Distributed mobile ad-hoc networks, going "Netless"; constructed using small wireless devices with built-in storage. These devices, worn by Faction operatives, swap data between other devices when they are in close enough physical proximity. Rather than rely on cell towers for connectivity, ad-hoc networks employs a large amount of low power antennas scattered around a defined area, relaying data within this mobile grid. The network authentication and data transmission are encrypted; Deep Cyper making these ad hoc networks relatively free from corporate and government monitoring and control. The existence of cheap materials and components has allowed a mass distribution of nodes, and their numbers are growing exponentially. Hiding behind anonymous email and Web accounts, our Factions put porn-addicted Internet users to work for them. Specifically, these Factions, and the armies of computers they control, pay in porn to decode the scrambled letters many Internet sites now use to prevent computers from generating spam or signing up for fake Web accounts that can be harvested for nefarious purposes. Called "captcha," it's essentially a test that's easy for a human to complete, but difficult or impossible for a computer to do. So instead of wasting our own precious processing cycles trying to descramble the jumbled letters, our Faction computers farm out the work to the millions of round-the-clock porn users. One program takes the form of a virtual stripper "game," in which a sexy avatar offers to remove another garment for each "task" the player completes. The user completes the captcha for the machine to plug in at one location on the Internet, and at another—like a chicken head pecking at a knob, the human gets his pellet of porn. Enterprise architecture: The god’s-eye view of systems and infrastructure. This effectively gives us a god’s-eye view of an enterprise, allowing for the mapping, visualization and analysis of all transactions, interactions, systems, processes and personnel in the entirety of a given business or agency. Our sophisticated enterprise architecture software for example, examines all of the transactions taking place across a financial institution in real time and examine that data for possible money laundering operations or rogue traders. Our software can also detect and identify insider trading (such as that noted leading up to the 9/11 attacks in the US). From the the White House to the FBI, FAA, and the boardroom of Microsoft, IBM and ATT, some of the best-secured organizations in the world, running the most protected servers housing the most sensitive data welcomed a relatively secretive organization into their midst. P-tech (a multi-layered cut out front for the Pluri Media Group) was given keys to the cyber kingdom, to map the weaknesses and vulnerabilities, and to show how these exploits could be used for cyber terror. "Cyber attacks subsided over the weekend and Web sites previously under siege were working normally yesterday." Authorities were busy analyzing “zombie” computers that had been infected with malicious code and had been the source of the crude distributed denial-of-service, or DDoS, attacks. Little did they know this was just another red herring used by Factions to probe and analyze government and corporate cyber attack response strategies. Asymmetric tactics and network-centric warfare- information is our collective societal weapon of choice; software, radio frequencies and bandwidth are critical commodities; control of networks essential for effective propaganda delivery. The foremost challenge for our operatives in this new battle space environment is infiltrating command and control of the Information infrastructure. Each of our Factions are nimble forces fielding powerful formations equipped with cutting-edge technologies. We will prevail and our global domination is assured. Size: 14602716 Duration: 14:59 Audio File: mp3
Friday, August 14, 2009
Subscribe to:
Post Comments (Atom)
5 comments:
Please list a faction. Maybe I'll start one in chicago area: something simple like CYBORG Faction.
darknet
identity=zq1qf564lJKUIYdFAzG-l1234LFUYjM-s5d1vj8anEs
location=0.39841354643039973
testnet=false
myName=Aethyyr13
lastGoodVersion=Fred,0.7,1.0,1010
sig=594b174dc670e3555a12345693ed45806c9f2351ec289b271cecd6fd87456d96,303df1593173c7cb35478c01e6a6586701b50cbde23cda877fec999d7b43cd91
version=Fred,0.7,1.0,1016
dsaPubKey.y=LlWomcYWo312345Hx76zr8xxwH5y2234pb6AxdEnIbUm7TUto5YUpVNWXcpC6uUCuHDyOjcw55BILEBjGMbvNRWqDwZhGMK52bXMOZCX8JN-qUJjwFYEwxVNJjhI2Dj7euIVeGsXSGheUeboKc3r~NKI2n6MWdvrXXJoiTV4eyPZ6XeFr6bdPtZ2fLfcFv~rXO9-g43QNHJCnAxjF0p649r1Uf-tLJHqNO4Ci9NX68UOqa1sjow3wl1kgT~NRl0ddIvUQtrOaTjHS4b~nYvZZAfSdOO48GWPT1mfIdxaiQL~5Egu2tVp4MRLzlRy21bHI4cI-VjJzQkrCCo2q4BhXVPQ
physical.udp=72.194.102.78:31592
oldark.pubURI=SSK@N7SoSa8MApo0tj39k5S051Zjs5a3GiyuAL652B46-jQ,7Fal5123o0H8gn6Elqv2vg9NDDZI0XCiIoiYwMuXrUo,AQABAAE/ark
oldark.number=178
dsaGroup.g=UaRatn13245QvTlaaAXTMzn1Z15LDTXe-J~gOqXCv0zpz83CVngSkb--bVRuZ1235OFg~ATKcuw8VJJwn1~A9p5jRt2NPj2EM7bu72O85-mFdBhcav8WHJtTbXb4cxNzZaQkbPQUv~gEnuEeMTc80KZVjilQ7wlTIM6GIY~ZJVHMKSIkEU87YBRtIt1R~BJcnaDAKBJv~oXv1PS-6iwQRFMynMEmipfpqDXBTkqaQ8ahiGWA41rY8d4jDhrzIgjvkzfxkkcCpFFOldwW8w8MEecUoRLuhKnY1sm8nnTjNlYLtc1Okeq-ba0mvwygSAf4wxovwY6n1Fuqt8yZe1PDVg
dsaGroup.q=ALF123456R9Y1kQNVBc5kzmk0VvvCWosXY5t9E9S1tN5
dsaGroup.p=AIYIrE132hM38qPjirGGT-PJjWZBHY0q-JxSYyDFQfZQeOhrx4SUpdc~SppnWD~UHym58WyX28eV3YjwkVyc~--H5Tc83hPjx8qQc7kQbrMb~CJy7QBX~YSocKGfioO-pwfRZEDDguYtOJBHPqeenVDErGsfHTCxDDKgL2hYM8Ynj8Kes0OcUzOIVhShFSGbOAjJKjeg82XNXmG1hhdh2tnv8M4jJQ9ViEj425Mrh6O9jXovfPmcdYIr3C~3waHXjQvPgUiK4N5Saf~FOri48fK-PmwFZFc-YSgI9o2-70nVybSnBXlM96QkzU6x4CYFUuZ7-B~je0ofeLdX7xhehuk
ark.pubURI=SSK@47DisjrMpI0e3NDv6J8lBmmnbRblaq3m3qhsff31osw,EVhqY2iwzdYnwtvgL5gh4a-whytatIXqUIahNoMOmfA,AQACAAE/ark
ark.number=11
End
oaaaaaaaaaaaa
I thinking being able to post, email and surf anonymously online is a god given right- too bad people abuse that power
Are these nodes still going up? Is the network still growing? I would imaging this would be permitted to continue?
Post a Comment