Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Califreak; StormFlag; LonePalm; Cletus.D.Yokel; ransomnote; bagster; bitt; TEXOKIE; KitJ

“””Was the Black Eye question ever answered?”””

Posting blind. But throwing out this suggestion

Don’t think seen. Think unseen.

“””Regarding the Q drop 2615

Q - Should we be prepping for some kind of shutdown?
No.
Reports of ‘power grid’ attacks (6 mo prep) should be disregarded. While attacks do occur, we are safeguarded by a ‘Black Eye’. Q “””

An enemy could attack either the power grid through two ways. Either attack and physically destroy generating facilities, transmission lines and substations, or, gain access and attack the computer software that controls all of the above. The later has happened in the past.

IIRC, when the Iranian centrifuges being used to refine the uranium for their nuclear program were wiped out it was done through gaining access to the computers that controlled them.

A physical attack is slower and can be seen, a software attack can be unseen and much faster.

I ran across this old article this morning which may offer a hint. Note date:

RCN ‘Upgrade’ Crashes System
Starpower Subscribers Among Many Off-Line for 33 Hours

By Ariana Eunjung Cha
Washington Post Staff Writer
Tuesday, March 7, 2000; Page E01

“The technicians “gave the Internet a black eye,” said Merle Roberson, 67, a retired Pentagon computer expert who was part of a team that helped develop the original Internet, the government’s Arpanet.”

http://www.washingtonpost.com/wp-srv/WPcap/2000-03/07/025r-030700-idx.html

What if in addition to the normal computer security measures taken by blocking outside hacking attempt pathways to gain access to grid or internet software, upon detection of those attempts, the security software injects its own attack aimed back at the attacker’s software or computer disrupting the attack, giving the attacker a “black eye”.

If such a thing exists, then by its crucial defensive nature it would be hard to read about it in the public domain.

I don’t know. Food for thought.


StormFlag
http://freerepublic.com/focus/chat/3712053/posts?page=1444#1444


1,548 posted on 12/13/2018 6:36:11 AM PST by haffast (Alternate universes held together by porridge.)
[ Post Reply | Private Reply | To 1468 | View Replies ]


To: haffast

https://twitter.com/genocochino/status/1073067882307837953

black eye??


1,553 posted on 12/13/2018 6:52:20 AM PST by bitt (,)
[ Post Reply | Private Reply | To 1548 | View Replies ]

To: haffast

the security software injects its own attack aimed back at the attacker’s software or computer disrupting the attack, giving the attacker a “black eye”.
~~~~~~

I love this idea and hope it is true. Thank you!


1,592 posted on 12/13/2018 7:42:53 AM PST by StormFlag (May the Light shine and darkness remove, MAGA)
[ Post Reply | Private Reply | To 1548 | View Replies ]

To: haffast; StormFlag; ransomnote; Cats Pajamas; greeneyes; bagster; generally; Wneighbor; mairdie; ...

re #2615, “black eye”

“The technicians “gave the Internet a black eye,” said Merle Roberson, 67, a retired Pentagon computer expert who was part of a team that helped develop the original Internet, the government’s Arpanet.”

“...What if in addition to the normal computer security measures taken by blocking outside hacking attempt pathways to gain access to grid or internet software, upon detection of those attempts, the security software injects its own attack aimed back at the attacker’s software or computer disrupting the attack, giving the attacker a “black eye”.

If such a thing exists, then by its crucial defensive nature it would be hard to read about it in the public domain.

http://www.washingtonpost.com/wp-srv/WPcap/2000-03/07/025r-030700-idx.html

StormFlag
http://freerepublic.com/focus/chat/3712053/posts?page=1444#1444

I don’t know. Food for thought.

~ ~ ~ ~ ~ ~ ~

Definitely food for thought, and my thoughts are right now sitting down to lunch!


1,623 posted on 12/13/2018 8:15:43 AM PST by TEXOKIE
[ Post Reply | Private Reply | To 1548 | View Replies ]

To: haffast

Re: Black Eye...

upon detection of those attempts, the security software injects its own attack aimed back at the attacker’s software or computer disrupting the attack, giving the attacker a “black eye”.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This feels of a certain synchronicity with Q’s Boomerang Suicide, or

the old stand by,

These People Are Stupid.


1,980 posted on 12/13/2018 7:29:58 PM PST by TheTexasMom (Q is my homie)
[ Post Reply | Private Reply | To 1548 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson