Cyber sabotage is now very sophisticated and effective. Even secret US
government projects have been penetrated to the point where the penitrated
projects are rendered useless; they require redesign or sometimes even
cancellation.


The type of information that has been asked for in this post is the stating
point for a cyber- treat called Spear Phishing.


In general, Spear Phishing is an e-mail spoofing fraud attempt that targets
a specific organization, seeking unauthorized access to confidential data.
Spear phishing attempts are not typically initiated by "random hackers" but
are more likely to be conducted by perpetrators out for financial gain,
trade secrets or military information.


As with the e-mail messages used in regular phishing expeditions, spear
phishing messages appear to come from a trusted source.


Thus the need for this info as follows from the referenced post:


“*How many people are working in the factory/lab?*


*Who is doing the hiring, engineering, plumbing, safety checks,*

*security, office admin, etc?*


*Has anyone seen "help wanted" ads from Rossi and/or Defkalion?*

*(Clicking "Job Positions" on http://www.defkalion-energy.com/ leads*

*to a 404 error.)*


*What are some names and backgrounds of newly hired people working on*

*the E-Cats?*


*Nobody has a friend of a friend who is working this? No leaks by*

*employees? Does this suggest military level secrecy?*


*Seems like Rossi would be getting lots of offers to help work on his*

*invention -- Do we know of anyone who is actually working along side*

*Rossi?”*


In the case of spear phishing, the apparent source of the e-mail is likely
to be an individual within the recipient's own company and generally someone
in a position of authority.


For example, a visiting West Point teacher and National Security Agency
expert Aaron Ferguson calls it the "colonel effect." To illustrate his
point, Ferguson sent out a message to 500 cadets asking them to click a link
to verify grades. Ferguson's message appeared to come from a Colonel Robert
Melville of West Point. Over 80% of recipients clicked the link in the
message.


In response, they received a notification that they'd been duped and warning
that their behavior could have resulted in downloads of spyware, Trojan
horse s and/or other malware.


Most people have learned to be suspicious of unexpected requests for
confidential information and will not divulge personal data in response to
e-mail messages or click on links in messages unless they are positive about
the source. The success of spear phishing depends upon three things: The
apparent source must appear to be a known and trusted individual, there is
information within the message that supports its validity, and the request
the individual makes seems to have a logical basis.


Here's one version of a spear phishing attack: The perpetrator finds a web
page for their target organization that supplies contact information for the
company. Thus the need for this info as specified by the referenced post as
follows:


“*Wouldn't it be easy for someone to follow him from his apartment to*

*the factory? Give an address, count cars in the parking lot, etc?*


*How many people are working in the factory/lab?*


*Who is doing the hiring, engineering, plumbing, safety checks,*

*security, office admin, etc?”*


Using available details to make the message seem authentic, the perpetrator
drafts an e-mail to an employee on the contact page that appears to come
from an individual who might reasonably request confidential information,
such as a network administrator. The email asks the employee to log into a
bogus page that requests the employee's user name and password or click on a
link that will download spyware or other malicious programming. If a single
employee falls for the spear phisher's ploy, the attacker can masquerade as
that individual and use social engineering techniques to gain further access
to sensitive data.


Rossi should go totally black, drop out of sight, and not use e-mail or
computers in his interface to his secret sponsors. If the US military is
routinely compromised, Rossi is dead meat.


See “Breaching Defense Contractor Data” for more background


http://www.aviationweek.com/aw/generic/story.jsp?channel=defense&id=news/dti/2011/09/01/DT_09_01_2011_p52-356943.xml&headline=Breaching%20Defense%20Contractor%20Data&next=0




On Mon, Aug 29, 2011 at 4:47 PM, ecat builder <ecatbuil...@gmail.com> wrote:

> With October fast approaching, I have some easy questions:
>
> Where is Rossi right now?
>
> Where is his lab/factory that is producing E-cats for the 1MW test?
>
> Wouldn't it be easy for someone to follow him from his apartment to
> the factory? Give an address, count cars in the parking lot, etc?
>
> How many people are working in the factory/lab?
>
> Who is doing the hiring, engineering, plumbing, safety checks,
> security, office admin, etc?
>
> Has anyone seen "help wanted" ads from Rossi and/or Defkalion?
>   (Clicking "Job Positions" on http://www.defkalion-energy.com/ leads
> to a 404 error.)
>
> What are some names and backgrounds of newly hired people working on
> the E-Cats?
>
> Nobody has a friend of a friend who is working this? No leaks by
> employees? Does this suggest military level secrecy?
>
> Seems like Rossi would be getting lots of offers to help work on his
> invention -- Do we know of anyone who is actually working along side
> Rossi?
>
> Assuming the 1MW reactor heats a flow of water by N degrees, how many
> liters/sec throughput would be expected where N is 10 to 80 degrees?
>
> Does this volume of cold water suggest he would be near a large body
> of water such as a lake or river?
> Or would waste heat go, as Defkalion said "...neighbour factories and
> other installations. One of these installations is Xanthi Police
> Academy."
>
> Does this sound plausible? Has anyone talked to the Xanthi Police
> Academy to see if they have a hot pipe leading to DGT working E-Cats?
>  http://wikimapia.org/17980152/Police-academy
>
> Besides Piantelli, Forcardi and Rossi, has anyone proved or replicated
> the transmutation of Ni+H+Heat to other elements such as copper?
>
> I'd love to hear your responses.. Maybe a little sleuthing is required
> to get a little better picture of what we can expect in the next
> couple of months.
>
> Cheers,
>
> - Brad L
>
>

Reply via email to