Toxic Time Bomb: Abandoned US Military Nuclear Dome Threatens Pacific Ocean

“People should know there’s a giant concrete dome filled with plutonium in the Pacific Ocean, and at some point in the near future, it will be underwater.”

On the Marshall Islands in the Pacific Ocean, roughly halfway between Australia and Hawaii, the US military hides a dirty secret. These islands (specifically Bikini Atoll and Enewetak Atoll) were used for nuclear weapons testing throughout the Cold War, and a terrible legacy still survives.
A staggering 67 atomic bombs were detonated on Enewetak and Bikini between 1946 and 1958. This equates to 1.6 Hiroshima bombs exploding every single day during this 12-year period. The Marshall Islands were chosen as the location because of their relative isolation from sprawling metropolises, although local people were forcibly evacuated from their land and are still suffering to this day.

Plutonium-239, used to make nuclear warheads, was ‘splattered’ all over the island. It has a half-life of 24,000 years. Other bombs didn’t detonate as planned. After the Cold War, the US military found itself with an urgent problem: what to do with all this radioactive waste? They wanted to dump it in the ocean, but luckily, environmental regulations prohibited them from doing so. Taking the toxic plutonium back to the USA wasn’t something the government were keen to do, so a ‘temporary’ solution was brainstormed.
Half-buried in the sand on Enewetak Atoll sits a giant concrete dome called Runit Dome. Locals know it as The Tomb. It has an ominous, eerie look to it, out of place in the beautiful surroundings of a tropical island. Here lies the US military’s radioactive plutonium, buried inside a cement dome at sea level.
In 1979, the nuclear waste was mixed with contaminated soil from the island and tipped into a 350-foot-deep crater. This was then topped with concrete, and abandoned. Scientists are now warning that rising sea levels caused by climate change could cause 111,000 cubic yards of radioactive waste to spill into the ocean. It’s not a question of if, it’s just a question of when.
In 1983, the Marshallese signed a deal with the USA which (among other things) left this small government in charge of The Tomb. They simply can’t afford the millions of dollars needed to deal with the USA’s mess, so for now, there is no easy solution in sight. This short video from the GroundTruth project in collaboration with the Guardian introduces this shocking issue. Please share and consider doing anything you can to put pressure on Obama to fund a permanent plan to protect the Pacific Ocean from further devastation.


Can Hackers Crash Trains?

The United Kingdom is being upgraded with a new railway network, and Cameron’s government will be spending more than thirty million British Pound’s on it. Included within this pricey upgrade is the signaling systems and railway. After the upgrade, the United Kingdom could become vulnerable to cyber attack(s) that might lead to a train collision.
Image Source: Google Image - A hack attack could theoretically cause trains to travel too quickly
Image Source: Google Image – A hack attack could theoretically cause trains to travel too quickly
The new signaling system is called the European Rail Traffic Management System – aimed at making the rail lines safer. Security experts have since expressed concerns about the upgrade, saying that the programmable logic controls can be exposed to malware, spyware, malicious code and viruses – technology which could possibly take millions of lives.
Image Source: Google Image - Hundreds of signal boxes are being replaced as part of the upgrade
Image Source: Google Image – Hundreds of signal boxes are being replaced as part of the upgrade
Security experts from City University, say that this malware can alter the way the trains will respond. For example, the malware could perhaps tell the system that there is no train on the track when, in actual fact, there is. The train will therefore continue traveling unmonitored.
We know that the risk [of a cyber-attack] will increase as we continue to roll out the digital technology across the network. We work closely with government, the security services, our partners and suppliers in the rail industry and external cyber security specialists to understand the threat to our systems and make sure we have the right controls in place. It is the smart malware [malicious software] that alters the way the train will respond. So, it will perhaps tell the system the train is slowing down when it is speeding up. Governments are not complacent, individual ministers know this is possible, and they are worried about it. Safeguards are going in, in secret, but it is always possible to get around them. We keep security arrangements under constant review to take account of the threat and any new challenges we face,” responded a spokeswoman for the Department of Transport.

Image Source: Google Image - The professor warns that malware could be introduced from an infected peripheral
Image Source: Google Image – The professor warns that malware could be introduced from an infected peripheral

The system will be installed all over the European Union by 2020. But with hacking concerns rising, work is being done to make the system better.
The weakness is getting malware into the system by employees. Either because they are dissatisfied or being bribed or coerced. Seeing as we have seen nuclear enrichment facilities targeted with state-sponsored malware attacks and ‘massive damage’ done to a German steelworks. You have to ask yourself whether it is likely that a train signal system would be any better defended? The most obvious danger is going to be human. The risk is that staff will either be deliberately and clandestinely assisting attackers or – most likely – make poor decisions, such as plugging in a device that is malware-infected that could expose the system’s security. It would take it back to a safe state,” says Professor Stupples. Stupples has been working with Cranfield University, to develop a security system that will inform the user if the monitoring systems are not responding correctly.


