[First off, see the section on 'strike back technology'. This article fits
 the previous debunking.]

http://www.us.net/signal/Archive/May98/make-may.html

   May 1998
   
   SIGNAL Magazine 1998
   
   Make-My-Day Server Throws Gauntlet to Network Hackers
   
   Virtual machine attacks, reintegrates and subsumes network-attached host computers' operating
   systems.
   
   By Clarence A. Robinson, Jr.
   
   A radical digital life form functioning as a virtual machine quietly protects information networks
   by watching for the earliest signs of an attack. When an outsider attempts network penetration, this
   information warfare battle management server shifts instantly from passive background monitoring to
   heightened readiness. If required, the digital mechanism provides an aggressive offensive
   capability.

["Radical digital life form"? Sci-fi or reality?]
   
   Bushwhackers along the information highway are quickly learning that their attacks can provoke a
   devastating response. This new digital life form, a nonlinear algorithm hosted on a server,
   functions like a biological organism with an attitude--a very hostile attitude! While recently
   undergoing prototype testing, the Blitzkrieg server detected a high probability of attack on U.S.
   Internet sites from hackers in another country. The server immediately took action to pre-empt and
   prepare for an anticipated assault before retaliating.

[I don't know where to begin with this. This is so fundamentally wrong it is
 amusing. "nonlinear algorithm", "digital life form", "hostile attitude"? These terms
 make it seem like a near sentient lifeform. I think we can safely say AI has not gotten
 that far yet.]
   
   The Blitzkrieg server generates retaliatory options based on integral information warfare rules of
   engagement from the company that perfected the technology. The server's nonlinear computing
   algorithm will self-organize and self-heal, recognize an infiltration, isolate it, adapt to it and
   create a totally different networking route to overcome an invasion. An inherent capability creates

[This is something that a team of security consultants can barely do, let alone
 this mythical program. "self-heal"? Do hackers hurt software in that capacity? Doubt it.]

   strong network survivability, while also holding numerous offensive options in reserve. These
   options could eventually end in the destruction of an attacker's network resources.
   
   Deployed as a node within existing networks, the Blitzkrieg server is a self-programmed,
   fault-immune, ubiquitous virus-like system. The technology involved addresses the information

[More neat terms and sci-fi lingo. Fault-immune? I don't think anyone has ever
 created a fault-immune system.]

   operations challenge of provably optimal, distributed, complex data analysis and intelligent,
   adaptive network resource orchestration, according to Laurence F. Wood. He is the Blitzkrieg
   server's inventor, a quantum physics theorist and chief scientist for the Santa Fe, New Mexico-based
   Network Waffen Und Munistionsfabriken Group (network weapons munitions factories). The company is a
   subsidiary of FutureVision Group Corporation.

[I can't help but wonder if this was written as sci-fi and adapted as a technology
 article. All of those qualifications mean nothing as far as computer programming.]
   
   Wood views the Blitzkrieg server as an offensive weapon for information warfare, even though it
   offers extremely strong network protection. He reveals that the nonlinear algorithm provides methods
   of permanently damaging the platforms of those seeking to conduct an attack. "Our internal system

[Permanently damaging the platforms? This can't be done with any remote attack
 against a machine, let alone this server.]

   exercises show that a collective Blitzkrieg server offensive is similar to an attack of a biological
   killer virus with an overall collective objective and agenda."
   
   "The server's virus-like sole objective is rampant, aggressive proliferation," Wood reports. A
   Central Intelligence Agency information security specialist calls the server's digital life form
   "potentially more dangerous than nuclear weapons." One federal law enforcement agent calls the
   system a computer virus with an attitude, while another agent considers it scary.

[A quote from the CIA and FBI on this technology.. of course we are given no names
 for either of them.]
   
