C4ISTAR for Hacking and Cyber Conflict

As per http://en.wikipedia.org/wiki/C4ISTAR

C2I stands for command, control, and intelligence.

C3I stands for command, control, communications, and intelligence.

C4I stands for command, control, communications, computers, and (military) intelligence.

C4ISTAR is the British acronym used to represent the group of the military functions designated by C4 (command, control, communications, computers), I (military intelligence), and STAR (surveillance, target acquisition, and reconnaissance) in order to enable the coordination of operations

I increasingly believe that cyber conflict will develop its own terminology and theory and paradigms in due time. In the meantime, it will adopt paradigms from existing military literature and adapt it to the unique sub culture of cyber conflict for both offensive, defensive as well as pre-emptive actions. Here I am theorizing for a case of targeted hacking attacks rather than massive attacks that bring down a website for a few hours and achieve nothing but a few press headlines . I would also theorize on countering such attacks.

So what would be the C4ISTAR for –

1) Media company supporting SOPA/PIPA/Take down Mega Upload-

Command and Control refers to the ability of commanders to direct forces-

This will be the senior executives including the members of board, legal officers, and public relationship/marketing people. Their name is available from corporate websites, and social media scraping can ensure both a list of contact addresses (online) as well as biases for phishing /malware attacks. This could also include phone (flooding or voicemail hacking ) attacks , and attacks against the email server of the company rather than the corporate website.

Communications– This will include all online and social media channels including websites of the media company , but also  those of the press relations firms handling communications , phones,websites- anything which the target is likely to communicate externally (and if possible internal communication)

Timing is everything- coordinating attacks immediately is juevenile, but it might be more mature to attack on vulnerable days like product launches or just before a board of directors meeting

Intelligence

Most corporates have an in-house research team, they can be easily targeted using social media channels, but also offline research and digging deep. Targeting intelligence corps of the target corporate is likely to produce a much better disruption. Eventually they can be persuaded to stop working for that corporate.

Computers– Anything that runs on electricity and can be disabled – should be disabled. This might require much more creativity than just flooding.

 surveillance-  This can be both online as well as offline, and would be of electronic assets, likely responses for the attack, and the key people who are to be disrupted.

target acquisition-  at least ten people within each corporate can and should be ideally disrupted, rather than just the website. this would call for social media scraping, and prior planning. even email in-boxes can be disrupted (if all else fails)

and reconnaissance-

study your target companies, target employees, and their strategies.

Then segment and prioritize in a list of  matrix of 10  to 10, who is more vulnerable and who is more valuable to attack.

the C4ISTAR for -a hacker activist organization is much more complicated but forensics reveal that most hackers tend to leave a signature style (in terms of computers,operating systems,machine ids,communication, tools, or even port numbers used)

the best defense for a media rich company to prevent hacking attacks is to first identify its own C4ISTAR structure for its digital content strategy and then fortify as well as scrub vulnerabilities (including from online information regarding its own employees)

(to be continued)

http://www.catb.org/~esr/faqs/hacker-howto.html

The Hacker Attitude

Creating Pages on Google Plus for some languages

So I decided to create Pages on Google Plus for my favorite programming languages.

a programming language that lets you work more quickly and integrate your systems more effectively

Add to circles

  –  Comment  –  Share

Ajay Ohri

Ajay Ohri's profile photo

Ajay Ohri  –
Ajay Ohri shared a Google+ page with you.
Structured Query Language
Leading statistical language since 1960’s especially in sociology and market research
The leading statistical language in the world
The leading statistical language since 1970’s

Python

https://plus.google.com/107930407101060924456/posts

 

These are in accordance with Google’s Policies http://www.google.com/intl/en/+/policy/pagesterm.html  Continue reading “Creating Pages on Google Plus for some languages”

Cognitive Biases exploited by Spammers and Phishers

"Keep Walking"

Since they day you arrive on this planet, you are programmed into accepting reality as good and bad.

Beautiful people good. Ugly people not good.

Fellow countrymen good. Fellow earthling not so good.

Same religion is good. Different religion is awkward.

These cognitive biases are exploited in social media in the following manner-

1) Same Name Bias- You like people of the same name as you. or people who remind you of your brothers name. or uncles name.

All that information is already known. Esp true on Linkedin.

2) Same Orientation Bias- People tend to react better to photos considered attractive of opposite sex / opposite preference. Especially true on Twitter and Facebook.

3) Nationality Bias- Israeli Americans tend to respond better to Jewish looking phishers who claim to be from Israel but are not. Ditto for Indians- Arabs etc. E|sp true on Linkedin and Facebook.

You are positively biased to people of same country or of friendly nation states and will likely accept invites/friend/poke

4) Same organization/ alumni bias- People at end of phishing attack will have higher response rate if proxy identity claims familiarity with organizations or schools attended. Especially true on Facebook and Linkedin.

5) Same interests/movies/books bias- Your likely response rate is higher to someone who has seen your profile page on Facebook for interests, and checked the RSS stream of your tweets for stuff you like.

Bias is just maths. Period.

Do android hackers tweet about electric sheep?

Here is a very amusing site where bunch of hackers discuss black hat techniques to game social media- they meet in the MJ website. LOL

Thats actually the official MJ website. (also see my Poem on MJ at

https://decisionstats.com/2011/04/29/tribute-to-michael-jackson/

and https://decisionstats.com/2009/12/01/obama-and-mj-on-history/)

But back to the funny twitter gamers

http://www.michaeljackson.com/us/node/703109

MICHAEL JACKSON YOU ARE OVER THE STATUS UPDATE LIMIT. PLEASE WAIT A FEW HOURS AND TRY AGAIN.

Catching Phishes

A great and free way to prevent your system and networks from phishing attacks is to route your DNS through www.opendns.com

The website says it all- Screenshot belongs to www.opendns.com .It handles more than 9.4 billion DNS requests daily.

  image

Nice and Impressive stuff – www.opendns.com  offers this service especially for DNS kind of attacks and botnet attacks specifically.By authenticating the website it thus helps your network from accidently downloading any malware or Trojans –right at the entry stage itself.

%d bloggers like this: