Workflow
Critical infrastructure
icon
Search documents
X @Mike Benz
Mike Benz· 2025-08-08 20:15
Why are "elections" still designated as "critical infrastructure" by DHS, when that DHS designation only happened in January 2017 because of the Russia hoax? With the Russia hoax now busted, shouldn't sovereignty over elections go back to the states? https://t.co/XFFoHmzzMnJeff Fulgham (@jeffmfulgham):On January 6, 2017 the outgoing Obama Admin with Deep State guidance designated state election systems as a federal Critical infrastructure.This allowed them to seize security jurisdiction over centralized vot ...
X @Mike Benz
Mike Benz· 2025-08-03 07:10
@joerogan 14. By mid-2021, everything had become "critical infrastructure," so government could censor anything. Our financial system was "critical infrastructure," so there goes questioning banks. Our climate was, so there goes questioning climate change. Ukraine, immigration, the works. https://t.co/fgBn8jLcDx ...
X @Mike Benz
Mike Benz· 2025-08-03 06:07
@joerogan 12. It was trick after trick after trick. The "critical infrastructure" trick gave DHS control over elections. Then, the "delegitimization" trick let DHS say any posts casting doubt on mail-in ballots or voting machines attacked "critical infrastructure"https://t.co/Fo7ArAlz7d https://t.co/35XKszzhMFMike Benz (@MikeBenzCyber):My response to the Washington Post.This is a 40-minute lecture, Part 1 in what I'd like to be an ongoing series, Censorship Industry Decoded.This first video cut through the ...
Companies need to be on high alert from Iran cyber attacks, says TrustedSec CEO David Kennedy
CNBC Television· 2025-06-23 18:08
Cybersecurity Threat Landscape - Iran's cyber capabilities are on par with other nation states and are leveraged as a direct extension of military force [2] - DHS and CISA have issued advisories for private sector corporations and government entities to be on high alert for cyber attacks [3] - Iran can inflict substantial damage in the US across manufacturing, supply chain, retail, and critical infrastructure without necessarily crossing the red line of loss of life [4] - Iran typically targets user accounts through phishing or social engineering, directly attacks external perimeters, and increasingly targets cloud infrastructure and SaaS providers [6] - Over 85% of critical infrastructure is privately owned, making it a vulnerable target [7] - Iran has been attempting to conduct operations for this type of event, potentially having undetected footholds in organizations and critical infrastructure [9] - Iran is specifically targeting industry verticals, which is not typical [10] Market Impact - Cybersecurity stocks such as Fortinet, CrowdStrike, and Zscaler are up by about 1.5% to 2.5% [5] - Palo Alto is up about 1.7% [6] Defensive Recommendations - Companies should be on high alert and diligent in putting up defenses and monitoring for specific issues to minimize damage [4][8] - Companies should be very diligent due to the current times [10]
Messing: Pro-Iranian groups target U.S. from small businesses to critical infrastructure
CNBC Television· 2025-06-23 11:33
Potential Cyber Threats - Pro-Iranian groups are shifting focus to target the United States, including critical infrastructure and even easily accessible devices like security cameras [2] - The aim of these attacks is a mix of causing actual damage, spreading disinformation or intimidation, and leaking information [2] - Pro-Iranian groups have already initiated denial of service attacks on American websites, signaling a shift in the cyber warfare landscape [3] Recommendations for Protection - US companies and government entities should raise their security awareness and vigilance, recognizing they could become targets [5] - Organizations should identify their critical network assets and assess their connections, paying special attention to potentially vulnerable devices like security cameras [5] - Companies should ensure they have the latest software patches and versions to address known vulnerabilities [6] - Employee training is crucial to combat spear phishing attacks via email, social media, and instant messaging apps, emphasizing password security [6][7] - Knowledge and awareness are crucial, representing approximately 50% of the solution to mitigate these threats [7]