Smoking Gun, Stuxnet architect.
Smoking Gun, Stuxnet architect.
If malware can be Art,
Stuxnet be its name.
Is one of the possible architects of Stuxnet, US Gov. Uber hacker #JohnBumgarner ?
Paradigm Intel has suggested that the United States was the author
of Stuxnet {malware} that destroyed the gas centrifuges at Iran's
Bushehr Nuclear Power Plant.
To date no real evidence has been presented that links the US to
Stuxnet. Our BSU's have finally uncovered a creditable link.
BSU's discovered an obscure article in public documents written by
John Bumgarner, Chief Technology Officer of the U.S. Cyber
Consequences Unit.
of Stuxnet {malware} that destroyed the gas centrifuges at Iran's
Bushehr Nuclear Power Plant.
To date no real evidence has been presented that links the US to
Stuxnet. Our BSU's have finally uncovered a creditable link.
BSU's discovered an obscure article in public documents written by
John Bumgarner, Chief Technology Officer of the U.S. Cyber
Consequences Unit.
For some unexplained reason all the major news agencies missed this source in all their research into Stuxnet.
It seems that the article was written primarily for an “information
operations (a.k.a. computer network attack)” audience {very
interesting}. Within the article he discusses launching a ‘covert
cyber strike’ against a nation that has violated internationaltreaties for the purpose of developing nuclear weapons {Iran?}
It seems that the article was written primarily for an “information
operations (a.k.a. computer network attack)” audience {very
interesting}. Within the article he discusses launching a ‘covert
cyber strike’ against a nation that has violated internationaltreaties for the purpose of developing nuclear weapons {Iran?}
He goes on to discuss the most likely target for such a covert
cyber attack. His target was the “gas centrifuges” used for uranium enrichment
{ thats what Stuxnet targeted?}. Have you ever wonder
how you might destroy a gas centrifuge with a cyber attack? John outlines the attack technique within his article. He states that by manipulating the rotationally frequency of the centrifuges you can cause a “catastrophic failure” of these
delicate devices. Same as Symantec stated stuxnet
did in their blog posting on November 12, 2010?
http://www.symantec.com/
Ralph Langner state at the TED conference in March that his
stuxnet analysis uncovered the same thing?
http://www.youtube.com/watch?
John’s article was published months before Symantec’s revelation or
Langner’s proclamation about stuxnet’s target and attack method!!
His article was also published months before the Belarusian
antivirus company discovered stuxnet!!
Some possible Paradigms:
Could he be one of the architects of Stuxnet?
Did he have insider knowledge of the pending attack {US government
conspiracy}?
Did he just make an educated guess about the exact target and the
exact attack technique?
I assume that there were lots of black ops people {intelligence,
military} that knew what the target and attack technique would be
in an “Iranian cyber attack scenario.”
But, no matter in our eyes John is the definitive Uber Hacker.
Our First lead, the Chinese translation the article:
http://knowfar.org.cn/html/
So does John’s article prove that Stuxnet was a creation of the
United States {NSA}. Maybe or maybe not, but it does make for a
compelling argument that the US had forehand knowledge of a pending
attack against Iran’s nuclear systems, but so did Israel and some
have even speculated that even the Chinese may have written
Stuxnet.
Although the evidence is not conclusive the United States does
looks to be the designer of the worlds first Uber Worm, rootkit,
with artificial Intelligence, and a self-defense mode. (another
attack technique that John has written about)
John’s article also talks about embedding malicious code into
Russia’s main battle tank the T-95. Is there more to this attack
scenario to come……
We also uncovered another paper John wrote back in 2005, which
suggests that more technologically advance and stealthier cyber
attacks are coming. The paper highlights at least 12 techniques!!
Some of those techniques include how cyber attackers need to become
more targeted in their efforts {check}, that malware would need to
employed self-defense capabilities {check – but not to the level
that he outlines}, that malware needs to self-aware capabilities
{nope}. He even talks about a “sleeper worm” that uses advance
techniques to hide covertly until it is instructed to spring into
action.
suggests that more technologically advance and stealthier cyber
attacks are coming. The paper highlights at least 12 techniques!!
Some of those techniques include how cyber attackers need to become
more targeted in their efforts {check}, that malware would need to
employed self-defense capabilities {check – but not to the level
that he outlines}, that malware needs to self-aware capabilities
{nope}. He even talks about a “sleeper worm” that uses advance
techniques to hide covertly until it is instructed to spring into
action.
We also found that John recently gave a lecture in London on how to
develop better cyber weapons!! More on that later…….
I think John is the closes we have come to one of the double super
secret uber hackers that I've written about. John is definitely
one of the USA's preeminent Hacker.
I think John is the closes we have come to one of the double super
secret uber hackers that I've written about. John is definitely
one of the USA's preeminent Hacker.
Rara Avis.
John Bumgarner is a celebrated “über-hacker” with 18 years of service in Special Operations and intelligence. His private sector certifications include CISSP, GIAC (Gold), and duel Masters degrees in Information Systems Management and Security Management. And we have connected him to the CIA and NSA.
Our sources indicate Iran is still 'raslin' with
Stuxnet.
War Anthropologist, ad Magnum
Tactical Internet Systems analyst.
Internet Anthropologist Think Tank: Russian view of Stuxnet.