   Wood's previous involvement in Defense Department artificial intelligence programs as a senior
   scientist for GTE Government Systems, Needham Heights, Massachusetts, set the stage for the
   Blitzkrieg server's technology. As a complexity scientist and holder of numerous patents, he founded
   GTE's advanced machine intelligence technology information warfare laboratory. While at GTE, Wood's
   learning and recognition system (LARS) developed for the Defense Department was used to solve a
   number of intractable information warfare problems. He is also a visiting scientist at a number of
   national laboratories, universities and corporations.
   
   The Sante Fe company uses the NWM acronym, Wood notes. The group's name is in memory of the Deutsche
   Waffen und Munistionsfabriken corporation, whose Jewish owners were sent to Nazi concentration camps
   and whose resources were dispersed, he clarifies.
   
   Lisa S. Wood is the company's chief executive officer, and her activities have provided more than $1
   million in private funding for the company. She also heads the parent corporation.
   
   John R. Messier, who recently retired as president of the $1.5 billion GTE Government Systems, is
   now the president of NWM, which is rapidly becoming engaged in information warfare operations with
   industry, government agencies and law enforcement organizations. Wood anticipates that the
   Blitzkrieg server will be involved in scenario-driven demonstrations during TechNet '98, June 9-11,
   at the Washington, D.C., Convention Center. Using a mission planning system, NWM expects to provide
   dynamic three-dimensional perspective of a battle management system within the context of the Joint
   Vision 2010 template in relation to network-centric operations.
   
   Wood and Messier explain that, after only two weeks of on-line operational testing, the Blitzkrieg
   server determined a high probability that a hacker attack would be targeted at specific U.S.
   corporations and California state government installations. The server predicted that the network
   attack would be from Japanese nationals with the help of U.S. collaborators affiliated with the 2600
   international hacker group.

[So now the program (while installed on a single network), can guess the patterns
 and activities worldwide, and say that 'Japanese nationals' and 'collaborators with the 2600
 international hacker group' will attack something? This is pure bullshit, and negligent slander.]
   
   The Blitzkrieg server's actions to pre-empt and prepare for the projected attack included the
   automatic modification of the T-1 firewall packet inbound filter parameters, locking down of the
   network file system, critical database backup and Internet access exclusion, Wood illustrates. He
   continues that other server actions involved user account lock down and removal, password changes,
   focused monitoring and analysis of specific types of real-time and historical Internet traffic.
   
   Anticipating the attack, the Blitzkrieg system's physical and virtual resident memory lock battle
   switch began execution of a priority increase and an automatic shutdown of nonessential system
   processes and applications. Three days after the server's prediction, Wood claims, "on Sunday August
   18, 1997, at 3 a.m., a massive attack from Japan was launched. A diversionary Internet SPAM attack
   lasted three weeks. The attack's ferocity increased every week, affecting thousands of individuals
   in the United States and hundreds of Fortune 500 companies."

[So it predicted a SPAM attack? No way. Any other documentation for this
 supposed attack?]
   
   One San Francisco company without firewall protection was severely crippled, compromising its
   electronic mail system. The functions of more than 80 computers in a distributed network also were
   destroyed. A company official seeking individual and corporate anonymity confirmed to SIGNAL, during
   an interview, that the attack was extremely hazardous and that Wood's Blitzkrieg server played a
   crucial role in assisting the company--restoring and protecting its network at a particularly
   vulnerable point.
   
   "NWM operations, as a result of the Blitzkrieg server, were unaffected by the attack, which greatly
   intensified when the Japanese nationals realized that we appeared to be invulnerable," Wood offers.
   He continues that NWM officials assisted the company under attack with damage control. Because of
   U.S. Department of State sensitivities where Japanese nationals are concerned, a decision was made
   to avoid diplomatic or legal action. After learning of the Blitzkrieg server's performance in
   thwarting the attackers, the Federal Bureau of Investigation (FBI) elicited technical details and
   obtained a white paper from NWM.
   
