Russian operation hacked a Vermont utility, showing risk to U.S. electrical grid security, officials say

Happy New Year?  The idiots who voted Trump in has put us at risk and grave danger.  Trump should be deported with the Russian Ambassadors for treason. He is not a patriot.  He is a dictator wanna-be.  He is not going to make it 4 years in office.  Obama will focus on redistricting to stop the corruption of the Republicans.  70,000 votes in the electoral college put this idiot in office.  While nearly 3 million votes put Hillary there.  This is not a democracy under the current system of elections.  It can’t be more evident than this election cycle; where the most unfit person is in control of our fate……Sandaura

Russian operation hacked a Vermont utility, showing risk to U.S. electrical grid security, officials say

U.S. officials say a Russian hacking operating penetrated a utility in Vermont. (Victoria Walker/The Washington Post)
December 31 at 11:50 AM

A code associated with the Russian hacking operation dubbed Grizzly Steppe by the Obama administration has been detected within the system of a Vermont utility, according to U.S. officials.

While the Russians did not actively use the code to disrupt operations, according to officials who spoke on the condition of anonymity to discuss a security matter, the discovery underscores the vulnerabilities of the nation’s electrical grid. And it raises fears in the U.S. government that Russian government hackers are actively trying to penetrate the grid to carry out potential attacks.

Officials in government and the utility industry regularly monitor the grid because it is highly computerized and any disruptions can have disastrous implications for the country’s medical and emergency services.

Burlington Electric said in a statement that the company detected a malware code used in the Grizzly Steppe operation in a laptop that was not connected to the organization’s grid systems. The firm said it took immediate action to isolate the laptop and alert federal authorities.

Friday night, Vermont Gov. Peter Shumlin (D) called on federal officials “to conduct a full and complete investigation of this incident and undertake remedies to ensure that this never happens again.”

“Vermonters and all Americans should be both alarmed and outraged that one of the world’s leading thugs, Vladimir Putin, has been attempting to hack our electric grid, which we rely upon to support our quality-of-life, economy, health, and safety,” Shumlin said in a statement. “This episode should highlight the urgent need for our federal government to vigorously pursue and put an end to this sort of Russian meddling.”

Sen. Patrick J. Leahy (D-Vt.) said he was briefed on the attempts to penetrate the electric grid by Vermont State Police on Friday evening. “This is beyond hackers having electronic joy rides — this is now about trying to access utilities to potentially manipulate the grid and shut it down in the middle of winter,” Leahy said in a statement. “That is a direct threat to Vermont and we do not take it lightly.”

Rep. Peter Welch (D-Vt.) said the attack shows how rampant Russian hacking is. “It’s systemic, relentless, predatory,” Welch said . “They will hack everywhere, even Vermont, in pursuit of opportunities to disrupt our country. We must remain vigilant, which is why I support President Obama’s sanctions against Russia and its attacks on our country and what it stands for.”

American officials, including one senior administration official, said they are not yet sure what the intentions of the Russians might have been. The incursion may have been designed to disrupt the utility’s operations or as a test to see whether they could penetrate a portion of the grid.

Officials said that it is unclear when the code entered the Vermont utility’s computer, and that an investigation will attempt to determine the timing and nature of the intrusion, as well as whether other utilities were similarly targeted.

“The question remains: Are they in other systems and what was the intent?” a U.S. official said.

This week, officials from the Department of Homeland Security, FBI and the Office of the Director of National Intelligence shared the Grizzly Steppe malware code with executives from 16 sectors nationwide, including the financial, utility and transportation industries, a senior administration official said. Vermont utility officials identified the code within their operations and reported it to federal officials Friday, the official said.

What the U.S. measures against Russia mean for the relationship between the two countries

Embed Share

Play Video2:40
The Post’s Karen DeYoung looks at the implications of the latest measures taken by the Obama administration against Russia and its interference in the U.S. election. (Bastien Inzaurralde/The Washington Post)

The DHS and FBI also publicly posted information about the malware Thursday as part of a joint analysis report, saying that the Russian military and civilian services’ activity “is part of an ongoing campaign of cyber-
enabled operations directed at the U.S. government and its citizens.”

