NSA cyber muscle on steriods
Home land security news has breaking
"old" news. Our readers knew 2 yrs ago.
Their news flash: "Stuxnet appears to be part of a larger cybersecurity weapons program with fully operational and easily modified malicious code that can be aimed at different targets "
"team at Kaspersky Labs, explained, “Stuxnet’s creators used a [software] platform to package and deliver it, because they wanted to be able to make many cyberweapons easily and be able to change them rapidly for targeting and attack."
“We think Stuxnet and Duqu are made by the same team, with the same goal…. They can change [the software weapon produced on the common platform], manipulate it, have different payloads.”
"This system allows for the quick assembly of existing code to create fully-developed cyberweapons that can be modified to target new industrial control systems or evade detection."
Sourced: http://www.homelandsecuritynewswire.com/dr20120118-stuxnet-and-duqu-part-of-assembly-line-researchers#.TxctkDkeOBk.twitter
We said "The payload function is key. The Super worm can change out, swap
payloads."
"What are some of the payloads?
The current one is configured to
take over various control systems
for reactors and centrifuges.
Others are configured to bring down,
or take CONTROL of:
banking systems,
Phone systems,
TV,cable systems.
Military C2 systems
Missile systems
Air Traffic control systems,
Nuclear launch systems,
specific manufacturing systems." 10/17/2010 07:16:00 PM
Internet Anthropologist Think Tank: Stuxnet 3.0 most powerful ...
Iran can't fight a WAR, NSA has Iran's OFF switch:
http://warintel.blogspot.com/2012/01/exclusive-iran-unable-to-fight-war.html
"a recently discovered intelligence gathering program thought to be a precursor to Stuxnet."
We said "Version 1.0 ( of stuxnet ) is much stealthier, and as of yet still undiscovered."
"And the current version of Stuxnet is 2.0," 10/17/2010 07:16:00 PM
Internet Anthropologist Think Tank: Stuxnet 1.0, 2.0, 3.0
We said: "The Recon for this OP, is mind boggling, these
bugging OPs worked, prior to the ( known stuxnet ) attack."
Internet Anthropologist Think Tank: Paradigm Intel NSA.
Internet Anthropologist Think Tank: BSU's intercept packet for Mission Impossible.
Kaspersky and Symantec are two years behind us in understanding
Stuxnet. But we are pleased they were able to confirm our
research from two yrs ago.
Confliker is a NSA tool used to get Stuxnet into many of
the Iranian computers. Source we have found to
be very reliable in the past.
Iran is at great risk of being turned OFF.
http://warintel.blogspot.com/2012/01/exclusive-iran-unable-to-fight-war.html
There are two possible three other stuxnet type programs
in the wild undiscovered as of yet, Persistent invisible threats.
We have used some of them.
Internet Anthropologist Think Tank: Intelligence Wet dream
We salute NSA's Stuxnet Non-Proliferation Treaty rootkit Enforcer
Sep 25, 2010
INTERNET ANTHROPOLOGIST THINK TANK: STUXNET NON-PROLIFERATION ...
Gerald
Internet Anthropologist
Tactical Internet Systems analyst.
Internet Anthropologist Think Tank: I am a Cyber Warrior
PS: Kaspersky and Symantec there is NO "Junk Code in
Stuxnet or Duqu.
"old" news. Our readers knew 2 yrs ago.
Their news flash: "Stuxnet appears to be part of a larger cybersecurity weapons program with fully operational and easily modified malicious code that can be aimed at different targets "
"team at Kaspersky Labs, explained, “Stuxnet’s creators used a [software] platform to package and deliver it, because they wanted to be able to make many cyberweapons easily and be able to change them rapidly for targeting and attack."
“We think Stuxnet and Duqu are made by the same team, with the same goal…. They can change [the software weapon produced on the common platform], manipulate it, have different payloads.”
"This system allows for the quick assembly of existing code to create fully-developed cyberweapons that can be modified to target new industrial control systems or evade detection."
Sourced: http://www.homelandsecuritynewswire.com/dr20120118-stuxnet-and-duqu-part-of-assembly-line-researchers#.TxctkDkeOBk.twitter
We said "The payload function is key. The Super worm can change out, swap
payloads."
"What are some of the payloads?
The current one is configured to
take over various control systems
for reactors and centrifuges.
Others are configured to bring down,
or take CONTROL of:
banking systems,
Phone systems,
TV,cable systems.
Military C2 systems
Missile systems
Air Traffic control systems,
Nuclear launch systems,
specific manufacturing systems." 10/17/2010 07:16:00 PM
Internet Anthropologist Think Tank: Stuxnet 3.0 most powerful ...
Iran can't fight a WAR, NSA has Iran's OFF switch:
http://warintel.blogspot.com/2012/01/exclusive-iran-unable-to-fight-war.html
"a recently discovered intelligence gathering program thought to be a precursor to Stuxnet."
We said "Version 1.0 ( of stuxnet ) is much stealthier, and as of yet still undiscovered."
"And the current version of Stuxnet is 2.0," 10/17/2010 07:16:00 PM
Internet Anthropologist Think Tank: Stuxnet 1.0, 2.0, 3.0
We said: "The Recon for this OP, is mind boggling, these
bugging OPs worked, prior to the ( known stuxnet ) attack."
Internet Anthropologist Think Tank: Paradigm Intel NSA.
Internet Anthropologist Think Tank: BSU's intercept packet for Mission Impossible.
Kaspersky and Symantec are two years behind us in understanding
Stuxnet. But we are pleased they were able to confirm our
research from two yrs ago.
Confliker is a NSA tool used to get Stuxnet into many of
the Iranian computers. Source we have found to
be very reliable in the past.
Iran is at great risk of being turned OFF.
http://warintel.blogspot.com/2012/01/exclusive-iran-unable-to-fight-war.html
There are two possible three other stuxnet type programs
in the wild undiscovered as of yet, Persistent invisible threats.
We have used some of them.
Internet Anthropologist Think Tank: Intelligence Wet dream
We salute NSA's Stuxnet Non-Proliferation Treaty rootkit Enforcer
Sep 25, 2010
INTERNET ANTHROPOLOGIST THINK TANK: STUXNET NON-PROLIFERATION ...
Gerald
Internet Anthropologist
Tactical Internet Systems analyst.
Internet Anthropologist Think Tank: I am a Cyber Warrior
PS: Kaspersky and Symantec there is NO "Junk Code in
Stuxnet or Duqu.