SUBSIM Radio Room Forums



SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997

Go Back   SUBSIM Radio Room Forums > General > General Topics
Forget password? Reset here

 
 
Thread Tools Display Modes
Prev Previous Post   Next Post Next
Old 10-04-10, 06:49 PM   #1
the_tyrant
Admiral
 
Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
Default My latest research essay: The Usage of Internet Warfare in Modern War

Anyways, it has always been my dream to become the Alfred Mahan of the hacking world.

I have this essay i am working on The Usage of Internet Warfare in Modern War
You always get that sense of achievement when you make a breakthrough(in my case, i think i have managed to solve a problem that has stumped the JSDF for quite some time)

so anyways, I'm posting the part i just completed here(its not in essay form yet though). please feel free to give feedback or ask questions. I will post the rest when I am finished.

The Usage of Internet Warfare in Modern War

Note: The “Hacker” is a member that contributes technologically to the
Part 1:The organization
Hackers should be organized into several categories
Tacticians: Tacticians determine the strategic and tactical goals of the organization. They create attack plans and tactics.
Core hackers: Core hackers are the organization's main asset. Their role is to be the main striking force of the organization. Core hackers comprise of the best, and they focus on penetrating firewalls, hacking servers, stealing files etc
Auxiliary hackers: Auxiliary hackers play a support role for the core hackers. They focus on stealing passwords, maintaining botnets, internet phishing etc.
Security experts: security personnel within the organization have 2 objectives. The first one is to prevent the organization itself from getting hacked. The second objective is to prevent the organization from getting traced and getting caught.
Hardware experts: hackers need working hardware. Hardware experts focus on maintaining hardware, upgrading hardware and purchasing new hardware when necessary.
Communication experts: communication experts focus on maintaining communication channels, and encrypting communication.
Encryption experts: Hacking organizations often deal with sensitive information. Therefore encryption experts are needed to encrypt sensitive files and to destroy sensitive files.
Other non computer related support personnel: security guards, bankers, etc

The basic unit within a hacking organization is a cell. A cell could be placed anywhere. A cell is fully capable of conducting an attack. A cell should comprise of:
2-4 core hackers
4-8 auxiliary hackers
1-2 communication experts
1-2 hardware experts
1-2 security experts
1 encryption expert

The size of a cell should not be increased. Instead more cells should be created when the organization increases in size. The members of each cell should be physically close, preferably in the same room.
The organization’s headquarters is mainly responsible for commanding and organizing large scale attacks. A headquarters unit should comprise of:
Tacticians
Security
Communications
Hardware

The size of the headquarters unit depends on the size of the headquarters and should be adjusted accordingly.

Communication within the organization should be regulated. All communication should be vertical(between headquarters and each individual cell).There should be no horizontal communication(between cells)
the_tyrant is offline   Reply With Quote
 


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 11:29 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright © 1995- 2025 Subsim®
"Subsim" is a registered trademark, all rights reserved.