2021-08-11 NSA Cybersecurity Information Sheet

1) The telecom industry, like the tobacco industry before it, knows about the dangers associated with the products it sells and the services it provides. Profit is like a drug, and the telecoms are addicted. Until the profit is hit hard, the industry will keep on doing what is making it the most profitable industry in the world. Prof.Johansson highlights some recent lawsuits. And more will come as people become educated and connect RF with their illnesses.

Associate professor Olle Johansson: Cars, humans, laws, artificial electromagnetic fields … but what about the future?

Just imagine if the outdoor temperature would increase 100,000,000 times, or 1,000,000,000,000,000,000 times, or much more…then you, your house and car, as well as the entire planet would melt. Crazy, right?!

But these are the exact figures the man-made, modern, low-frequency as well as high-frequency electromagnetic fields have been allowed to increase in the last 100 years. Since they are invisible, you can not see them, but scientists have revealed their negative impacts on molecules, cells, tissues, organs, and entire lifeforms including humans, animals, plants, and bacteria. Crazy, right?!…

One group, which many persons hope will assist our society to get it right, are the legal representatives, of all categories. And they certainly are making themselves heard!”

Associate professor Olle Johansson: Cars, humans, laws, artificial electromagnetic fields … but what about the future?


2) US National Security Agency has provided its employees with a Cybersecurity Information Sheet with a checklist warning about the vulnerability of using Wi-Fi, bluetooth, etc. This is sound advice for anyone. Wired is much more secure than any wireless access, but I didn’t see this advice anywhere on this Information Sheet.

Securing Wireless Devices in Public Settings

“Accessing public Wi-Fi hotspots may be convenient to catch up on work or check email, but public Wi-Fi is often not configured securely. Using these networks may make users’ data and devices more vulnerable to compromise, as cyber actors employ malicious access points (Masquerading [T1036] 1 ), redirect to malicious websites, inject malicious proxies, and eavesdrop on network traffic (Network Sniffing [T1040]).[1] In addition to WiFi, cyber actors can compromise other common wireless technologies, such as Bluetooth® and Near Field Communications (NFC) (Exploit via Radio Interfaces [T1477]). These technologies must be properly configured to ensure user devices remain secure from compromises. The risk is not merely theoretical; these malicious techniques are publicly known and in use.



3) John Deere is investing in 5G, using the internet, etc. to allow autonomous tractors, etc. I must admit it hadn’t occurred to me that smart farms” presented cyber threats.

John Deere to Acquire Autonomous Tractors Start-Up; “removes a person from the tractor cab entirely”

“Cybersecurity experts have warned about serious risks and vulnerabilities associated with “Smart Farms” and Internet of Things (IoT) connected agriculture. Strangely enough, proponents still aren’t discouraged.

In fact, earlier this summer John Deere announced that the company supports 5G for farming despite cybersecurity as well as well-documented biological and environmental risks from the controversial technology which has already been banned in some cities and countries . Nevertheless, the company is investing in autonomous tractors even though other autonomous vehicles are getting lousy reviews.”


IEEE: Smart Farms Are Hackable and Internet of Things Connected Agriculture Vulnerable to Cybersecurity Threats

“For example, while field agriculture might be subject to threats from damage to the facility, poultry and livestock breeding may face sensor failures, and greenhouse cultivation could face control system intrusions. All of these could result in damage to the IoT architecture, both hardware and software, leading to failure or malfunction in farming operations. Plus, there are threats to data acquisition technologies—malicious attacks, unauthorized access, privacy leaks, and so on—while blockchain technologies can be vulnerable to access control failure and unsafe consensus agreement.

In Yang’s opinion, the most pressing security problems in smart agriculture involve the physical environment, such as plant factory control system intrusion and unmanned aerial vehicle (UAV) false positioning. “The network for rural areas is not as good as that of cities,” he says, “which means that the network signals in some areas are poor, which leads to…false base station signals.””



Sharon Noble, Director, Coalition to Stop Smart Meters

“The only real voyage of discovery consists not in seeking new landscapes but in having new eyes.”       Marcel Proust



Smart Meters, Cell Towers, Smart Phones, 5G and all things that radiate RF Radiation