Another senior administration official, who also spoke on the condition of anonymity to discuss security matters, said in an email that “by exposing Russian malware” in the joint analysis report, “the administration sought to alert all network defenders in the United States and abroad to this malicious activity to better secure their networks and defend against Russian malicious cyber activity.”

According to the report by the FBI and DHS, the hackers involved in the Russian operation used fraudulent emails that tricked their recipients into revealing passwords.

Russian hackers, U.S. intelligence agencies say, earlier obtained a raft of internal emails from the Democratic National Committee, which were later released by WikiLeaks during this year’s presidential campaign.

President-elect Donald Trump has repeatedly questioned the veracity of U.S. intelligence pointing to Russia’s responsibility for hacks in the run-up to the Nov. 8 election. He also has spoken highly of Russian President Vladimir Putin, despite President Obama’s suggestion that the approval for hacking came from the highest levels of the Kremlin.

Trump spokesman Sean Spicer said it would be “highly inappropriate to comment” on the incident given the fact that Spicer has not been briefed by federal authorities at this point.

Obama has been criticized by lawmakers from both parties for not retaliating against Russia before the election. But officials said the president was concerned that U.S. countermeasures could prompt a wider effort by Moscow to disrupt the counting of votes on Election Day, potentially leading to a wider conflict.

Officials said Obama also was concerned that taking retaliatory action before the election would be perceived as an effort to help the campaign of Democratic presidential nominee Hillary Clinton.

On Thursday, when Obama announced new economic measures against Russia and the expulsion of 35 Russian officials from the United States in retaliation for what he said was a deliberate attempt to interfere with the election, Trump told reporters, “It’s time for our country to move on to bigger and better things.”

Trump has agreed to meet with U.S. intelligence officials next week to discuss allegations surrounding Russia’s online activity.

Russia has been accused in the past of launching a cyberattack on Ukraine’s electrical grid, something it has denied. Cybersecurity experts say a hack in December 2015 destabilized Kiev’s power grid, causing a blackout in part of the Ukrainian capital. On Thursday, Ukranian President Petro ­Poroshenko accused Russia of waging a hacking war on his country that has entailed 6,500 attacks against Ukranian state institutions over the past two months.

Since at least 2009, U.S. authorities have tracked efforts by China, Russia and other countries to implant malicious software inside computers used by U.S. utilities. It is unclear if the code used in those earlier attacks was similar to what was found in the Vermont case. In November 2014, for example, federal authorities reported that a Russian malware known as BlackEnergy had been detected in the software controlling electric turbines in the United States.

The Russian Embassy did not immediately respond to a request for comment. Representatives for the Energy Department and DHS declined to comment Friday.

Alice Crites, Carol Morello and Ellen Nakashima contributed to this report.

RF radiation risks; taking a cue from history

YOUR TURN: RF radiation risks; taking a cue from history

Share on Facebook
Tweet on Twitter

If the cost of doing business is people’s health — and, in fact, extends to our mortality as many respected scientists say — then it’s time we take a good hard look at questioning the wisdom of continuing to condone National Grid’s ill-advised wireless utility ”smart” meter pilot.

Marketed as Smart Energy Solutions, the Worcester pilot is dependent on an infrastructure that includes multiple WiMax (more powerful Wi-Fi) towers. The two-year experiment ends Dec. 31 in the face of credible science pointing to the health hazards of these wireless devices, which continually pulse microwave radiation in spiky bursts – some random, some periodic. Adding insult to injury, the Department of Public Utilities currently is considering a proposal to extend the pilot beyond December.

While we are all at risk, those most vulnerable are potential parents, pregnant women, children, seniors, those with preexisting conditions and the electromagnetically hypersensitive (EHS). Symptoms of overexposure can include memory loss, tinnitus, debilitating headaches, dizziness, insomnia, mental confusion, anxiety, joint and muscle pain and intestinal disorders. These conditions may be caused by other factors, but science shows that radio frequency radiation can cause or contribute to them – and there’s more than enough research to justify actions to reduce exposures.

Smart meters and cell phones occupy similar frequency bands of the electromagnetic spectrum, meaning cell phone research can apply to smart meter radio frequency radiation. The Federal Communications Commission claims RF that doesn’t heat tissue isn’t harmful, yet independent science shows this to be inaccurate, including the results of the U.S. National Toxicology Program’s cell phone study released earlier this year.

While scores of epidemiological investigations have linked cell phones to brain and heart malignancies, the NTP project is the largest and most comprehensive laboratory study of the cancer risks of cell phone radiation. The results of this thoroughly peer-reviewed, multi-year study roundly challenge the widely-held view that wireless radiation exposure is harmless.

Chief study designer Ronald L. Melnick emphasizes, “The NTP tested the hypothesis that cell phone radiation could not cause health effects and that hypothesis has now been disproved.”

An acclaimed study by leading EMF/RF researchers Barnes and Greenebaum provides an explanation in the IEEE Power Electronics Journal about how such radiation could cause such cancers. The NTP results prompted the American Academy of Pediatrics to issue new guidelines for using cell phones.

“They’re not toys. They have radiation that is emitted from them,” warned Dr. Jennifer A. Lowry, chair of the Council on Environmental Health Executive Committee.

AAP advises safer use means keeping the phone off the body and using it in other ways. Since the FCC bases its radiation guidelines on inaccurate, outdated data, this allows utilities to continue using them to justify projects like the Worcester wireless “smart” meter pilot. Industry strategy regarding wireless devices reprises past attempts to cast doubt on the risks of other hazardous materials like tobacco and asbestos.

The rapidly rising body of evidence showing health risks of low energy radio frequency radiation is motivating an increasing number of scientists, physicians, citizens and officials to advocate taking precautions now. If we fail to at least examine the evidence and continue to coast on weak, outdated questionably motivated positions, according to science not beholden to industry interests, the status of human health and the environment faces an unparalleled challenge.

Worcester citizens, along with many thousands globally, are bringing the information to the attention of our local populations and public officials charged with protecting our interests. It’s heartening to see some have taken the time and made the effort to listen. What harm does it do to look at the evidence? What harm does it do to pursue the Precautionary Principle? Are we not to take our lessons from history? Are we willing to live with the consequences of not paying attention when serious calls to action are being sounded by scientists and engineers far more knowledgeable than we— those like the EMF Scientists, to name but a couple hundred experts? What will history show about damage from wireless we’re experiencing today when the “juries come in with their verdicts” tomorrow?

We can opt to turn a deaf ear while we continue to be bathed in a sea of invisible, artificially-produced radiation from wireless devices … or we can look squarely at the evidence and move together from there to explore accessible, creative solutions that allow us to use our technology safely and responsibly. Which do you choose? To investigate the science, see the EMF-Portal and Bioinitiative Report on the web. Many other websites will tell you more about “EMF safety.”

Leslie Saffer is a writer, musician and member of the Worcester Info Team for Health (WITH), supporting Worcester decision makers and others in learning about and mitigating the public health risks posed by the rapid roll-out of wireless devices and infrastructure, emphasizing the Precautionary Principle and seeking collaboration on creative solutions.

You can submit your own guest column to Your Turn by emailing the editor at, subject line: Your Turn. Submissions should be 700-750 words. Longer submissions will be considered and run as space allows.

