by China and India and all these emerging countries is going to stay flat,” Obama told The Detroit News. “Just demographics tell us demand is going to continue to grow, that over the long term it will grow faster than supply and we have to be smart about our energy policy,” he said.
Obama is using the stop at the Ford facility in Wayne, Michigan to tout his administration’s auto industry bailout. The facility, where Ford produces the Focus and C-Max, is currently idle due to slow sales.