Oct 13, 2010 ... Stuxnet successfully hit 1368 of 5000 centrifuges at the uranium enrichment plant at Natanz, as well as disrupted launch date of nuclear ...
warintel.blogspot.com/2010/10/russian-view-of-stuxnet.html Internet Anthropologist Think Tank: Stuxnet 3.0 most powerful
Oct 17, 2010 ... Stuxnet 3.0 most powerful weapon EVER. The Ultimate War Weapon. ...Stuxnet 3.0 is super stealthy, with more. unknown day one exploits. ...
warintel.blogspot.com/2010/.../stuxnet-30-most-powerful- weapon-ever.html Internet Anthropologist Think Tank: Stuxnet 1.0, 2.0, 3.0
Oct 14, 2010 ... We were going to write about the next generation of Stuxnet. But realized the Iranian Reactor Stuxnet is the 2.0 version. ...
warintel.blogspot.com/2010/10/stuxnet-10-20-30.html Internet Anthropologist Think Tank: Missed lesson of Stuxnet.
Dec 14, 2010 ... This blog set to display 20 days of posts. Sorry Blogspot only shows 3 days, waiting for a Google fix, G. Missed lesson of Stuxnet.
warintel.blogspot.com/2010/12/missed-lesson-of-stuxnet.html Internet Anthropologist Think Tank: update stuxnet,
Oct 3, 2010 ... Stuxnet: engineered for persistence after discovery, acts defensively, to preserve existence, foils removal. Gabout 23 hours ago via web ...
warintel.blogspot.com/2010/10/update-stuxnet-100310.html Internet Anthropologist Think Tank: Stuxnet update
Oct 20, 2010 ... Stuxnet is evolving its capabilities to infect systems and replicate within an organization, yet its payload remains unchanged. ...
warintel.blogspot.com/2010/10/stuxnet-update-102010.html Internet Anthropologist Think Tank: Stuxnet Non-
Proliferation
Sep 25, 2010 ... Stuxnet Non-Proliferation Treaty rootkit Enforcer ...http://www. symantec.com/connect/blogs/ exploring-stuxnet-s-plc- infection-process ...
warintel.blogspot.com/2010/09/stuxnet-non-proliferation- treaty.html Internet Anthropologist Think Tank: Stuxnet development Paradigm Intel
Sep 25, 2010 ... abysssec Here is unpacked stub of stuxnet for fans http://bit.ly/czCqF7 password=abysssec #stuxnet Some files cannot be scaned? G ...
warintel.blogspot.com/2010/09/stuxnet-development-paradigm- intel.html Internet Anthropologist Think Tank: Stuxnet Manhattan project
Jan 18, 2011 ... Stuxnet Manhattan project. Mikko Hyppönen at F-Secure confirms what we have ... STUXNET 2.0 3.0 4.0 5.0 6.0 ETC. NSA confirms WE ARE SCEWED ...
warintel.blogspot.com/2011/01/stuxnet-manhattan-project.html
- Oct 5, 2010 ... Tribute to Stuxnet. Face of stuxnet: ... BSU's intercept packet for MI · Terror alert: What to do? update stuxnet, 10.03.10 ...
warintel.blogspot.com/2010/10/tribute-to-stuxnet.html Internet Anthropologist Think Tank: The new war domain at work.
Sep 24, 2010 ... Stuxnet even uses a finger print to be sure of target. ... that the Stuxnetexploits will be available in Metasploit within 6 months. ...
warintel.blogspot.com/2010/09/new-war-domain-at-work.html Internet Anthropologist Think Tank: Iran's future Nuclear program. NOT
Sep 25, 2010 ... head with the discovery of Stuxnet in 300000. of its PC's and associated control mechanisms. While they are scrambling for methods to dis- ...
warintel.blogspot.com/2010/09/irans-future-nuclear-program- not.html Internet Anthropologist Think Tank: Ops and Intel update 10,22,10
Oct 22, 2010 ... Stuxnet team GENIUSES. Most knowledgeable and advanced hacker. ever.Stuxnet work of art. ... Stuxnet 3.0 in the wings, awaiting deployment. ...
warintel.blogspot.com/2010/10/ops-and-intel-update-102210. html Internet Anthropologist Think Tank: The world is a safer place
Oct 10, 2010 ... protecting the WWW nodes, Stuxnet is built on the concept. ... Stuxnet is remarkable in other ways, the level of encryption ...
warintel.blogspot.com/2010/10/world-is-safer-place-this- saturday.html Internet Anthropologist Think Tank: Paradigm Intel NSA.
Dec 25, 2010 ... the box thinking on Stuxnet, just carried old ... Internet Anthropologist Think Tank: Stuxnet 3.0 most powerful Weapon. ...
warintel.blogspot.com/2010/12/paradigm-intel-nsa.html
.Who do you think is behind Stuxnet?Comments open.
3 Comments:
Someone needs to buy that man a beer.
Mosquito forerunner of Stuxnet http://www.vanityfair.com/culture/2013/07/new-cyberwar-victims-american-business?mbid=social_retweet … we spotted in 11/01/2006 http://warintel.blogspot.com/2006/11/our-non-public-terrorism-initiative_01.html … middle of page, G
Saw it in 11/01/2006
"USA army paradigm. Mosquito squad infecting Al Q computers with malaria virus, weakening them by stealing email address books, banking info and reading their email on their PC's. Logging web sites which they connect to. "
In middle of page, G
identified in David Sanger's book Confront and Conceal as a mastermind of the Stuxnet project, Cartwright is also one of the most politically contentious military officers in Washington, Gen. James Cartwright. The former vice chairman of the Joint Chiefs of Staff .
http://www.foreignpolicy.com/articles/2013/06/28/a_general_gets_knifed_james_cartwright_stuxnet_leak
Post a Comment
Subscribe to Post Comments [Atom]
<< Home