SUBSIM Radio Room Forums



SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997

Go Back   SUBSIM Radio Room Forums > General > General Topics
Forget password? Reset here

Reply
 
Thread Tools Display Modes
Old 10-04-10, 06:49 PM   #1
the_tyrant
Admiral
 
Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
Default My latest research essay: The Usage of Internet Warfare in Modern War

Anyways, it has always been my dream to become the Alfred Mahan of the hacking world.

I have this essay i am working on The Usage of Internet Warfare in Modern War
You always get that sense of achievement when you make a breakthrough(in my case, i think i have managed to solve a problem that has stumped the JSDF for quite some time)

so anyways, I'm posting the part i just completed here(its not in essay form yet though). please feel free to give feedback or ask questions. I will post the rest when I am finished.

The Usage of Internet Warfare in Modern War

Note: The “Hacker” is a member that contributes technologically to the
Part 1:The organization
Hackers should be organized into several categories
Tacticians: Tacticians determine the strategic and tactical goals of the organization. They create attack plans and tactics.
Core hackers: Core hackers are the organization's main asset. Their role is to be the main striking force of the organization. Core hackers comprise of the best, and they focus on penetrating firewalls, hacking servers, stealing files etc
Auxiliary hackers: Auxiliary hackers play a support role for the core hackers. They focus on stealing passwords, maintaining botnets, internet phishing etc.
Security experts: security personnel within the organization have 2 objectives. The first one is to prevent the organization itself from getting hacked. The second objective is to prevent the organization from getting traced and getting caught.
Hardware experts: hackers need working hardware. Hardware experts focus on maintaining hardware, upgrading hardware and purchasing new hardware when necessary.
Communication experts: communication experts focus on maintaining communication channels, and encrypting communication.
Encryption experts: Hacking organizations often deal with sensitive information. Therefore encryption experts are needed to encrypt sensitive files and to destroy sensitive files.
Other non computer related support personnel: security guards, bankers, etc

The basic unit within a hacking organization is a cell. A cell could be placed anywhere. A cell is fully capable of conducting an attack. A cell should comprise of:
2-4 core hackers
4-8 auxiliary hackers
1-2 communication experts
1-2 hardware experts
1-2 security experts
1 encryption expert

The size of a cell should not be increased. Instead more cells should be created when the organization increases in size. The members of each cell should be physically close, preferably in the same room.
The organization’s headquarters is mainly responsible for commanding and organizing large scale attacks. A headquarters unit should comprise of:
Tacticians
Security
Communications
Hardware

The size of the headquarters unit depends on the size of the headquarters and should be adjusted accordingly.

Communication within the organization should be regulated. All communication should be vertical(between headquarters and each individual cell).There should be no horizontal communication(between cells)
the_tyrant is offline   Reply With Quote
Old 10-04-10, 06:54 PM   #2
Takeda Shingen
Navy Seal
 
Join Date: Mar 2000
Posts: 8,643
Downloads: 19
Uploads: 0
Default

Cyberspace is the next big front in the war between nations. There will be lots of job security in this field. Good choice.
Takeda Shingen is offline   Reply With Quote
Old 10-04-10, 06:59 PM   #3
Legionary74
Ensign
 
Join Date: Sep 2010
Location: New Jersey
Posts: 220
Downloads: 5
Uploads: 0
Default

Quote:
Originally Posted by Takeda Shingen View Post
Cyberspace is the next big front in the war between nations. There will be lots of job security in this field. Good choice.
---

Last edited by Legionary74; 06-16-15 at 05:17 AM.
Legionary74 is offline   Reply With Quote
Old 10-04-10, 07:02 PM   #4
the_tyrant
Admiral
 
Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
Default

Quote:
Originally Posted by Legionary74 View Post
NOOOO


*BOOM*

YOU SUNK MY BATTLESHIP!! RRRRAARRR

HOLY ****! TAAANNKKSSSSS!

*fat guys sitting behind computer, with fierce, determined looks*
*BOOM*

Your money is all gone, its all in my account now........
the_tyrant is offline   Reply With Quote
Old 10-04-10, 07:02 PM   #5
Takeda Shingen
Navy Seal
 
Join Date: Mar 2000
Posts: 8,643
Downloads: 19
Uploads: 0
Default

Quote:
Originally Posted by Legionary74 View Post
NOOOO


*BOOM*

YOU SUNK MY BATTLESHIP!! RRRRAARRR

HOLY ****! TAAANNKKSSSSS!

*fat guys sitting behind computer, with fierce, determined looks*
Well, no. What I am refering to is cyber-terrorism and espionage. Since everything is online, one can hack into the Defense Department, intelligence services and even power infastructure, which could devistate a warring nation without even the release of physical ordnance. China has been very active in this regard.

http://www.networkworld.com/news/201...e-ring-to.html
Takeda Shingen is offline   Reply With Quote
Old 10-04-10, 07:19 PM   #6
Castout
Silent Hunter
 
Join Date: Nov 2006
Location: Jakarta
Posts: 4,794
Downloads: 89
Uploads: 6
Default

Quote:
Originally Posted by Takeda Shingen View Post
China has been very active in this regard.

http://www.networkworld.com/news/201...e-ring-to.html
Meh even tiny nation such as Singapore is very active on cyberwarfare and online spying but mostly against critics and dissidents so nobody is going to write that story on the newspaper.

China is perhaps the most aggressive because they tend to target bigger fish like organizations or foreign departments.
__________________
Castout is offline   Reply With Quote
Old 10-04-10, 07:23 PM   #7
the_tyrant
Admiral
 
Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
Default

Quote:
Originally Posted by Castout View Post
Meh even tiny nation such as Singapore is very active on cyberwarfare and online spying but mostly against critics and dissidents so nobody is going to write that story on the newspaper.

China is perhaps the most aggressive because they tend to target bigger fish like organizations or foreign departments.
China is actually pathetic in internet warfare
they have poor leadership. and the biggest organization of this sort is the China Honker Army (Chinese Commie Hackers)
I am actually worried about Japan. I mean, its official. you can be an internet warfare admiral in japan.
the_tyrant is offline   Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 05:53 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright © 1995- 2025 Subsim®
"Subsim" is a registered trademark, all rights reserved.