THOSE DAM HACKERS (SIC)

Yes, you read the title of this blog correctly, "Those Dam Hackers," and not "Those Damned Hackers" or even "Those Dammed Hackers," though the latter may be closer to the literal truth than my own title, for it seems that someone has hacked into the USA's database of dams, according to RT:

US database containing dam vulnerabilities breached

Suggestively, RT has placed a picture of Hoover Dam, and the vast Lake Meade reservoir, as the header for its article, for Hoover damn supplies electrical power for the area (think of the Las Vegas strip at night here folks), and much of the water for this part of the southwest comes from this reservoir.

Now, my own home state, South Dakota, has four similarly large "damns"(sic) along the Missouri River, including the immense Oahe earthen "damn"(sic) near the state's capital of Pierre, and going south from there, the Fort Randall, Big Bend, and Gavin's Point "damns." Indeed, much of the Missouri-Ohio-Mississippi basin is riddled with dams and reservoirs. OK, that's enough of those dammed ...er...damned, problems...

Note where, allegedly, the hack was traced to:

"An online database containing information on 79,000 dams throughout the US was compromised for several months by a hacker, according to a spokesman for the Army Corps of Engineers. Analysts reportedly traced the hack to China."

My first reaction, when Ms. George Ann Hughes of The Byte Show brought this to my attention, was "how convenient...China."  After all, China has been a major force behind the geopolitical and economic realignment taking place that goes under the name "BRICS" or "BRICSA" nations (as I like to call them). And what better way to demonize the Chinese than to show their perfidious and unscrupulous nature by showing they're up to covert-no-good regarding our flood plains, water supplies, and electrical power.

Shudder.

Except, why would fellow BRICSA partner Russia be reporting on their ally's nefarious activity? Here's why:

"The Free Beacon quotes unnamed intelligence officials familiar with the incident as having traced the intrusion to China. As Wired notes, however, using proxy servers it is possible to leave misleading data trails pointing the finger at foreign nations."

That's more like it.

But now, you're probably thinking the same things I am, none of the alternatives being terribly pleasant to contemplate:

  1. The US government is, for once, telling the unabashed truth, and the hack really did originate in China, and that means with Chinese government complicity, if not outright involvement. In that case, it's a shame, because if you're like me, the US government's stock of credibility and trustability was exhausted long ago. (Mine started to erode during JFK, quickly gathered momentum under Watergate and Iran-Contra, reached a point of no return with Iraq Gulf War one, and pretty well bottomed during the Clinton-Waco-OKC bombing era. G.W. Bush and Barmitt Obromneyack are merely the Q.E.D.s). In short, they may be telling the truth, but so what? They're no longer believable. Even Dr. Goebbels told an occasional truth, and a clock set to the wrong time is...well, you know. 
  2. So, if China did hack, it is unlikely that it's going to leave signatures all over the place, unless it wants to send a very unpleasant message, like "we can open the flood gates if we want to...", but in that case, what would be the point of the message? It would only produce "heightened security," and be revealing a capability you'd want to keep secret anyway. So...my inclination is we can rule out China;
  3. So, it's "someone else," and RT is very likely trying to suggest that this "someone else" comes from within the West itself, and perhaps within its power structure, those "aggressive circles" within the military-industrial complex that former Soviet premier Nikita Khrushchev referred to after the Russians shot down Francis Gary Powers' U-2 in 1960. You'll recall, Khrushchev very cleverly did not blame President Eisenhower directly for the incident, but rather, was suggesting that their were elements within the power structure of America that had slipped totally out of public control. He was, in short, talking about a state within a state.

If this is indeed behind the hack, then...well... drills, drills-gone-live.... hacking, terrorism, more national security state... you get the idea. And significantly, RT already interviewed the appropriate official, who herself planted the meme:

"Michelle Van Cleave, a former consultant to the CIA, told the Beacon that the data breach appeared to be part of a greater effort to collect 'vulnerability and targeting data' for future cyber or military attacks.

“'In the wrong hands, the Army Corps of Engineers’ database could be a cyber attack roadmap for a hostile state or terrorist group to disrupt power grids or target dams in this country,' said Van Cleave.

