Skip to content

Instantly share code, notes, and snippets.

View backnotprop's full-sized avatar
📟
E.Alderson

Michael Ramos backnotprop

📟
E.Alderson
View GitHub Profile

Intelligence Report 4: Federal Emergency Management Agency (FEMA) Cyber Unit

Restricted

Executive Summary:

FEMA’s Cyber Unit has identified threats indicating a possible cyber attack on the national emergency response systems. The group behind this threat, CrisisCore, aims to incapacitate emergency communication channels and data centers, potentially during natural disasters or major emergencies, to amplify chaos and hinder response efforts.

Threat Details:

Intelligence Report 3: Homeland Security Intelligence Service (HSIS)

Top Secret

Executive Summary:

The Homeland Security Intelligence Service has detected a cyber espionage campaign targeting the defense sector, specifically contractors involved in military technology and armaments. The campaign, attributed to the group ShadowLance, aims to steal sensitive information and undermine national defense capabilities.

Threat Overview:

Intelligence Report 2: Cyber Defense Initiative (CDI)

Classified

Executive Summary:

The Cyber Defense Initiative has uncovered evidence of a potential cyber attack against the national telecommunications infrastructure. The group identified, SignalThief, exhibits capabilities suggesting a focus on intercepting and disrupting communication networks. Their efforts could severely impact emergency services and critical communication channels.

Threat Actors:

Intelligence Report 1: National Cybersecurity Agency (NCA)

Confidential

Executive Summary:

The National Cybersecurity Agency has identified a planned cyber attack targeting the nation’s water supply systems. Intelligence suggests the involvement of the cyber group AquaHack, with potential affiliations to a Southeast Asian country. The primary objective appears to be contaminating water treatment facilities to compromise public health and safety.

Threat Profile:

Simulated Intelligence Report: Potential Cyber Attack on Critical Infrastructure

Confidential


Executive Summary:

The Cyber Intelligence Unit (CIU) has identified credible threats indicating a possible cyber attack targeting the nation's critical infrastructure. Based on gathered intelligence, the attack appears to be in the advanced planning stages, with a specific focus on the energy sector and transportation networks. The threat actors are believed to be a sophisticated cyber espionage group with possible state-sponsored backing.

@backnotprop
backnotprop / resume.json
Last active January 22, 2024 19:45
resume.json
{
"meta": {
"theme": "elegant"
},
"basics": {
"name": "Cameron Carr",
"label": "Cyber Net Defense Analyst",
"phone": "1111111234",
"url": "https://www.linkedin.com/in/cameron-carr-aa9163161/",
"summary": "Experienced Cyber Net Defense Analyst with a demonstrated history of working in the information technology and services industry. Skilled in media event operations, technical support, and cybersecurity. Proven ability to lead teams and manage operational incidents effectively.",
@backnotprop
backnotprop / cpu_manager.sh
Created May 20, 2020 00:42 — forked from yanniszark/cpu_manager.sh
GKE CPU Pinning Script - Run this as a DaemonSet
#!/bin/bash
HOSTFS="/mnt/hostfs"
function sleep_forever() {
while true; do sleep 100; done
}
function setup_kubectl() {
# Setup kubectl
@backnotprop
backnotprop / bear_survival.md
Last active July 21, 2019 13:19
Can the bear population survive

Looking for a solution to my below game problem. I believe it to require some sort of reinforcement learning, dynamic programming, or probabilistic programming solution, but am unsure... This is my original problem, and is part of an initiative to create "unique and challenging problem that you're able to conceptualize and then solve. 3 Judging criteria: uniqueness, complexity, and solution (no particular weighting and scoring may favor uniqueness/challenge over solution"

Inspirations: Conway's Game of Life, DeepMind's Starcraft Challenge, deep Q-learning, probabilistic programming

BEAR SURVIVAL

A bear is preparing for hibernation. A bear must reach life-strength 1000 in order to rest & survive the winter. A bear starts off at a health of 500. A bear explores an environment of magic berries. A bear makes a move (chosen randomly with no optional direction) and comes across a berry each time. There are 100 different types of berries that all appear across the wilderness equally and

Sun Jul 15 17:59:46 UTC 2018

Keybase proof

I hereby claim:

  • I am mdramos on github.
  • I am rambossa (https://keybase.io/rambossa) on keybase.
  • I have a public key whose fingerprint is 50B7 2B40 2491 3DB2 279E 4243 D11F 7D44 0A73 27C6

To claim this, I am signing this object: