Friday, May 26, 2017

THE IRON MOUNTAIN

AN IRON MOUNTAIN BASE

[DOORS]

TUGSTEN CARBIDE 500 POUND EACH, LASER PROXIMITY DETECTOR TO PREVENT ACCIDENTS SLIDING ELEVATOR STYLE.

AUTOMATED KEYPAD LOCKOUT AND ALARM AFTER 3 TRIES. IRIS AND SCLERA CAPILLARY SCAN UNIQUE TO EVEN TWINS. LIVING THUMBPRINT SCANNER.

[WALLS]

3 inch high carbon steel bomb proof Faraday cage walls. 

[ULTRASOUND SHIELDING]   VACUUM PUMPED CARBON FIBER CHAMBERS, RUBBER COATED 1'. SOUND CANNOT PROPAGATE IN A VACUUM. 1 square foot thick blocks each. Three blocks thick lining the walls.

[HALLWAY]

IMAGE RECOGNITION OF IRISES, FACES AND BODY HEIGHTS WITH LIDAR AND HD CAMERAS, IF NO RECOGNITION IS MADE; THE HALLWAY GETS HOTTER AND HOTTER THE FURTHER YOU WALK IN WITH MICROWAVE AREA DENIAL. 
THIS SETS YOU ON FIRE HALFWAY DOWN THE HALLWAY AND SOUNDS AN ALARM.

[EMP SHIELDING]

IRON EPOXY COATED SEWER PIPE FILLED WITH MINERAL OIL TO RUN HIGH VOLTAGE ELECTRIC WIRES TO IRON BOXES WITH TRANSFORMERS ALSO MINERAL OIL FILLED TO COOL AND I ALSO INSULATE. ELECTRONICS TO BE SETUP FROM THESE LINES IN FARADAY CAGES. ALL COMPUTERS FOR EQUIPMENT.

[SEC SAT-PHONES]

BIO-METRIC LIVING THUMBPRINT SCANNER ON PHONE FOR AUTHENTICATION. THORP CHIP FOR END TO END ENCRYPTION OR OUT .
PBX PROXY. 


[LAND LINE]

PBX IN A BOX INSTALLATION MILITARY AES ENCRYPTED, THORP TRAFFIC WITH MILITARY AES TRAFFIC UNDER THORP. REMASTERSYS USED TO TURN IT INTO A LIVEDISK ON A ENCRYPTED DVD BIO-LOCKED. BLACKOUT PERSON BEFORE TOUCHING.

SECURES COMMUNICATION BETWEEN BASES.


[RED ALERT]
A LARGE RED BUTTON INSTALLED THAT SAYS RED ALERT. IF PRESSED A RED ALERT ALARM SOUNDS CIVILIANS AND WOMEN ARE TO GO TO SAFE ROOMS. RED KEY LOCKED. CIVILIANS IN ONE ROOM WITH FOOD, WATER AND TOILET, WOMEN IN COMPUTER EQUIPMENT ROOMS WITH INSTANT KILL TERMINALS.

SATCOM PHONE UPLINK; ROOM AUTOMATED KEYPAD LOCKOUT 3 TRIES. IRIS AND SCLERA CAPILLARY SCAN UNIQUE TO EVEN TWINS. LIVING THUMBPRINT SCANNER. RED KEY.

INSTANT KILL TERMINALS; AUTOMATED KEYPAD LOCKOUT 3 TRIES. IRIS AND SCLERA CAPILLARY SCAN UNIQUE TO EVEN TWINS. LIVING THUMBPRINT SCANNER.  RED KEY AROUND NECK OF WOMEN.

THE SECURITY DUTY IS NOTIFIED VIA SATCOM PHONE TEXT. ARMED MEN GO TO THEM FOR DIRECTIONS TO ROOM (RED ALERTED). 

[WALL OF SOUND]
ELECTRIFIED FENCES.

3D RADAR AND ULTRASOUND TOWER FIELD, EACH TOWER EXTRAPOLATES 3D TARGETING IMAGE AND IMAGE RECOGNITION, FOR ULTRASOUND. 3D RADAR THAT SEES THOUGH WALLS AND TREES. AUTOMATED

CLICK ON THE AREA AND ZOOM IN TO A PANORAMIC DOME 3D IMAGE. DIRECT INSTANT KILL.

