• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Air Force manual describes shadowy cyberwar world

Joined
Jan 26, 2010
Messages
381 (0.07/day)
Location
Lost in space
System Name Geting old
Processor AMD Phenom II X4 940 Processor BE 3.8 Ghz
Motherboard MICRO-STAR INTERNATIONAL.. MS-7388 1.0
Cooling CORSAIR H50 water cooler
Memory 8 GB of Patriot Extreme Performance DDR2 4GB (2 x 2GB)PC2-6400 Enhanced Latency
Video Card(s) AMD Radeon R7 200 Series
Storage Seagate Barracuda 1 TB
Display(s) LG FLATRON W2361V 23"
Case RAIDMAX SMILODON
Audio Device(s) HD Realtek
Power Supply Two 1000W ULTRA X3 wired together
Mouse Logitech G9x Laser
Keyboard Corsair K65 RGB
Software Windows 10 pro
What got my attention!! Is the part that say "The manual points out that much of the Internet's hardware and software are produced and distributed by private vendors in other countries who "can be influenced by adversaries to provide altered products that have built-in vulnerabilities, such as modified chips." Here the manual link in pdf. http://www.e-publishing.af.mil/shared/media/epubs/AFDD3-12.pdf
 

Wrigleyvillain

PTFO or GTFO
Joined
Oct 13, 2007
Messages
7,702 (1.28/day)
Location
Chicago
System Name DarkStar
Processor i5 3570K 4.4Ghz
Motherboard Asrock Z77 Extreme 3
Cooling Apogee HD White/XSPC Razer blocks
Memory 8GB Samsung Green 1600
Video Card(s) 2 x GTX 670 4GB
Storage 2 x 120GB Samsung 830
Display(s) 27" QNIX
Case Enthoo Pro
Power Supply Seasonic Platinum 760
Mouse Steelseries Sensei
Keyboard Ducky Pro MX Black
Software Windows 8.1 x64

streetfighter 2

New Member
Joined
Jul 26, 2010
Messages
1,655 (0.33/day)
Location
Philly
This is just policy from the air force and it's targeted specifically at educating servicemen (so far as I can tell).

There are a lot of classified papers regarding cyber warfare tactics and logistics. I believe some have been released, in heavily redacted form, that give much better insight into the reach of the gubernment in a shit-hitting-fan scenario.

A choice bit on pg. 35
Attack and exploitation operations in an HD scenario may involve complex legal
and policy issues; however, these issues do not prevent the application of attack and
exploitation operations for HD, but temper it. Unless approved by appropriate
authorities, DOD assets cannot be used to perform attack or exploit operations on US
entities.
 
Joined
Jan 26, 2010
Messages
381 (0.07/day)
Location
Lost in space
System Name Geting old
Processor AMD Phenom II X4 940 Processor BE 3.8 Ghz
Motherboard MICRO-STAR INTERNATIONAL.. MS-7388 1.0
Cooling CORSAIR H50 water cooler
Memory 8 GB of Patriot Extreme Performance DDR2 4GB (2 x 2GB)PC2-6400 Enhanced Latency
Video Card(s) AMD Radeon R7 200 Series
Storage Seagate Barracuda 1 TB
Display(s) LG FLATRON W2361V 23"
Case RAIDMAX SMILODON
Audio Device(s) HD Realtek
Power Supply Two 1000W ULTRA X3 wired together
Mouse Logitech G9x Laser
Keyboard Corsair K65 RGB
Software Windows 10 pro
This is just policy from the air force and it's targeted specifically at educating servicemen (so far as I can tell).

There are a lot of classified papers regarding cyber warfare tactics and logistics. I believe some have been released, in heavily redacted form, that give much better insight into the reach of the gubernment in a shit-hitting-fan scenario.

A choice bit on pg. 35

wow
 

Wrigleyvillain

PTFO or GTFO
Joined
Oct 13, 2007
Messages
7,702 (1.28/day)
Location
Chicago
System Name DarkStar
Processor i5 3570K 4.4Ghz
Motherboard Asrock Z77 Extreme 3
Cooling Apogee HD White/XSPC Razer blocks
Memory 8GB Samsung Green 1600
Video Card(s) 2 x GTX 670 4GB
Storage 2 x 120GB Samsung 830
Display(s) 27" QNIX
Case Enthoo Pro
Power Supply Seasonic Platinum 760
Mouse Steelseries Sensei
Keyboard Ducky Pro MX Black
Software Windows 8.1 x64
Joined
Nov 4, 2005
Messages
11,682 (1.73/day)
System Name Compy 386
Processor 7800X3D
Motherboard Asus
Cooling Air for now.....
Memory 64 GB DDR5 6400Mhz
Video Card(s) 7900XTX 310 Merc
Storage Samsung 990 2TB, 2 SP 2TB SSDs and over 10TB spinning
Display(s) 56" Samsung 4K HDR
Audio Device(s) ATI HDMI
Mouse Logitech MX518
Keyboard Razer
Software A lot.
Benchmark Scores Its fast. Enough.
If you believe any system does not have at least one backdoor built in for dev, support, security, oh shit, or government purposes you are silly. My cousin works for Lockheed Martin, and he made a few interesting comments on the latest cyber attack on the Iranian nuclear facility.


If a system has a kernel level listening port that only responds to a specific IP source, key, and port number out of all the ports, IP's, and keys you could generate do you think they would have found it by now? Hell no.
 

andrew123

New Member
Joined
Jan 18, 2010
Messages
30 (0.01/day)
Location
Canada
You'd be surprised how much Telecom grade gear comes out of Israel. For such a tiny little country, the produce TONNES of digital cross-connect, muxers...
 
Joined
Oct 5, 2007
Messages
601 (0.10/day)
Location
North Carolina, USA
Processor Q6600 @ 3600mhz with 1600fsb
Motherboard Asus P5E x38
Cooling Zalman CPU, and 4x120mm fans
Memory 2 gig(2x1gig) Crucial ballistix 4gig(4x2gig) Corsair
Video Card(s) ATI 4850
Storage 150gig Raptorx/wd 320gig/2x raptor 37gig
Display(s) Samsung SnycMaster 906bw/acer 19inch
Case Lian Li PC V1000II
Audio Device(s) Creative SB X-FI
Power Supply 600w Silverstone ATX
Software vista 64, fruityloops, COD4, TF2, HL2
Benchmark Scores 15983 3dmark06
All i will say is "Its not what you think"
 
Top