Critical infrastructure
Search documents
X @Bloomberg
Bloomberg· 2025-11-19 15:07
German Chancellor Friedrich Merz’s cabinet approved legislation that enables the Bundeswehr armed forces to shoot down unidentified drones suspected of spying on military bases, industrial facilities and other critical infrastructure. https://t.co/bXAW0nlymx ...
China's hacked into U.S. critical infrastructure to preposition for future conflict: Nicole Perlroth
CNBC Television· 2025-11-05 16:42
Let's turn now to cyber security. A new documentary podcast out this week examines China's rise to cyber supremacy and the state sponsored hackers haunting America's infrastructure. Joining us now, Nicole Pearl Roth, former cyber security reporter at the New York Times and the host of To Catch a Thief: China's Rise to Cyber Supremacy.She's also the author of This Is How They Tell Me the World Ends, an expose on the global cyber arms race. And she served on the Department of Homeland Security Cyber Security ...
How Yi Peng 3 and Newnew Polar Bear wreaked havoc in the Baltic Sea
60 Minutes· 2025-09-28 23:23
Geopolitical Risk & Security Concerns - Critical undersea infrastructure, such as the Slink 2 electric cable between Finland and Estonia, has been severely damaged, raising concerns about national security [1] - Suspicion falls on Russia, with potential intentional acts of aggression impacting NATO airspace and critical infrastructure [3] - The use of a "shadow fleet" by Russia to circumvent sanctions is highlighted as a potential factor contributing to these incidents [4][5][8] - NATO has initiated Operation Baltic Sentry to monitor underwater infrastructure and commercial vessels in the Baltic Sea, acting as a deterrent [15][16] Investigation & Attribution Challenges - The Eagle S oil tanker is suspected of deliberately severing the undersea cable, with police investigating the incident [2] - Investigations into incidents involving the Newnew Polar Bear and Yeping 3 are ongoing, with both vessels suspected of damaging undersea cables [9][10][11] - Proving intentional damage on the high seas is difficult, with crews often claiming accidents [12][13] Economic & Financial Implications - Russia continues to sell as much oil as before the war, potentially funding its military operations [7] - A Russian oil company leased a ship for $35 million for two years, which was then used to purchase the ship, highlighting financial mechanisms used to operate the shadow fleet [6]
X @Mike Benz
Mike Benz· 2025-08-08 20:15
Why are "elections" still designated as "critical infrastructure" by DHS, when that DHS designation only happened in January 2017 because of the Russia hoax? With the Russia hoax now busted, shouldn't sovereignty over elections go back to the states? https://t.co/XFFoHmzzMnJeff Fulgham (@jeffmfulgham):On January 6, 2017 the outgoing Obama Admin with Deep State guidance designated state election systems as a federal Critical infrastructure.This allowed them to seize security jurisdiction over centralized vot ...
X @Mike Benz
Mike Benz· 2025-08-03 07:10
@joerogan 14. By mid-2021, everything had become "critical infrastructure," so government could censor anything. Our financial system was "critical infrastructure," so there goes questioning banks. Our climate was, so there goes questioning climate change. Ukraine, immigration, the works. https://t.co/fgBn8jLcDx ...
X @Mike Benz
Mike Benz· 2025-08-03 06:07
@joerogan 12. It was trick after trick after trick. The "critical infrastructure" trick gave DHS control over elections. Then, the "delegitimization" trick let DHS say any posts casting doubt on mail-in ballots or voting machines attacked "critical infrastructure"https://t.co/Fo7ArAlz7d https://t.co/35XKszzhMFMike Benz (@MikeBenzCyber):My response to the Washington Post.This is a 40-minute lecture, Part 1 in what I'd like to be an ongoing series, Censorship Industry Decoded.This first video cut through the ...
Companies need to be on high alert from Iran cyber attacks, says TrustedSec CEO David Kennedy
CNBC Television· 2025-06-23 18:08
Cybersecurity Threat Landscape - Iran's cyber capabilities are on par with other nation states and are leveraged as a direct extension of military force [2] - DHS and CISA have issued advisories for private sector corporations and government entities to be on high alert for cyber attacks [3] - Iran can inflict substantial damage in the US across manufacturing, supply chain, retail, and critical infrastructure without necessarily crossing the red line of loss of life [4] - Iran typically targets user accounts through phishing or social engineering, directly attacks external perimeters, and increasingly targets cloud infrastructure and SaaS providers [6] - Over 85% of critical infrastructure is privately owned, making it a vulnerable target [7] - Iran has been attempting to conduct operations for this type of event, potentially having undetected footholds in organizations and critical infrastructure [9] - Iran is specifically targeting industry verticals, which is not typical [10] Market Impact - Cybersecurity stocks such as Fortinet, CrowdStrike, and Zscaler are up by about 1.5% to 2.5% [5] - Palo Alto is up about 1.7% [6] Defensive Recommendations - Companies should be on high alert and diligent in putting up defenses and monitoring for specific issues to minimize damage [4][8] - Companies should be very diligent due to the current times [10]
Messing: Pro-Iranian groups target U.S. from small businesses to critical infrastructure
CNBC Television· 2025-06-23 11:33
Potential Cyber Threats - Pro-Iranian groups are shifting focus to target the United States, including critical infrastructure and even easily accessible devices like security cameras [2] - The aim of these attacks is a mix of causing actual damage, spreading disinformation or intimidation, and leaking information [2] - Pro-Iranian groups have already initiated denial of service attacks on American websites, signaling a shift in the cyber warfare landscape [3] Recommendations for Protection - US companies and government entities should raise their security awareness and vigilance, recognizing they could become targets [5] - Organizations should identify their critical network assets and assess their connections, paying special attention to potentially vulnerable devices like security cameras [5] - Companies should ensure they have the latest software patches and versions to address known vulnerabilities [6] - Employee training is crucial to combat spear phishing attacks via email, social media, and instant messaging apps, emphasizing password security [6][7] - Knowledge and awareness are crucial, representing approximately 50% of the solution to mitigate these threats [7]