Conspiracy Cafe

Conspiracy, alternative news, history, intelligence agencies


Emergency alert issued after 'incident' at Pickering Nuclear Generating Station

Posted by George Freund on January 12, 2020 at 7:50 AM

The Province of Ontario has issued an emergency bulletin after an “incident” at the Pickering Nuclear Generation Station

The emergency bulletin, which was sent out shortly after 7:20 a.m. on Sunday, said it applies to people within 10 kilometres of the facility.

“An incident was reported at the Pickering Nuclear Generating Station,” the alert said.

“There has been no abnormal release of radioactivity from the station and emergency staff are responding to the situation.”

The facility is located on Montgomery Park Road beside Lake Ontario, west of Brock Road.

The bulletin said people “do not need to take protective actions at this time.”

More to come.

More to come? How much more? Since there are no details, we can only speculate. Governments, as usual, are tight lipped. After we start dropping in the street, they may start evacuating. It might be wise to stay indoors.

How do you make an error like this? I guess the employee wasn't told to never inform the public of anything sensitive regarding threats to them. I imagine they woke up the premier and he gave them merry hell for the indiscretion.

Alles in Ordnung

Provincial Nuclear Emergency Response Plan (PNERP)

Potassium Iodide (KI)

They are now saying they were conducting a drill. My sources are saying the plant was hacked by Iran. We can only expect things to get worse if that is the case.

Emergency alert about incident at Pickering Nuclear Plant "sent in error": OPG

It's a warning that would give anyone chills and put you into panic mode.


Fortunately, an emergency alert sent out across Ontario this morning, advising of some sort of unspecified accident at Pickering Nuclear Plant, was a false alarm.


While there are still more questions than answers, about the mishap, NEWSTALK1010 has learned that it was reportedly meant to be an internal "test" message during a training drill, but that somehow, it went live across the province just before 7:30 this morning.


Speaking to our media partner CP24, James Kilgour with Durham Emergency Management says,"This is something that we do test quite a bit. This is something we do actually work on."


Kilgour says that authorities scrambled to retract the warning once they verified it was a false alarm, adding "I cannot confirm how the province issued it."


Ontario Power Generation tweeted out a correction some time after the initial alert went out, saying in part, that it was "sent in error" and that "there is no danger to the public and environment" but they've offered no further explanation.

Iranian hackers hit Bahrain oil company, target US power utilities

Iranian hackers have hit Bahrain’s national oil company as a new report finds that Iranian state-sponsored hackers have also been targeting U.S. power utilities.

The attack in Bahrain targeted oil company Bapco Dec. 29 and is said to have involved the use of the new strain of data-wiping malware. Dubbed “Dustman” by the Saudi Arabia National Cybersecurity Authority, the malware, designed to delete data on an infected computer, was quickly detected with only minor disruptions on Bapco’s network.

“This attack could have been much worse, and while we don’t know all the details, I’m willing to bet that Bapco had planned out their response before this incident occurred,” Roger A. Grimes, data-driven defense evangelist at security training company KnowBe4 Inc., told SiliconANGLE. “The lack of utter devastation this time around should be counted as a major computer defense success. ”

Grimes noted that the 2012 Disttrack attack against Saudi Aramco, which devastated that company and put all of Saudi Arabia on its heels for half a year, led to the better successful defense of Bahrain.

“The Saudi Aramco attack changed everything for that part of the world,” he said. “Before the Saudi Aramco attack, Middle East computer security was worse than poor. It was almost nonexistent. But losing 32,000 computers, servers and workstations, in one of the world’s first nation-state attacks and the shutting down of the number one wealth producer for the country has a way of creating focus.”

A separate report from cybersecurity report Dragos Inc. details the activities of an Iranian hacking group it calls Magnallium, also known as APT33 in targeting U.S. power companies.

The report says that the group has been undertaking a broad campaign of password-spraying attacks against U.S. firms since the beginning of 2019. Those are attacks that attempt to access accounts with a few commonly used passwords. Wired reported that another Iranian group called Parasite has also been working with Magnallium by attempting to exploit vulnerabilities in virtual private networking software.

Dragos did not say whether any of the attacks were successful.

Jason Kent, hacker in residence at application security firm Cequence Security Inc., noted that these groups are looking for ways to cause the greatest amount of disruption with the least amount of effort possible.

“Because our electrical grid and gas systems are largely run by regional monopolies, the attackers cannot focus on one target,” he said. “This can be a protective measure so long as each of these organizations has tightened security to the NERC-CIP standards that govern the security of the grid.”

The problem, Kent said, is that security standards often have certain holes and can allow for an attacker to gain access. “These holes are what they are counting on,” he said. “Once in, deleting files or causing damage to networks, has been their goal. Hopefully, they won’t move on to more sophisticated attacks targeting the destruction of sensitive systems like our nuclear power generation systems.”

Categories: New World Order, Environment