Startup Says Beaming Millimeter Waves Over the Air Will Make It a Star in Ultra-Fast Wireless Broadband

Startup Says Beaming Millimeter Waves Over the Air Will Make It a Star in Ultra-Fast Wireless Broadband

A white Starry Beam antenna mounted on a pole for a beta test in Boston, Massachusetts

Standing on the flat roof of a data center at an undisclosed location in Boston, a shivering Chet Kanojia gestures toward a sleek white box about the size of a piece of carry-on luggage. This is the proprietary base station that the seasoned startup founder believes will change the way the world receives its Internet and liberate frustrated customers from the iron grip of legacy providers such as Comcast and Time Warner.

The white box mounted on a pole before us is called a Starry Beam. Only about a dozen of these custom base stations exist in the world right now. The team at Kanojia’s newest startup, named Starry, has spent the past 20 months perfecting the base station’s design. Its performance so far on this nondescript rooftop has persuaded Kanojia that the Internet of the future will not be delivered through expensive fiber optic cables laid in the ground, but beamed over the air using high-frequency millimeter waves.

Standing beneath the Starry Beam, Kanojia points past a spate of warehouses lined with leafy trees to an apartment complex about a kilometer away. There, jutting out from the window of an apartment that Starry has rented, is a white spherical device called a Starry Point. Starry Beams broadcast millimeter waves to Starry Points, which convert them to lower frequencies that flood the home so users can stream ultra-high-definition 4K TV shows to their hearts’ content.

This method, Kanojia believes, can offer much faster service to customers for far less money. In January, he shared that vision at Starry’s launch party in New York City. The company has been quiet ever since, but executives now say their first beta, which has been underway since late August, has confirmed their basic premise—that millimeter waves can deliver ultra-fast broadband speeds up to 1 gigabit per second to customers over the air.

Based on these early results, Starry anticipates average user speeds on its yet-to-be-built network will be as fast as any broadband connection available today—somewhere in the range of 200 to 300 megabits per second. For comparison, the average broadband network in the United States offers average download speeds of just 55 megabits per second.

Right now, Starry’s beta is only measuring the performance of this original Starry Beam that serves a handful of users. In the first quarter of 2017, the company will launch an open beta and build its test network out to a half dozen sites capable of serving several hundred users. Starry has also received permission from the U.S. Federal Communications Commission to run tests in 14 other cities including New York, Dallas, Seattle, San Francisco, and Chicago.

Because Starry CTO Joe Lipowski says the start-up doesn’t plan to publish the results of the beta, it’s hard for anyone to independently evaluate the company’s claims. Starry has not released any press releases about its progress, and Kanojia has also kept the details of his fundraising under wraps. “The less people know about our performance, the better it is for us,” he says.

A Starry Point mounted to the window of an apartment in Boston.
Photo: Amy Nordrum
A Starry Point mounted to the window of a Boston apartment.

That attitude has left outsiders wondering what to think of the company’s prospects in such a highly competitive market. “On the surface, the technology sounds like it’s sufficient to do what they need it to do,” says Teresa Mastrangelo, a longtime wireless analyst with Broadbandtrends LLC. “We haven’t really seen anything at a big scale. I’ll be curious to see how it goes when we’re looking at tens of thousands of subscribers.”

If the company can successfully scale, Starry could rewrite the story of what it means to provide high-speed Internet service to homes and businesses. Millimeter waves are high-frequency radio waves that occupy a section of the electromagnetic spectrum that has never been used for consumer technologies. While WiFi, Bluetooth, and cellular carriers have operated on frequencies below 6 gigahertz, Starry is currently testing its technology at 38.2 GHz and 38.6 GHz (where waves are much shorter in length), with future plans to broadcast at 37 GHz and 40 GHz.

Millimeter waves offer several advantages over those delivering cellular data wirelessly on 4G LTE networks and even those carrrying broadband Internet service that is piped to homes through fiber. First, there is a lot more open bandwidth in the millimeter-wave range than there is at lower frequencies crowded with signals from smartphones, microwaves, and WiFi devices. And Starry thinks sending the Internet over the air to consumers will be much cheaper than digging up the ground to lay cables.

