Podcasts about grizzly steppe

  • 7PODCASTS
  • 10EPISODES
  • 50mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jun 19, 2024LATEST

POPULARITY

20172018201920202021202220232024

Related Topics:

russian

Best podcasts about grizzly steppe

Latest podcast episodes about grizzly steppe

Conspiracy Clearinghouse
Power Is Power: The Vulnerable Electrical Grid

Conspiracy Clearinghouse

Play Episode Listen Later Jun 19, 2024 45:22


EPISODE 113 | Power Is Power: The Vulnerable Electrical Grid Guest: Chris Underwood, author of the The Cold Winter series Our digital age needs electricity more than anything else. But what would happen is part of the power grid went down during one of the worst winter storms in history? That's the premise of Chris Underwood's thriller series The Cold Winter. The fact is that power grid is vulnerable, and a series of low-tech in recent years have highlighted some serious problems that have still not been addressed.  Like what we do? Then buy us a beer or three via our page on Buy Me a Coffee. #ConspiracyClearinghouse #sharingiscaring #donations #support #buymeacoffee You can also SUBSCRIBE to this podcast. Review us here or on IMDb! SECTIONS 02:35 -  A look at the first two novels, the inspiration and overall plot 09:10 - The third book, the history of the Ohio River, companies still use COBOL, Huey helicopters and LST-235 13:56 - Blackouts inspire the Pentagon to commission the report Brittle Power, it all costs money, attacks against the grid in the 70s and later - the Metcalf Sniper Attacks, Russian hacks by Grizzly Steppe, transformers made in China, Jason Woodring's Arkansas attacks, a neo-Nazi couple in Baltimore, human attacks increasing, power stations themselves need power 24:20 - Weaponizing extreme climate, HAARP, the Walking Dead with weather, people become extreme in extreme situations 27:47 - Four types of threats, false flags  32:57 - We ship coal to China, cold fusion holdouts, education is the cure, the cavalry is not coming  37:38 - Point Pleasant's Mothman Festival, The Creatures of Holden Beach, this is a different Chris Underwood, prepper conventions, the Dayton Air Show Music by Fanette Ronjat More Info Chris Underwood website The Cold Winter series by Chris Underwood The Mist by Stephen King The Road by Cormac McCarthy How a butterfly's wing can bring down Goliath / Chaos theories calculate the vulnerability of megasystems Blackouts cause N America chaos Hacking The Electric Grid Is Damned Hard Keeping the electric grid safe from attack Sophisticated but low-tech power grid attack baffles authorities U.S. Power Grid Vulnerable to Attack: Congressional Research Service Attacks on power substations are growing. Why is the electric grid so hard to protect? How the US power grid is a target for far-right groups The story of Jason Woodring, the Arkansas power grid vandal Southern Idaho Man Sentenced for Destruction of Energy Facility After Shooting at Idaho Power Hydroelectric Plants Sniper attack on California power grid may have been 'an insider,' DHS says Physical attacks on power grid surge to new peak Extremists keep trying to trigger mass blackouts — and that's not even the scariest part What is going on with attacks on American power stations? Brittle Power: Energy Strategy for National Security by Amory B. Lovins and L. Hunter Lovins Electric Power Grid 'Inherently Vulnerable' to Terrorist Attacks Girding the Grid in Security Management  Scientists successfully replicate historic nuclear fusion breakthrough three times A Bridge Too Far: The Mothman Visits Point Pleasant episode Mothman Festival website The Creatures of Holden Beach.....And the Murder they did NOT Commit! by Chris Underwood Prepper Camp The Dayton Air Show Follow us on social: Facebook Twitter Other Podcasts by Derek DeWitt DIGITAL SIGNAGE DONE RIGHT - Winner of a 2022 Gold Quill Award, 2022 Gold MarCom Award, 2021 AVA Digital Award Gold, 2021 Silver Davey Award, 2020 Communicator Award of Excellence, and on numerous top 10 podcast lists.  PRAGUE TIMES - A city is more than just a location - it's a kaleidoscope of history, places, people and trends. This podcast looks at Prague, in the center of Europe, from a number of perspectives, including what it is now, what is has been and where it's going. It's Prague THEN, Prague NOW, Prague LATER  

MarketScale Technology
Parabellum: Attack on US Critical Infrastructure and the Post Mortem of an IT/OT Attack

MarketScale Technology

Play Episode Listen Later Apr 28, 2020 57:35


Tony Rowan, Cyberbit Cybersecurity Architect, provided a deep-dive into the Grizzly Steppe campaign which targeted critical infrastructure networks in North America. Rowan introduced the discussion with an overview of Cyberbit, before he launched into some examples of several attacks on OT (Operational Technology) networks over the last few years. Rowan provided a kill chain analysis of the attack, saying: "It is pretty much to be expected now to be an arm of any future warfare to include attacks on infrastructure through cyber techniques." Why are OT networks at risk? Rowan walked through several potential reasons. One of the main ones being the convergence of IT and OT networks which increases connectivity to the outside world. Other factors increasing OT risk are lack of OT monitoring and inherent design flaws. Rowan offered steps to prevent similar attacks, focusing on a segmented network architecture, obtaining more visibility into assets and network communications, creating a robust OT security policy, and establishing a means to detect both known and unknown threats.