BEHIND {

[WALL OF FLAME] 400 DEG MICROWAVE WALL, THE HEAT BUILDS UP FROM 0 THE CLOSER TO THE CENTER OF THE WALL AS A WARNING.}




[FIREWALL] PF-SENSE WITH INTERNAL NETWORK ONLY WEB DATA ACCESS DATABASE. MUST CALL OVER SEC-SATELLITE PHONE TO ADD IP. OTHERWISE FIRE-WALLED OFF TO ALL BUT OTHER BASES. SIMPLE INTERNAL WEB INTERFACE WITH SCLERA CAPILLARY SCAN UNIQUE TO EVEN TWINS. LIVING THUMBPRINT SCANNER.

IN LOU OF THIS  

[MILITARY TOR] TOR SOFTWARE THAT WOULD ALLOW YOU TO SELECT MILITARY END POINT ONLY.  THE MILITARY EXITNODES WOULD ONLY ALLOW PREDESIGNATED AUTHORIZED USERS TO USE END POINTS.

TOR HYPOTHETICAL CONFIGURATION  IN torrc
strictnodes 1 
ExitNodes  militaryexitnode1 militaryexitnode2 militaryexitnode3
AND SO ON.

A JETTY CAPTIVE PORTAL WOULD BE INSTALLED ON MILITARY EXITNODES TO PREVENT AUTHORIZED USE. ACCESS ONLY GRANTED BY SECURE 
BIO-AUTHENTICATION TOKEN GIVEN ON THE USER END.

THE DATABASE WOULD BE SSL SERVED WITH 16384 BITS, 2MIN TO SERVE.

JETTY WEBSITE PROXYING ONLY JPG IMAGES OF A WEBSITE, FOR DOCUMENT ACCESS. SIMPLE HTML.

[MYSTERY BOX DATA BASE SYSTEM]

A SECURE ENCRYPTED APP CONTAINING A LIST OF TIME AND DATE BACKUP OF SQL DATABASES AND SERVERS. ACCESS THORP-DATABASE RUN AS A PROCESS 
ON A SECURE SUPERCOMPUTER. 

IP ADDRESSES TO THE MYSTERY BOXES ARE ADDED VIA A SECURE ON ONLY FIRE WALLED OFF BASE TERMINAL WITH ONLY ACCESS TO THORP-D AND BIOMETRIC SECURITY, THIS IS THE ONLY WAY TO ADD IP'S TO MYSTERY BOX DATABASES. YOU CANNOT EXTRACT IP ADDRESS FROM THORP-D.

WHEN THORP-D RECIVES A RESTORE REQUEST FROM A SECURE TERMINAL. 

THORP-D RECEIVES A REQUEST AS A THORP DARK-SITE. THORP-D THEN ACCESSES THE DATABASE VIA THORP AND SECURE EXTREME SUPERCOMPUTER LENGTH AUTHENTICATION TOKEN CONSISTING OF RANDOM DATA THAT GIVES THE M-BOX'S LOCATION AND TERMINAL NUMBER SECRETLY AND IS GENERATED VIA THE ONE ACCESS TERMINAL AND SUPERCOMPUTER.

THE TOKEN IS STORED BY THORP-D. IT IS LABELED ONLY TO THORP-D. ACCESSING THE HIDDEN M-BOX DATABASE FOR RESTORE.

THE TOKEN IS PASSED FROM THORP-D TO TO THE M-BOX DATABASE TO UNLOCK IT ON THE FLY USING MID LEVEL MILITARY GRADE AES

EACH M-BOX IS STORED IN A SECURE SERVER FARM ,

AGAIN ALL THE END TERMINAL NEED TO IS GIVE THE THORP-D SUPER COMPUTER PROCESS THE TERMINAL NUMBER, TIME AND DATE AND A SEPARATE SECURE SMALLER BIO-AUTHENTICATION TOKEN. TO ACCESS THE HIDDEN M-BOX DATABASE. BY THE CLICK OF A BUTTON.

THE M-BOXS ARE STORED IN A HIGH SECURITY SERVER FARM  WITH MID CLASS MILITARY AES ENCRYPTION,  AND LABELED ONLY WITH THE LETTER M, WITH NO OTHER DISTINGUISHING FEATURES. YOU JUST DON'T TOUCH AN M-BOX. 


