Internet Anthropologist Think Tank: 12/16/12 - 12/23/12

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Friday, December 21, 2012

    Our cyber weapon.

    If we had a cyber weapon what
    would it look like?






    This is not an admission of
    any activity.

    Cyber Scope;
    We plug in a IP, and scope probes;
    Auto loads appropriate exploits.

    Checks if Java on? If yes, loads
    Java Exploits.



    Barb

    Checks IPS & loads exploits, if any.

    Checks physical location,
    list resources we have,that area.

    Checks OS, loads appropriate
    exploit.


    Checks Browser, checks for 
    available traps.


    More opsec won't allow.




    Cyber missile head;
    Loaded exploits for OS,
    Java, IPS, and more.

    Pay load;
    Stage 1#)
    Available appropriate exploits.
    & bots.

    Stage 2#, war head)   
    IPT's, APT's, rootkits,
    malware,password breakers.




    DAMAGE;
    Many; from pop-ups to
    burning up HD, or blocking
    WWW access from hrs to permanent,
    over writing data, parts or all.
    Or invisible monitoring & reporting,
    to Artificial Intelligence BSU's.
    http://warintel.blogspot.com/2011/04/real-thinkingself-aware-computer.html

    COWS ( cyber over watch ) by BSU's.

    COUNTER SURVEILLANCE; 
    Also auto checks & monitors  metrics 
    for changes in behavior.

    Thats part one.

    Of course that assumes they tripped
    our ROE.


    Stuxnet 3.0 most powerful weapon EVER

    Gerald 
    Tactical Internet Systems analyst.






    Terrorist Names SEARCH:
    Loading

    Wednesday, December 19, 2012

    EXCLUSIVE; Newtown motive to kill kids

    Paradigm Intel Engine:"PIE".
    Hypothesis;
    Caution none of this has been confirmed.



    Adam Lanza, 20 Newtown 20 children and six adults killed in the Sandy Hook Elementary School rampage in Newtown, Conn.


    Shot his mother 4 times in head,
    we expect shots to eyes.

    He was computer literate, had classes.
    Destroyed hard drive, he was concealing 
    data.
    This might be reversed engineered, search
    WWW for traces of his IP.
    He went to nearest school with first graders.

    Our PIE  proposes this paradigm, none
    of which has been proved.

    Their has been mention of his social
    mis-function, limited social skills.
    20 yrs old and no girl friend.

    At 20 and a social misfit,
    he had discovered porn,
    he may have been attracted 
    to younger girls/boys
    ages closer to his social comfort 
    zone.

    His mom discovered him viewing
    pedophilia content and wanting to 
    scare him away from his deviant 
    behavior, threatened him with
    Police, and being marked for
    life as child molester.

    I would expect his slow social 
    development marked him as
    an outsider and subject him
    to bulling and abuse.

    The threat of marking him
    as child abuser for viewing 
    child porn may have pushed him
    over the edge.

    He saw one way out.
    Kill mother, 4 shots to eyes?
    4 shots to head indicate lot of anger.
    If dead she can't report him.
    Destroy hard drive.

    No proof of offence

    Knowing he killed his mother

    it was the end for him.
    And he nay have viewed the 
    children as the cause of his problems
    and as the enemy, and decided
    to kill some of his 'enemies'
    before committing suicide.

    And went to the GUN FREE ZONE
    school to kill children, able to
    kill many for about 10 min 
    before police arrive, police
    sirens were trigger to commence
    suicide.

    REPEAT; This is only a hypothesis,
    it seems to match all known facts.
    We have no evidence.


    NSA will have his web history 

    ( STORED with everyone's web history
    in NSA archives ) G