SATELLITE WARFARE IS MY CREATION IN 1989 AND CYBER WARFARE IS HOW WE FIGHT IT OR FIGHT YOU!












Thursday, December 13, 2007

TARGETING A VIP - SELLING THE MESSAGE

When the political left targets a VIP, the main focus is to push the message or make it more suggestive. Due to the overwhelming outrageousness, there must be enough or sufficient attacks to make a target acclimated to the left. They want people to be accustomed to this anxiety and irritation they produce. Keep in mind, the use of 24/7 surveillance offers the left every opportunity to change the reality or rearrange the reality of others. They may do this and not let up for an entire lifetime of a VIP, maybe even several decades. The idea is to harass them when they are in public or to mess everything up so it is impossible to have any sense of happiness. If they can say you have a mental illness, then they have won and you are forever imprisoned by their handiwork. The idea is to make every aspect of life hell and the idea of total control will be very logical. The idea is to induce an emotional response or make their arguments logical. The personality and the characters must make their management style agreeable to others. This is impossible unless you can rearrange the reality of others and educate them to be sensitive to the left. This is their sensitivity training because they have handicaps. It is unrelenting and nonstop in nature and is meant to invoke a nervous breakdown. When a person has a downfall or fall from grace, their reality does not work, they must search for new answers, they must ask questions and they become very frustrated with life. The left will be waiting by the phone for this call even if they are the ones who did it. Simply use a different location or a different area to check if there is anything suspicious. This is very close to blackmail if enough evidence is available. If it is a collective effort of the community or the full effort of a labor union, then it is impossible to crack down or build a sufficient legal case. It is the pernicious theatrics of powerful leftist political groups who advance an unwanted partnership.

After empirical data of over five hundred attacks, an example of how the left challenges others is using transportation vehicles. Automobiles are thoroughly insured. Accidents benefit the owners of the vehicles. The bill is paid by the target in insurance premium. If you do not keep a cool head, they will press charges even though they are attacking. The left want to present themselves as protectors and will follow a target 24/7. They will block people in while in vehicles to frustrate them. They will use the safety space between cars to make an “Indian run” where the collective effort builds on the safety and forces others to give them room. They will challenge people when they come off merge areas in a chicken game. The idea is they want in and if you do not let them in, they will make their message clear. They will hit vehicles and claim the other people did not let them in or block cars and wait for the smallest space to butt in. By varying your speed, you can prevent an ambush. If there is a pursuit, do not speed up, slow down and let the pursuit become obvious. If it is that obvious, then get the license plate. That is just some of the games they will play when they target a subject and put thoughts in their minds.

Targeting a high value hostage is used to break them down, frustrate them, make them angry or irritated, and make things more suggestive. Because it is so overwhelming, people begin to let go and begin to give up on the effort. By using nonstop and never ending pestering, the idea is to play chicken and to put the thought of impossibility or “no chance of winning.” When you are a high value target, it is impossible to prove and it is an invisible effort. The political left makes something as simple as driving hell and a war zone. They will curse and yell when they do not have their way and if they create an accident, then tell the police it was the other person’s fault because nobody yielded or let them in. This happens over and over to the point where going in public becomes a war zone and a stressful anxiety. When it repeats over and over, be aware it may be this clandestine effort. The best way bring it out of clandestine is to get into an accident. However, keep in mind that the high stakes game is about who ends up with the bill. You must use probability and check every single clue. Write down blatant efforts and forward it to the authorities. The idea is to test others and to determine how far they can get with the golden goose. They are probing for information and also trying to produce a more suggestive climate. By pestering and attacking, reality can be rearranged and people are brought closer to a mental breakdown. Where the leadership of the left was never admired, they are now either admired or understood better. They are not crazy, they are not insane, and the leaders of the left are your best friend and “poortectors”. They are a new partner where they once were once only viewed as pestering. Expect a massive effort soon afterwards if they have put a sweaty attempt already and over a long period of time.

Tuesday, December 4, 2007

INTRODUCTION TO SATELLITE WARFARE BY CYBER WARFARE HQ

The field of satellite technology is usually left to the national security sectors. Due to the pressure of cost and profitability, most satellite systems are based on necessity and not profitability; therefore, most satellites are owned by governments and militaries and have national security functions. This chapter discusses the very basic concept and developments towards theoretical Satellite Warfare, the most devastating form of warfare known to mankind presently.

There are a lot of definitions for security. Security is access. Security is authority. Security is proximity. Security is resources. Security can be brute force. However, the only way to carry out security is by information. Without information and order, execution of mission is impossible and coordination of mission is impossible. Senseless thought, to senseless action, to senseless goals, to senseless information. Therefore, security is also communication. Communication is simply a process which can take time but you have to be able to afford that reaction time. The role of command centers is to perform vital functions of execution and security to minimize the least amount of time. If the basis of access is denied or compromised, then there is no such concept as security, you must now fall back to a stronger position and try this again.

Satellite warfare (SATWAR) is the staple of Cyber Warfare HQ and the author of these books. This expertise began in the late 1980s and has progressed to the development of these manuals and books. SATWAR is the next rung past Nuclear Warfare and is perceived to be a threat of much greater scale than nuclear warfare. The evidence for such will be presented and the care and delicacy of the matter is built upon the disastrous experience and history with nuclear weaponry.

The origin of SATWAR is World War II with the first developments in the V series rockets. The first success of the V series rockets during the war led to the work of Axis scientists who originally developed them and the new field of aerospace engineering. These developments and the development of nuclear delivery vehicles will be the groundwork for SATWAR.

