RED China’s One World One Dream Franchise Expands to Kazakhstan

The Blueprint for RED China’s One World One Dream:

Authoritarian Regimes Will Intercept All Internet Traffic Inside Their Countries.

Kazakhstan government is now intercepting all HTTPS traffic.

Kazakh government first wanted to intercept all HTTPS traffic way back in 2016, but they backed off after several lawsuits.

By Catalin Cimanu for Zero Day

July 18, 2019

 

Starting Wednesday, July 17, 2019, the Kazakhstan government has started intercepting all HTTPS internet traffic inside its borders.

Local internet service providers (ISPs) have been instructed by the local government to force their respective users into installing a government-issued certificate on all devices, and in every browser.

The certificate, once installed, will allow local government agencies to decrypt users’ HTTPS traffic, look at its content, encrypt it again with their certificate, and send it to its destination.

Kazakh users trying to access the internet since yesterday have been redirected to web pages that contained instructions on how to install the government’s root certificate in their respective browsers, may it be a desktop or mobile device.

For example, this is the page shown by local ISP Kcell, and this is another one that Beeline is showing to its customers.

KAZAKHSTAN GOVERNMENT SAYS IT’S FOR THE BEST

Local ISPs started forcing their customers into installing the government’s root certificate yesterday, following an official government announcement.

In a statement posted on its website, the Kazakh Ministry of Digital Development, Innovation and Aerospace said only internet users in Kazakhstan’s capital of Nur-Sultan will have to install the certificate; however, users from all across the country reported being blocked from accessing the internet until they installed the government’s certificate. Some users also received SMS messages on their smartphones about having to install the certificates, according to local media.

Ministry officials said the measure was “aimed at enhancing the protection of citizens, government bodies and private companies from hacker attacks, Internet fraudsters and other types of cyber threats.”

GOVERNMENT PREVIOUSLY FAILED IN 2015

The Kazakh government first tried to have all its citizens install a root certificate in December 2015. At the time, it ruled that all Kazakh user had to install their root certificate by January 1, 2016.

Local ISPs started forcing their customers into installing the government’s root certificate yesterday, following an official government announcement.

In a statement posted on its website, the Kazakh Ministry of Digital Development, Innovation and Aerospace said only internet users in Kazakhstan’s capital of Nur-Sultan will have to install the certificate; however, users from all across the country reported being blocked from accessing the internet until they installed the government’s certificate. Some users also received SMS messages on their smartphones about having to install the certificates, according to local media.

Ministry officials said the measure was “aimed at enhancing the protection of citizens, government bodies and private companies from hacker attacks, Internet fraudsters and other types of cyber threats.”

GOVERNMENT PREVIOUSLY FAILED IN 2015

The Kazakh government first tried to have all its citizens install a root certificate in December 2015. At the time, it ruled that all Kazakh user had to install their root certificate by January 1, 2016.

The decision was never implemented because the local government was sued by several organizations, including ISPs, banks, and foreign governments, who feared this would weaken the security of all internet traffic (and adjacent business) originating from the country.

At the same time in December 2015, the Kazakh government also applied with Mozilla to have its root certificate included in Firefox by default, but Mozilla declined.

Currently, browser makers like Google, Microsoft, and Mozilla are discussing a plan of actionon how to deal with sites that have been (re-)encrypted by the Kazakh government’s root certificate. No decision has been reached, at the time of writing.

Article

Support Document


Utah. NSA Data Centers for the Dream.

 

GO RED CHINA! GO RED CHINA!

 

DHS says Cyber attacks are rising on industry and utilities

Editor’s Note – Not much is printed or taken seriously about cyber threats to America but, it should be known, just how fragile our way of life actually is as virtually every part of our infrastructure is tied to the Internet as are most communications and the military. For this reason, the DHS publishes a weekly events summary listing security breaches that requires our attention. The month of October is dedicated to the study of all segments of the internet and recommendations are made to keep some order and protection walls from cyber threats.

DHS – Report for September 30, 2011

The world banking system, corporations, power grid, and water systems, as well as most of our industries are tied to Internet communications. With the ubiquitous viruses, worms and malware, the Idaho National Laboratory for example is armed with cyber experts that are dedicated to responding and assisting to minimize and stop cyber interference.

