Cyber Wars Could Crash Markets and Threat To Humanity – Rickards and Buffett www.goldcore.com /us/gold-blog/cyber-wars-crash-markets-threat-humanity-rickards-buffett/ By Mark O'Byrne Cyber wars are a bigger threat to humanity than nuclear weapons, the world’s richest and most famous investor Warren Buffett, presciently warned a few days ago.

“I do think that’s the number one problem with mankind,” Warren Buffett warned during Berkshire Hathaway’s annual shareholder meeting on May 6th. “I’m very pessimistic on weapons of mass destruction generally although I don’t think that nuclear probably is quite as likely as either primarily biological and maybe cyber,” Buffett said during Berkshire Hathaway’s annual shareholders’ meeting. Unlike most of Buffett’s pronouncements, this clear and very strong warning was not reported widely. “I don’t know that much about cyber, but I do think that’s the number one problem with mankind” said Buffett as reported by Business Insider UK. Last year, Buffett told CNBC — cyber, nuclear, biological and chemical attacks — posed a major threat to the economic well-being of Berkshire shareholders. Echoing Buffett’s cyber concerns, today one of the world’s leading experts on currency wars, financial warfare, cyber terrorism and cyber war, James Rickards has again warned that cyber attacks may have already compromised the U.S. national security and could turn a “bad day on Wall Street into a full blown crash”. According to Rickards writing in the Daily Reckoning today: “Friday’s cyberattack just highlights the growing nature of the threat, and the need for much greater security. WikiLeaks’ March release of 7,818 web pages, called the “Vault 7,” was a major development. This collection amounted to more than several hundred million lines of code, and gave away the entire hacking capacity of the CIA. It was by far the largest release of CIA intelligence documents in history. And the WikiLeaks’ released documents proved that U.S. intelligence agencies have lost control of their hacking tools. This is part of a much larger problem.

1/4

Barely a day goes by without some company or government agency announcing that one of its systems has been compromised or attacked … In 2010, the FBI and Department of Homeland Security discovered an attack virus in the computer systems of the Nasdaq stock market. That virus was disabled, but others may remain. On Aug. 22, 2013, the Nasdaq was mysteriously shut down for over three hours, disrupting trading in Apple, Google, Facebook and other investor favorites. Military planners make use of a fighting doctrine called the “force multiplier.” The idea is that any given weapon can be used with greater-than-normal effect when combined with some other state or condition that gives the weapon greater impact. For example, if Russia wanted to disrupt a U.S. stock exchange, they might wait until the market is down over 3%, say, 500 points on the Dow Jones index, for reasons unrelated to the cyberattack. Launching the attack on a day when the market is already nervous would “multiply” the impact of the attack and possibly result in a drop of 4,000 Dow points or more, comparable in percentage terms to the one-day drop on Oct. 19, 1987. All of these scenarios are worrying enough, but a couple years ago the U.S. government suffered a cyberattack even worse than shutting a stock exchange or opening the floodgates on a dam. Chinese hackers had gained access to the files of the U.S. Office of Personnel Management (OPM). Estimates of individuals affected range from 4 million up to 32 million. The Chinese hackers actually obtained credentials to gain access to the system, and once inside systematically downloaded the database. If the stolen information were limited to names, addresses, Social Security numbers and the like, the damage would be immense and the affected individuals would be at constant risk of harassment and identity theft. But the damage was far worse. Many of the files consisted of responses to a questionnaire called Standard Form 86, or SF-86. This is the form used to apply for security clearances up to and including the top-secret level. The form itself is 127 pages long, which is daunting enough. But the attachments and documentation required to support the information on the form, including tax returns, personal net worth statements, explanations of answers to certain questions, etc., can run to hundreds of pages more.” Our modern financial system and investment and savings providers with their massive dependency on single interface websites, servers and the internet face serious risks that few analysts have yet to appreciate and evaluate. These also pose risks to digital gold providers who do not allow clients to interact and trade on the phone and are solely reliant for pricing and liquidity from online portals and online trading platforms. Those who have outright legal ownership of physical gold and silver coins and bars outside the banking system will weather the cyber storm better than those who do not. The hope is that these risks will not materialise. Hope is never a strategy. We believe it is prudent to be aware of and take appropriate measures – sooner rather than later – to protect your wealth. Related Content