Anonymous attacks on Canadian government (#OpCyberPrivacy)

This is what happens when any government or any private organization doesn’t listen to Anonymous’s messages—Anonymous strikes at their servers. As always, Anonymous have delivered on their promise. Anonymous attacked Canadian government servers after Anonymous uploaded a couple of videos against the approval of anti-terror law C-51 , which hurts both internet privacy and Anonymous.
As per this law, Canadian security intelligence will gain immense power, and will be able to violate any individuals internet privacy whenever they want to. Anonymous took down the following websites of Canadian government:
Online portal
Department of finance
Treasury board
And other websites of major departments
The operation is continued under the banner of #opc51 and #billc51, and one the Canadian government officials-Tony clement, accepted that there was a cyber attack on the Canadian government.
On 17th June, Anonymous added the following statement on the video
Greetings citizens of Canada, we are Anonymous. Today, this 17th of June 2015, we launched an attack against the Canadian senate and government of Canada websites, in protest against the recent passing of bill C-51. A bill which is a clear violation of the universal declaration of human rights, as well as removing our legal protections that have stood enshrined in the Magna Carta, for 800 years. Perhaps it was fate that the day the Magna Carta arrived in our country, to go on display for the populous, was the same day our corrupt government was symbolically pissing upon it, and us all.
Bill C-51 targets minority groups and dissidents alike, both being strong parts of a healthy democracy. Do we trade our privacy for security? Do we bow down and obey what has become totalitarian rule? Don’t fool yourselves. The Harper regime does not listen to the people, it acts only in it’s best interests and has and will continue to act outside of the law until we, the fucking people, say ENOUGH. Today, Anons around the world took a stand for your rights. Today, Anons around the world risked their freedom for you. We now ask that you follow suit. Stand for your rights, take to the streets in protest this 20th of June, 2015. Disregard these laws which are injust, even illegal. We will not allow our freedoms to be stripped one by one, our privacy to be ravaged like a back alley whore. When will it be enough for you to stand up and say NO?

In a time of universal deceit, telling the truth is a revolutionary act, and this my fellow Canadians is the truth. There is something very, very wrong in our country and people are either too uninformed or too afraid to take a stand. When injustice becomes law, resistance becomes duty. It is now incumbent upon all Canadians to rise and resist.
We are Anonymous
We are Legion
We do not Forgive
We do not Forget
To the government of Canada
You should have expected us.
Our Info:
Irc: Channel: #OpCyberPrivacy


The Man Who Hacked The Lotto

Prosecutors believe they have proof that a former information security director for a lottery outfit in Iowa, tampered with lottery instruments.
Eddie Raymond Tipton is the defendant on charges of buying a rigged Hot Lotto lottery ticket from a Seven Eleven-style shop in December of the year 2010. At the time, Tipton was the Director of I.T. Security at the Multi-State Lottery Association. His job, and state law, barred him from being able to play the lottery or claim any lottery prizes.
Image Source: Google Image – A system that generates random lottery tickets.
At a group discussion about Tipton’s arrest, authorities supported the premise that Tipton manipulated the lottery outcome. Court documents indicated that prosecutors suspect Tipton did tamper with lottery instrumentality… but they need proof that supports their theory. They believe that Tipton used his privileged position among the lottery association to access a secured area — where the random number-generating (RNG) computers are housed — and infected them with malware which granted him management over what the winning numbers would be.

Only two individuals at a time are allowed to access the room housing the computers. The room was lined with glass at that time and a video camera monitored it 24/7, 365. To avoid remote attacks and possible manipulation, these computers aren’t connected to an online network. Prosecutors believe that Tipton entered the space sometime in 2010 but it’s too difficult for them to tell exactly what he was doing, since the surveillance cameras recorded at only one frame per minute.
Four out of five people who have access to controls and the camera’s settings will testify they did not change the recordings. The fifth person is the defendant, it is a reasonable deduction to infer that the defendant tampered with the camera equipment to have an opportunity to insert a USB into the RNG tower without detection,” the prosecution stated.

Tipton pleaded not guilty to all of the charges against him and claims that tampering with the system isn’t viable.

Image Source: Google Image – Video footage shows a man purchasing the mystery Hot Lotto ticket. Authorities announced at a news conference that they have recognized him as Eddie Raymond Tipton, an information-security director for a lottery vendor.
About a month after the supposed tampering of the computers by Tipton occurred, that would be on or about December 23rd, a person was spotted at a local shop purchasing a Hot Lotto ticket which won the $14.3 million prize. The person in the video was recognized by authorities as Tipton but again, being an associate-level worker for an association administering lottery tickets, Tipton isn’t allowed to shop for tickets or claim lottery prizes.
For a couple of years, the winning ticket remained unclaimed. Then, just a few hours before its expiration, a corporation integrated with British Honduras declared the prize money via a brand new royal house professional. Tipton was charged with 2 fraud counts in January and he is facing a punishment of up to 5 years in jail and a fine of $750 to $7,500.