Linkedin Mail RSS Skype Telegram Twitter WhatsApp
  • Quantum
  • AI
  • AI Security
  • Society 5.0
  • Cyber-Kinetic
  • 5G
  • Smart Cities
  • Blockchain & Crypto
  • Other
Search
Marin Ivezic Marin Ivezic Marin Ivezic
  • Quantum
  • AI
  • AI Security
  • Society 5.0
  • Cyber-Kinetic
  • 5G
  • Smart Cities
  • Blockchain & Crypto
  • Other
Linkedin Mail RSS Skype Telegram Twitter WhatsApp
  • Home
  • About
  • My Books
    • Securing Society 5.0
    • The Future of Leadership in the Age of AI
    • Crypto & Blockchain Security
    • Cyber-Kinetic Security
  • Resources
    • Internet of Things (IoT) Wireless Protocols
    • Emerging Tech Security Guidelines, Frameworks, Standards
    • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
  • Contact
Sign in
Welcome! Log into your account
Forgot your password? Get help
Password recovery
Recover your password
A password will be e-mailed to you.
Home Malfunction - Bellingham, Washington, Pipeline Rupture

    Malfunction – Bellingham, Washington, Pipeline Rupture

    By
    Marin Ivezic
    -
    November 19, 2017
    Bellingham Explosion Cyber-Kinetic

    Poor programming practices led to a pressure buildup and subsequent explosion that killed three people, injured eight others and released a quarter-million gallon of gasoline.

    Bellingham Explosion Cyber-Kinetic
    Previous articleUntargeted Attack – Worcester Airport Control Tower Lost Communication
    Next articleTargeted Attack – Maroochy Shire Wastewater Plant Compromised
    Marin Ivezic
    Marin Ivezic
    ABOUT US
    Marin Ivezic's personal blog with guest contributors on security, safety, privacy and controllability of emerging technologies such as AI, IoT, Blockchain, Metaverse, and others.
    FOLLOW US
    Linkedin Mail RSS Skype Telegram Twitter WhatsApp
    • Home
    • About
    • My Books
      • Securing Society 5.0
      • The Future of Leadership in the Age of AI
      • Crypto & Blockchain Security
      • Cyber-Kinetic Security
    • Resources
      • Internet of Things (IoT) Wireless Protocols
      • Emerging Tech Security Guidelines, Frameworks, Standards
      • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
    • Contact
    © Marin Ivezic | Terms of Use | Privacy Policy