Picture I |
http://kimmontaidearvioita.blogspot.com/p/about-codenames-of-operations-of.html
Kimmo Huosionmaa
When we are talking about information, what CIA or NSA delivers, we must understand that there would be many operations and projects, what have the same name. And the accomplisher of the mission would determine the purpose of the project. So when we are thinking about Project or Operation "MAGNET", we might first analyze, what kind of thing is the "Magnet". It is the thing, what pulls other objects to it, and that's why I think that the real version of this project is to build "honeypot servers", what mission would be to catch hackers from the Internet.
"Honeypot" servers are filled with the most addictive information, like drawings of the "top secret" military planes, but the information, what this kind of server involves is one problem, even those aircraft could be secret, the vital information has been changed, and the computer programs, what are in those servers contains very dangerous code. Those servers mission is to track the hostile operators from the Internet, and they are also used to deliver the "hoax-information". When somebody would hack into the system, the server would offer very much interesting information. The information, what hacker is searching helps to profile the employers of that person.
Criminals are interested in the names of the undercover agents, and the military intelligence is interested in the top-secret tanks and aircraft. The information what that hacker wants uncovers the reason and motive for that operation. By using those servers the intelligence might deliver information, what causes chaos in the targeted organization. And one of the best way to cause disorder in the drug cartels is delivered hoax information, that their best gunmen are working for DEA. This would cause the violence between those gangsters. The secret aircraft might be made with wrong materials, that means, they could be dangerous for their pilots.
Code, what is downloaded would link the homepages to other targets, what contains specially modified data. In the worst scenario, the MAGNET would set the "Trojan horse" type virus to the targeted system. That computer virus would be delivered in the files, what are downloaded. The code has been set in the place of "dead code", and then the virus would be connected by using robot program, what would connect those code lines. But also this server can replace the parts of the operating system with its own code, and that means, that operating system turns to computer virus, and the trick is quite easy in theory.
The place, where Windows or any other operating system downloads packages would be changed to another server, and then the server can replace all operating system with virus code. Those codes can also make possible to shut down the system in the critical moment. And that could be devastating if it happens in the war. This is why that kind of servers must be dodged because they would take entire computer system in the control.
Picture I
https://www.tahawultech.com/wp-content/uploads/2012/09/Windows-Server-2012-to-be-released-on-September-4-1.jpg
Comments
Post a Comment