SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices -- Ignore unavailable to you. Want to Upgrade?


To: combjelly who wrote (587209)9/25/2010 10:49:40 AM
From: bentway  Respond to of 1583684
 
Malware Hits Computerized Industrial Equipment

By RIVA RICHMOND
bits.blogs.nytimes.com

The technology industry is being rattled by a quiet and sophisticated malicious software program that has infiltrated factory computers.

The malware, known as Stuxnet, was discovered in mid July, at least several months after its creation, by VirusBlokAda, a Belarussian computer security company that was alerted by a customer.

Security experts say Stuxnet attacked the software in specialized industrial control equipment made by Siemens by exploiting a previously unknown hole in the Windows operating system.
The malware marks the first attack on critical industrial infrastructure that sits at the foundation of modern economies.

It also displays an array of novel tactics like an ability to steal design documents or even sabotage equipment in a factory that suggest its creators are much more sophisticated than hackers whose work has been seen before. The malware casts a spotlight on several security weaknesses.

Eric Chien, the technical director of Symantec Security Response, a security software maker that has studied Stuxnet, said it appears that the malware was created to attack an Iranian industrial facility. Security experts say that it was likely staged by a government or government-backed group, in light of the significant expertise and resources required to create it. The specific facility that was in Stuxnet’s crosshairs is not known, though speculation has centered on gas and nuclear installations.

Since it was unleashed, Stuxnet has spread to plants around the world. Siemens said it has received 15 reports from affected customers, five of which were located in Germany. All of these sites successfully removed the malicious program, which can be detected and removed by commercial antivirus programs. “Up to now there have been no instances where production operations have been influenced,” the company said in an e-mailed statement. Security researchers initially believed Stuxnet’s primary purpose was espionage because of its ability to steal design documents for industrial control systems. But more in-depth study of the program, which is extremely large and highly complex by malware standards, has revealed that it can also make changes to those systems.

Exactly what Stuxnet might command industrial equipment to do still isn’t known. But malware experts say it could have been designed to trigger such Hollywood-style bedlam as overloaded turbines, exploding pipelines and nuclear centrifuges spinning so fast that they break. “The true end goal of Stuxnet is cyber sabotage. It’s a cyber weapon basically,” said Roel Schouwenberg, a senior antivirus researcher at Kaspersky, a security software maker. “But how it exactly manifests in real life, I can’t say.”

Stuxnet’s remarkable sophistication has surprised many security professionals. Its authors had detailed knowledge of Siemens’ software and where its security weaknesses are. They discovered and used four unknown security flaws in Microsoft’s Windows operating system. And they masked their attack with the aid of sensitive intellectual property stolen from two hardware companies, Realtek and JMicron, which are located in the same office park in Taiwan.

“It’s impossible this was created by some teenager in his basement,” Mr. Chien said. “The amount of resources and man hours to put this together,” he said, show “it has to be something that was state originated.”



To: combjelly who wrote (587209)9/25/2010 12:01:28 PM
From: steve harris1 Recommendation  Read Replies (1) | Respond to of 1583684
 
I see SEIU is doing a pretty good job in Houston with voter fraud.

foxnews.com

Most of the findings focused on a group called Houston Votes, a voter registration group headed by Steve Caddle, who also works for the Service Employees International Union. Among the findings were that only 1,793 of the 25,000 registrations the group submitted appeared to be valid. The other registrations included one of a woman who registered six times in the same day; registrations of non-citizens; so many applications
from one Houston Voters collector in one day that it was deemed to be beyond human capability; and 1,597 registrations that named the same person multiple times, often with different signatures.



To: combjelly who wrote (587209)9/29/2010 10:34:27 AM
From: longnshort  Read Replies (1) | Respond to of 1583684
 
Texas SEIU Member Registers 23,207 Fraudulent Voters
texasinsider.org

By Warner Todd Huston

Texas Insider, September 27 2010 – Service Employees International Union (SEIU) member Steve Caddle of Houston, Texas has been caught registering 23,207 fake voters in Harris County alone due to the hard detective work of Catherine Engelbrecht and her “True the Vote” project.

This is one of the best examples of what good citizen activism inspired by Tea Party principles can do for their community.

Catherine Engelbrecht was sick and tired of the vote fraud perpetrated by unions and Democrats and set out to expose it herself. Along with many friends who donated their time, computers, and sweat, they’ve uncovered thousands upon thousands of illegal Democrat “voters” in Texas.

“The integrity of the voting rolls in Harris County, Texas, appears to be under an organized and systematic attack by the group operating under the name Houston Votes,” the Harris voter registrar, Leo Vasquez, charged as he passed on the documentation to the district attorney. A spokesman for the DA’s office declined to discuss the case. And a spokesman for Vasquez said that the DA has asked them to refrain from commenting on the case.

The union thug behind this particular criminal enterprise admitted only that there “had been mistakes made.” Yeah, like not worrying about icebergs was just a “mistake” made by the Titanic’s crew! Of the 25,000 voter registrations turned in by Caddle only about 1,793 were legal.

“Vacant lots had several voters registered on them. An eight-bed halfway house had more than 40 voters registered at its address,” Engelbrecht said. “We then decided to look at who was registering the voters.”

….The other registrations included one of a woman who registered six times in the same day; registrations of non-citizens; so many applications from one Houston Voters collector in one day that it was deemed to be beyond human capability; and 1,597 registrations that named the same person multiple times, often with different signatures.

Does anyone have any doubt that this sort of crime has been perpetrated by Democrats the nation over? How many millions of fake, dead, nonexistent, and/or fraudulent voters have Democrats foisted upon the voter rolls in every corner of the nation?

Well, due to the excellent work of Catherine Engelbrecht we see exposed at least some of the criminal behavior of Texas Democrats and Union thugs.

So what was the outcome of Engelbrecht’s hard work? All of Harris County’s voting machines were torched in a three-alarm fire by person or persons unknown. Bet those shadowy firebugs hold SEIU membership cards, too!

Great work, Catherine. Now let’s see this replicated in every city in the nation.