page-loading-spinner

Chris Martenson

by Chris Martenson

Executive Summary

  • The wisdom and value of scenario planning
  • Scenario #1: A Slow Burn
  • Scenario #2: Fragmentation
  • Scenario #3: A Hard Landing
  • The prudence of taking individual action now, vs depending upon "the system" to react to future events

If you have not yet read Part 1: Ready Or Not available free to all readers, please click here to read it first.

It all begins with the clear-eyed recognition that the old way of doing business is clearly unsustainable. And yet knowing that the various governmental and institutional powerbrokers are doing everything they can to perpetuate the status quo way of doing business.

Business-as-usual is literally going to end in some flavor of disaster, and yet we collectively adhere to it, even when the end-point is as obvious as calculating the linear rate of withdrawal of water from a non-renewing aquifer.

But there's nothing linear about the nested and/or intertwined complex systems we call the Economy, the Environment and Energy.  Each of these is independently complex, meaning they often easily defy the attempts to manage them. And they are utterly unpredictable for anything longer than the immediate term.

For example, of the three, Energy seems the simplest, and it is.  But even there, we note that the amount of energy that can and will be extracted is a function of the price of energy, available technology and skills, capital available for investment, and what's actually down there in the earth to be pulled up.  In that list, several factors are courtesy of the Economy, which is itself dependent on Energy. A glitch in one can feedback rapidly to create a glitch in the other.

Given all of this complexity, one good way to get a handle on things is to identify the scenarios we deem to be most likely given all available evidence, and then assign probabilities to each. Asking ourselves, What can we today to prepare for Scenario X? then allows us to begin constructing action plans to mitigate our vulnerability, and even better in cases, position ourselves to prosper as the future unfolds. 

Scenario #1:  A Slow Burn

In 2008, the practice of borrowing too much caught up with the developed world and a serious financial crisis threatened to take down the entire financial system.  Indeed, according to after-action reports from Hank Paulson (then Treasury Secretary) and Mervyn King (then BoE chairman), the world came within mere hours of a full-blown global banking system meltdown…

The 3 Likeliest Ways Things Will Play Out From Here
PREVIEW by Chris Martenson

Executive Summary

  • The wisdom and value of scenario planning
  • Scenario #1: A Slow Burn
  • Scenario #2: Fragmentation
  • Scenario #3: A Hard Landing
  • The prudence of taking individual action now, vs depending upon "the system" to react to future events

If you have not yet read Part 1: Ready Or Not available free to all readers, please click here to read it first.

It all begins with the clear-eyed recognition that the old way of doing business is clearly unsustainable. And yet knowing that the various governmental and institutional powerbrokers are doing everything they can to perpetuate the status quo way of doing business.

Business-as-usual is literally going to end in some flavor of disaster, and yet we collectively adhere to it, even when the end-point is as obvious as calculating the linear rate of withdrawal of water from a non-renewing aquifer.

But there's nothing linear about the nested and/or intertwined complex systems we call the Economy, the Environment and Energy.  Each of these is independently complex, meaning they often easily defy the attempts to manage them. And they are utterly unpredictable for anything longer than the immediate term.

For example, of the three, Energy seems the simplest, and it is.  But even there, we note that the amount of energy that can and will be extracted is a function of the price of energy, available technology and skills, capital available for investment, and what's actually down there in the earth to be pulled up.  In that list, several factors are courtesy of the Economy, which is itself dependent on Energy. A glitch in one can feedback rapidly to create a glitch in the other.

Given all of this complexity, one good way to get a handle on things is to identify the scenarios we deem to be most likely given all available evidence, and then assign probabilities to each. Asking ourselves, What can we today to prepare for Scenario X? then allows us to begin constructing action plans to mitigate our vulnerability, and even better in cases, position ourselves to prosper as the future unfolds. 

Scenario #1:  A Slow Burn

In 2008, the practice of borrowing too much caught up with the developed world and a serious financial crisis threatened to take down the entire financial system.  Indeed, according to after-action reports from Hank Paulson (then Treasury Secretary) and Mervyn King (then BoE chairman), the world came within mere hours of a full-blown global banking system meltdown…

by Chris Martenson

Executive Summary

  • The most likely forms of cyber attack the national grid is vulnerable to
  • The evidence that shows malicious attacks on the US grid have been attempted multiple times
  • The low level of integrity in the current grid's defenses
  • A checklist of backup systems at the home level every concerned citizen should work to have in place

If you have not yet read Part 1: The Electrical Grid May Well Be The Next War's Battlefield available free to all readers, please click here to read it first.

