A piece in the conversation.com, gives an excellent coverage of the cyber threat posed by ransomware attacks. The reader can follow up the details if interested, but my concern now is upon the bigger picture, whether there is an impending massive cyber-attack upon the internet and essential IT infrastructure. Fellow fringe dweller dissents are concerned about the latest cyber polygon event, reported below. As the article says, Australia is a sitting duck, and if you think Covid produced chaos, just wait what happens when the lights go out. Present South Africa will be a tea party, if the black outs damage power stations, and it is power down indefinitely.
“Australian organisations are a soft target for ransomware attacks, say experts who yesterday issued a fresh warning that the government needs to do more to stop agencies and businesses falling prey to cyber-crime. But in truth, the danger has been growing worldwide for more than three decades.
Despite being a relatively new concept to the public, ransomware has roots in the late 1980s and has evolved significantly over the past decade, reaping billions of dollars in ill-gotten gains.
With names like Bad Rabbit, Chimera and GoldenEye, ransomware has established a mythical quality with an allure of mystery and fascination. Unless, of course, you are the target.
Victims have few options available to them; refusing to pay the ransom depends on having good enough backup practices to recover the corrupted or stolen data.
According to a study by security company Coveware, 51% of businesses surveyed were hit with some type of ransomware in 2020. More concerningly still, typical ransom demands are climbing dramatically, from an average of US$6,000 in 2018, to US$84,000 in 2019, and a staggering US$178,000 in 2020.”
https://www.theorganicprepper.com/cyber-polygon-2020/
“Cyber Polygon 2020 Digital Pandemic is Now Complete
Many may wonder just what in the world happened there. The convention was kind enough to publish the findings for the rest of us to peruse at our leisure.
As noted by the official website, “The central theme of the event was a ‘digital pandemic.’ No surprise to those of us who paid attention. It’s because of this moniker that so many people have been concerned in the first place.
Videos published by the World Economic Forum set mental alarms off for Americans nationwide. According to this video, a cyber attack could be 10x more prevalent than what we’ve experienced with COVID-19. The narrator within the video states, “Fortunately, at least until now, cyber-attacks have not impacted our health the way pandemics have. At least until now.”
The video goes on to state, “The only way to stop the exponential propagation of a COVID-like cyber threat is to fully disconnect the millions of vulnerable devices from one another and from the internet.”
How Would a Full Disconnect Be Implemented and What Would the Effects Be?
One possible way would involve the use of an internet kill switch. Not only do those exist, but the US government has access to one. Theoretically, if you can turn off the internet, large segments of the population will be disconnected from one another. Meaning, what happens in one geographic region will go utterly unrecognized by citizens everywhere else.
Think about the practical implications of such. Think about the potential for further human rights violations. Perhaps a world where all news sources disappear overnight, with your favorite collectivist news agency being the only website still on the air?
Just Take a Look at Egypt in 2011
Protests by citizens fed up with the constant human rights violations they experienced under the current administration spread throughout the entire nation of Egypt in 2011. In an attempt to disband the protesters and keep them from organizing, Egypt hit its internet kill switch.
Egyptians responded by resorting to mesh networks such as Firechat (which is sadly now gone) to communicate with one another. Still, there’s no doubt that the internet shutdown was a significant blow to both the people and their businesses.
Though the internet was “dead” for only five days, it cost the Egyptian economy approximately $90 million US.
Approximately 5 million People From 57 Nations Tuned in to the Live Stream
The Cyberpolygon 2020 live stream “featured global leaders and experts, including Mikhail Mishustin, Prime Minister of the Russian Federation, and Klaus Schwab, Founder and Executive Chairman, World Economic Forum, as well as top officials from INTERPOL, ICANN, Visa, IBM, Sberbank, MTS and other organizations.”
These leaders and experts spoke on the subject of cyber threats and cyber pandemics. But that wasn’t all.
From the official website: The experts addressed the latest trends and technological threats, shared their experience in creating cybersecurity ecosystems, talked about the transforming threat landscape, and discussed the problem of fake news and how to discern misinformation on the Web
Coincidentally, one of the end goals of Cyber Polygon was to determine how to do a more thorough job of silencing all criticism that goes against the mainstream narrative.
If One Can Shut Down All Alternative Viewpoints, One Can Become the Sole Provider of “Truth”
If you’re a regular reader of The Organic Prepper, you’ve already seen this up close and personal. We were defunded roughly just one month ago. Why? For being a ‘misinformation site.’
It doesn’t matter how many scientists a person has to back up what they say. It doesn’t matter how many links to scientific journals a person adds. If anyone dares go against what the politicians and their ‘fact checkers’ deem to be correct, they will be silenced.
I believe “alternative” news sites are the only trustworthy source of news at the moment. Sites such as Zero Hedge, Children’s Health Defense, Daily Expose, Activist Post, The Last American Vagabond, Technocracy News, Survival Blog (and of course The Organic Prepper) are the only sites I trust to give me accurate information.
As far as I’m concerned, all else is misinformation. It’s propaganda.
However, these sources are just a fraction of the size of the major players (and you know who they are). If they are successfully stamped out, we will quickly end up in the type of situation warned of by FA Hayek in his excellent book The Road to Serfdom.
From Hayek: “If all the sources of current information are effectively under one single control, it is no longer a question of merely persuading the people of this or that. The skillful propagandist then has the power to mold their minds in any direction he chooses, and even the most intelligent and independent people cannot entirely escape that influence if they are long isolated from all other sources of information.”
(Hayek has much else to say about our current situation within the chapter ‘The End of Truth.’ It virtually reads as a play-by-play of the last year and a half.)
Technical Training Followed the Live Stream
Here, a collection of some of the best cybersecurity workers in the world gathered together into two teams to simulate a cyberattack of massive scope in real-time. This simulation involved 120 teams from 29 countries, and “the event was joined by state and law enforcement agencies, financial, educational and healthcare institutions, organizations from the IT, telecom, energy, metal, chemical, aerospace engineering and other industries.”
The good guys were the Blue Team, which protected their little chunks of infrastructure from the cyber-attack. The bad guys who conducted the attack were the Red Team. This simulation split into two halves: the real-time threat and the post-attack investigation. Throughout the real-time simulation, the Blue Team had to contain the cyberattack as best they could.
The banking industry and companies within the realm of IT “demonstrated the highest resilience.” However, it was also discovered that, as a whole, “technical specialists are better prepared for investigation than for defense.” The entire investigation process involved regular forensics as well as a concept known as Cyber Threat Hunting.
Cyber Threat Hunting is looking for cyber attacks that haven’t set off your early alert system. You may have anti-virus software, but it only alerts you to what it sees. If it doesn’t see it, no alarm is raised. With Threat Hunting, you seek to discover the hiding places where a cyber attack is lurking – or has already taken place – outside of the realm of where your traditional alarm systems would have guarded.”