M-box redundant backup.
Each M-BOX has Self checking code, at every execution it checks against a
hash taken of each M-box and has yet another extreme key length unique Authentication Token, If either are different from what is stored and encrypted in a separate series of M-boxes it then restores it from hidden random On the fly Encryption & up do date P2P, Encrypted nodes. THORP-D will keep all logs.

On the fly MID CLASS MILITARY AES ENCRYPTION destroys the key on encryption.

[OMEGA  SUPERCOMPUTER PROTOCOL]

LINKING ALL AVAILABLE  SUPERCOMPUTERS INTO A MASSIVE COMPUTING CLUSTER VIA FIBER OPTIC, IN THE EVENT OF A CYBER ATTACK, AT THE TURING OF KEYS.
KEEPING DATA LINES ON THE BACKBONE ON RETAINER FOR SUCH EMERGENCY.

1. TO LAUNCH A MASSIVE DOSS CAMPAIGN AGAINST ATTACKING COUNRTY.

2. TO LAUNCH A SUPERWORM THAT WOULD SCAN, INDEX, ALL OF EXISTENCE EXPLOIT DUMP, RIP ALL DATA OUT, AND DISRUPT ALL INFRASTRUCTURE, OF EVERY IP ADDRESS OF AN ATTACKING COUNTRY.  EXPLOITING AN ENTIRE ATTACKING COUNTRY IN MINUTES. 1000 NSA AGENTS OPERATING FROM EXISTING TERMINALS, CORE FORCE MODULE CENTERED.

100 MILLION DOLLARS FOR SOFTWARE DEVELOPMENT, INCLUDING 0-DAY AND SUPERWORM.

OPTIONAL;
1 BILLION DOLLARS FOR MILLION DOLLAR ANT-MINER CLUSTERS SCATTERED AROUND BLACKSITES AROUND THE COUNTRY  AS LAUNCH PLATFORMS AND FIBER OPTIC CONNECTIVITY.

 [SOFTWARE ATTACK WORM]

A VIRUS THAT SECURE DELETES SOFTWARE ACCORDING TO THE HASH CHECK OF THE GUI. ENCRYPTED SOFTWARE IS CRACKED REMOTELY VIA SUPERCOMPUTER PROCESS ONCE THE VIRUS CALLS HOME.

NEW ESCROWED SOFTWARE IS INSTALLED AND CONFIGURED VIA SCRIPT.

[ESCROW FOR SAFETY]

ALL MILITARY SOFTWARE EXCEPT HIGH ENCRYPTION IN WHICH THE KEY COUNTS AS THE ESCROW, SHOULD BE ESCROWED FOR OPERATIONAL SAFETY. THE KEYS AND LOCATIONS TO BE KEPT IN IRON MOUNTAIN FACILITIES ON HIGH CAPACITY HOT SWAPPABLE SSD'S, OFF LINE. UNDER GUARD.

[COMPUTERS]
3D PRINTED CARBON FIBER PLUGS FOR USED USB PORTS QUICK DRY EPOXIED IN.
QUICK DRY EPOXIED IN INDESTRUCTIBLE  KEYBOARDS. 

TIG WELDED SHUT COMPUTER, LiAN Li.


SCLERA CAPILLARY SCAN UNIQUE TO EVEN TWINS. LIVING THUMB-PRINT SCANNER LOCK.

BIO-AUTH WITH EVERY COMMAND GIVEN.

LINUX UPDATED VIA PRIVATELY KEEP MILITARY SEVERS IN RANDOM BLACKSITES.

NINJA ALL BOXES
ROOTKIT HUNTER SCRIPT ON ALL BOXES
 IP2BAN ALL BOXES 20MIN TIMEOUT.

Military AES ENCRYPT all boxes.

Military AES all boxes traffic, 10 times under thorp.


all routers blackout PERSON before THEY CAN BE TOUCHED.


HASHCHECK CHECKED ON EVERY FILE DOWNLOAD VIA IRON MOUNTAIN SERVER D-BASE.

MILITARY TRAFFIC AND PERSONAL ONLY ISP'S.

No comments:

Post a Comment