Internet Anthropologist Think Tank: New US Cyber offensive paradigm

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Friday, April 08, 2011

    New US Cyber offensive paradigm

    More of our INTEL



    Many foreign Intelligence agencys and hackers
    use the DOD and Government networks
    for cyber target practice.
    As there is little or no consequence to attacking them.

    And there have been cyber pundits that have argued
    one cannot attack them back as it might be a bot
    on some innocent persons PC or even a critical
    PC, like a hospital and have made that argument
    as a reason to remain passive, a safe fire wall for
    hackers to pound on.

    Playing Defense: Lt. Gen.William T Lord "enemy will batter away at our applications" (They are erecting coastal defenses a Maginot Line....G )  through rigorous testing, and then apply program management office money to fix any holes, as opposed to funding the next new release of capability.
    http://www.spacedaily.com/reports/Air_Force_CIO_Discusses_Future_Of_Cyberwar_Ops_999.html

    The US Government has been providing free,
    safe training targets for hackers, as they have
    no offensive force.

    This paradigm is a method of addressing
    that passivity and providing a consequence for
    attacking the DOD or other Government networks.



    The first question is Who is attacking,
    if its a bot net there are ways of determining that.
    Internet Anthropologist Think Tank: WarIntel Bot probe

    If its a bot net attacking there are indicators, one can
    even tell what kind of bot net is attacking.



    On all attacks one gets an IP, which is enlightening,
    running a "Whois" on it can tell if it belongs to a hospital
    or bank, sometimes. Other times its almost useless.

    And there are "POP UPs" that can get around your
    anti-pop up soft ware.
    Even persistent pop ups, the only way to knock them down
    is click on them, and get infected or close and reopen your
    entire browser and all tabs.
    We discovered them during a Porno operation.
    Internet Anthropologist Think Tank: Porn as Infowar weapon.


    And for repeat offenders we have "Cyber Chain guns"
    with persistent adventures.
    Internet Anthropologist Think Tank: IATT Cyber capabilities


    Which will identify the attacker, and stay with him like a WART.
    And allow one to dispense justice on ones own time line as 
    their ID is discovered and according to their offense.


    And Jester has a cyber side arm that can take an IP off line
    for up to 8 days, thats all he has demonstrated so far.


    Ok we now have all the tools, and in working proof of concept.
    How do they work together?


    Upon the first attack the IP is logged and a Whois is automatically
    run looking for soft critical targets, like hospitals ect.
    And 'if' and the kind of bot net is checked.


    And a semi persistent pop up is sent.
    That is a pop up that stops the PC owner from
    knocking/closing it down, but allows them to open other
    tabs and recreate the blocked tab.


    The pop up also gives an emergency phone number
    for its removal in critical situations.


    If its a known bot net a link to bot removal is provided.
    And a warning that that PC attacked a critical US network.
    And told if that PC attacks again it maybe blocked from
    connecting to the WWW for 15 min up to 8 days.


    So if its a hospital in a critical operation they can call
    for immediate removal of the popup blocking the critical
    tab. Or open a new tab and recreate the window.


    A log of the attackers IP is recorded.


    The next attack a Jester type attack is launched
    cutting that IP off from the WWW for 15 min.


    The third time an hour.
    And each time  persistent pop up is included,
    maybe one that causes them to reboot their
    browser to regain control or click a link which
    launches some key exploit to further ID them.


    And at some point we can fire the "chain gun"
    launching a myriad of adventures or exploits,
    to penetrate the attacker for ID purposes or punishment.


    If they are using a proxy we penetrate it and 
    track and collect real IP.
    Google attempted this in a timid way
    when they were attacked.


    We have the technology, and can safely deploy
    it, but who has the leadership and power to 
    deploy it, finally a cyber offensive to hacker attacks.






    Gerald
    Ad magnum
    Tactical Internet Systems analyst.









    1 Comments:

    Anonymous Anonymous said...

    KSM indictment data dump

    http://cryptome.org/0003/mohammed/mohammed-834.pdf

    11:57 AM  

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home