The first satellites were communications satellites. These communication satellites led the way for large and very expensive photo reconnaissance units used for both eavesdropping and espionage. The recent declassification of the (project) offers a glimpse into the very first aerial reconnaissance and communication satellites of the 1960s. Technology has progressed to leaps and bounds since that time.

The physiology of satellites has changed dramatically. The very first aerial systems weighed in the tons and had a very brief shelf life. Furthermore, they were not produced to be disposal but the evolution of them led to the concept of disposable and non-maintenance systems. The first systems were communication satellites all with defense purposes. Nowadays, there are limited commercial usages for satellites but the extravagant breeds are still in the hands of defense pioneers.

There are three types of satellites; they include geostationary (GEOSTAT), geosynchronous (GEOSYNC), and low earth orbiting satellites (LEO). The cost of each is a process of life cycle and starts with the LEO satellites and increase to the GEOSYNC systems. The differences between the three and the cost of them are due to the nature they are launched and kept in orbit. The orbital track of the satellite defines the genera of each type of satellite. There are advantages and disadvantages of each system and this will not be discussed as it is usually a budgetary matter.

Nuclear warfare has always been deemed to be unreasonable and unrealistic as it imparts doomsday philosophy. There has always been a drive to make up the gap between the conventional forces and the nuclear forces in order to prevent this doomsday philosophy from taking an upper hand. Basically, doomsday philosophy is the equalization and the balance of power between conflicting political systems. Unless those conflicting political systems fix or find answers, the problem of having warfare conflicted and equalized is a serious cause of concern. Technology and the rapid progress of defense spending have shortened this gap between forces nuclear and forces conventional. However, there is still no resting point for the advancement of science. This never ending field of science and math and the threat of global conflict is addressed in the book “The Fate of the World: By Way of Insanity” by Cyber Warfare HQ.

Nuclear warfare has always been the pinnacle of sheer terror and the introduction of SATWAR takes this pinnacle to a threshold of likelihood and probability. The higher probability of SATWAR over nuclear war gives SATWAR a more shortened breath to achieve what was once only achievable through nuclear war. Therefore, this chapter emphasizes the need to limit and the need to monitor this area of concern if the course of history is to be avoided again and again. History is tormented by actors good and bad who fail to understand and get right what was once history and therefore, it repeats itself in a never ending manner.

Knowing this, all aspects of nuclear war and nuclear proliferation was studied. Further, formal study was made into the military science level to extract and then transplant both successes and failures of the past, to a model for SATWAR and the skeletal model for managing SATWAR. All failures were thrown aside and deemed unacceptable as a methodology of excellence was more important towards producing a sound and workable avenue. Goals were analyzed as having a potential for corrupting greed, sabotaging DNA, disrupting political motives, and disturbing candidness.

SATWAR is not a heading which is personified by only SATWAR. SATWAR is the reliance of several other fields of developing warfare, mainly Cyber Warfare, Information Warfare, and Electronic Warfare. All these areas of study push SATWAR above and beyond all other difficulty levels of warfare to include nuclear warfare. SATWAR is all out war without any end, any rules, any escape, and any counter measures. The characteristics of SATWAR overlap much of another form called Cyber Warfare and is discussed in a separate chapter.

The characteristic of all out war and non ending war breeds a division in the personnel and makes emphasis on the problems encountered in the early phases of nuclear development and proliferation. In other words, absolute care must be made to select and involve exposure to this field because it admonishes a level of political problems in much of the same manner nuclear warfare did. Therefore, more discriminatory tastes and exclusion must be made to prevent both the proliferation and the increase of this field. Simply put, political systems do not work, the actors in the political systems cannot deliver the premises of freedom, and the level of failure must not be allowed to stretch into and gain hold of SATWAR. The blacklist for such is long and ever growing.

The political system is simply unguarded, untrustworthy, unreliable, unaccountable, and undeniably a failure. To adopt SATWAR into a political model which places levels of pressure from a confidence level which should not even be there, is both the making and mathematical formula for disaster. This same notion applied to nuclear warfare and takes a look at what happened to this history.

We advocate good foreign policy because bad foreign policy leads to expensive wars. This duplicity and fear of Europeans as socialists will end up leading to an expensive endeavor to fix this earth of all its flaws. Resources on the earth are vital to a healthy military. Not only is this crucial, the public image and the moral of the military are only based on the goodness of political leaders. Bad leadership wears down the moral of the military and forces them to seek answers which are beyond their duties. Wars are not only costly; they cost priceless human assets which we value dearly. Most people do not understand it because there is a lot of senseless killing; the moment you engage in war, it is the most brutal and vicious danger to the human creature. There is no turning back and you have to make a vital decision if you want to win because the cost of losing is not an option. Likewise, there is nothing about war which is good enough to be respected. The only respect is the victory and this better be for a good moral cause. In this victory and horror, there is a transformation because soldiers are more in touch with life itself and become stronger in spirit. Human beings are pre-programmed to destroy each other, maybe for capitalism and maybe for freedom; unless you can figure out a way to talk some sense to the human creature, wars will be a necessary evil we must live with unwillingly and defiantly. Peace and love in the socialist movement is only advertisement because it is based on very manipulative strategy meant for their own survival and control. Most people do not even want to deal with it because it is catastrophic to their life, but are they given any choices besides asking for professionalism and value?