In fact, Kanojia estimates that Starry can build out a wireless network that costs only $25 for every home it serves in areas with a population density of at least 1,500 homes per square mile. Installing fiber networks typically costs $2,500 per home. Kanojia thinks the company can make money with market penetration as low as 3 to 5 percent, whereas fiber deployments sometimes require up to 65 percent penetration to be profitable.

One factor that will likely work in Starry’s favor is the range and agility of its Starry Beams. Kanojia says these base stations can deliver superfast Internet service to any customer within 1.5 kilometers who also falls within “near-line-of-sight” of a Starry Beam. That’s an important finding because millimeter waves are often presumed to perform best at shorter distances when there is a clear path between a base station and the end user—and such a direct route can be difficult to find in cities. Millimeter waves can’t easily penetrate windows or buildings, or maneuver around objects like traditional cellular signals can. They are also prone to degrade over longer distances when passing through foliage or rain.

To work around that, Starry equipped each Starry Beam with four active phased arrays, which are rows of tiny antenna elements that cooperate to point and amplify signals in precise directions. With these arrays, a base station can transmit signals more rapidly and with more precision than traditional antennas. In practical terms, this means the Starry network can serve Starry Point receivers mounted on the sides of a building from the same base station that serves those in front by bouncing signals off of buildings and other reflective surfaces. “Our measurements have shown that there’s tremendous reflections,” Lipowski says. Even at what they call “extreme non-line-of-sight” conditions, they’ve delivered data rates of 200 Mb/s to beta users.

Starry CTO Joe Lipowski (left) and founder Chet Kanojia stand on a rooftop near a Starry Beam.
Photo: Amy Nordrum
Starry CTO Joe Lipowski (left) and founder Chet Kanojia (right) stand on a rooftop near a Starry Beam.

Based on these results, Kanojia thinks Starry can provide broadband service with a deployment model similar to existing LTE networks: renting space on existing rooftop cell towers through companies such as the American Tower Corporation. To cover all of Boston, which measures about 230 square kilometers, Kanojia figures the company will need to install three or four Starry Beams at 20 to 30 sites. Each box will support about 1,000 users and boast throughput of 5 Gb/s, for a total of 15 to 20 Gb/s per site. They expect this rate will improve to 45 to 50 Gb/s per site in 2017, once the company upgrades its equipment to meet a new wireless standard known as 802.11ax.

Though Starry says it has cleared some of the biggest technical hurdles that millimeter waves pose for delivering high-speed Internet over the air, it must still find the right pricing model to bring the service to market. “There’s no doubt that one could make a system work at 1.5 kilometer range at 37 GHz. In fact, that’s a pretty modest range,” says John Naylon, CTO at Cambridge Broadband Networks Limited which operates several millimeter wave networks throughout the U.S. “The issues are going to be economic.”

Mastrangelo, the analyst, says that based on competitors’ rates, Starry would need to price its broadband plan below $100 a month, and ideally between $65 and $85 a month. Unfortunately, Starry’s heavy reliance on custom-built hardware means that its base stations are much more expensive than off-the-shelf models.

Meanwhile, plenty of other wireless providers are rushing to develop their own gigabit solutions. Though Google has more or less abandoned its costly fiber deployments, it recently purchased a company called Webpass that provides wireless broadband to entire buildings by installing rooftop antennas. (Starry offers a similar option for landlords who want to hook up their properties.) Verizon and AT&T have both said that they will launch trials for delivering over-the-air broadband in 2017. Mastrangelo warns that if Starry doesn’t act quickly, the start-up could fall behind.

“If they had been able to come out with a service when they first unveiled it in January, they would have definitely had a huge head start and probably positioned themselves to be an acquisition for somebody,” she says. “But their timing is not fantastic at this stage.”

Jonathan Wells, president of the wireless consulting firm AJIS LLC, says even if Starry can scale and solve the complications of serving hundreds of users at once through phased arrays without causing interference, competition could quickly undercut their plans.