Watch the video below, then please read the article from Fox News:

Utilities and Industries Face Rising Number of Cyber Break-Ins, DHS Says

From Fox News

U.S. utilities and industries face a rising number of cyber break-ins by attackers using more sophisticated methods, a senior Homeland Security Department official said during the government’s first media tour of secretive defense labs intended to protect the U.S. power grid, water systems and other vulnerable infrastructure.

Acting DHS Deputy Undersecretary Greg Schaffer told reporters Thursday that the world’s utilities and industries increasingly are becoming vulnerable as they wire their industrial machinery to the Internet.

“We are connecting equipment that has never been connected before to these global networks,” Schaffer said. Disgruntled employees, hackers and perhaps foreign governments “are knocking on the doors of these systems, and there have been intrusions.”

According to the DHS, Control System Security Program cyber experts based at the Idaho National Laboratory responded to 116 requests for assistance in 2010, and 342 so far this year.

Department officials declined to give details about emergency response team deployments, citing confidentiality agreements with the companies involved. Under current law, the reporting of cyber attacks by private organizations is strictly voluntary.

The Obama administration has proposed making reporting mandatory, but the White House could find the idea difficult to sell at a time when Republicans complain about increased regulation of business.

Officials said they knew of only one recent criminal conviction for corrupting industrial control systems, that of a former security guard at a Dallas hospital whose hacking of hospital computers wound up shutting down the air conditioning system. The former guard was sentenced to 110 months in prison in March.

The Homeland Security Department’s control system program includes the emergency response team, a Cyber Analysis Center where systems are tested for vulnerabilities, a malware laboratory for analyzing cyber threats and a classified “watch and warning center” where data about threats are assessed and shared with other cyber security and intelligence offices.

The offices are located at nondescript office buildings scattered around Idaho Falls. No signs announce their presence.

Marty Edwards, chief of the control system security effort, said the malware lab analyzed the Stuxnet virus that attacked the Iranian uranium enrichment facility in Natanz last year. He did not describe the group’s findings in detail, except to say that they confirmed that it was “very sophisticated.”

Edwards said that several years ago he had asked the German company Siemens to study the same kind of industrial controllers used at Natanz for vulnerabilities to attack, because they were so widely used in industry.

But he said the study was not part of any effort to target the controllers with malware, and said his program’s work on the controllers could not have helped Stuxnet’s designers.

A senior Homeland Security cyber official, who spoke on condition of anonymity because of the sensitivity of the topic, said the Stuxnet worm exploited well-known design flaws common to many system controllers, vulnerabilities that in general can’t be patched.

Many independent experts and former government officials suspect that Stuxnet was created by the United States, perhaps with the help of IsraelBritain and Germany.

The U.S. and other nations believe Iran is building a nuclear weapons program, but Tehran insists it is interested only in the peaceful uses of nuclear technology.

While U.S. officials talk frequently about the threat of cyber attacks to America, they seldom discuss the country’s offensive cyber weapons capability. The U.S. is thought to be the world’s leader in cyber warfare, both defensive and offensive.

U.S. officials and others long have feared that future wars will include cyber assaults on the industries and economies of adversaries, and the potential targets include power plants, pipelines and air traffic control systems.

Foreign nations could also target military control systems, including those used for communications, radar and advanced weaponry.

Because of its advanced industrial base and large number of computer controlled machines connected to the Internet, the U.S. is thought to be highly vulnerable to a cyber attack on its infrastructure.

In a 2007 test at the Idaho National Laboratory, government hackers were able to break into the control system running a large diesel generator, causing it to self-destruct.

A video of the test, called Aurora, still posted on YouTube, shows parts flying off the generator as it shakes, shudders and finally halts in a cloud of smoke.

James Lewis, a former State Department official now with the Center for Strategic and International Studies in Washington, said in an interview that the Aurora test ushered in a new era of electronic warfare.

Before the test, he said, the notion of cyber warfare “was mainly smoke and mirrors. But the Aurora tests showed that, you know what? We have a new kind of weapon.”

Homeland Security officials said they have not conducted such a test on that scale since. But they demonstrated Thursday how a hacker could tunnel under firewalls in computer systems to take command of industrial processes.

“All systems deployed have vulnerabilities,” Edwards said.