originally posted by: STTesc
a reply to: greghansen
I'm just curious, what type of person takes a job to spy on and sell out his own people? It's like those poor SS soldiers that were just doing their
job. Are you proud of the fact that you were a traitor? And that now you have a venue to push your book down our throats? It's not good enough to
simply enlighten people, you need to be paid on top of being a traitor?
No thank you. Keep your book.
----
He's been vetted.
He is supposed to show his book AND any of his papers to
the local CO in his division. With the NSA, it's a crapshoot
whether your getting a MILITARY commanding officer or
a general executive manager. Kinda depends upon the
projects he's been on. I SUSPECT he's got a TRUE
CO since the DIA (Defense Intelligence Agency)
TENDS to want to dip their hands into cybersecurity
and they will appoint a full Colonel (or at least a Lt. Colonel)
to oversee any documents he has or wishes to publish.
The MUST sign off so as to not violate his and their
NDA's (Non-Disclosure Agreements)!
In terms of Cybersecurity, it sounds like work such
as defending against DDOS (Distributed Denial of Service)
attacks (i.e. prevent ping or IP request floods), oversight
of strategies to secure servers and workstations from physical
and remote intrusion, enactment of biometric and card-based
login and verification systems.
---
NSA SECURITY? THAT AIN'T SECURITY !!!!
THIS IS SECURITY.....
14 inches of Solid Copper Plate walls, ceiling, floor
suspended on active suspension, seismic rated pistons.
It's called a FARADAY cage! ALL BANDS from 200 KHZ to 30 GHZ.
2 inches of LEAD shielding against high-powered
soft and hard high-band and X-ray imaging at 30 GHZ
and above! 4 inches of Rhino-liner for preventing
200 khz or below acoustic imaging!
48 hours of compressed air for internal sealment
of personnel within Solid Faraday Cage. Personnel
entry is card-based, User ID/password, facial recognition
and LIVE human detection with TEXT CHALLENGE/RESPONSE
(like a Captcha but BETTER!) and body scanning techniques
to verify employees.
Computers: 400 AMD S9150 stream cards
for 1.2 Petaflops of CPU horsepower!
Servers AMD Tyan 64 core Opteron servers
NOT running Windows 12 --- Custom Trusted Linux
with ALL Malloc(), FileOpen, IP/UDP packet
construction CUSTOM built DIRECTLY for the
DMA, Disk and Network IO controllers!
Encryption/Decryption takes place ONLY in
CPU Level 1 cache and on-board CPU registers
for ULTIMATE Key security!
ALL Malloc()'ed data blocks, record, fields are fully
encrypted at 768-bit Triple-EAS and one Shor's Algorithm
quantum-computing resistant encryption algorithm
during RAM/Cache/Disk storage and when waiting
for access (data is only decrypted AT time of access
ON the CPU itself) and then record/field is re-encrypted
with a DIFFERENT KEY from the CPU cache itself.
ALL Fibre cable is nitrgoen-encased with Pressurre,
Acoustic and LIDAR-based physical intrusion detection.
Drives, Network Cards, Chipset and Graphics Card BIOSES
are all CUSTOM-MADE and BURNED with boot-up CRC and
configration change detection. USB and SATA Serial-bus
I/O is security-checked and rejected to prevent self-booting
basic sector-based allocation and boot-load software from
booting up from USB sticks or connected drives.
Monitors are ALL TEMPEST rated -- all fibre-channelled
with on-screen low-field of view filters for prevention
of camera-recording systems. Room has IR/UV/Visible-light/Acoustic/RF
imaging systems detection to prevent camera phone pickup of
screens and any hidden wireless devices! EM-signature detection
of common RF emissions to catch unauthorized electronic devices!
2.2 GHZ and 60 GHZ body imaging and olifactory sensors to detect
on-body systems and internal storage of devices in body cavities!
500 onsite HDTV/Thermal imaging cameras at 60 FPS for security
and intrusion detection plus pressure-sensitive flooring.
THAT IS HIGH-LEVEL BEYOND TOP SECRET LEVEL SECURITY !!!!!!!
GO REALLY SECURE OR GO HOME !!!!!!
edit on 2016/3/7 by StargateSG7 because: sp