The Federal Bureau of Inquiry’s Johnathan Quest today
confirmed that investigators had found a 157mm artillery shell inside the
boundary fence of NACL Industries, the site of last week’s massive chlorine
release outside of Blew Bayou, LA. He refused to confirm that it was one of the
US Army’s new NKE (non-kinetic effects) rounds that had been stolen from an
Army munitions dump in Poland. Quest was responding to a reporter’s question
about claims from SFINCTER that it had used such a munition in their
cyberattack on the facility.
Earlier in the day an internet announcement from Students
for Immediate Neutralization of Chlorine Technology and Energy Reversion
(SFINCTER) claimed that the organization was responsible for the theft and
employment of the munition. They claim to have used the advanced cyber-tools and
communications protocols contained in the shells electronic core to take over
the facility’s control system and disable the automated safety systems in place
to initiate the attack.
Anonymous Army sources commenting without authorization
confirmed that four of the NKE projectiles had been stolen last month from the
munition depot outside of Triblinka, Poland. The Army had just started forward deploying
the munitions six months ago. The Army officially has not commented on either
the reported theft or the use of the munition in Louisiana.
Dade Murphy from Dragonfire told this reporter that the Army’s
NKE round was just a delivery system for a sophisticated cyberattack tool. It
included a radio frequency receiver/transmitter to pick up signals from
industrial control systems and send hacking signals back to those systems. He
noted that the impressive AI chip employed in the system could be preprogramed
with a desired outcome for an attack and the onboard processors would find a
way into the system employing known vulnerabilities and implement system
changes necessary to achieve the desired outcome. Murphy denied that Dragonfire
had anything to do with the development of the NKE system or the underlying AI
chip.
Murphy did note that he thought that the Army had required
the developer to include a safety mechanism in the round that would not allow
the processor to turn on until it had been fired from an artillery piece. That
safety mechanism should have prevented this type of attack where the munition
was emplaced by hand rather than fired into the installation. Murphy
acknowledged that such a safety device could probably be hacked.
CAUTIONARY NOTE: This is a future news story –