“I think Starry may well be the first there with the technology and if they are successful, they’ll get snapped up by Verizon or AT&T,” Wells says. “But I think offering a service that is competitive with Verizon and AT&T is incredibly hard.”

Kanojia says Starry will ultimately compete with its gigabit rivals by providing exceptional customer service, rather than focusing only on high speeds. The company expects to double in size from roughly 100 employees to 200 before the end of next year; among them will be its first batch of customer representatives. But while the Starry team has already proven it can deliver speed, they may find that providing top-notch customer response is more of an art than a science.

Learn More

5G Internet Starry base stations broadband communicationsmillimeter waves networks startups telecom wireless

Cell Phones, Brain Cancer and Public Health with Katie Singer

Cell Phones, Brain Cancer and Public Health with Katie Singer

Posted by Ryan Munsey | December 29, 2016

20 minutes of cell phone usage breaks the double-strands of our DNA.

If our body’s repair systems cant keep up with these breaks, cancer and birth defects can result. [1]

Using a digital cell phone as a teenager or younger increases brain cancer risk by 420%. [2]

These are just a few of the startling statistics published in well respected, peer reviewed journals (like the International Journal of Oncology) that I found when I began investigating the safety of cell phone usage.

What surprised me most was not that I could find data to support the claims of cells phones causing cancer.

The biggest surprise was the volume of science-backed data that calls into question the safety of cell phones and other electronic devices.

I kept digging and kept asking questions.

Why aren’t these studies more widely circulated?

Why aren’t communication companies and the government doing more to prevent these public health concerns?

Are cell phones and other electronics as safe as we think they are?

You’re not going to like the answers…

Me: “Sounds like the government is making up laws to facilitate technology at the cost of human and biological ?

Katie: “Exactly right”

Meet Katie Singer

Katie Singer is the author of An Electronic Silent Spring and she serves as a consultant for the Electromagnetic Radiation Policy (EMRP) Institute, a 20-year-old watchdog group.

I was connected to Katie by Joel Moskowitz, the director of UC Berkeley’s School of Public Health. (Joel declined my OPP invite due to the unique status of his position and to maintain neutrality/diplomacy in academia.)

Our goal with this post and this podcast is simply to inform you.

Both Katie and I want you to be armed with the full spectrum of knowledge regarding electronics, technology, and the policies that

“It’s about being informed and making an educated decision for yourself”

Full article at:

Pizza place left in the dark after installation of unwanted smart meter

Pizza place left in the dark after installation of unwanted smart meter

Wednesday, December 28th 2016, 6:49 pm EST

Thursday, December 29th 2016, 7:14 am EST

Smart electricity meters can be dangerously insecure, warns expert

Smart electricity meters can be dangerously insecure, warns expert

Hackers can cause fraud, explosions and house fires, and utility companies should do more to protect consumers, conference told

Smart meters are frequently dangerously insecure, a security expert has warned.
Smart meters are frequently dangerously insecure, a security expert has warned.

Smart electricity meters, of which there are more than 100m installed around the world, are frequently “dangerously insecure”, a security expert has said.

The lack of security in the smart utilities raises the prospect of a single line of malicious code cutting power to a home or even causing a catastrophic overload leading to exploding meters or house fires, according to Netanel Rubin, co-founder of the security firm Vaultra.

“Reclaim your home,” Rubin told a conference of hackers and security experts, “or someone else will.”

If a hacker took control of a smart meter they would be able to know “exactly when and how much electricity you’re using”, Rubin told the 33rd Chaos Communications Congress in Hamburg. An attacker could also see whether a home had any expensive electronics.

“He can do billing fraud, setting your bill to whatever he likes … The scary thing is if you think about the power they have over your electricity. He will have power over all of your smart devices connected to the electricity. This will have more severe consequences: imagine you woke up to find you’d been robbed by a burglar who didn’t have to break in.

