Internet Anthropologist Think Tank: Our cyber weapon.

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Friday, December 21, 2012

    Our cyber weapon.

    If we had a cyber weapon what
    would it look like?






    This is not an admission of
    any activity.

    Cyber Scope;
    We plug in a IP, and scope probes;
    Auto loads appropriate exploits.

    Checks if Java on? If yes, loads
    Java Exploits.



    Barb

    Checks IPS & loads exploits, if any.

    Checks physical location,
    list resources we have,that area.

    Checks OS, loads appropriate
    exploit.


    Checks Browser, checks for 
    available traps.


    More opsec won't allow.




    Cyber missile head;
    Loaded exploits for OS,
    Java, IPS, and more.

    Pay load;
    Stage 1#)
    Available appropriate exploits.
    & bots.

    Stage 2#, war head)   
    IPT's, APT's, rootkits,
    malware,password breakers.




    DAMAGE;
    Many; from pop-ups to
    burning up HD, or blocking
    WWW access from hrs to permanent,
    over writing data, parts or all.
    Or invisible monitoring & reporting,
    to Artificial Intelligence BSU's.
    http://warintel.blogspot.com/2011/04/real-thinkingself-aware-computer.html

    COWS ( cyber over watch ) by BSU's.

    COUNTER SURVEILLANCE; 
    Also auto checks & monitors  metrics 
    for changes in behavior.

    Thats part one.

    Of course that assumes they tripped
    our ROE.


    Stuxnet 3.0 most powerful weapon EVER

    Gerald 
    Tactical Internet Systems analyst.






    0 Comments:

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home