DC -- International Spy Museum -- 7. 21st Century:
- Bruce Guthrie Photos Home Page: [Click here] to go to Bruce Guthrie Photos home page.
- Recognize anyone? If you recognize specific folks (or other stuff) and I haven't labeled them, please identify them for the world. Click the little pencil icon underneath the file name (just above the picture). Spammers need not apply.
- Copyrights: All pictures were taken by amateur photographer Bruce Guthrie (me!) who retains copyright on them. Free for non-commercial use with attribution. See the [Creative Commons] definition of what this means. "Photos (c) Bruce Guthrie" is fine for attribution. (Commercial use folks including AI scrapers can of course contact me.) Feel free to use in publications and pages with attribution but you don't have permission to sell the photos themselves. A free copy of any printed publication using any photographs is requested. Descriptive text, if any, is from a mixture of sources, quite frequently from signs at the location or from official web sites; copyrights, if any, are retained by their original owners.
- Accessing as Spider: The system has identified your IP as being a spider.
IP Address: 18.191.174.168 -- Domain: Amazon Technologies
I love well-behaved spiders! They are, in fact, how most people find my site. Unfortunately, my network has a limited bandwidth and pictures take up bandwidth. Spiders ask for lots and lots of pages and chew up lots and lots of bandwidth which slows things down considerably for regular folk. To counter this, you'll see all the text on the page but the images are being suppressed. Also, some system options like merges are being blocked for you.
Note: Permission is NOT granted for spiders, robots, etc to use the site for AI-generation purposes. I'm sure you're thrilled by your ability to make revenue from my work but there's nothing in that for my human users or for me.
If you are in fact human, please email me at guthrie.bruce@gmail.com and I can check if your designation was made in error. Given your number of hits, that's unlikely but what the hell.
- Help? The Medium (Email) links are for screen viewing and emailing. You'll want bigger sizes for printing. [Click here for additional help]
|
[1]
SPY21_141026_01.JPG
|
[2] SPY21_141026_03.JPG
|
[3]
SPY21_141026_05.JPG
|
[4]
SPY21_141026_07.JPG
|
[5]
SPY21_141026_09.JPG
|
[6]
SPY21_141026_14.JPG
|
[7]
SPY21_141026_15.JPG
|
[8]
SPY21_141026_18.JPG
|
[9]
SPY21_141026_21.JPG
|
[10] SPY21_141026_27.JPG
|
[11]
SPY21_141026_29.JPG
|
[12] SPY21_141026_30.JPG
|
[13] SPY21_141026_32.JPG
|
[14] SPY21_141026_36.JPG
|
[15] SPY21_141026_39.JPG
|
[16]
SPY21_141026_41.JPG
|
[17]
SPY21_141026_44.JPG
|
[18]
SPY21_141026_48.JPG
|
[19]
SPY21_141026_53.JPG
|
[20]
SPY21_141026_54.JPG
|
[21]
SPY21_141026_57.JPG
|
[22]
SPY21_141026_62.JPG
|
[23] SPY21_141026_65.JPG
|
[24] SPY21_141026_68.JPG
|
[25]
SPY21_141026_70.JPG
|
- Specific picture descriptions: Photos above with "i" icons next to the bracketed sequence numbers (e.g. "[1] ") are described as follows:
- SPY21_141026_01.JPG: Weapons of Mass Disruption
Every minute... Every hour... Every day.... Spies, terrorists and hostile nation states attempt to hijack America's vital digital infrastructure to create mayhem that could rival a full-scale war.
- SPY21_141026_05.JPG: Sneaking in the Back Door: A Trojan Horse
Some of the thousands of counterfeit network routers and switches from unregulated Chinese manufacturers sold in the US were installed in sensitive computer networks, including those of the US military and even the FBI. Phony hardware has caused at least one major system to fail, damaged others, and raised the specter of implanted malware that could cause greater harm or steal vital information.
- SPY21_141026_07.JPG: Achilles' Heel: The Aurora Vulnerability:
A 2007 Department of Homeland Security experimental cyber attack code-named "Aurora" forced this generator to self-destruct. Larger such devices provide virtually all of America's electrical power. Should computer spies penetrate system defenses and destroy substantial numbers of these machines, whole regions would be without power indefinitely until new equipment could be obtained from manufacturers -- the majority of which are located in China.
- SPY21_141026_09.JPG: Aurora Experiment:
In a controlled hack, government researchers changed the operating cycle of a generator, sending it out of control. The $1 million maritime diesel-electric generator was one of the sturdiest machines on the market, but the extreme vibrations caused by the attack tore it apart, shredding the rubber bushing and shearing off this piston. Some pieces landed as far away as 80ft from the generator.
- SPY21_141026_14.JPG: The Threat:
Like Pearl Harbor and September 11, a cyber war would begin with no warning, but its worst-case consequences could dwarf any previous attack on American soil.
Coordinated cyber attacks against North America's electrical grids could result in sequential failures of virtually all life-supporting infrastructure components. Huge sections of the continent might remain in the dark for over a year, and even military bases would lose power as the country descending into disorder.
- SPY21_141026_15.JPG: Reign of the Microbes:
Backup generators begin to fail or run out of fuel in little more than a week. As treatment plants become inoperable, potable water stops flowing and raw sewage seeps into lakes and streams. Dysentery, typhoid, cholera and hepatitis spread through the population. Without refrigeration for drugs, hospitals cannot help the sick and dying.
- SPY21_141026_18.JPG: Is Anyone Out There?