“But even if you don’t have smart devices, you are still at risk. An attacker who controls the meter also controls the meter’s software, allowing him to cause it to literally explode.”

Rubin said many of the warnings were not hypothetical. In 2009 Puerto Rican smart meters were hacked en masse, leading to widespread billing fraud, and in 2015 a house fire in Ontario was traced back to a faulty smart meter, although hacking was not implicated in that.

The problems at the heart of the insecurity stem from outdated protocols, half-hearted implementations and weak design principles. While the physical security of smart meters is strong – “trust me, I tried” to hack in that way, Rubin said – the wireless protocols many of them use are problematic.

To communicate with the utility company, most smart meters use GSM, the 2G mobile standard. That has a fairly well-known weakness whereby an attacker with a fake mobile tower can cause devices to “hand over” to the fake version from the real tower, simply by providing a strong signal. In GSM, devices have to authenticate with towers, but not the other way round, allowing the fake mast to send its own commands to the meter.

Worse still, said Rubin, all the meters from one utility used the same hardcoded credentials. “If an attacker gains access to one meter, it gains access to them all. It is the one key to rule them all.”

Inside the home, too, the communications are rendered insecure by outdated standards and bad implementation. Almost all smart meters use the Zigbee standard to speak to other smart devices in the home.

Zigbee, which dates from 2003, is a popular home automation standard, used for controlling everything from lightbulbs to air conditioners. But it is so convoluted, due to the vast array of devices supported, that it is almost better to think of it as 15 different standards, each of which vendors can choose to implement as they see fit.

“This unique situation is so difficult to implement, venders actually choose what they want to implement. And when they choose what to support, they more often than not skip security,” Rubin said.

Other weak security decisions made by vendors include:

  • Encryption keys derived from short (often just six-character) device names.
  • Pairing standards with no authentication required, allowing an attacker to simply ask the smart meter to join the network and receive keys in return.
  • Hardcoded credentials, allowing administrator access with passwords as simple and guessable as the vendor’s name.
  • Code simplified to work on low-power devices skipping important checks, allowing nothing more than a long communication to crash the device.

“These security problems are not going to just go away,” Rubin said. “On the contrary, we are going to see a sharp increase in hacking attempts. Yet most utilities are not even monitoring their network, let alone the smart meters. Utilities have to understand that with great power comes great responsibility.”

Smart meters come with benefits, allowing utilities to more efficiently allocate energy production, and enabling micro-generation that can boost the uptake of renewable energy. For those reasons and more, the European Union has a goal of replacing 80% of meters with smart meters by 2020.

The Scary Future is Upon Us

Future of driverless cars: Government able to lock you in your own car to deliver you to the nearest reeducation camp

(NaturalNews) Recently, the Seattle police enlisted the help of car manufacturer BMW to both track and remotely lock a criminal inside of the vehicle he had stolen. This has sparked some spirited debates regarding the remote-lock aspects of vehicles and the ways they can be used.

BMW confirmed that they have the power to remotely lock and unlock their vehicles if they wish to do so. A police report obtained from the incident shows that the responding Seattle officer noted that BMW assistance was called upon to locate the vehicle and remotely lock its doors. The suspect found sleeping inside the BMW and briefly tried to get away when awoken by police. The suspect failed to flee because he couldn’t get the vehicle in gear quickly enough, he was arrested without incident.