“'Alarm bells should be going off because we have next to no national security emergency preparedness planning in place to deal with contingencies like that,' she added."

Yea my alarm bells are going off alright...

See you on the flip side.

Posted in

Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and "strange stuff". His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into "alternative history and science".

19 Comments

  1. emlong on May 7, 2013 at 11:49 pm

    So China attempts to destroy the power grid of America, so that Americans can no longer afford to buy Chinese goods like a drunken sailor. I don’t think so.



    • cwickenkamp on May 8, 2013 at 11:54 am

      So how about this: They just shut down the generators in the dams that produce power?

      Why would they destroy the grid? All they have to do is control it.

      If you will look at current Chinese govt statistics, you will see that they do not in fact, depend upon exports to the US to survive.



  2. Gail on May 7, 2013 at 9:21 pm

    mmmmmmmmmmm Ok , here is a speculation. Just try it, see how it fits. Let’s call it, ” I know what you did last summer,” or rather ” I know what you’re gonna do damn buster.”

    And it comes from RT. Simply because it CANNOT come from any other MSM outlet, and if if comes from ” Alternate” it will not be believed. However, it is all acronyms. .. possibly. Nothing is what it seems. Easy to blame China. Who else are they going to blame? Al CIA Da? You see there is this, just one of many examples you can find on the net. Hoover Dam on the Dollar.

    http://beforeitsnews.com/conspiracy-theories/2011/10/hoover-dam-likely-the-next-11-11-sacrifice-1231329.html

    As with all the Illuminati stuff, the disasters have been advertised way in advance in one way or another. On the dollar bill, the Illuminati card pack, in movies. So, I think this is a message from RT AND China… as in ” I know what you’re gonna do dam buster! ”

    I speak for myself and maybe many others, but I am so tired of this crap! When are these people going to grow up, get out of Disney World Wag the Dog and start using these same imaging talents to create a better world?



    • cwickenkamp on May 8, 2013 at 12:16 pm

      Actually, RT did not originate the story. They just picked it up.

      Peter Pierce is indeed a spokesperson for the Corps of Engineers in Washington D.C.

      The article was originally published in The Washington Free Beacon, who interviewed Pierce:
      http://freebeacon.com/the-cyber-dam-breaks/

      RT picked up the story, but so did profession journals like Cyber Defense Magazine which has some interesting comments from non-government types:
      http://www.cyberdefensemagazine.com/us-army-corps-of-engineers-national-inventory-of-dams-nid-were-hacked/#sthash.fvolqpmx.dpbs

      Does this make it fact that there were incursions into the NID? No, but it is is a fact that the spurious source RT did not originate the story.

      The publication which originally published it is a reputable, non-MSM source.

      Is it true that China’s military and hacker community do in fact easily and frequently penetrate our Swiss cheese cyber environment? Yes, it is, and it is not news to anybody who follows cyber security.

      What this means is, IMO, we have both the Chinese military and our own twisted elite to worry about. It is too bad they do not cancel each other out.

      ———

      The Chinese people you know and respect are NOT the Chinese military/regime, any more that we here are the regime in DC. It is a good thing to know the difference. Decent attitudes and motive you witness in Chinese people outside China are not the same attitudes and motives of the PLA or the CCP.

      In fact, a recent poll I read done in China reads a lot like a similar poll if done here:

      1. They do not trust their government (the CCP)
      2. They are upset because their government keeps printing money
      3. They are concerned about inflation



  3. DownunderET on May 7, 2013 at 2:46 pm

    Firstly sorry guys for not being around lately, I’ve had computer problems and my computer has been in the computer hospital. (Joseph take note, it isn’t pretty when it does south)

    Back to the Dam Busters, who knows who is behind it, it’s all smoke and mirrors in todays world. Seems to me that with all the firewalls and computer security, it’s still possible to bust in anywhere you like as long as you know “HOW”.

    Well as long as they are concentrating on water and not launch codes for ICBM’ then all’s ok.



