Internet Anthropologist Think Tank: Smoking Gun, Stuxnet architect.

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Tuesday, March 22, 2011

    Smoking Gun, Stuxnet architect.





    Smoking Gun, Stuxnet architect.


    If malware can be Art,
    Stuxnet be its name.

    Is one of the possible architects of Stuxnet, US Gov. Uber hacker #JohnBumgarner ?
    Paradigm Intel has suggested that the United States was the author
    of Stuxnet {malware} that destroyed the gas centrifuges at Iran's
    Bushehr Nuclear Power Plant.
    To date no real evidence has been presented that links the US to
    Stuxnet.   Our BSU's have finally uncovered a creditable link.
    BSU's discovered an obscure article in public documents written by
    John Bumgarner, Chief Technology Officer of the U.S. Cyber
    Consequences Unit.

    For some unexplained reason all the major news agencies missed this source in all their research into Stuxnet.

    It seems that the article was written primarily for an “information
    operations (a.k.a. computer network attack)” audience {very
    interesting}.   Within the article he discusses launching a ‘covert
    cyber strike’ against a nation that has violated international
    treaties for the purpose of developing nuclear weapons {Iran?}



    He goes on to discuss the most likely target for such a covert
    cyber attack.  His target was the “gas centrifuges” used for uranium enrichment
    { thats what Stuxnet targeted?}.    Have you ever wonder
    how you might destroy a gas centrifuge with a cyber attack?  John outlines the attack technique within his article.  He states that by manipulating the rotationally frequency of the centrifuges you can cause a “catastrophic failure” of these
    delicate devices. Same as Symantec stated stuxnet
    did in their blog posting on November 12, 2010?

    http://www.symantec.com/connect/blogs/stuxnet-breakthrough

    Ralph Langner state at the TED conference in March that his
    stuxnet analysis uncovered the same thing?
    http://www.youtube.com/watch?v=CS01Hmjv1pQ

    John’s article was published months before Symantec’s revelation or
    Langner’s proclamation about stuxnet’s target and attack method!!
    His article was also published months before the Belarusian
    antivirus company discovered stuxnet!!

    Some possible Paradigms:

    Could he be one of the architects of Stuxnet?

    Did he have insider knowledge of the pending attack {US government
    conspiracy}?

    Did he just make an educated guess about the exact target and the
    exact attack technique?


    I assume that there were lots of black ops people {intelligence,
    military} that knew what the target and attack technique would be
    in an “Iranian cyber attack scenario.”

    But, no matter in our eyes John is the definitive Uber Hacker.


    Our First lead, the Chinese translation the article:
    http://knowfar.org.cn/html/version/201010/10/2830.htm

    So does John’s article prove that Stuxnet was a creation of the
    United States {NSA}.  Maybe or maybe not, but it does make for a
    compelling argument that the US had forehand knowledge of a pending
    attack against Iran’s nuclear systems, but so did Israel and some
    have even speculated that even the Chinese may have written
    Stuxnet.

    Although the evidence is not conclusive the United States does
    looks to be the designer of the worlds first Uber Worm, rootkit,
    with artificial Intelligence, and a self-defense mode. (another
    attack technique that John has written about)

    John’s article also talks about embedding malicious code into
    Russia’s main battle tank the T-95.    Is there more to this attack
    scenario to come……

    We also uncovered another paper John wrote back in 2005, which
    suggests that more technologically advance and stealthier cyber
    attacks are coming.  The paper highlights at least 12 techniques!!
    Some of those techniques include how cyber attackers need to become
    more targeted in their efforts {check}, that malware would need to
    employed self-defense capabilities {check – but not to the level
    that he outlines}, that malware needs to self-aware capabilities
    {nope}.  He even talks about a “sleeper worm” that uses advance
    techniques to hide covertly until it is instructed to spring into
    action.

    We also found that John recently gave a lecture in London on how to
    develop better cyber weapons!!  More on that later…….

    I think John is the closes we have come to one of the double super
    secret uber hackers that I've written about.  John is definitely
    one of the USA's preeminent Hacker.

    Rara Avis.

    John Bumgarner is a celebrated “über-hacker” with 18 years of service in Special Operations and intelligence. His private sector certifications include CISSP, GIAC (Gold), and duel Masters degrees in Information Systems Management and Security Management. And we have connected him to the CIA and NSA.




    Our sources indicate Iran is still 'raslin' with
    Stuxnet.



    Gerald
    War Anthropologist, ad Magnum


    Tactical Internet Systems analyst.
    .

    I heart Stuxnet. 


    .
    Index of our Stuxnet paradigm intel: Reaearch:


    1. Internet Anthropologist Think Tank: Russian view of Stuxnet.

      Oct 13, 2010 ... Stuxnet successfully hit 1368 of 5000 centrifuges at the uranium enrichment plant at Natanz, as well as disrupted launch date of nuclear ...
      warintel.blogspot.com/2010/10/russian-view-of-stuxnet.html
    2. Internet Anthropologist Think Tank: Stuxnet 3.0 most powerful 

         
      Oct 17, 2010 ... Stuxnet 3.0 most powerful weapon EVER. The Ultimate War Weapon. ...Stuxnet 3.0 is super stealthy, with more. unknown day one exploits. ...
      warintel.blogspot.com/2010/.../stuxnet-30-most-powerful-weapon-ever.html
    3. Internet Anthropologist Think Tank: Stuxnet 1.0, 2.0, 3.0

      Oct 14, 2010 ... We were going to write about the next generation of Stuxnet. But realized the Iranian Reactor Stuxnet is the 2.0 version. ...
      warintel.blogspot.com/2010/10/stuxnet-10-20-30.html
    4. Internet Anthropologist Think Tank: Missed lesson of Stuxnet.