The CyberWire
SHA-1 is broken. Grizzly Steppe and Carbanak. M&A notes. Linux patched. Arrest in Deutsche Telekom hack. The insecurities of connected cars. 

The CyberWire

Play Episode Listen Later Feb 24, 2017 19:39


SHA-1 is broken, for real. Grizzly Steppe threat actors seem to have a lot in common with the Carbanak gang. Bitcoin exchange hit by DDoS. Linux patches an old vulnerability. Reuters says Symantec was in talks to buy FireEye, but the companies backed away from a deal. An arrest in the Deutsche Telekom hack. Dr. Charles Clancy from Virginia Tech's Hume Center explores the designation of election systems as critical infrastructure. Jason Porter from AT&T decribes the newly formed IoT Cybersecurity Alliance. And what the vulnerability researchers found when they looked at connected cars.

The CyberWire
Patcher ransomware. Locky, Cryptowall, and Cerber are still active; so is old-fashioned blackmail. NSA keeps the VEP. Reactions to New York State's cyber regs for banks. Observations of BugDrop, and thoughts on cyber war and attribution.

The CyberWire

Play Episode Listen Later Feb 23, 2017 14:25


In today's podcast, we hear about how Patcher ransomware is infesting Macs. Locky, Cryptowall, and Cerber are also still out and about in the wild. NSA seems likely to continue its Vulnerabilities Equities Process. Industry reactions to New York State's coming cybersecurity regulations for financial institutions. A look back at RSA discussions of cyber warfare. Further developments in the study of BugDrop malware. Terbium Labs' Emily Wilson examines the way novel exploits becomes part of the standard tool kit. And TruSTAR looks at Grizzly Steppe and has some thoughts on the difficulties of attribution.

This Comes Next
2: Jay Carmona Goes To Washington [January 29, 2017]

This Comes Next

Play Episode Listen Later Jan 30, 2017 122:44


They start by taking about Jay's recent visit to Washington DC to disrupt the inauguration and to participate in the Women's March. Tom provides a footnote to open source activism and talks about what he would like to see in terms of the strength of discourse. Jay raises the size of crowds and Tom talks about some of the science behind this. Sean Spicer is impossible to ignore. Tom puts his experience in San Jose up for analysis. Jay provides a great insight on her time in DC with an example of strategic use of privilege. Under Jay's instigation they return to Assange and the Russians. Tom gives some analysis on Grizzly Steppe. [Note: Unfortunately there were various technical difficulties which cut a small portion of the recording.] Tom concludes the recording with a reflection on the inevitability of war.

This Comes Next
2: Jay Carmona Goes To Washington [January 29, 2017]

This Comes Next

Play Episode Listen Later Jan 29, 2017 122:44


They start by taking about Jay's recent visit to Washington DC to disrupt the inauguration and to participate in the Women's March. Tom provides a footnote to open source activism and talks about what he would like to see in terms of the strength of discourse. Jay raises the size of crowds and Tom talks about some of the science behind this. Sean Spicer is impossible to ignore. Tom puts his experience in San Jose up for analysis. Jay provides a great insight on her time in DC with an example of strategic use of privilege. Under Jay's instigation they return to Assange and the Russians. Tom gives some analysis on Grizzly Steppe. [Note: Unfortunately there were various technical difficulties which cut a small portion of the recording.] Tom concludes the recording with a reflection on the inevitability of war.

The CyberWire
LeakedSource is down. DoubleFlag's called out for bogus stolen goods. Fancy Bear is in UK, German networks. Shamoon alert in Saudi Arabia. Scamming tech support scammers.

The CyberWire

Play Episode Listen Later Jan 27, 2017 19:54


In today's podcast, we hear that LeakedSource is down, maybe for good. DoubleFlag seems to be selling bogus data on the black market. (And where, we ask, is the Ripper review? If you can't trust a criminal, who can you trust these days? Sad.) Fancy Bear is back—actually, she never really left—now snuffling at British and German networks. Saudi Arabia remains on Shamoon alert. The Dridex banking Trojan has reappeared, in an improved version. Dale Drew from Level 3 Communications shares findings on the Asia Pacific region. Vince Crisler from Dark Cubed puts Grizzly Steppe in perspective. And tech support scammers get scammed—don't try this at home.

Intelligence. Unclassified.
Welcome to Season 2! - GRIZZLY STEPPE and Cybersecurity Efforts in the New Jersey

Intelligence. Unclassified.

