mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.6K
active users

#NuclearPowerPlant

0 posts0 participants0 posts today

Wednesday, May 14, 2025

Russia threatens to ‘neutralize’ all NATO efforts against Moscow amid alliance drills in Lithuania — Macron promises new Russia sanctions, discusses French nuclear deterrent for Europe — Russia has lost 968,130 troops in Ukraine since Feb. 24, 2022 — Russia killed Ukrainian author Victoria Amelina — but not her words or quest for justice … and more

activitypub.writeworks.uk/2025

Sunday, April 27 2025

Russia attacked Chornobyl Nuclear Plant in February, damaging confinement. Can it be fully restored? — US signals support for Europe’s peacekeeping coalition in Ukraine — Russia training to integrate motorcycles into summer offensive in Ukraine — Interpol investigates Russian company for human trafficking over African workers in Tatarstan drone factory … and more

activitypub.writeworks.uk/2025

Continued thread

#RedWing Police Respond After #NuclearPowerPlant Reports #Drones

Andy Brownell
Published: January 9, 2025

#RedWingMinnesota (KROC-AM News) - "A southeastern Minnesota law enforcement agency is reporting an encounter with mysterious drones.

"A news release issued Thursday afternoon by the Red Wing Police Department indicates Goodhue County Sheriff's Office dispatchers received a report around 6:30 PM Wednesday from the #PrairieIslandNuclearPowerPlant. The report indicated four to five drones had been seen flying around the area of the #XcelEnergy facility.

"The news release says Red Wing Police and officers from the #PrairieIsland #TribalPolice Department responded to the report and observed two drones flying around the power plant and the nearby Lock and #Dam3 on the #MississippiRiver. It states that the officers monitored the drones until they were no longer seen in the area."

krocnews.com/red-wing-police-r
#RethinkNotRestart #NuclearPlants #NuclearPowerPlants #SecurityRisk

News Talk 1340 KROC-AMRed Wing Police Respond After Nuclear Power Plant Reports DronesThe responding officers were unable to locate the operator or operators of the drones.

I headed in the direction of home… south. I stopped at a little marina type place right across the water from the Seabrook Nuclear Power Plant. At this point in time I am not glowing in the dark.

https://www.flickr.com/photos/robj_1971/54061294758/in/album-72177720321127970/

https://www.flickr.com/photos/robj_1971/54061375629/in/album-72177720321127970/

https://www.flickr.com/photos/robj_1971/54061295043/in/album-72177720321127970/

https://www.flickr.com/photos/robj_1971/54061502360/in/album-72177720321127970/

https://www.flickr.com/photos/robj_1971/54061376144/in/album-72177720321127970/

And this is the point where I realized that my ISO was set to 1600. I changed it to 100 but I was almost done for the day so there aren’t many low ISO pics. Oh well.

https://www.flickr.com/photos/robj_1971/54060171702/in/album-72177720321127970/

https://www.flickr.com/photos/robj_1971/54061502455/in/album-72177720321127970/

https://www.flickr.com/photos/robj_1971/54061295618/in/album-72177720321127970/

https://www.flickr.com/photos/robj_1971/54060172237/in/album-72177720321127970/

And there we have it. All of the pics (well, most of them at least) from my morning photo fun experience at the ocean. I shot a whole roll of film to go along with all of this. Maybe I’ll get it developed at some future date in 2025 or something.

https://robertjames1971.blog/2024/10/12/this-mornings-photo-adventure-part-3-3/

FlickrDSC_3040By robj_1971

Of course, now we know who was behind #Stuxnet -- #Israel and the #CIA -- thanks!

Why the #StuxnetWorm is like nothing seen before

By Paul Marks
27 September 2010

"Stuxnet is the first worm of its type capable of attacking #CriticalInfrastructure like #PowerStations and #ElectricityGrids: those in the know have been expecting it for years. On 26 September, #Iran’s state news agency reported that computers at its #Bushehr #NuclearPowerPlant had been infected.

Why the fuss over Stuxnet?

"#ComputerViruses, worms and #trojans have until now mainly infected PCs or the servers that keep e-businesses running. They may delete key system files or documents, or perhaps prevent website access, but they do not threaten life and limb.

"The Stuxnet worm is different. It is the first piece of #malware so far able to break into the types of computer that control machinery at the heart of industry, allowing an attacker to assume control of critical systems like #pumps, #motors, #alarms and #valves in an industrial plant.

"In the worst case scenarios, safety systems could be switched off at a nuclear power plant; fresh water #contaminated with effluent at a #SewageTreatmentPlant, or the valves in an #OilPipeline opened, contaminating the land or sea.