At some point in time, the problems on earth will exceed the operations of the military capability. This is a balancing act which concerns a lot of people because it makes them question why the situation is so precariously flawed. We have spent a century dismantling a military threat, we will spend another century to try and dismantle the political threat. Our efforts are severely undermined to a level where there is a lack of care. The best example of bad foreign policy leading to expensive but necessary war is the Iraqi War. It has cost 3.5 trillion dollars from 2001 to 2007 and you can look at the cost of oil, arm sales to the region, sanctions imposed, revolutions and revolts, aid to the Middle East and what everyone is so upset about, a fear that Europeans are socialists. It is fair to be disappointed with politicians and government. People want freedom and capitalism in that region, not fight for it. It is flawed foreign policy which has sent the entire region into a state of panic and rapid militarism which we would like to change and see changed. The problems manifested and were exacerbated by the broken will of the political system which allowed extremism moral authority over national issues. All they want is change but they do not know what to call it, maybe justice.

Rather than writing a full chapter on cyber warfare, this next section will allow another writer to explain what kind of intricacy we are speaking of when the term cyber warfare is used. Governments have spent a lot of research and development on the defense of systems and security; however the field of actual warfare has not been fully explored at this time. Here is an example of a cyber warfare synopsis found inadvertently on the internet from a website called security-gurus. Not much is known about security gurus or the authors of this paper, it was a simple encounter on the internet, but one worth mentioning.

Cyber Warfare[1]

Introduction

Every country has its right to defend itself by all appropriate means. Defence

industries arose to satisfy demand for armies and don’t seem to stop growing. This

industry is driven by daily progress in advanced defence or offence technologies that

make all the previous advancements obsolete. There are very few countries whose

wealth allows to keep up with this speed. Even the best economic countries can't

afford to develop technologies too advanced due to high expenses required for such

programms.

Any conventional army needs to be well equipped and well organized. Equipment is

not the only expense because organization of the army is much more important. Organization is distribution of correct information in exact scale and timing. Every

army needs information and telecomunication network, every army is based on

logistics and every army needs to know the enemy. Information age doesn't show only

in business but also on the battlefield. The information distribution needs to be done

much faster; enemy movement must be communicated more precisely; troops need to

be deployed more exactly and decisions have to be based on more accurate

information. This shows that armies rely more and more on information, but they

don't realize that information is an asset with great value that needs to be protected.

All the efford to protect the information was targeted on physical security (eg.

Limiting access to the information), but today with inernetworking and teleworking

there are other risks that need to be taken into account. Weaknesses in logical security

enable attackers do all what is possible with conventional weapons (destruction of

infrastructure) as well as weapons of mass destruction (nuclear reactor meltdown)

Cyberwarfare

Cyberwarfare is a relatively new type of weaponry with varous effects on the target. It

doesn't have any limitations of use and can achieve most of the goals set.

Weapons

Cyber weapons are usually basic programs that have the objective to defend or attack

a target. Most of them are freely available on the internet but some more sophisticated

or newer ones are kept privately or are commercial.

Detection

Systems in this category have the goal to detect possible attackers and identify what

are they trying to do and possible where they are. Detection can be based on expert knowledge (if I hear bullets flying then somebody is attacking us) or based on standard behavior (if a patrol doesn’t come back from recon mission on time there might be an attack imminent).

Tools in this category are

Intrusion detection systems

Security monitoring

Log analysis

Prevention

Stopping the attacker is the primary concern even if the attack has not been identified

(locking the entrance door is always a good idea). Most of the attacks are very simple

and straightforward just like testing each door if it is open and a good prevention is to

simply lock it, unless somebody expects an army trying to enter (but then other

preventive measures apply).

Main tools in this category are:

Firewalls

Authentication systems

Authorization systems

Target Identification

Network scanners

System scanners

Vulnerability scanners

Attack

Here come all the tools that use the vulnerability of the system or application and

achieve the objective an attacker wants. There are too many tools here to mention

them as for every vulnerability there is more than one tool available.

It is also important to mention internet worms that are automated tools misusing

certain vulnerabilities and self-replicating themselves from one system to the other.

Another group are Trojan horses that can be deployed on the system to gain access to

it later or to create a covert channel to obtain important information.

Deception tools

Deceiving the enemy is also important in case a distraction is needed to perform an

attack or to slow the detection time of it. Here belong these subcategories:

Log modifiers

Distributed attack systems

Root-kits

Stealth tools

Strategy and Tactics

The acclaimed British strategic thinker B.H. Liddell-Hart approached strategy from

two different perspectives. He differentiated between a grand strategy and military

strategy. Liddell- Hart’s grand strategy focused on a nation s ability to coordinate

and direct all resources of a nation toward the attainment of a political objective.

Military strategy was more narrow, related to the execution of a battle plan or the

projection of military force.

In Cybersecurity there is no difference between military and civilian infrastructure as

many targets are non- military but indirectly are involved in military infrastructure.

Disrupting economy or damaging image of a public infrastructure can wield much

larger effect as weapons of mass destruction and therefore it is necessary not to limit

the tactics or a strategy with any boundaries in order to get a global understanding of

what attackers can gain or loose. Strategies are based on certain behavior that defines the acting party. In cyber-security there are 3 major types (if not counting chaotic behavior)

Reactive behavior

Here strategy is based on action that can be seen or reported in any way. It reacts upon

it with the apropriate response by increasing the awarenes on that weakness.

As an example US security started to concentrate on airport security after September

11th incident. Or increasing awareness on information security after extensive cyberattacks from china and other not “pro-american” countries.