Play Episode Listen Later Jan 17, 2017 26:08


The FBI and DHS released a Joint Analysis Report containing technical details and indicators of compromise (IOCs) that the US government has attributed to Russian intelligence services, designated as GRIZZLY STEPPE, in connection with malicious cyber-enabled activities targeting a variety of US entities over the last several years. This report was intended to provide network defenders with previously undisclosed and in some cases declassified IOCs to aid in detecting and, when necessary, blocking network traffic or malicious tools used by Russian actors, as well as to encourage the reporting of confirmed incidents to Federal authorities. Today, as we welcome you back to Season 2 of Intelligence. Unclassified., Rosemary Martorana is joined by New Jersey's Chief Technology Officer Dave Wienstein, NJOHSP's Director of Cybersecurity CISO Steven Branigan, and New Jersey Cybersecurity and Communications Integration Cell Director Mike Geraghty who discuss what GRIZZLY STEPPE actually is and what efforts are being put forth in New Jersey to secure our digital footprint.

AT&T ThreatTraq
ThreatTraq #229 - Can You Send Me a Sample

AT&T ThreatTraq

Play Episode Listen Later Jan 11, 2017 51:24


AT&T Data Security analysts discuss malware trends, Grizzly Steppe, DDoS Defense with BGP Flowspec, and the Internet Weather Report. Originally recorded January 10, 2017.

internet security grizzly steppe
WashingTECH Tech Policy Podcast with Joe Miller
Ep 71: Who Says Seniors Can't Get Around Barriers in Tech? (Part 1) with Tom Kamber

WashingTECH Tech Policy Podcast with Joe Miller

Play Episode Listen Later Jan 3, 2017 24:11


Tom Kamber (@thomaskamber) is the founder and executive director of OATS, where he has helped over 20,000 senior citizens get online, built more than 30 free technology centers, created the seniorplanet.org digital community, and launched the Senior Planet Exploration Center—the country's first technology-themed community center for older adults. His work has been covered in major national media, including The New York Times, The Wall Street Journal, USA Today, The Washington Post, National Public Radio, Univision, MSNBC, and the TODAY Show. Tom is active in shaping technology policy and serves on the City of New York's Broadband Task Force, and on the State of New York's Broadband Adoption Task Force. Tom teaches courses on social entrepreneurship and philanthropy at Columbia University and has published widely in academic journals on topics including housing policy, crime and geography, advertising strategy, broadband technology, and technology adoption by senior citizens. Prior to founding OATS, Tom worked as a tenant organizer working with low-income residents in Harlem and the South Bronx. He has a B.A. in Latin from Columbia College and a PhD in Political Science from the City University of New York. In this episode, we discussed: key challenges older adults face getting online. how OATS helps older adults use technology to stay engaged and enhance their overall quality of life. specific policy recommendations for ensuring older adults are both connected and actively using technology.  Resources   OATS Senior Planet This Chair Rocks by Ashton Applewhite SPQR: A History of Ancient Rome by Mary Beard NEWS ROUNDUP Missy Ryan, Ellen Nakashima and Karen DeYoung of the Washington Post report that the Obama administration has announced sanctions against Russia for executing cyberattacks on American institutions, including the Democratic National Committee, and releasing sensitive material to the public, in an effort to sway the November presidential election in favor of Donald Trump. The sanctions include the shutting down of two Russian facilities in Maryland and on Long Island which U.S. officials believe were used to collect intelligence. President Obama also expelled 35 Russian agents believed to be involved in the hacks. The President also said the U.S. may undertake covert activity to undermine Russia. But the Kremlin has vigorously denied the hacks, with Russsian President Vladimir Putin calling President Obama's response "irresponsible diplomacy". Yet, Putin has said Russia will hold off on a tit-for-tat response and not expel U.S. agents working in Russia or close American facilities there, until they see how Trump will respond following the inauguration on January 20th. Camila Domonoske has the story for NPR. Here's the link to the DHS and FBI report on the Russian intrusion, which has been dubbed Grizzly Steppe. Andrew Kramer has a nice piece in the New York Times describing how Russians recruited hackers for its cyberwar against the United States.  -- Ellen Nakashima also reported in the Washington Post that President Obama has signed a bill that would work to split U.S. Cybercommand from the National Security Administration in order to promote administrative efficiency. But the split can't happen unless it is approved by the defense secretary and the chair of the Joint Chiefs of staff, which may or may not happen under the Trump administration.  -- House Speaker Paul Ryan wants to stop sit-ins by members of Congress on the House floor. Speaker Ryan introduced a rules package last week which would attempt to curtail live streaming on the house floor by imposing sanctions of $500 for the first livestreaming offense and $2,500 for each subsequent offense, with ethical citations also a possibility. Back in June, Democrats had live-streamed a sit-in on the House floor to protest Republicans' failure to introduce gun control legislation. The livestream was organized in response to the fact that Republican leaders had turned off tv cameras in the chamber, preventing the public from viewing the sit-in on C-Span.