Cyber Attacks, Hacking, and Malware

The other main threat we should concern ourselves with centers on the highly automated nature of the electricity grid combined with the human propensity for mischief. As with everything these days, computer-controlled devices are at the heart of the entire electrical generation and distribution system.

Again from the same Peak Prosperity member quoted earlier:

Combine this with the known vulnerabilities of the SCADA [Supervisory Control And Data Acquisition] systems controlling the power grid and you have the recipe for a real coordinated and manufactured disaster.

US researchers have identified 25 zero-day vulnerabilities in industrial control SCADA software from 20 suppliers that are used to control critical infrastructure systems. Attackers could exploit some of these vulnerabilities to gain control of electrical power and water systems, according to Wired.com.

Nine of these potential exploits have so far been reported to the suppliers concerned and the US Department of Homeland Security.

In theory, an intruder could exploit the vulnerabilities simply by breaching the wireless radio network over which the communication passes to the server.

Unlike the "heartbleed" zero-day bug that could be more or less addressed by software server patches, the SCADA systems are hardware boxes sitting out in the field. It's quite possible they are not upgradeable, or they were made by companies no longer in business, or whose programmers no longer support the system any more. "Uh, you want me to come up with a patch for THAT old system? Really? The guy who knew that code retired 10 years ago. I'm not even sure we have the source code anymore – or if it compiles – or if our build system can even compile for that CPU-type. And then we have to test it. We don't have any of those boxes to test it on anymore. And once tested, how exactly do we deploy this patch?"

If you've ever worked in a software organization, you'll know what I'm talking about.

No need to launch any supersonic missiles. If the US power grid is down, the US Navy won't be projecting power anywhere, since we'll be so busy trying to keep our people alive (and/or deploying what forces we have available into our own cities to prevent all those people who can't use their EBT cards anymore from tearing the place apart) to worry about what Russia is doing in their own backyard.

So – yes, asymmetric warfare. A coordinated cyber-assault supported with a kinetic attack on a select group of substations will…

Reducing Your Risk To A Grid-Down Event
PREVIEW by Chris Martenson

Executive Summary

  • The most likely forms of cyber attack the national grid is vulnerable to
  • The evidence that shows malicious attacks on the US grid have been attempted multiple times
  • The low level of integrity in the current grid's defenses
  • A checklist of backup systems at the home level every concerned citizen should work to have in place

If you have not yet read Part 1: The Electrical Grid May Well Be The Next War's Battlefield available free to all readers, please click here to read it first.

Cyber Attacks, Hacking, and Malware

The other main threat we should concern ourselves with centers on the highly automated nature of the electricity grid combined with the human propensity for mischief. As with everything these days, computer-controlled devices are at the heart of the entire electrical generation and distribution system.

Again from the same Peak Prosperity member quoted earlier:

Combine this with the known vulnerabilities of the SCADA [Supervisory Control And Data Acquisition] systems controlling the power grid and you have the recipe for a real coordinated and manufactured disaster.

US researchers have identified 25 zero-day vulnerabilities in industrial control SCADA software from 20 suppliers that are used to control critical infrastructure systems. Attackers could exploit some of these vulnerabilities to gain control of electrical power and water systems, according to Wired.com.

Nine of these potential exploits have so far been reported to the suppliers concerned and the US Department of Homeland Security.

In theory, an intruder could exploit the vulnerabilities simply by breaching the wireless radio network over which the communication passes to the server.

Unlike the "heartbleed" zero-day bug that could be more or less addressed by software server patches, the SCADA systems are hardware boxes sitting out in the field. It's quite possible they are not upgradeable, or they were made by companies no longer in business, or whose programmers no longer support the system any more. "Uh, you want me to come up with a patch for THAT old system? Really? The guy who knew that code retired 10 years ago. I'm not even sure we have the source code anymore – or if it compiles – or if our build system can even compile for that CPU-type. And then we have to test it. We don't have any of those boxes to test it on anymore. And once tested, how exactly do we deploy this patch?"

If you've ever worked in a software organization, you'll know what I'm talking about.

No need to launch any supersonic missiles. If the US power grid is down, the US Navy won't be projecting power anywhere, since we'll be so busy trying to keep our people alive (and/or deploying what forces we have available into our own cities to prevent all those people who can't use their EBT cards anymore from tearing the place apart) to worry about what Russia is doing in their own backyard.

So – yes, asymmetric warfare. A coordinated cyber-assault supported with a kinetic attack on a select group of substations will…

Total 118 items