This behavior strengthens those points in defence where attacks already happened,

which means that there will be always several succesful penetrations at the beginning.

Although it seems as in longterm infrastructure may reach a point where the systems

would be secured sufficiently, but the fact is that with introduction of new software or

new updates (and this happens very often) there are new security holes introduced

which may be misused in time.

Infrastructures with limited security resources are very often using this behavior to

manage security. This means that security team in charge is either not very

experienced or there is not enough people devoted to maintain IT systems. Depending

on the response on a system breach there might be conclusions drawn upon their

cybersecurity strategy (especially incident handling and security monitoring).

By analyzing the security vulnerabilities of their systems it is possible to see the

history of attacks upon their infrastructure. There is also another alternative to this behavior, which is learning from mistakes of others, but not always can solutions of others be used to increase security of a bit different infrastructure.

Planned behavior

Importance of planning is already well known to project managers, but due to the

nature of IT infrastructure it is not always applicable. IT infrastructure can't be kept

strictly static and no t change to fit the work needs of its owner. To keep up with the

progress in IT field as well as match the requirements for functionality in a very short

time it is not possible to keep everything planned and well documented. It is similar in national security planning where detailed plans won’t work as expected as they cover huge economic; military and other systems that are changing very often and are not well documented.

In a best case with appropriate security planning well thought of and implemented

appropriately can achieve decent level of security defense. In former communist countries planning was done in almost every part of the state, but although many scenarios were thought of one aspect wasn’t so much covered and that was human resources. Due to unexpected deviations in human behavior the whole system collapsed.

Cyber-security can be very well planned but the plan can’t cover all scenarios and by

not employing capable and experienced security people who can adopt the response

there would always be a risk of a break-in. If companies lack skilled people to operate defensive security measures or keep the systems secured (this is very ofthen the case) apropriate response would follow after a long period of investigation and escalation. By knowing the procedures used by external companies an attacker can predict specific behaviors that would follow and adjust the cyberattack to prevent any response.

A risk may be to underestimate the possibility of having outsourced managed security

system that might be difficult to overcome. This trend gains importance in middlesized

or progressively thinking companies and if implemented nation-wide can be a

very effective measure.

Proactive behavior

Previous behaviors were trying to cover known risks and vulnerabilities, but what if

there is something new that wasn't reported or documented? In such case this attacks

would remain undetected and would be identified as anomalies. For detecting and

preventing also unknown new attacks it is necessary to be highly flexible and “be the

first to know” your weakness. A security strategy that concentrates on identifying its own potential weaknesses and covering its own holes is based on proactive behavior.

There are many functions that fall under proactive behavior category:

· source code review

· formal functionality proving

· traffic analysis

· self penetration testing

· self-adaptable security measures

There are already some security solutions and products on the market but are not very

capable due to lack of skilled people to operate it. Formal functionality testing and

source code review is not done in necessary scope to insure the safety of such system.

Several countries already started investigating this field and started adapting some

parts of their systems. China already invested a lot into building large and well trained

cyber-security force or USA has built national cyber-security research centers to

concentrate security experts and skilled engineers to improve bits and pieces of

national cyber-security.

Proactive behavior needs highly skilled people and very tight security system in place

and therefore it is important to keep highly skilled people in the country to either

ensure its own security or to develop security systems that do it.

National security strategy

This is more an utopistic approach as it is not possible to integrate and synchronise all

the parts of one nation into one cyber-defense initiative, but it should be the goal of

any cyber-security initiative.

The main goal here is to secure the nation from the network provider side up to the

end-user. There is one general security standard and security policy which is being

implemented and audited by authorized experts. Central electronic warfare center is

responsible of handling incidents that are reported by any entity in the country.

Educational system is capable of providing sufficient number of security experts and

research capabilities to ensure implementation of national security strategy in every

important infrastructure .

Attacking such system is extremely hard and may be only done from inside near by

the target in order to minimize the possibility of detection or prevention. Such attacks

require cooperation with conventional special forces that help the cyber-attack team to

get to the target as close as possible and gain access to its data or functionality.

People

Security is based on 3 aspects: people; systems and procedures. As systems and

procedures are developed by people, human resources are the key to cyber-security

defense initiative.

Experts

The core of a cyber-security defense force are the people with security knowledge.

These are not administrators who are able to install a firewall, but these are people

who design and develop firewalls and other security measures. Without these people a country or a company needs to rely upon external help that may or may not be successful. Position of a security expert is similar to a nuclear scientist, who can invent and develop deadly weapon for any state that is willing to pay for his research.

Intelligence

Information about the enemy is according to Sun Tzu the key to success in the battle

or warfare. Gathering information about enemy tools and cyber-security systems is as

valuable as knowing what kind of weapons and soldiers enemy has. Even on a

company level it is important to know what kind of new security tools are on the

market and what kind of security problems were discovered recently. Also information about security experts may be valuable in case of recruiting needs.

Hackers

Defense force is one side of cyber-security but it is also necessary to have offense

capabilities. For the training scenarios as well as for identification of existing and new

security holes in systems hackers are important.

Very often ex-hackers tend to do security consulting but the ma jor difference between

a hacker and security expert is that a hacker needs to identify one hole while the

security expert has to cover them all.

System programmers

With all the knowledge of security requirements and new security holes, there needs

to be somebody who integrates and modifies the software/hardware or a solution.

Knowledge of a system and skills in programming are necessary for progress of the IT

industry as well as cyber-security.