Coming soon, iris scanning cars that talk to traffic signals

New technology allows vehicles to talk to traffic lights

Motorists are being tracked in real-time

Police Use Smart Water Meters As Evidence In Murder Investigation

Police Use Smart Water Meters As Evidence In Murder Investigation

Time to Wake UP, Before It is Too Late…

Think about what it takes from private citizens who act out of desperation for help and assistance, and too,the few politicians, who act out of conscience and not what is in it for them.  For example the Flint water crisis or the Dakota pipeline standoff.  These problems are in our face, yet we see how much one must must fight for what is right. WHY?  So, you can see how an issue such as the dangers of smart grid technology would and could be so conveniently oppressed and avoided.  It is a silent killer.  The medical professionals for the most part do not recognize the millions who are aware of their EHS.  If you have been compromised, health-wise ; the environment you live in is important for healing. We cannot sustain our health in the current environment of RF/microwave radiation exposure. The FCC standards are bogus and outdated.  No radiation is acceptable to humans, animals or plants!!!!!  Why is this an acceptable way to live?  It is suicide.  No one is exempt; even the idiots who are profiting.  This is blood money and the passive are guilty for this genocide by standing by and doing nothing.  It is not ever an easy path, but the alternative of doing nothing has left us no choice, but to fight for our lives.  These are the stakes….Sandaura



Dario Vidić, Zoran Vrhovski, Igor Petrović

1. INTRODUCTION The electric power grid is a hostile environment for high-speed data transmission, but after years of development, the technology to deliver high-speed data over the existing electric power delivery network has emerged, somewhat tentatively, in the marketplace. This technology, referred to as Broadband over Power Lines (BPL), uses medium- and low-voltage power lines to provide broadband Internet access to residential users and businesses and is considered by some as a third access technology offering potential competition to xDSL telecommunication lines and cable modems. Recent trends, however, indicate that the focus of BPL technology is shifting from providing broadband connectivity to smart meter usage allowing households to reduce energy costs and allow better energy management by developing a “smart grid”. BPL technology is relevant to a variety of public policy issues, such as energy, communications, environmental policy, and national security policies. BPL can promote energy policy by enabling advanced metering initiatives for time-of-use pricing, load management and outage detection, but it can also enhance communications policy by providing broadband access and promoting competition for broadband services to rural and under-served areas. It is relevant for environmental policies through conservation and energy management that reduce greenhouse gases, and for national security through network redundancy and video surveillance applications that are being used for public safety and critical infrastructure protection. There are several reasons why BPL can be attractive as a third wire to the home. From the perspective of electrical utility companies the basic infrastructure is already in place (electric grid) and there is no requirement to obtain rights of way or construct ducts, nor is there a need for business or household wiring to deploy BPL. This enhances the cost effectiveness of rolling out BPL. Only the sub-station server equipment and customer conditioning service units need to be installed in order to establish a digital power line network. Another important benefit from the perspective of providers is that the power grid is virtually ubiquitous in most countries providing an already existing network infrastructure covering private customers as well as businesses. From the perspective of end users, the equipment needed to set up BPL in the home is cheaper on average than that of other broadband solutions such as DSL and cable modems. The equipment uses existing power outlets in the home making it easier to set-up and there is no need for additional wiring or installations. For end users in rural areas, who cannot receive DSL or cable modem services, BPL could have the potential to provide a broadband access which can support triple play services and automation of a smart network controlling electrical consumption. Despite the potential advantages of BPL, it Tehnički glasnik 9, 3(2015), 251-259 251



Key words: Broadband, power line, Internet, Access BPL, In-Home BPL, smart grid

Noise Floor: Where Do We Go From Here?

They are avoiding the Elephant in the room!  They are aware of the noise pollution issue, but are not pointing a finger to the source…Power Line communication technology.  The backbone of the smart grid.  All of the other things mentioned below are not causing the noise issue “we the hearers” are hearing 24/7 nonstop.  The day the digital PLC was turned on was the moment my life changed.  Like a light switch it was “ON” and the torture has not stopped since.  The infrasound and low frequency pure tones are in our environment all the time.  The frequencies are a Public Health Hazard whether you are aware of the noise pollution or not your bodies are absorbing the negative impact this has on humans and animals.  We have forensic audio evidence proving this is being done to the majority of the population.  Ever wonder why people are acting out in bizarre and aggressive ways?….Hitler used this technique to control his troops using infrasound….Sandaura   Does anyone out there care?

Noise Floor: Where Do We Go From Here?

%d bloggers like this: