Internet Anthropologist Think Tank: Stuxnet development Paradigm Intel

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, September 25, 2010

    Stuxnet development Paradigm Intel



    Stuxnet Paradigm Intel
    Stuxnet is a joint effort.




    An extraordinary piece of professional craft.
    Multi State craft.

    The expertise required for this effort is remarkable.
    Just assembling the required experts was a huge effort.
    We have identified outside Uber hackers,
    State hackers, nuclear experts, and using state of the art
    programing/exploits/hacking.

    This worm is based on past well tested and proven
    malware fitted with unknown zero day exploits four of them.
    One would have been sufficient.

    It required experts with intimate knowledge of the nuclear systems.

    The Teams were organized around these tasks.

    #1) Penetration methods and vectors 4 
    #2) Worm, security, backdoors and reporting
    #3) Controlling nuclear processes
    #4) Fingerprinting exact targets
    #5) Rootkit paradigms
    #6) Security team for counter strike
    #7) ARTIFICIAL INTELLIGENCE ENGINE

    And NSA used outside Uber Hackers, 
    other State experts, Nuclear Scientists,
    and pre-tested it over and over.
    And maintained Opsec.

    As we have said "the new
    paradigms will be discovered
    with in new contexts.

    This opens a new era in
    warfare in a new domain.

    Hope they are ready for 
    the counter strike.
    Its coming.

    Iran doesn't have the craft
    and won't have for years.

    But there are others who
    do.
    But this shows that NSA is at the
    top of the Game world wide,
    and they learn from every attack 
    on US systems. 
    This deluxe combo relies on
    old stand-bys and cutting edge
    craft, and even 4 unknown zero 
    day exploits. The data they have
    collected on this would fill several
    blogs already, and there is a lot
    more to reverse engineer.


    There are Gov. guys out there
    that are buying unknown zero
    day exploits, I've talked to
    one. He was interested in 
    our BSU's.


    We are scanning for the application
    of the "Law of Untended Consequence."


    We may not see that until a counter
    strike.


    One nice "LUC" maybe the expulsion
    of Abberjonny as Iranian President
    from the discovery of Stuxnet.
    Some of the file names are
    very illuminating.


    This surprised me, I knew it was
    possible, but didn't think NSA
    had the imagination, originality
    or Guts to do it.
    VERY IMPRESSIVE.
     true masters of their craft,
    on every level, well thought
    out Paradigm, GENIUS.
    This isn't the first one they've
    done just the first discovered.
    And they may have meant for it to
    be found? At this point, most common 
    malware detection tools will detect this.)


    Iran can get FUCKED very hard
    if they mishandle this Nuke thing.






    Gerald
    Tactical Internet Systems analyst.


    1 Comments:

    Anonymous Anonymous said...

    Was he connected?

    http://www.telegraph.co.uk/news/uknews/8024998/FBI-joins-investigation-into-MI6-spys-death.html

    Stuxnet sample hides on usb disks
    http://webcache.googleusercontent.com/search?q=cache:G4JRMWg8J48J:www.www.offensivecomputing.net/%3Fq%3Dnode/1604+74ddc49a7c121a61b8d06c03f92d0c13&cd=19&hl=en&ct=clnk&gl=us

    If you go to Offensive computing and log in you can find "live - wild" samples for download-analysis.
    http://www.offensivecomputing.net

    10:46 AM  

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home