Defense

Information systems have many potential weaknesses, but whatever they are if they

don’t operate there is a problem. It is the scale of this problem that determines the importance of such system and necessary security measures to protect it. Minimizing the risk of such problem or the scale of it requires security measures that cover all the potential initiators of the problem. Here security experts tend to differentiate 3 main categories, although some security measures are in more than one and there is no clear definition which security measure belongs where.

Physical security

For thousands of years people, goods, towns or states were protected by physical

security measures starting with stone walls up to nuclear bunkers. But no matter how

smart or good the defense was there were always ways to get through. Therefore

combination of each category is necessary to prevent the accident.

A good example of physical security is detecting and preventing EMP weapons

getting in contact with logical security measures and switching them off. A EMP blast

can disable C3 (command and communication center) communication system and

herewith stop the attack or prevent defensive force from operating efficiently. A good

physical countermeasure may be anti air defense or air patrols in the area. A company level physical security countermeasure may be storing information system in a shielded datacenter with UPS.

Logical security

This is the main cyber-security battlefield where digital information is being

exchanged or stored. Every security measure that is performed by a non-human

device in the digital world is a member of this group.

There are many sub-fields here:

Encryption

Network security

System security

Application security

Security monitoring/auditing

Organizational security

Even if information is sealed behind the blast doors there might be a risk that

somebody would open the door and let the attacker take it. That is why security procedures are in place to ensure that in case other security measures fail people would know what to do and by following procedures ensure the safety of the information. Very often in stressful situations with lack of expertise people tend to do more mistakes than ever. Procedures are there to help people do the right thing even if they don’t know what to do these guidelines would show them how to prevent the worst.

Offence

Strike scenario

The cyber-attack requires detailed structure and a plan in order to achieve the

expected objective. Such plan should have this structure:

1.General Target analysis

2.Choosing specific objectives

3.Selection of team members with sufficien qualification

4.Detailed target analysis

5.Attack planning

6.Training the attack

7.Execution of the attack

8.Observing the target to ensure the obectives were met

At first point analysts collect as much information about the target as possible by

standard means (eg. Newspapers, web-sites; newsgroups;..). This information should

help identify:

Target's mission (what is the goal of system's existance)

Content and structure of the target's systems (network structure; geographical location; externa l systems connected; customers ;..)

Technologies used (systems used; software and hardware implemented; defensive measures)

History of system implementation (system integration times; upgrade dates; vendors)

Human resources (how many people are employed; how well trained are they; what kind of information they collect; what are their interests;..)

All the information above should help to pick up the best (or the weakest) target and

possible source of attack as well as time plan of action. Second point should identify all the weakest spots or interesting spots that should be looked into more deeply. These targets do not have to be specific systems they also can be information sources or people.

In third point the team should be assembled containing specialists for every type of

system used at the target. As it is not always possible to collect all the information

necessary to choose the team all the starting members in the team should be able to

call in any specialists they need for target analysis or strike. Point four should gather all the necessary information about the target to create a specific plan of action to achieve the objectives specified in point two. This point identifies specific target structure and validates the information collected at point one. This is done by scanning the target systems and identifying operation systems, network elements as well as services and daemons running on them. At point five the above information is processed and specific weaknesses identified for possible break-in. It is not always possible to identify them up to the detail necessary, but with correlation of other information collected it may be possible to make the attack plan more specific. The plan can contain further testing and scanning as there may be other systems that are not identifiable from outside. Training the attack at point six is a preparation for the attack that optimizes and tests the cyber-weapons as well as the plan for the attack on a group of ssimilar systems. This also helps to develop a certain level of automation that speeds up the attack and minimizes the probability of human intervention.

Attack plan is usually very simple:

1. use a system vulnerability detected

2. gain the autorization level required

3. achieve the objectives

4. remove all the clues (if the objective was other than destroy the target)

Verification of achieving the objectives is dependant on their contents, but can be

proved by analyzing the information collected or checking the target's services that

should have been disrupted or analyzing the local information sources (eg. Newspapers).

Training

Building cyber army from volunteers can't be a solution for national security even if

they are the elite of computer security experts. It is the same as if best sportsmen or

hunters were to build an army. They may run fast or excell in precision shooting, but

they will not succeed in logistics and tactics.

In order to train a cyber army there needs to be a structure created that will use them

efficiently. There have to be procedures created to help handle the situations effectively. All this needs to be built first before any training can begin. It is already clear that standard army field manuals can't be used to help build the cyber troops as here quality matters not quantity. Also tactics has to be built from scratch in order to achieve objectives necessary. Separation of offensive and defensive training is more clearer and distinctive than in real combat training.

Defensive training

Infrastructure protection requires training in security technologies.

Field Technologies Roles

Network Security

Firewalls

NIDS

Network design

Firewalls specialist

NIDS specialist

Network designer

System Security

System installation and configuration

HIDS (system monitoring, integrity checking)

Authentication

Auditing and logging

System programming

System administrator

HIDS specialist

Authentication specialist

System auditor

System coder Application Security

Application installation and configuration

Application design and development

Data encryption

Application administrator

Application developer

Encryption specialist Organization Security

Security policies

Disaster recovery planning

Incident handling

Forensics

Auditing

Policy writer

Disaster recovery planner

Incident manager

Forensics officer

Auditor

Other

Security monitoring

Surveilance crew

All the roles described above are already existant in many companies and government

agencies. There are many trainings for technologies specified above, but in order to use them in cyberwarfare they need to be integrated together.

