0 0
Read Time:7 Minute, 17 Second

Taken directly from Russian sites:

Pompous words about cooperation and increased security are just a cover for probing weaknesses and blocking proposed responses.

For ten days, an imitation of a large-scale cyberattack on the global financial system was carried out with the aim, as officially stated, “to expand cooperation that could help minimize any potential damage to financial markets and banks.” The simulation scenario suggested the leakage of classified information into the public space and the subsequent fabrication of false news, which, according to the legend of the teachings, led to global financial chaos. 

Representatives of the World Bank, the International Monetary Fund, the Bank for International Settlements, the Israeli Ministry of Finance, as well as officials from Austria, the United Arab Emirates, Great Britain, Germany, Israel, Italy, the Netherlands, the United States, Thailand and Switzerland took part in the cyber exercises. Israeli cyber official Rahav Shalom-Revivo said that such a large-scale attack on the global financial system can only be carried out by “sophisticated attackers”. 

Commenting on the Collective Power exercises held in Israel, experts from the Russian Institute for International Political and Economic Strategies that “such a“ anticipation of events ”could be observed on the eve of the outbreak of the COVID-19 virus. In New York, on October 18, 2019, Johns Hopkins University, with the participation of the Bill and Melinda Gates Foundation and the World Economic Forum, conducted a pandemic training exercise, called the “Event 201” exercise. It is noteworthy that the exercise was attended by representatives of the same countries that met again to plan the future of humanity in Israel. 

The organizers of the exercise “Event 201” (Event 201) offered partners an introductory, according to which a new strain of coronavirus has appeared in Brazil, which has killed 65 million people. Two months after these exercises, China officially announced a new disease, it is not known how it got to its territory. 

During the Collective Force exercise, a scenario of a large-scale cyberattack was simulated, which spreads a malicious computer virus across all countries, similar to the coronavirus, only ten times faster. The Internet will be completely paralyzed, electricity will be cut off, life support systems will stop working: heating, water supply, sewerage. Industrial enterprises will freeze, transport will stop, in a matter of days civilization will plunge into chaos. 

A year earlier, the founder of the World Economic Forum, Klaus Schwab,  warned  of the threat of “a daunting scenario of an all-encompassing cyberattack that would lead to a complete shutdown of electricity, transportation and hospital services and our society as a whole.” Note that the scenario of a global cyberattack presented during the Collective Force exercise can only be implemented (excuse the tautology) by the cyber command of the US Armed Forces. Effective cyberattacks are a key element of the Pentagon’s modern military doctrine – the so-called Third Offset Strategy (TOS-3),  developed by the  US Center for Strategic and Budgetary Assessments (CSBA).

MITRE is a global leader in cybersecurity and is involved in the Pentagon’s cyberwarfare project, the so-called Plan X. The DARPA website  reports that “Plan X is a foundational cyberwarfare program aimed at developing platforms for the Department of Defense to plan, conduct and evaluate cyberwarfare. .. To this end, the program will connect cyber communities of interest, from academia to the defense industry, the commercial technology industry, and user experience experts. ” As part of the “Plan X» MITRE company  established  STIX protocols (Structured Threat Information eXpression) and TAXII (Trusted Automated eXchange of Indicator Information),  intended  to inform about cyber threats.

The third counterbalancing strategy is aimed at increasing the importance of the most effective types of weapons in modern conditions, primarily cyber weapons. The key role in the implementation of TOS-3 is played by the American non-profit company MITRE Corporation (Center for Technology and National Security), which works in the field of systems engineering and creates developments in the interests of the US government, primarily the Department of Defense. Within the framework of TOS-3, this corporation has been allocated an order of magnitude more funds from the federal budget than, for example, the famous RAND Corporation. 

A special place in the development of MITRE is occupied by the ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) software matrix-framework, a kind of virtual encyclopedia of methods of various hackers. This matrix provides a comprehensive view of the behavior of virtual attackers when networks are compromised and can be used for offensive operations on the Internet. In particular, ATT&CK  can be useful  in cyber intelligence. 

One of the most ambitious and clearly aimed at attack, rather than defense, MITRE’s developments is the  Unfetter project, created in cooperation with the NSA  . It empowers cybersecurity professionals to identify and analyze security breaches on enemy computers. The names of the MITRE software products are symbolic. As you know, Styx (STIX) in ancient Greek mythology is the personification of primitive horror and darkness, as well as the name of the river in the underworld of death. The abbreviation ATT&CK speaks for itself.

One of the most ambitious and clearly aimed at attack, rather than defense, MITRE’s developments is the  Unfetter project, created in cooperation with the NSA  . It empowers cybersecurity professionals to identify and analyze security breaches on enemy computers. The names of the MITRE software products are symbolic. As you know, Styx (STIX) in ancient Greek mythology is the personification of primitive horror and darkness, as well as the name of the river in the underworld of death. The abbreviation ATT&CK speaks for itself. 

Among the main programs of the company are developments in the field of control of operations of the so-called multi-domain war (Command and control of multi-domain operations). This means that MITRE specialists are working to create a single digital theater space, and the main battles in this war will take place in virtual space, but the destruction of strategic and infrastructure facilities will be comparable to the damage from missile and bomb attacks. According to  The New York Times, the list of US Cyber Command targets includes “civil institutions and municipal infrastructure … including power grids, banks and financial networks, transportation and telecommunications,” that is, all those targets that were identified in the exercise scenario ” Collective power “. 

The US Cyber Command used MITRE’s developments to attack the power systems of  Venezuela  and Russia. In Venezuela, this led to massive power outages across the country and caused a humanitarian disaster. In Russia, cyberattacks by the US military on Russian power grids have been successfully repelled, according  to the  press secretary of the Russian president, Dmitry Peskov. 

In June 2019, The New York Times, citing knowledgeable sources,  reported that the United States has intensified its attempts to infiltrate the control systems of Russian energy grids since 2012. However, now, as indicated in the material, Washington’s strategy has become more aggressive and tends to place malicious software on Russian networks. 

The Kremlin confirmed that strategic areas of the Russian economy have been and are being subjected to cyberattacks from abroad more than once. “Our departments are constantly fighting this in order to prevent harm to our economy and our sensitive areas,” said Dmitry Peskov. 

Commenting on the publication of the New York Times about the attempts of the US intelligence services to introduce malicious code to carry out cyberattacks on the Russian energy system, Peskov added that “this information testifies to the hypothetical possibility of all signs of cyberwar, cyberwar actions against Russia.” The so-called Duck Test is widely known: “If something looks like a duck, swims like a duck and quacks like a duck, then it probably is a duck.” 

There is a strong suspicion that if the global cyberattack predicted in the course of the Collective Force exercises happened, the notorious Russian hackers, behind which, of course, Moscow stands, will be named as the “sophisticated attackers” who created it. In fact, all the pompous words about cooperation and strengthening security are just a cover for the true purpose of the operation, which is to probe weaknesses and block the intended response and defense measures. In other words, it is a false flag operation.

The “duck test” in relation to the possible initiators of a global cyberattack unambiguously points to the US cyber command. Suffice it to recall the cyberattacks of the United States and Israel on Iran by the Stuxnet virus, the cyberattacks on the Russian energy systems that we repelled. It seems that now our partners in the West have something more impressive in mind.

 

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence