![]() |
SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997 |
|
![]() |
#1 |
Admiral
![]() Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
|
![]()
Anyways, it has always been my dream to become the Alfred Mahan of the hacking world.
I have this essay i am working on The Usage of Internet Warfare in Modern War You always get that sense of achievement when you make a breakthrough(in my case, i think i have managed to solve a problem that has stumped the JSDF for quite some time) so anyways, I'm posting the part i just completed here(its not in essay form yet though). please feel free to give feedback or ask questions. I will post the rest when I am finished. The Usage of Internet Warfare in Modern War Note: The “Hacker” is a member that contributes technologically to the Part 1:The organization Hackers should be organized into several categories Tacticians: Tacticians determine the strategic and tactical goals of the organization. They create attack plans and tactics. Core hackers: Core hackers are the organization's main asset. Their role is to be the main striking force of the organization. Core hackers comprise of the best, and they focus on penetrating firewalls, hacking servers, stealing files etc Auxiliary hackers: Auxiliary hackers play a support role for the core hackers. They focus on stealing passwords, maintaining botnets, internet phishing etc. Security experts: security personnel within the organization have 2 objectives. The first one is to prevent the organization itself from getting hacked. The second objective is to prevent the organization from getting traced and getting caught. Hardware experts: hackers need working hardware. Hardware experts focus on maintaining hardware, upgrading hardware and purchasing new hardware when necessary. Communication experts: communication experts focus on maintaining communication channels, and encrypting communication. Encryption experts: Hacking organizations often deal with sensitive information. Therefore encryption experts are needed to encrypt sensitive files and to destroy sensitive files. Other non computer related support personnel: security guards, bankers, etc The basic unit within a hacking organization is a cell. A cell could be placed anywhere. A cell is fully capable of conducting an attack. A cell should comprise of: 2-4 core hackers 4-8 auxiliary hackers 1-2 communication experts 1-2 hardware experts 1-2 security experts 1 encryption expert The size of a cell should not be increased. Instead more cells should be created when the organization increases in size. The members of each cell should be physically close, preferably in the same room. The organization’s headquarters is mainly responsible for commanding and organizing large scale attacks. A headquarters unit should comprise of: Tacticians Security Communications Hardware The size of the headquarters unit depends on the size of the headquarters and should be adjusted accordingly. Communication within the organization should be regulated. All communication should be vertical(between headquarters and each individual cell).There should be no horizontal communication(between cells) |
![]() |
![]() |
![]() |
#2 |
Navy Seal
![]() Join Date: Mar 2000
Posts: 8,643
Downloads: 19
Uploads: 0
|
![]()
Cyberspace is the next big front in the war between nations. There will be lots of job security in this field. Good choice.
![]() |
![]() |
![]() |
![]() |
#3 |
Ensign
![]() Join Date: Sep 2010
Location: New Jersey
Posts: 220
Downloads: 5
Uploads: 0
|
![]()
---
Last edited by Legionary74; 06-16-15 at 05:17 AM. |
![]() |
![]() |
![]() |
#4 |
Admiral
![]() Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
|
![]() |
![]() |
![]() |
![]() |
#5 | |
Navy Seal
![]() Join Date: Mar 2000
Posts: 8,643
Downloads: 19
Uploads: 0
|
![]() Quote:
http://www.networkworld.com/news/201...e-ring-to.html |
|
![]() |
![]() |
![]() |
#6 | |
Silent Hunter
![]() Join Date: Nov 2006
Location: Jakarta
Posts: 4,794
Downloads: 89
Uploads: 6
|
![]() Quote:
China is perhaps the most aggressive because they tend to target bigger fish like organizations or foreign departments.
__________________
|
|
![]() |
![]() |
![]() |
#7 | |
Admiral
![]() Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
|
![]() Quote:
they have poor leadership. and the biggest organization of this sort is the China Honker Army (Chinese Commie Hackers) I am actually worried about Japan. I mean, its official. you can be an internet warfare admiral in japan. |
|
![]() |
![]() |
![]() |
|
|