    • LSM on May 7, 2013 at 3:09 pm

      “Seems to me that with all the firewalls and computer security, it’s still possible to bust in anywhere you like as long as you know “HOW”

      absolutely- start with Gary McKinnon



      • DownunderET on May 7, 2013 at 3:33 pm

        Hi Larry:

        Yes, the Gary McKinnon story hasn’t been fully told. And from one of Joseph’ interviews with George Ann Hughes, forget which one, he says that he is going to write about GM.

        If Garry McKinnon is telling the truth about NASA’ offworld officers, then there’s your secret space program right there.



  4. LSM on May 7, 2013 at 2:36 pm

    if one would permit me to add an addendum to my previous postings all I can say is this: I work here in Germany with many Asians (mostly Koreans, some Japanese, a handful of Chinese)- the Koreans/Japanese have a slight ‘Asian’ accent when speaking German- the 4 Chinese with whom I work speak fluent, accent-free German as if they were born natives-it’s actually frightening- hey, I’m not making this up!-

    just goes to show us how the Chinese can infiltrate anywhere, make themselves feel at home and wrap themselves around anyone’s finger- I really like these Chinese co-workers- they seem to be lovely people on the surface (intelligent, diligent, extremely polite, etc.) but I’ve always had a gut feeling they have an ace up their sleeves they are not revealing- they’re just too calm and collected (well, poker-faced when they’re being the most polite) and never, ever flip-out (unlike some of my other Asian co-workers, we Americans, Europeans, etc.)-

    make of the info what you will- I’m just relating my own life’s experiences-

    Larry in Germany



    • bdw000 on May 7, 2013 at 3:44 pm

      I really like that kind of info. thanks.



    • Frankie Calcutta on May 7, 2013 at 4:44 pm

      Larry,

      Thanks for the compliment.

      I remember ordering some take out Soul Food when i lived in Manhattan. It was delivered by a Chinese kid. What I later discovered was that the local Chinese restaurant was running several different non-Chinese style take out menus, such as soul food, from the backdoor.

      A silly anecdote I admit, but I found it very revealing of their national character– a lot of pluck and ambition which may leave the rest of us in their dust one day.



  5. Robert Barricklow on May 7, 2013 at 1:34 pm

    The US Government could cry wolf until the cows come home, before I would even begin to believe a word “they” say(never happen).
    The State within in a state, is their blame game scenario, that is winked at, but verboden in official circles.
    Was a done a trial-run mini-marshal-law in Boston? Are they now searching for a national emergency, to run Marshall Law from sea to shining sea…?



  6. Frankie Calcutta on May 7, 2013 at 1:13 pm

    My first thought is that China has more dams probably than any country and a Asian typhoon in 2012 put many on the Chinese eastern seaboard in danger with one actually collapsing and causing numerous casualties. So the high octane speculation would be the Chinese suspect the typhoon was man made by western enemies who were attempting to inundate the vulnerable Chinese dam system and cause a catastrophe. Therefore, the Chinese are probing the US dam system for weaknesses to send a message or, more likely, someone is probing the US system to turn China into a patsy– the supplier of US dam security info to “terrorists.”

    Then I immediately have to ponder the demon Netanyahu’s current visit to China and wonder if the release of this information is more than just a coincidence. Some kind of blackmail to get China to give them a green light to attack Syria/Iran? I notice Israel attacked Syria yesterday without much serious condemnation from Russia. The air strike even included an attack on the facilities housing Russian made surface to air missiles. My guess is the zionists are doing some serious arm twisting to get Russia and China to look the other way while the west pulverizes Syria. The Turkish government’s condemnation of the Israel air strikes is of course drivel to placate the Turkish citizens.

    And while all this is going on, the myopic, moronic Fox news crowd still have their underwear in a bunch over Jane Fonda and Viet Nam and can think of nothing else… until the next media event is engineered to further distract them from real acts of treason.



