AlliedMastercomputer
Cogito, Ergo Sum.
- One on One
- Group
- Nation Building
TOP SECRET - LEVEL 9/100000 CLEARANCE CVC
CENTRAL INTELLIGENCE AGENCY (CIA)
Memorandum No. : AAA1 192345
Subject: Military Allocation Required to Neutralize Anomaly - Case study: USSR
PROJECT ARTIFICIAL ANTENNAE
OPERATION PRECISE LOCATION
December 22 1999
EXECUTIVE SUMMARY:
Allocations on military spending are continously being reviewed and are still being questioned for their sufficiency in order to neutralize Anomaly. A computer program developed by the USSR designed to implement high traffic in Western internet regions. Anomaly's capabilities lie in the fact that it can disrupt services, and execute Distribution Denial of Service (DDoS) attacks on an expanded scale. It is also capable of jamming radio communications in an unknown radius. It has demonstrated advanced abilities to crack, decrypt, and brute force through top cryptographic security algorithms in a matter of miliseconds. As well as surpassing predictive modeling thresholds. Existing cybersecurity protocols (REF: OPSEC-99) are insufficient to contain projected data saturation by FY 2001.
Reports indicate that 17-77% of the Western population has fallen, believed, or been exposed to Soviet misinformation campaigns conducted by Anomaly. If left unchecked, it can destabilise critical civilian and military digital infrastructure.
Military cyberwarfare such as tracking and monitoring surveillance will be used to keep monitor the progress of Anomaly, and potentially neutralise the program
Recommendations
Military cyberwarfare will be implemented to deal with the threat
Quarantine Anomaly from the Western regions.
Block any disinformation from Anomaly from spreading.
Signed,
[Redacted]
Central Intelligence Agency (CIA)
CENTRAL INTELLIGENCE AGENCY (CIA)
Memorandum No. : AAA1 192345
Subject: Military Allocation Required to Neutralize Anomaly - Case study: USSR
PROJECT ARTIFICIAL ANTENNAE
OPERATION PRECISE LOCATION
December 22 1999
EXECUTIVE SUMMARY:
Allocations on military spending are continously being reviewed and are still being questioned for their sufficiency in order to neutralize Anomaly. A computer program developed by the USSR designed to implement high traffic in Western internet regions. Anomaly's capabilities lie in the fact that it can disrupt services, and execute Distribution Denial of Service (DDoS) attacks on an expanded scale. It is also capable of jamming radio communications in an unknown radius. It has demonstrated advanced abilities to crack, decrypt, and brute force through top cryptographic security algorithms in a matter of miliseconds. As well as surpassing predictive modeling thresholds. Existing cybersecurity protocols (REF: OPSEC-99) are insufficient to contain projected data saturation by FY 2001.
Reports indicate that 17-77% of the Western population has fallen, believed, or been exposed to Soviet misinformation campaigns conducted by Anomaly. If left unchecked, it can destabilise critical civilian and military digital infrastructure.
Military cyberwarfare such as tracking and monitoring surveillance will be used to keep monitor the progress of Anomaly, and potentially neutralise the program
Recommendations
Military cyberwarfare will be implemented to deal with the threat
Quarantine Anomaly from the Western regions.
Block any disinformation from Anomaly from spreading.
Signed,
[Redacted]
Central Intelligence Agency (CIA)