   The server's unique technology enabled it to indicate that there was inside help for the attack on
   the San Francisco company. The FBI determined that a disgruntled employee attending the 2600
   hackers' convention in Las Vegas, Nevada, sought assistance from hackers in Japan to attack the
   company.

[More bull. The convention in Las Vegas is called Defcon, and is organized by
 Jeff Moss. People affiliated with 2600 attend the conference, but have basically nothing
 to do with the con.]
   
   With the end of what Wood describes as a highly sophisticated, well prepared, distributed,
   semiautomatic attack by Japanese hackers, the Blitzkrieg server automatically returned NWM systems
   under its protection to full production status. "The server, displaying its 'I Am Watching' logo,
   returned to a passive background offensive monitoring system." The company assisted by NWM is now
   seeking to acquire a commercial version of the Blitzkrieg server, called a Parabellum server. Five
   additional major U.S. corporations are also seeking to become test sites for Parabellum servers.
   
   Current efforts by all large defense contractors and government agencies that specialize in
   defensive information operations as their primary focus are likened by Wood to the Maginot Line
   along France's border with Germany. Those fortifications were bypassed and captured by the Germans
   in 1940. "In order to prevent disasters, which are coming, we must have the equivalent of an
   electronic warfare carrier battle group protecting the eight critical infrastructures of the United
   States," he stresses.
   
   The eight critical infrastructures that depend on the public information highway are
   telecommunications, electrical power systems, storage and transportation of gas and oil, banking and
   finance, transportation, water supply systems, emergency systems and continuity of government.
   
   Deployed as a node within conventional networks, the Blitzkrieg server technology addresses the
   challenge of a distributed network attack and a defense using a new provably optimal method, Wood
   warrants. The Blitzkrieg algorithm is implemented within a Microsoft Backoffice Windows NT server;
   however, the technology could run on any platform, he explains. The NT server is augmented by the
   Blitzkrieg server virtual machine, reconfigurable processing units and three-dimensional OpenGL
   graphics acceleration hardware.
   
   Upon powering up for the first time after a Blitzkrieg server virtual machine installation, the NT
   server operating system is attacked and subsumed by the Blitzkrieg server's software and optional
   hardware. The newly integrated technology turns the NT server into a high-performance NWM Blitzkrieg
   server. In a graphical server or workstation application development environment, the information
   warfare system is ready for operational deployment and network assimilation.

[What does it being graphical have to do with anything? These attacks are launched
 via network protocols, that have nothing to do with graphics.]
   
   Subject to authenticated user discretion, the Blitzkrieg server attaches to an existing network and
   immediately infects it, Wood observes. "This 'infection' assimilates all other nodes attached to the
   network in a process that is intentionally transparent to the host computer irrespective of any
   antivirus preventive or protective mechanism," he emphasizes.
   
   The Blitzkrieg server virtual machine reintegrates and subsumes the operating system of all
   network-attached host computers. Following successful host assimilation, the server virtual machine
   installs itself as an invisible part of the native operating system on the infected computer, Wood
   discloses. Encrypted multichannel communication is immediately established with the parent
   Blitzkrieg server and all other assimilated nodes--the components of an intelligent network
   collective, he assures.

[Ugh. This is complete bull again. There is absolutely NO way a program can 
 do this, and affect so many operating systems. If three companies share network space, how
 can it even tell which are which? It can't.]
   
   This initial communication authenticates the remote virtual machine to the collective from which it
   draws its operational orders, Wood points out. The orders can be delayed, leaving the remote virtual
   machine in a benign, hidden state until its capabilities are required by the collective. The
   collective's encrypted messages appear as meaningless noise to conventional network resources and
   monitoring devices.
   
   When the Blitzkrieg server virtual machine is transferred, the evolved encrypted problem-solving
   dynamic state moves with it as well. "As the wind is to a puff of smoke, no trace of the virtual

["evolved encrypted problem-solving dynamic state"? Sci-fi at work.]

   machine, its dynamic problem-solving state or its historical activities remain upon transfer from a
   network host unless ordered by the collective," Wood declares.
   
   No ability exists for the Blitzkrieg server to access network resources, such as files and hardware,
   directly. Rather, the operating system of an assimilated computer on the network is orchestrated to

[Yet this article says the server can permanantly damage hardware. If it can't
 access files and hardware..]

   provide access to data. "The virus-like operation of the server harnesses the functions of the host
   operating system to access external local and network resources. Potential Blitzkrieg server virtual
   machine threats are either disabled, monitored or made unaware of the virus-like network
   collective," Wood confirms.
   
   Subsequent, secure and continual communication between all Blitzkrieg server virtual machines within
   the collective provides a detailed analysis of the capabilities, Wood offers, "such as software and
   hardware resources of all network assimilated machines. This detailed network resource knowledge is
   made available to the entire collective for orchestrated computational and offensive or defensive
   purposes." Once the assimilation process begins, the server processing collective is ready to
   conduct complex data analysis, offensive or defensive operations, or all three.
   
   At the heart of the Blitzkrieg server are what Wood calls self-programmed adaptive
   automatacapsids--variable length string transformation rules. The rules have extremely
   power-adaptive, problem-solving qualities and self-healing and regenerative properties. "When
   examined on an individual basis, no automatacapsid in and of itself has any meaning. The
   automatacapsid only has value in the context of the distributed Blitzkrieg server network
   collective," Wood discloses.
   
   The adaptive automatacapsids, like fragments of a living virus without a host cell, transform one
   another and data, and they spontaneously generate or regenerate new automatacapsids to meet every
   conceivable complex data analysis need. "No single automatacapsid or group of them, either located
   locally or on a distant network node, is required to complete the problem-solving process," Wood
   contends. "If pieces of the problem-solving, nonlinear puzzle are missing or have been
   destroyed--perhaps intentionally destroyed by the Blitzkrieg server collective--they are dynamically
   regenerated from only partial information.
   
   "The adaptive, automated, self-enhancing functionality renders the Blitzkrieg server and all of its
   distributed virtual machine extensions completely fault immune and invulnerable to attack," Wood
   proclaims. The automatacapsids execute and operate to Wood's discovery--the unified general equation
   of motion, or UGEM.

[More signs of snake-oil! "invulnerable to attack". We know that no system is
 immune to attack.]
   
   The discovery of UGEM took place during fundamental research in resolving problems in quantum
   measurement theory and its relation to the quantum classical transition process. UGEM involves the
   laws that govern and control the complexity of all self-organization in nature. "The result is the
   first true virus-like collective digital life form--the information operations Blitzkrieg server,"
   Wood asserts.
   
   Industry and government officials believe that, in an era of information war, attacks against soft
   nonmilitary U.S. commercial electronic targets could have a devastating effect on economic growth.
   This fear is inhibiting the widespread adoption of electronic commerce, Wood insists.
   
   Each of the Blitzkrieg server's automatacapsids behaves according to the 10 self-organizing laws of
   UGEM. A corresponding "I Am Watching" nonlinear detection and problem-solving capability emerges.
   This process is considered sufficient to remain invulnerable while protecting and providing damage
   control from its passive background offensive monitoring mode.
   
   Additional information on the Network Waffen Und Munistionfabriken Group is available on the World
   Wide Web at http://www.fvg.com
   

Server:  ns1.inficad.com
Address:  207.19.74.3

*** ns1.inficad.com can't find www.fvg.com

And a URL to no additional information.

FutureVision Group Inc (FVG-DOM)
   1406 Hyde Park Road
   Santa Fe, NM 87501

   Administrative Contact, Technical Contact, Zone Contact:
      Wood, Laurence F  (LW110)  LFW@FVG.COM
      505-820-7983 (FAX) 505-820-7982