would it look like?
This is not an admission of
any activity.
Cyber Scope;
We plug in a IP, and scope probes;
Auto loads appropriate exploits.
Checks if Java on? If yes, loads
Java Exploits.
Barb
Checks IPS & loads exploits, if any.
Checks physical location,
list resources we have,that area.
Checks OS, loads appropriate
exploit.
Checks Browser, checks for
available traps.
More opsec won't allow.
Cyber missile head;
Loaded exploits for OS,
Java, IPS, and more.
Pay load;
Stage 1#)
Available appropriate exploits.
& bots.
Stage 2#, war head)
IPT's, APT's, rootkits,
malware,password breakers.
DAMAGE;
Many; from pop-ups to
burning up HD, or blocking
WWW access from hrs to permanent,
over writing data, parts or all.
Or invisible monitoring & reporting,
to Artificial Intelligence BSU's.
http://warintel.blogspot.com/2011/04/real-thinkingself-aware-computer.html
COWS ( cyber over watch ) by BSU's.
COUNTER SURVEILLANCE;
Also auto checks & monitors metrics
for changes in behavior.
Thats part one.
Of course that assumes they tripped
our ROE.
Stuxnet 3.0 most powerful weapon EVER |
Gerald
Tactical Internet Systems analyst.
No comments:
Post a Comment