For example there is a potential target detected and commanding officer decides it is important to protect the target. Here is a general plan that needs to be executed:

1. Auditors are sent onsite to investigate current status of security

2. Every area specified above is assessed and commanding officer decides what area needs improvement and what experts would join the taskforce.

3. Experts start improvements in organizational security (priority nr.1)

4. After improving security policy other areas start improving systems and networks accordingly.

5. Incident reporting (if possible also security monitoring) is linked to a defence center with security surveilance crew.

6. General advisory is given to the target's security crew.

7. After deescalation of security alert monitoring and incident reporting is given back to target's security team.

This all needs to happen in a very short time as cyber attacks may start immediatelly

after warning. Also cooperation with target's security team is vital due to the fact that

they know their systems better.

Defence teams need to be trained in various technologies on the market and practice

their skills on most of the common systems on the market.

Trainings on specific technologies need to be done by external companies who have

resources and skills for it, but trainings in tactics should be done locally with

cooperation of offensive warfare teams.

There are 3 types of training:

1. Proactive securing of a target

2. Immediate reaction on a attack and securitg of the target

3. Security forensics after attack and securing of target's infrastructure to prevent more

Attacks

Type 1 training start with deployment of a system with application and a function

defined for it. It continues with performing security checklists in order to bring the

system and network components to a securely configured level. Next there are active

security measures deployed in order to prevent majority of standard attacks. After that

there are passive security measures deployed to monitor the system as well as provide

sufficient auditing data to identify what happened.

Type 2 trainings are very similar to security drills on a military base. After an alert is

issued team members have to gain control over the system and remove all the

attackers from the system. This can be done with cooperation with offensive warfare

teams. After allert is issued there needs to be an escalation procedure executed which

informs global security control center (GSC2) of an ongoing attack. After gaining

back complete control of the system team has to investigate how attackers got into the

system and report it to GSC2. With this information system needs to be secured and

security holes need to be patched. Also this process needs to be reported to GSC2 in

order to secure other similar system that may be possible targets.

Type 3 trainings take place in systems that have already been hacked. Their main

objective is to analyze system state and logs and reconstruct the actions that attackers

did. This can help to secure the system as well as give some information to offensive

warfare teams how to perform similar attacks. Another objective is to detect what has

been changed in the system to preven further damage or fraud.

Offensive training

It is difficult to train something not very specific that varies every moment. Offensive

cyberwarfare is a set of tools and technologies based on security holes in various

software. These holes get fixed very quickly and training how to misuse the would

become obsolete after several days. Offensive training should be therefore based on

general technologies rather than on specific tools.

Training objectives:

psychological fitness (working under time pressure)

technological understanding (general concepts of systems and networks)

operational procedures and policies understanding

State/government/army functionality understanding (information flow, command

structure)

In order to meet these objectives there should be a training plan set to meet the army

needs.

Psychological fitness

To succeed in cyber battlefield soldier needs to be able to work under pressure and

make correct decisions very fast. Just like in convetional warfare a hole or a window

in enemy's defence is opened for limited ammount of time. Strike team needs to use

this window and every second counts that they can gain with good preparation and

training. Stress is not only a side-effect when working under pressure but also a key

factor for success. Training should be done just in a same way as conventional

trainings by learning procedures in order to minimize the reaction time in between.

Technological understanding

In conventional warfare it is necessary to know how weapons work in order to use

them properly. This same concept is necessary for cyber-warfare. The level of detail

must be sufficient to guarantee understanding of what happened, is happening or is

expected to happen. By knowing the technologies a cyberwarior is able to make

decisions and predict the enemy move as human interactions are very rare to happen.

Understanding of networking and operation systems technology should not be

underestimated and should be the main objective of cyberwarior's training.

Operational procedures and policies

Technological protection is very limited thanks to opennes of every system. Protective

measures don't affect required functionality of a system and therefore can't be

expected to be the only defense of a target. By logical security there is also

organizational security that comprises of procedures and policies. These are usually

deployed in order to strengthen the defences up to a maximum. Due to the human

nature they are not as quick and precise as technological means, but they are not very

visible and can't be easily predicted.

A s an example if the target follows government cybersecurity standard and has already detected

a breach it needs around 10 minutes to report an incident and ask for help. This external help

requires at least 30 minutes to analyze the environment and assess the indicators of the breach. All

this time can be used for achieving the objectives and covering tracks by cyberattack team.

By knowing standard procedures employend in specific industry a cyberwarior is able

to predict the human response and assess the actions necessary to take or the

remaining time he has to achieve his objectives.

General target's functionality

Learning about counterforce functionality and structure helps to choose the correct

targets as well as make quick decisions about tactics to be used in specific attack. By

hitting correct targets it is possible to achieve expected effect as well as create

sufficient confusion and distraction to enlarge the attact window or leave the attacked

system unnoticed. Although it is not very usefull for execution cyberforce but it is

surely valuable for target choosing or tactics planning,

As an example US government initiated cyber-defence strategy which requires central

emergency center. Information about the incident should be sent to the experts there but if the

path is disabled and cyberattack team takes over the communication target may be gained easier

under control.

Or by estimating time of response from the target knowing of existance of such center can

increase the time delay of such response as target is expected to wait until the decision from such

center.

Conclusion

Gaining importance of information systems in today's warfare shows that information

security is being a key to success of a conflict or even a war. Cyber warfare is

becoming more and more powerful on today's battlefield and affects development of

armies in many countries as well as development of weapon technologies. It's use

should not be underestimated as it is highly flexible and hard to detect. Its costs allow

any country to train or hire a team capable of doing more than a complete army.

