AN IRON MOUNTAIN BASE
[DOORS]
TUGSTEN CARBIDE 500 POUND EACH, LASER PROXIMITY DETECTOR TO PREVENT ACCIDENTS SLIDING ELEVATOR STYLE.
AUTOMATED
KEYPAD LOCKOUT AND ALARM AFTER 3 TRIES. IRIS AND SCLERA CAPILLARY SCAN
UNIQUE TO EVEN TWINS. LIVING THUMBPRINT SCANNER.
[WALLS]
3 inch high carbon steel bomb proof Faraday cage walls.
[ULTRASOUND
SHIELDING] VACUUM PUMPED CARBON FIBER CHAMBERS, RUBBER COATED 1'.
SOUND CANNOT PROPAGATE IN A VACUUM. 1 square foot thick blocks each.
Three blocks thick lining the walls.
[HALLWAY]
IMAGE
RECOGNITION OF IRISES, FACES AND BODY HEIGHTS WITH LIDAR AND HD
CAMERAS, IF NO RECOGNITION IS MADE; THE HALLWAY GETS HOTTER AND HOTTER
THE FURTHER YOU WALK IN WITH MICROWAVE AREA DENIAL.
THIS SETS YOU ON FIRE HALFWAY DOWN THE HALLWAY AND SOUNDS AN ALARM.
[EMP SHIELDING]
IRON
EPOXY COATED SEWER PIPE FILLED WITH MINERAL OIL TO RUN HIGH VOLTAGE
ELECTRIC WIRES TO IRON BOXES WITH TRANSFORMERS ALSO MINERAL OIL FILLED
TO COOL AND I ALSO INSULATE. ELECTRONICS TO BE SETUP FROM THESE LINES IN
FARADAY CAGES. ALL COMPUTERS FOR EQUIPMENT.
[SEC SAT-PHONES]
BIO-METRIC LIVING THUMBPRINT SCANNER ON PHONE FOR AUTHENTICATION. THORP CHIP FOR END TO END ENCRYPTION OR OUT .
PBX PROXY.
[LAND LINE]
PBX IN A BOX INSTALLATION MILITARY AES ENCRYPTED, THORP TRAFFIC WITH MILITARY AES TRAFFIC UNDER THORP. REMASTERSYS USED TO TURN IT INTO A LIVEDISK ON A ENCRYPTED DVD BIO-LOCKED. BLACKOUT PERSON BEFORE TOUCHING.
SECURES COMMUNICATION BETWEEN BASES.
[RED ALERT]
A
LARGE RED BUTTON INSTALLED THAT SAYS RED ALERT. IF PRESSED A RED ALERT
ALARM SOUNDS CIVILIANS AND WOMEN ARE TO GO TO SAFE ROOMS. RED KEY
LOCKED. CIVILIANS IN ONE ROOM WITH FOOD, WATER AND TOILET, WOMEN IN
COMPUTER EQUIPMENT ROOMS WITH INSTANT KILL TERMINALS.
SATCOM
PHONE UPLINK; ROOM AUTOMATED KEYPAD LOCKOUT 3 TRIES. IRIS AND SCLERA
CAPILLARY SCAN UNIQUE TO EVEN TWINS. LIVING THUMBPRINT SCANNER. RED KEY.
INSTANT
KILL TERMINALS; AUTOMATED KEYPAD LOCKOUT 3 TRIES. IRIS AND SCLERA
CAPILLARY SCAN UNIQUE TO EVEN TWINS. LIVING THUMBPRINT SCANNER. RED KEY
AROUND NECK OF WOMEN.
THE SECURITY DUTY IS NOTIFIED VIA SATCOM PHONE TEXT. ARMED MEN GO TO THEM FOR DIRECTIONS TO ROOM (RED ALERTED).
[WALL OF SOUND]
ELECTRIFIED FENCES.
3D
RADAR AND ULTRASOUND TOWER FIELD, EACH TOWER EXTRAPOLATES 3D TARGETING
IMAGE AND IMAGE RECOGNITION, FOR ULTRASOUND. 3D RADAR THAT SEES THOUGH
WALLS AND TREES. AUTOMATED
CLICK ON THE AREA AND ZOOM IN TO A PANORAMIC DOME 3D IMAGE. DIRECT INSTANT KILL.