2/4

Ransonware Attacks Show Vulnerability of Digital Financial System Cyber Attacks Growing In Frequency – Entire Financial System Is Vulnerable Cyber Fraud At SWIFT – $81 Million Stolen From Central Bank “Cyber Security Loophole”- Bank Hackers “Unfettered Access” To Accounts Number One Reason To Buy Gold and Silver Is “Cyber Financial Warfare” News and Commentary Wall Street hit records as technology, energy stocks rise (Reuters.com) Oil Rally Lifts Stocks as Dollar Slips With Bonds (Bloomberg.com) White House says Trump did not reveal classified intel to Russians (MarketWatch.com) Hedge Funds Are Dumping Gold Bets at Fastest Rate Since 20 (Bloomberg.com) Bitcoin’s Surge Fuels Fears of Asset Bubble – FT via GATA (Gata.org) $25 Billion in 30 Days: Are Cryptocurrencies in a Bubble? (CoinDesk.com)

Cyber attacks a bigger threat to humanity than nuclear weapons – Buffett (TheHill.com) Cybersecurity Kicks Into High Gear – Rickards (DailyReckoning.com) U.S. policy to drive gold out of financial system – State Dept. memo (Gata.org) This Is The Terrifying Thing About This Mania – Fleckenstein (KingWorldNews.com) Was Noble Group the Silver Seller? (TheMacroTourist.com) Gold & Silver Shorts at “Tipping Point” and Short Squeeze Coming – Turk (KingWorldNews.com) Avoid Digital & ETF Gold – Key Gold Storage Must Haves

– History of Gold – Interesting Facts and Changes Over 50 Years – U.S. Gold Exports To China and India Surge In 2017

3/4

– The Dream of the Central Banker – Silver Investment Case Remains Extremely Compelling – Gold Coins, Bars In Demand – +9% In Q1, 2017 – Irish Property Bubble – 38pc Believe Housing Market Will Crash – Silver Bullion On Sale After 10.6% Fall In Two Weeks – London Property Bubble Vulnerable To Crash – Silver price manipulation, is regulation putting a stop to it? – Trump 100, Margin Debt Stock Bubble and Gold – Gold Bullion Imports Into China via Hong Kong More Than Doubles in March – LePen Euro Frexit Panic Over – “For Now”

4/4

goldcore.com-Cyber Wars Could Crash Markets and Threat To ...

goldcore.com-Cyber Wars Could Crash Markets and Threat To Humanity Rickards and Buffett.pdf. goldcore.com-Cyber Wars Could Crash Markets and Threat ...

109KB Sizes 0 Downloads 124 Views

Recommend Documents

Tel Aviv State - A Threat to Israel
How is the accelerated development of Tel Aviv to be slowed? 61 ... Figure 5: Students at institutions of higher learning (first and second degrees) 39 in the field of design ...... concentrated in it, about 60% of academics and scientists, about 90%

Rally Effects, Threat, and Attitude Change: An Integrative Approach to ...
Mar 7, 2017 - emotional appraisal models, and the political science literature. Keywords: ... Alison Zisser, and by a first-year research project conducted by Laura. Scherer ... provide one possible reason why rally effects did not occur fol-. lowing

From Threat to Fear - Caltech Authors
Sep 30, 2009 - tor, the postencounter reflects the initial detection of the poten- tial threat, whereas the circa-strike is associated with direct interaction with the predator (i.e., when the predator attacks). The postencounter is linked with “pa

A Field Guide to Insider Threat - Media15
Using the Threat Agent Library developed by Intel IT, study of published .... Agents with “unknown” intent can be either hostile or nonhostile, depending on the ...

A Field Guide to Insider Threat - Media15
Posting confidential details to social media sites. Misuse. Broadly encompasses any insider use of enterprise resources in ways that bypass or ignore safety or ...

Identity, Power, and Threat Perception - Semantic Scholar
Sep 19, 2007 - (1953) demonstrated how intense competition could quickly spiral into ..... shared identity will decrease threat perception, is also supported by the data. The ... asymmetry, the analysis clearly demonstrates that both power and ...

Language and ID threat REVISED
May 23, 2009 - through language use'; (ii) 'exclusion of others and personal claims .... distinctiveness is necessary in order to attain a meaningful sense of .... 'completely phase out in a few generations anyway' had interesting implications for.

Identity, Power, and Threat Perception - Semantic Scholar
Sep 19, 2007 - Department of Political Science. University at Albany ..... military power and the degree of shared identity between the countries. The word-.