“'Giving an attacker control of industrial systems like a #dam, a sewage plant or a power station is extremely unusual and makes this a serious threat with huge real world implications,' says Patrick Fitzgerald, senior threat intelligence officer with Symantec. 'It has changed everything.'

Why is a different type of worm needed to attack an industrial plant?

"Industrial machinery is not controlled directly by the kind of computers we all use. Instead, the equipment used in an industrial process is controlled by a separate, dedicated system called a programmable logic controller (#PLC) which runs supervisory control and data acquisition software (#SCADA).

"Running the SCADA software, the PLC controls the process at hand within strict safety limits, switching motors on and off, say, and emptying vessels, and feeding back data which may safely modify the process without the need for human intervention – the whole point of industrial automation.

So how does a worm get into the system?

"It is not easy because they do not run regular PC, Mac or Linux software. Instead, the firms who sell PLCs each have their own programming language – and that has made it tricky for hackers to break it.

"However there is a way in via the Windows PC that oversees the PLC’s operations. Stuxnet exploited four vulnerabilities in Microsoft Windows to give a remote hacker the ability to inject malicious code into a market-leading PLC made by German electronics conglomerate Siemens.

"That’s possible because PLCs are not well-defended devices. They operate for many years in situ and electronic access to them is granted via well-known passwords that are rarely changed. Even when Stuxnet was identified, Siemens opposed password changes on the grounds that it could cause chaos as older systems tried to communicate using old passwords.

Where did the initial Stuxnet infection come from?

"It appears to have first arrived in Iran on a simple #USBMemoryStick, says Fitzgerald. His team in Dublin, Ireland has been analysing Stuxnet since it was first identified by a security team in Belarus in June.

"The first of the four Windows vulnerabilities allowed executable code on a USB stick to spread to a PC. The USB may have been given to an Iranian plant operative – or simply left somewhere for an inquisitive person to insert into their terminal.

"Says Fitzgerald: 'It then spreads from machine to machine on the network, exploiting a second vulnerability to do so, and reports back to the attacker on the internet when it finds a PC that’s running Siemens SCADA software. The attacker can then download a diagram of the industrial system set-up the SCADA controls.'

"The next two Windows vulnerabilities lets the worm escalate its privilege levels to allow the attacker to inject Siemens PLC format computer code – written in a language called STL – into the PLC. It’s that code which is capable of performing the skulduggery: perhaps turning off alarms, or resetting safe temperature levels.

How do we know where Stuxnet is active?

"Symantec monitored communications with the two internet domains that the worm swaps data with. By geotagging the IP addresses of Stuxnet-infected computers in communication with the attacker, Fitzgerald’s team found that 58.8 per cent of infections were in Iran, 18.2 per cent in #Indonesia, 8.3 per cent in #India, 2.6 per cent in #Azerbaijan and 1.6 per cent in the US.

Who is behind the worm?

"No one knows. It is however very professionally written, requiring what Fitzgerald calls 'a broad spectrum of skills' to exploit four new vulnerabilities and develop their own SCADA/PLC set-up to test it on.

"This has some commentators suggesting that a #NationState with plenty of technical resources may have been behind Stuxnet. But computer crime is a billion dollar business so such an effort is not beyond extortionists.

"Stuxnet comprises a 600-kilobyte file and it has not yet been fully analysed."

Read more:
newscientist.com/article/dn195

New Scientist · Why the Stuxnet worm is like nothing seen beforeBy Paul Marks

Fact-checkers are doing everything they can to obscure the link between Trump and Project 2025. Even though Trump said this about the group behind Project 2025:

"This is a great group, and they're going to lay the groundwork and detail plans for exactly what our moment will do and what your movement will do when the American people give us a colossal mandate to save America."

According to PolitiFact Trump has since said that he doesn't even know what Project 2025 is - so game, set match. Kamala Harris is a liar, not Trump who has lied relentlessly throughout his political and business careers.

The Democrats are also lying when they pointed out that under Trump states will have to provide statistics on the number of abortions performed. What the Project 2025 docs say is that organisations that don't report statistics on abortion statistics will have all federal funding withheld.

So big, big difference. I suppose they could decide to go broke instead...

In Australia, our corrupted national broadcaster the #ABC used its fact-checking unit to accuse the energy minister of lying because he said that it takes 19 years on average to build a nuclear power plant. It's not 19 years it's 18.4 years - so there. Of course, the ABC has become a sort of incompetent, simpering PR agency for the far-right opposition parties.

Fact-checking is fraud. It's also a waste of time because in today's febrile media environment, anyone not hearing what they want to hear will just ignore it. Nice that the fact-checkers, incompetent and corrupted as they are, have decided to become spreaders of misinformation.

rollingstone.com/politics/poli