    • LSM on May 7, 2013 at 1:41 pm

      wow, Frankie, your postings never cease to amaze me- bravo!-

      “Then I immediately have to ponder the demon Netanyahu’s current visit to China and wonder if the release of this information is more than just a coincidence”- if B. Fulfords’s postings are to taken seriously (if, if, IF!!!) Netanyahu was commanded to go to China- sort of puts a different spin on things, if (IF!) true-

      “And while all this is going on, the myopic, moronic Fox news crowd still have their underwear in a bunch over Jane Fonda and Viet Nam and can think of nothing else”- ohh, baby, you know it!-

      stay well- regards-

      Larry



  7. chris on May 7, 2013 at 12:44 pm

    what is an ‘earthen damn ‘ 😉



  8. marcos toledo on May 7, 2013 at 9:05 am

    The bogeyman game again when will our Child Kings stop playing their dangerous stupid games. We are talking of real lives at stake here if somebodies are messing with our dams safety grow up life is not a game.



  9. LSM on May 7, 2013 at 5:33 am

    it wouldn’t surprise me at all if the Chinese are actually behind this simply because of Gary McKinnon’s testimonies; he stated he was the least important snooper in the Pentagon’s PC system: “even the Chinese were in there” (paraphrase)- even if China wasn’t involved and a rogue element is behind this…

    “Alarm bells should be going off because we have next to no national security emergency preparedness planning in place to deal with contingencies like that,’”

    someone like Douglas Dietrich (if he has credibility) has been stating from the very beginning that the bumblingness, incompetence of the DoD is staggering- pretty scary thought- but it corroborates with Van Cleave’s statement



    • cwickenkamp on May 7, 2013 at 9:36 am

      I have to agree about easily dismissing the possibility of the Chinese penetrating the Corps of Engineers.

      This is not to downplay the possibility of dirty tricks on the part of western “interests”.

      But…

      Don’t count the Chinese out. About 3 years ago the NY Times published an article quoting a security expert who discussed a troubling article in an academic journal, written by a Chinese electrical engineer, which dealt with cascading failures in the US power grid:

      Academic Paper in China Sets Off Alarms in U.S.
      http://www.nytimes.com/2010/03/21/world/asia/21grid.html?pagewanted=all
      Links to the actual Chinese research follow.

      Roughly 9 months after that, the Southwest power grid suffered the same kind of cascading failure described in the academic paper, and there was never any very convincing reason given for that failure. Wikipedia’s article on that is as good an explanation as any. But you can read industry pubs about it too if you don’t trust Wiki.

      “The 2011 Southwest blackout, sometimes referred to as the Great Blackout of 2011,[1][2] was a widespread power outage that affected large areas of Southern California as well as western Arizona and northern Baja California and Sonora.[3] It occurred on Thursday, September 8, 2011, beginning at about 3:38 pm PDT. It was the largest power failure in California history.[4]”
      http://en.wikipedia.org/wiki/2011_Southwest_blackout

      The industry was already well aware of the danger of cascading blackouts, and their excuses seemed rather weak, as well as their spirited denial of any “terrorist” connection. I think the blackout was a “calling card”, this is my supposition.

      Security experts have told the managers of infrastructure utilities for some time to get their security together. That is historical fact.

      They started a little too late on that project.

      The Chinese hacked Northrop and stole everything but their laundry lists, and you can read about that too. The important thing is that Northrop developed the software for the military drones, one of which was cooincidentally brought down by Iran with China’s help. That is also a fact.

      Cyberwarfare is consistent with Peoples Liberation Army military writings. Two military doctrine publications, Science of Strategy, and Science of Campaigns identify information warfare (IW) as integral to achieving information superiority and an effective means for countering a stronger foe.

      This strategy is called integrated network electronic warfare, and it is one of the basic forms of integrated joint operations. They take it very seriously. This is fact.

      The authors of the Chinese article published another one on the same topic. Here are links to their research:

      Cascade-based attack vulnerability on the US power grid
      http://www.sciencedirect.com/science/article/pii/S0925753509000174

      Effect Attack on Scale-Free Networks due to Cascading Failures
      http://iopscience.iop.org/0256-307X/25/10/084

      There’s more than one thief in the bazaar.



      • LSM on May 8, 2013 at 3:17 pm

        great info, cwickenkamp- I’ll try to sift through it- thanks-

        and I think one mustn’t forget the Li family (as mentioned in Dr. Farrell’s “Babylon’s Banksters”)



Help the Community Grow

Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.

Upcoming Events