Effective use of such teams can gain dominance on battlefield or force the enemy to

retreat by shutting down its command infrastructure or communication network.

Value of cyberwarfare is growing and with digitization of conventional warfare

technologies as well as us ing more complex devices creates risks and weaknesses that

allow cyberwarfare units to do more damage than they could in past.

Information age is taking over conventional industries and with growing needs for

automation and digitization nations realize la ck of skilled people able to control them.

Governments realize that this problem is slowing economy but they don't realize that

it also creates risks and holes in national security strategy. Shuting down nuclear

powerplants may destroy the whole economy in a mattter of minutes; opening water

dams may kill thousands of people or releasing poisonous chemicals destroy country's

nature.

Cyberwarfare units have a important mission to ensure country's survivability,

prosperity and stability. They need to ensure national security and in worst case help

with disaster recovery.In past countries relied on strength of convetional military units

but now future of a country may depend on how well trained cyberwarfare units are

and how much practice they have . Enemy is already there and getting stronger every moment. We must make sure we can keep him from destroying our values we've been creating so hardly.

Appendix A. Offensive training scenario

Mission describtion

Inteligence reports a planned cyber-attack against powerplants and energy distribution

systems. They request a ransom of $1 000 000 or they shutdown the power grid in a

big city. The enemy was located in a not friendly country and there is a suspicion that

they planted an automatic attack mechanism on various places in the network.

Plan

A Cyberattack team should be sent in escorted by special forces to investigate and

neutralize potential threat .

Special forces are to secure the area and neutralize any physical threats. They should

ensure safety of cyberattack team and help them reaching the objectives of the

training. The team should remain undetected by local authorities.

Cyberattack team should be composed of:

forensics specialists

firewalls specialist

system security specialist

specialist in energy ind ustry's aplications security

They are to collect all the information about the plan and tools used as well as

investigate any external potential threats from the local connection.

Forensics specialists should be collecting any kind of evidence about the planned

attack or possible future attacks as well as other information that might help increase

the security of the homeland.

The rest of cyberattack team should investigate possible threats seen from the local

connections available to the attack group after the forensics specialists have recovered

all the information necessary.

In case they detect possible external automatic attack mechanisms the rest of the team

should try to disable it and report them to the local defence teams of these external

locations.

Objectives

1.location of external automatic attack mechanisms

2.elimination of detected external automatic attack mechanisms

3.recovery of attack software that should have been used

4.stay undetected by local authorities for the time necessary.

Appendix B. Example of target analysis

Commerce Department is responsible for providing timely warnings of hurricanes

through its Tropical Prediction Center (the TPC ) in Miami, Florida. Incapacity or

destruction of this essential government service could result in considerable loss of

life and property. Indeed, thousands of people died during the Galveston, Texas

hurricane of 1900 because there was no advance warning of the hurricane s approach

and, thus, no one evacuated the city. In 1992, Hurricane Andrew would have been

even more devastating than it was had the TCP not been able to provide timely

information about the storm, thereby enabling thousands to evacuate from those areas

where the storm s predicted strength threatened to be greatest. Although the TPC is a

critical asset, it does not operate in isolation; it depends on a variety of other

government agency assets, as well as assets owned and operated by private

government contractors. These include satellite imaging and analysis centers and

radio transmission facilities located in Maryland and Pennsylvania. Operational

disruptions at any one of these facilities could impede the delivery of timely hurricane

warnings just as effectively as operational disruptions at the TPC itself. Furthermore,

the TPC depends on specific providers of critical infrastruc-ture services to operate,

including Florida Power & Light for electric power, and Bell South & MC 2000 for

telecommunications. Disruptions to these services also could impede TCP operations

that are necessary to deliver hurricane warnings.

Effect:

Disable early warning system against hurricanes.

Damage indirectly in certain regions (with proper timing)

Kill people indirectly in certain regions (with proper timing)

Create negative image on state's government functionality (with proper timing)

Create confusion and minimize trust in early warning systems

Objectives

Disable electric power distribution

Disable telecommunications systems

Disable satellite imaging capabilities

Modify satellite imaging capabilities

Modify telecommunications systems

The article above has some very interesting and unique aspects of Cyber War and the next floor up of this type of warfare. It is all a collection at this time but the goal is the same; command, control, communications, and intelligence. This collection of problems is compounded by the nature of changing technology. Basically, you are tackling the same problem with three different angles. Like a bar graph, when one bar goes up, the other goes down. Similarly, when the other bar goes up, the first bar goes down. There are efforts to curb some of the cyber warfare that is beginning to develop. Keep in mind, technology will change and the power of the technology will change with along with it. It is the human factor which must be questioned.

Police raid botmaster blamed for 1 million infections

By Robert McMillan, IDG News Service, 11/29/07

Police have raided the home of the alleged ringleader of an international group of cybercriminals said to be responsible for infecting more than one million computers.

Other stories on this topic

The raid was conducted earlier this week at the New Zealand residence of the alleged botmaster, known online as AKILL. It was part of a joint effort by New Zealand police and the U.S. Federal Bureau of Investigation.

Read the latest WhitePaper - FTP Use on the Rise

While the FBI believes the raid has helped breakup the botnet network, AKILL has not been arrested, an FBI spokesman said Thursday.

Botnets are networks of infected computers that can be remotely controlled by criminals to perform a range of illegal activity, such as hosting phishing sites or launching online attacks against victims. Typically the owners of these infected computers don't even realize that their systems are being misused. In the past few years, criminals have become increasingly sophisticated in their use of botnets, making it harder for law enforcement to figure out who exactly is controlling the botnet networks.

