Johann Wagener 12-02-13
The right-wing-nut faction of the Republican party remains hell-bent on destroying this countries first comprehensive healthcare system.
Why? It's either because of the obsessive-psychotic hatred of our President, or simply that there's just not enough profit to be made by those who thrive on other's suffering.
There are plenty of those $50,000 a plate fanatics who would not have a problem with recruiting a bunch of not-so-bright followers armed with smartphones, tablets, pc's and iMacs just punching the enter button to healthcare.gov.
It's a page out of the Republican playbook that's constantly being used to skew opinion polls and the like put out by FOX or the Koch Bro's 501(c) 3' and 4's
Roberta Stempfley highlighted one successful attack that is designed to deny access to the website called a Distributed Denial of Service (DDoS) attack. A DDoS attack is designed to make a network unavailable to intended users, generally through a concerted effort to disrupt service such as repeatedly accessing the servers, saturating them with more traffic than the website is designed to handle.
Right wingers have been distributing the link to the necessary tools to perform the attacks on the Healthcare.gov website through social networking, as pointed out by Information Week, and other websites .
The name of the attack tool is called, "Destroy Obama Care!"
If attacking a Federal website is not a crime in it's own right, then I would suggest it should be because it is nothing less than an "assault" on Americans who are being terrorized in their own homes.
The FBI is out there looking for the bad guys but I'm not sure there's much interest in doing anything.
Combating the threat. In recent years, we’ve built a whole new set of technological and investigative capabilities and partnerships—so we’re as comfortable chasing outlaws in cyberspace as we are down back alleys and across continents. That includes:
A Cyber Division at FBI Headquarters “to address cyber crime in a coordinated and cohesive manner”;
Specially trained cyber squads at FBI headquarters and in each of our 56 field offices, staffed with “agents and analysts who protect against investigate computer intrusions, theft of intellectual property and personal information, child pornography and exploitation, and online fraud”;
New Cyber Action Teams that “travel around the world on a moment’s notice to assist in computer intrusion cases” and that “gather vital intelligence that helps us identify the cyber crimes that are most dangerous to our national security and to our economy;”
Our 93 Computer Crimes Task Forces nationwide that “combine state-of-the-art technology and the resources of our federal, state, and local counterparts”;
A growing partnership with other federal agencies, including the Department of Defense, the Department of Homeland Security, and others—which share similar concerns and resolve in combating cyber crime.
Help us catch suspects wanted in computer intrusion cases: Visit our Featured Fugitives—Cyber Crimes webpage to use the power of the web against the very criminals who seek to exploit it.
A Cyber Division at FBI Headquarters “to address cyber crime in a coordinated and cohesive manner”;
Specially trained cyber squads at FBI headquarters and in each of our 56 field offices, staffed with “agents and analysts who protect against investigate computer intrusions, theft of intellectual property and personal information, child pornography and exploitation, and online fraud”;
New Cyber Action Teams that “travel around the world on a moment’s notice to assist in computer intrusion cases” and that “gather vital intelligence that helps us identify the cyber crimes that are most dangerous to our national security and to our economy;”
Our 93 Computer Crimes Task Forces nationwide that “combine state-of-the-art technology and the resources of our federal, state, and local counterparts”;
A growing partnership with other federal agencies, including the Department of Defense, the Department of Homeland Security, and others—which share similar concerns and resolve in combating cyber crime.
Help us catch suspects wanted in computer intrusion cases: Visit our Featured Fugitives—Cyber Crimes webpage to use the power of the web against the very criminals who seek to exploit it.
No comments:
Post a Comment