         
      Dec 14, 2010 ... This blog set to display 20 days of posts. Sorry Blogspot only shows 3 days, waiting for a Google fix, G. Missed lesson of Stuxnet.
      warintel.blogspot.com/2010/12/missed-lesson-of-stuxnet.html
    5. Internet Anthropologist Think Tank: update stuxnet

      Oct 3, 2010 ... Stuxnet: engineered for persistence after discovery, acts defensively, to preserve existence, foils removal. Gabout 23 hours ago via web ...
      warintel.blogspot.com/2010/10/update-stuxnet-100310.html
    6. Internet Anthropologist Think Tank: Stuxnet update 

      Oct 20, 2010 ... Stuxnet is evolving its capabilities to infect systems and replicate within an organization, yet its payload remains unchanged. ...
      warintel.blogspot.com/2010/10/stuxnet-update-102010.html
    7. Internet Anthropologist Think Tank: Stuxnet Non-Proliferation 

         
      Sep 25, 2010 ... Stuxnet Non-Proliferation Treaty rootkit Enforcer ...http://www.symantec.com/connect/blogs/exploring-stuxnet-s-plc-infection-process ...
      warintel.blogspot.com/2010/09/stuxnet-non-proliferation-treaty.html
    8. Internet Anthropologist Think Tank: Stuxnet development Paradigm Intel

      Sep 25, 2010 ... abysssec Here is unpacked stub of stuxnet for fans http://bit.ly/czCqF7 password=abysssec #stuxnet Some files cannot be scaned? G ...
      warintel.blogspot.com/2010/09/stuxnet-development-paradigm-intel.html
    9. Internet Anthropologist Think Tank: Stuxnet Manhattan project

      Jan 18, 2011 ... Stuxnet Manhattan project. Mikko Hyppönen at F-Secure confirms what we have ... STUXNET 2.0 3.0 4.0 5.0 6.0 ETC. NSA confirms WE ARE SCEWED ...
      warintel.blogspot.com/2011/01/stuxnet-manhattan-project.html

    1. Oct 5, 2010 ... Tribute to Stuxnet. Face of stuxnet... BSU's intercept packet for MI · Terror alert: What to do? update stuxnet, 10.03.10 ...
      warintel.blogspot.com/2010/10/tribute-to-stuxnet.html
    2. Internet Anthropologist Think Tank: The new war domain at work.

      Sep 24, 2010 ... Stuxnet even uses a finger print to be sure of target. ... that the Stuxnetexploits will be available in Metasploit within 6 months. ...
      warintel.blogspot.com/2010/09/new-war-domain-at-work.html
    3. Internet Anthropologist Think Tank: Iran's future Nuclear program. NOT

      Sep 25, 2010 ... head with the discovery of Stuxnet in 300000. of its PC's and associated control mechanisms. While they are scrambling for methods to dis- ...
      warintel.blogspot.com/2010/09/irans-future-nuclear-program-not.html
    4. Internet Anthropologist Think Tank: Ops and Intel update 10,22,10

      Oct 22, 2010 ... Stuxnet team GENIUSES. Most knowledgeable and advanced hacker. ever.Stuxnet work of art. ... Stuxnet 3.0 in the wings, awaiting deployment. ...
      warintel.blogspot.com/2010/10/ops-and-intel-update-102210.html
    5. Internet Anthropologist Think Tank: The world is a safer place 

         
      Oct 10, 2010 ... protecting the WWW nodes, Stuxnet is built on the concept. ... Stuxnet is remarkable in other ways, the level of encryption ...
      warintel.blogspot.com/2010/10/world-is-safer-place-this-saturday.html
    6. Internet Anthropologist Think Tank: Paradigm Intel NSA.

      Dec 25, 2010 ... the box thinking on Stuxnet, just carried old ... Internet Anthropologist Think Tank: Stuxnet 3.0 most powerful Weapon. ...
      warintel.blogspot.com/2010/12/paradigm-intel-nsa.html


      .Who do you think is behind Stuxnet?
      Comments open.

    3 Comments:

    Anonymous Anonymous said...

    Someone needs to buy that man a beer.

    8:53 PM  
    Blogger gerald said...

    Mosquito forerunner of Stuxnet http://www.vanityfair.com/culture/2013/07/new-cyberwar-victims-american-business?mbid=social_retweet … we spotted in 11/01/2006 http://warintel.blogspot.com/2006/11/our-non-public-terrorism-initiative_01.html … middle of page, G

    Saw it in 11/01/2006

    "USA army paradigm. Mosquito squad infecting Al Q computers with malaria virus, weakening them by stealing email address books, banking info and reading their email on their PC's. Logging web sites which they connect to. "
    In middle of page, G

    3:33 PM  
    Blogger gerald said...

    identified in David Sanger's book Confront and Conceal as a mastermind of the Stuxnet project, Cartwright is also one of the most politically contentious military officers in Washington, Gen. James Cartwright. The former vice chairman of the Joint Chiefs of Staff .

    http://www.foreignpolicy.com/articles/2013/06/28/a_general_gets_knifed_james_cartwright_stuxnet_leak

    2:49 AM  

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home