BEHIND {
[WALL OF FLAME] 400 DEG MICROWAVE WALL, THE HEAT BUILDS UP FROM 0 THE CLOSER TO THE CENTER OF THE WALL AS A WARNING.}
[FIREWALL]
PF-SENSE WITH INTERNAL NETWORK ONLY WEB DATA ACCESS DATABASE. MUST CALL
OVER SEC-SATELLITE PHONE TO ADD IP. OTHERWISE FIRE-WALLED OFF TO ALL
BUT OTHER BASES. SIMPLE INTERNAL WEB INTERFACE WITH SCLERA CAPILLARY
SCAN UNIQUE TO EVEN TWINS. LIVING THUMBPRINT SCANNER.
IN LOU OF THIS
[MILITARY
TOR] TOR SOFTWARE THAT WOULD ALLOW YOU TO SELECT MILITARY END POINT
ONLY. THE MILITARY EXITNODES WOULD ONLY ALLOW PREDESIGNATED AUTHORIZED
USERS TO USE END POINTS.
TOR HYPOTHETICAL CONFIGURATION IN torrc
strictnodes 1
ExitNodes militaryexitnode1 militaryexitnode2 militaryexitnode3
AND SO ON.
A JETTY CAPTIVE PORTAL WOULD BE INSTALLED ON MILITARY EXITNODES TO PREVENT AUTHORIZED USE. ACCESS ONLY GRANTED BY SECURE
BIO-AUTHENTICATION TOKEN GIVEN ON THE USER END.
THE DATABASE WOULD BE SSL SERVED WITH 16384 BITS, 2MIN TO SERVE.
JETTY WEBSITE PROXYING ONLY JPG IMAGES OF A WEBSITE, FOR DOCUMENT ACCESS. SIMPLE HTML.
[MYSTERY BOX DATA BASE SYSTEM]
A
SECURE ENCRYPTED APP CONTAINING A LIST OF TIME AND DATE BACKUP OF SQL
DATABASES AND SERVERS. ACCESS THORP-DATABASE RUN AS A PROCESS
ON A SECURE SUPERCOMPUTER.
IP
ADDRESSES TO THE MYSTERY BOXES ARE ADDED VIA A SECURE ON ONLY FIRE
WALLED OFF BASE TERMINAL WITH ONLY ACCESS TO THORP-D AND BIOMETRIC
SECURITY, THIS IS THE ONLY WAY TO ADD IP'S TO MYSTERY BOX DATABASES. YOU
CANNOT EXTRACT IP ADDRESS FROM THORP-D.
WHEN THORP-D RECIVES A RESTORE REQUEST FROM A SECURE TERMINAL.
THORP-D
RECEIVES A REQUEST AS A THORP DARK-SITE. THORP-D THEN ACCESSES THE
DATABASE VIA THORP AND SECURE EXTREME SUPERCOMPUTER LENGTH
AUTHENTICATION TOKEN CONSISTING OF RANDOM DATA THAT GIVES THE M-BOX'S
LOCATION AND TERMINAL NUMBER SECRETLY AND IS GENERATED VIA THE ONE
ACCESS TERMINAL AND SUPERCOMPUTER.
THE TOKEN IS STORED BY THORP-D. IT IS LABELED ONLY TO THORP-D. ACCESSING THE HIDDEN M-BOX DATABASE FOR RESTORE.
THE TOKEN IS PASSED FROM THORP-D TO TO THE M-BOX DATABASE TO UNLOCK IT ON THE FLY USING MID LEVEL MILITARY GRADE AES
EACH M-BOX IS STORED IN A SECURE SERVER FARM ,
AGAIN
ALL THE END TERMINAL NEED TO IS GIVE THE THORP-D SUPER COMPUTER PROCESS
THE TERMINAL NUMBER, TIME AND DATE AND A SEPARATE SECURE SMALLER
BIO-AUTHENTICATION TOKEN. TO ACCESS THE HIDDEN M-BOX DATABASE. BY THE
CLICK OF A BUTTON.
THE
M-BOXS ARE STORED IN A HIGH SECURITY SERVER FARM WITH MID CLASS
MILITARY AES ENCRYPTION, AND LABELED ONLY WITH THE LETTER M, WITH NO
OTHER DISTINGUISHING FEATURES. YOU JUST DON'T TOUCH AN M-BOX.
