Friday, October 4, 2019

Stolen Army NKE Round Used in Cyber Attack


The Federal Bureau of Inquiry’s Johnathan Quest today confirmed that investigators had found a 157mm artillery shell inside the boundary fence of NACL Industries, the site of last week’s massive chlorine release outside of Blew Bayou, LA. He refused to confirm that it was one of the US Army’s new NKE (non-kinetic effects) rounds that had been stolen from an Army munitions dump in Poland. Quest was responding to a reporter’s question about claims from SFINCTER that it had used such a munition in their cyberattack on the facility.

Earlier in the day an internet announcement from Students for Immediate Neutralization of Chlorine Technology and Energy Reversion (SFINCTER) claimed that the organization was responsible for the theft and employment of the munition. They claim to have used the advanced cyber-tools and communications protocols contained in the shells electronic core to take over the facility’s control system and disable the automated safety systems in place to initiate the attack.

Anonymous Army sources commenting without authorization confirmed that four of the NKE projectiles had been stolen last month from the munition depot outside of Triblinka, Poland. The Army had just started forward deploying the munitions six months ago. The Army officially has not commented on either the reported theft or the use of the munition in Louisiana.

Dade Murphy from Dragonfire told this reporter that the Army’s NKE round was just a delivery system for a sophisticated cyberattack tool. It included a radio frequency receiver/transmitter to pick up signals from industrial control systems and send hacking signals back to those systems. He noted that the impressive AI chip employed in the system could be preprogramed with a desired outcome for an attack and the onboard processors would find a way into the system employing known vulnerabilities and implement system changes necessary to achieve the desired outcome. Murphy denied that Dragonfire had anything to do with the development of the NKE system or the underlying AI chip.

Murphy did note that he thought that the Army had required the developer to include a safety mechanism in the round that would not allow the processor to turn on until it had been fired from an artillery piece. That safety mechanism should have prevented this type of attack where the munition was emplaced by hand rather than fired into the installation. Murphy acknowledged that such a safety device could probably be hacked.

CAUTIONARY NOTE: This is a future news story –