Featured Post

The Science of Getting Rich: CHAPTER VII [excerpt] by Wallace D. Wattles #Gratitude

--- Gratitude THE ILLUSTRATIONS GIVEN IN THE LAST CHAPTER will have conveyed to the reader the fact that the first step toward getting ...

Friday, July 19, 2013

Prepping [US!] for the next financial #crisis #Banks -commentary

---

Washington & Wall Street remain way behind in the f'ing GAME! #They still think they can use fear to manipulate the entire f'ing population in any way they like. Stampede the f'ing HERD!

The SIMPLEST #solution here is for EVERYONE to REMOVE ALL your worthless f'ing manipulated FIAT from the banks! Especially the [now even far bigger than before!] BIG banks!

Turn your back on the status quo BS system! We don't NEED them anymore! They [#government, #politicians, #corporations, #political PARTIES] are all obsolete! Delete them & live your life the way God intended from the beginning! Simple & full of the true pleasures of life! God has provided for all the needs of #humanity throughout history. USE THEM! Resources are a GIFT from God! Money is a LIE from man! The monetary system is DESIGNED to be an easy way for #government & corporations to #steal your fiat!

Everything we need ALREADY EXISTS!

Humanity has no NEED of governments who only seek to limit & control all resources!

IMHO the NEXT [unexpected my ASS!] crisis will be due to cyber warfare..

IGNORE the idiots!

Greg

---

U.S. banks brace for cyberattacks with security drill -Source

Financial firms, feds will join in 'Quantum Dawn 2' drill

It’s a war game, Wall Street-style.

Banks large and small are girding for an elaborate drill this week that will test how they would fare if hackers unleashed a powerful and coordinated attack against them.

The exercise is being called “Quantum Dawn 2,” and though the name sounds like a video game, it’s meant to convey the seriousness of the threat.

Cyberattacks on the banking industry are growing more frequent and sophisticated, and the list of assailants is ever-changing: crime bosses who want money, “hacktivists” who want to make political statements, foreign governments that want to spy on U.S. companies. A successful, widespread attack on the industry would shake confidence in the banking system, and the possibility has banks and regulators on edge.

More dangerous
Jamie Dimon, CEO of the country’s biggest bank, JPMorgan Chase, acknowledged that attacks are becoming more complex and dangerous, no longer carried out by “fairly simplistic” hackers commandeering people’s personal computers.

“Now you’re talking about state-sanctioned folks, hundreds of programmers,” he said in a call with reporters this spring, “taking over not just PCs but servers and mainframes.”

JPMorgan and its peers like Bank of America, Citigroup and Wells Fargo have signed up for Thursday’s drill, which is being organized by Wall Street’s biggest trade group, the Securities Industry and Financial Markets Association.

About 50 banks and organizations will participate, including government agencies like the Treasury, the Department of Homeland Security, the Securities and Exchange Commission and the FBI.

Here's the drill
During the drill, bank employees will be stationed at their normal offices, and will be blasted throughout the day with bits of information that could indicate an encroaching hacker attack. They’ll monitor a simulated stock exchange for irregular trading and will be pressed to figure out what’s going on and how to react while sharing information with regulators and each other.

As the name suggests, this isn’t the first Quantum Dawn. The original drill was in November 2011 and attracted scant attention and only about half as many participants. But that was before a wave of cyberattacks last fall, when big banks were forced to temporarily shut down websites after attackers bombarded them with traffic.

At that time, banks probably wouldn’t have listed cyberattacks among their top five risks, said Karl Schimmeck, SIFMA’s vice president for financial services operations. Now, he said, the calculation has changed.

• The barrage: Software giant Symantec calculates that cyberattacks against U.S. businesses jumped 42 percent last year. Banks, though, are reluctant to give more details about how they’re affected, financially or otherwise, for fear of becoming a target, and attacks often go undetected and unreported.

• High alert: Whatever the number, banks and the government are on high alert. President Barack Obama warned about international hacking against the banking industry in February’s State of the Union address. He later met with JPMorgan CEO Dimon, Bank of America CEO Brian Moynihan and other business leaders to discuss the threat.

Big banks have started listing cyberattacks as a potential risk factor in filings for regulators and investors. The Office of the Comptroller of the Currency, which regulates national banks, recently held a call with community bankers to warn them that they’re not free from danger either: Since September, attacks have been increasingly aimed at businesses with fewer than 250 employees, the OCC says.

• Impossible victory? Banks realize the threat isn’t going away. If anything, the possibility of an online attack will grow as customers do more transactions online and banks outsource operations to other companies whose systems might not be as secure.

Says Greg Garcia, a former DHS official who now runs the consulting firm Garcia Cyber Partners: “If someone asks, ‘When are you going to stop cybercrime?’ Well, when are you going to stop crime?”

• Your money: The banks downplay the risk of hackers tapping into any individual customer’s account. For most, that will never happen, the banks say, and even if it did, the customer wouldn’t be responsible. Customers would have to go through certain steps to get their money back, like filing a claim, showing that they weren’t negligently tossing their account information around and giving the bank time to investigate. But federal regulations protect retail customers from being held accountable when money is removed from their accounts without permission.

• A drill by any other name: As for the title of Thursday’s drill — the one that sounds more appropriate for an action movie than a bank security exercise — it came about during the creation of the original drill in 2011, which was organized by the Financial Services Sector Coordinating Council.

National security staff at the White House wanted exercises to have names, preferably with two words. According to the FSSCC, a federal government official who was involved in the planning suggested the title after noticing some media reports about the dawn of quantum computing.

Schimmeck points out that a similar exercise in Britain had a title at least as curious: It was called “Waking Shark.”

No comments:

Post a Comment