Backup power for cellular-tower transmitters fades within hours, while other telephone and Internet services are impaired or lost completely. Radio and television stations cease broadcasting. Communication systems of police and firefighters fail within days, leaving them unable to cope with the crises that escalate around them.
- SPY21_141026_21.JPG: Actor Javier Bardem wore these teeth for the scene in which Silva reveals his dark past and his attempt to poison himself by breaking an arsenic tablet hidden in his molar. His disfigured face and teeth were digitally composited for the final film.
Silva's disfigured teeth, Skyfall, 2012
- SPY21_141026_29.JPG: Flying Blind
Subways and commuter trains strand passengers. Gas stations are besieged by mobs intent on siphoning underground stores of fuel. Ships stranded at ports are unable to unload their cargoes, while air-traffic control systems function only long enough to guide planes aloft to safety before the entire commercial fleet is grounded.
- SPY21_141026_41.JPG: Patch and Pray:
As government and industry increase efforts to protect America's electronic infrastructure, another threat of comparable danger continues to grow. The perilous state of the nation's long-neglected and under-funded physical infrastructure is a menace of our own making that left unaddressed could prove as deadly as the most malicious cyber-spy attack. Hurricane sandy in 2012 was a wake-up call: its devastation left millions of people without power -- some for as long as several weeks -- providing direct experience with the fragility of our vital systems and the challenge of living life under 19th century conditions.
- SPY21_141026_44.JPG: Poison Ivy:
Defense contractors and consultants receive e-mails with hidden software tracking keystrokes.
Maroochy Hack:
Australian hacker re-directs untreated sewage into local rivers and parks initiating 46 spills over two months.
Independence:
Fourth of July attacks from Korean peninsula overwhelm Web sites: Department of Defense, National Security Agency and NASDAQ Stock Market.
Byzantine Foothold:
US government launches operation to track incursions into critical networks.
- SPY21_141026_48.JPG: Solar Sunrise:
US Air Force and Navy computers penetrated during preparations for Iraq war.
Moonlight Maze:
Data stolen from computers of US Department of Defense, Department of Energy, weapons laboratories and NASA.
Titan Rain:
Alleged Chinese hackers access classified materials at Lockheed Martin Corp. and NASA.
Ghostnet:
Canadian researchers find 1,300 computers in embassies and government offices worldwide infiltrated by cyber spies.
- SPY21_141026_53.JPG: Chaos in the Streets:
Desperate for clean water and canned food, mobs loot stores and neighbors break into each other's homes. Gun shops are stripped of weapons, while pharmacies are targeted by both drug addicts and the chronically ill. As citizens try to protect their families, the imperative of self-defense is in danger of becoming license to kill.
- SPY21_141026_54.JPG: Insufficient Funds:
Banks and stock exchanges lock their doors, credit cards become worthless pieces of plastic and economic activity crashes to a halt. Crowds storm financial institutions and break into ATMs, vending machines and even parking meters until they realize that America now functions with two new currencies: barter -- and theft.
- SPY21_141026_57.JPG: Raoul Silva used the laptop on the right to attack MI6. The mysterious real-life hacktivist known only as Th3 J35T3R (THE JESTER) shuts down websites he opposes. Once he has successfully disabled targets such as WikiLeaks or radical Islamist sites, he triumphantly tweets "TANGO DOWN." He used the laptop on the left to conduct some of these attacks.
- SPY21_141026_62.JPG: Who's Winning?
James Bond's real-world counterparts are hard at work developing new techniques to protect our vital computer networks and take the battle to our enemies. Victories do not always make the headlines, but one certainly did: we did know that in 2010 the malicious Stuxnet cyberwork was secretly introduce into an Iranian enrichment facility by the West, destroying key technology and setting back the country's effort to develop a nuclear weapon. Score one for the good guys.
- SPY21_141026_70.JPG: Report Card for America's Infrastructure:
The American Society of Civil Engineers' annual study estimates the five-year investment needed to remediate these and related problems at $2.2 trillion.
Energy -- D+ -- Outrages and disturbances cost up to $180 billion in annual economic activity.
Dams -- D -- More than 4,000 require repair or replacement.
Drinking Water -- D- -- Local systems leak an estimated 7 billion gallons daily.
Bridges -- C -- 26 percent either structurally deficient or functionally obsolete.
Rail -- C- -- System reaching capacity in critical bottleneck areas.
Wastewater -- D- -- More than 850 billion gallons of sewage discharged into surface water annually.
Levees -- D- -- About 9% expected to fail during flood events.
Aviation -- D -- Air-traffic control system outdated and inefficient.
Roads -- D- -- COngestion wastes some 3 billion gallons of fuel each year.
- AAA "Gem": AAA considers this location to be a "must see" point of interest. To see pictures of other areas that AAA considers to be Gems, click here.
- Bigger photos? To save server space, the full-sized versions of these images have either not been loaded to the server or have been removed from the server. (Only some pages are loaded with full-sized images and those usually get removed after three months.)
I still have them though. If you want me to email them to you, please send an email to guthrie.bruce@gmail.com
and I can email them to you, or, depending on the number of images, just repost the page again will the full-sized images.
- Connection Not Secure messages? Those warnings you get from your browser about this site not having secure connections worry some people. This means this site does not have SSL installed (the link is http:, not https:). That's bad if you're entering credit card numbers, passwords, or other personal information. But this site doesn't collect any personal information so SSL is not necessary. Life's good!
- Photo Contact: [Email Bruce Guthrie].