M-box redundant backup.
Each M-BOX has Self checking code, at every execution it checks against a
hash
taken of each M-box and has yet another extreme key length unique
Authentication Token, If either are different from what is stored and
encrypted in a separate series of M-boxes it then restores it from
hidden random On the fly Encryption & up do date P2P, Encrypted
nodes. THORP-D will keep all logs.
On the fly MID CLASS MILITARY AES ENCRYPTION destroys the key on encryption.
[OMEGA SUPERCOMPUTER PROTOCOL]
LINKING
ALL AVAILABLE SUPERCOMPUTERS INTO A MASSIVE COMPUTING CLUSTER VIA
FIBER OPTIC, IN THE EVENT OF A CYBER ATTACK, AT THE TURING OF KEYS.
KEEPING DATA LINES ON THE BACKBONE ON RETAINER FOR SUCH EMERGENCY.
1. TO LAUNCH A MASSIVE DOSS CAMPAIGN AGAINST ATTACKING COUNRTY.
2.
TO LAUNCH A SUPERWORM THAT WOULD SCAN, INDEX, ALL OF EXISTENCE EXPLOIT
DUMP, RIP ALL DATA OUT, AND DISRUPT ALL INFRASTRUCTURE, OF EVERY IP
ADDRESS OF AN ATTACKING COUNTRY. EXPLOITING AN ENTIRE ATTACKING COUNTRY
IN MINUTES. 1000 NSA AGENTS OPERATING FROM EXISTING TERMINALS, CORE
FORCE MODULE CENTERED.
100 MILLION DOLLARS FOR SOFTWARE DEVELOPMENT, INCLUDING 0-DAY AND SUPERWORM.
OPTIONAL;
1
BILLION DOLLARS FOR MILLION DOLLAR ANT-MINER CLUSTERS SCATTERED AROUND
BLACKSITES AROUND THE COUNTRY AS LAUNCH PLATFORMS AND FIBER OPTIC
CONNECTIVITY.
[SOFTWARE ATTACK WORM]
A
VIRUS THAT SECURE DELETES SOFTWARE ACCORDING TO THE HASH CHECK OF THE
GUI. ENCRYPTED SOFTWARE IS CRACKED REMOTELY VIA SUPERCOMPUTER PROCESS
ONCE THE VIRUS CALLS HOME.
NEW ESCROWED SOFTWARE IS INSTALLED AND CONFIGURED VIA SCRIPT.
[ESCROW FOR SAFETY]
ALL
MILITARY SOFTWARE EXCEPT HIGH ENCRYPTION IN WHICH THE KEY COUNTS AS THE
ESCROW, SHOULD BE ESCROWED FOR OPERATIONAL SAFETY. THE KEYS AND
LOCATIONS TO BE KEPT IN IRON MOUNTAIN FACILITIES ON HIGH CAPACITY HOT
SWAPPABLE SSD'S, OFF LINE. UNDER GUARD.
[COMPUTERS]
3D PRINTED CARBON FIBER PLUGS FOR USED USB PORTS QUICK DRY EPOXIED IN.
QUICK DRY EPOXIED IN INDESTRUCTIBLE KEYBOARDS.
TIG WELDED SHUT COMPUTER, LiAN Li.
SCLERA CAPILLARY SCAN UNIQUE TO EVEN TWINS. LIVING THUMB-PRINT SCANNER LOCK.
BIO-AUTH WITH EVERY COMMAND GIVEN.
LINUX UPDATED VIA PRIVATELY KEEP MILITARY SEVERS IN RANDOM BLACKSITES.
NINJA ALL BOXES
ROOTKIT HUNTER SCRIPT ON ALL BOXES
IP2BAN ALL BOXES 20MIN TIMEOUT.
Military AES ENCRYPT all boxes.
Military AES all boxes traffic, 10 times under thorp.
all routers blackout PERSON before THEY CAN BE TOUCHED.
HASHCHECK CHECKED ON EVERY FILE DOWNLOAD VIA IRON MOUNTAIN SERVER D-BASE.
MILITARY TRAFFIC AND PERSONAL ONLY ISP'S.
No comments:
Post a Comment