The New Zealand raid was one of several actions undertaken by the FBI since June as part of its "Operation Bot Roast," an effort to crack down on botnets. Since Bot Roast's inception, the FBI has charged or convicted eight men, executed 13 search warrants and uncovered more than US $20 million in economic damages relating to botnets, the agency said in a statement Thursday.

FBI Director Robert Mueller called botnets the "weapon of choice of cyber criminals," in the statement. The FBI said that Internet-related fraud cost $200 million in 2006.

Copyright 2007 Network World Inc.

__________

Brian Krebs on Computer Security

FBI Unveils Movable Feast with 'Operation Bot Roast'

The FBI said today it has identified more than 1 million personal computers that have been infected with computer worms enabling the attackers to control PCs for criminal purposes such as sending spam, spreading spyware and attacking Web sites.

The FBI used details it gleaned from an ongoing investigation called "Operation Bot Roast" to highlight a few recent arrests of individuals accused of running botnets and to raise public awareness about the problem, which the agency called "a growing threat to national security, the national information infrastructure and the economy."

Individual personal computers infected with remote-control software are known as "bots," and people who control these PCs herd them in 'botnets," which generally are large groups of centrally controlled machines that are used for criminal moneymaking schemes.

"The majority of victims are not even aware that their computer has been compromised or their personal information exploited," FBI Assistant Director for the Cyber Division James Finch said in a statement. "An attacker gains control by infecting the computer with a virus or other malicious code and the computer continues to operate normally. Citizens can protect themselves from botnets and the associated schemes by practicing strong computer security habits to reduce the risk that your computer will be compromised."

Estimates of the global bot problem vary widely. Symantec Corp. in a recent Internet Security Threat Report estimated that there are more than 6 million bot-infested PCs worldwide. Other experts, such as Georgia Tech's David Dagon, posit that the actual number of these compromised PCs is growing upward of 13 million.

The FBI said it is working with industry partners to notify the victims of the botted computers, ostensibly to glean evidence from the machines and to get them cleaned. However, it also warned people to be wary of scam artists who might use the incident to send e-mails disguised as messages from the FBI seeking personal or financial information.

The government named three individuals it has arrested or charged in connection with the investigation, one of whom was long-time spam king Robert Soloway. The FBI charged James Brewer of Arlington, Tex., with running a botnet of "tens of thousands of computers," at least some of which were located in Chicago-area hospitals.

Jason Michael Downey of Covington, Ky., is charged with conducting "distributed denial-of-service" attacks, which involve using a botnet to flood a Web site or network with so much junk Internet traffic that the target network either crashes or is rendered unavailable.

Security Fix dug up the charging document on Downey showing that he may be the administrator of an Internet server called Yotta-Byte.net, which, according to anti-virus vendor Trend Micro, was the server used to control a botnet infected by a particularly nasty version of the Agobot worm. The worm family has spawned thousands of variants and goes by a few other names, including "Phatbot." In spring 2004, washingtonpost.com ran my story about a version of phatbot that was estimated to have infected between 1 million to 2 million computers.

By Brian Krebs | June 13, 2007; 5:03 PM ET

The use of satellites suggests distant or terrestrial sites; therefore, the reliance on processing remote instructions relies heavily on software based applications. The hardware is just as equal as the hardware; therefore, the removal of either system is a cause for panic. Hardware without question is the amplification of the software which fine tunes and is the thinking module controlling all features. If one wishes to visualize the system as a human body where the shell is the hardware and the software is the brain, then the models begin to develop.

Anytime the word “satellite” is used, the perceived knowledge is the absence of any hardware. However, the special aspect of the word satellite is the presence of something if anything in terrestrial space which is both receiving and giving instructions in a spatial manner, not withstanding a real time operator behind the system itself. Therefore, conflict in the terrestrial can involve either machines or human operators. This is both the quality and the excellence of the software; it allows automatic or semiautomatic progressions and therefore the removal of a human in a spatial timing. If there is no human operator, then the more accurate word for this type of military strategy is demolition and sequencing of demolition which was planned and executed at two different time frames.

If you tell a satellite to track a target until it is destroyed, then it will and the relentless pursuit between a machine and a target will ensue. The probability of the machine gaining greater advantage and victory is within the 99th percentile. Of course, there are certain aspects of stealth and cunning a machine cannot interpret as it is confused; however, the sustained and repeated onslaught of stealth and cunning is no match for any machine because the human brain cannot process the stealth and cunning on such a level to match the machine. Similarly, in an evenly matched confrontation, the machine will be able to sustain a level of onslaught whereas the human factor will become fatigued, most especially at this level of mental thought. A game of chess is one thing, on the battlefield the rules change dramatically.

Reliance on software is an issue and one of the biggest issues is the nature of software conflict. Any system integrating many different nodes or parts to the whole must realize the sabotage of the whole is more achievable by sabotaging the smallest unit. When this sabotage or simple error occurs, software conflict is produced. The inescapable reality to software engineering is the core skeletal instructions of machine language. Built layer upon layer, machine language “God” does not and cannot process instructions when it is being told or ordered to process by software in conflict. Therefore, large networks must abide by the simple rules and determine only one leader software which makes the final decisions. Most if not all instances, the leader software is a human representative controlling all other automated processes.

The current problem is the notion of training all personnel in cyber war. Personnel trained in cyber war must be as cunning as or more cunning than the adversary. When you widen this approach, the issue of standardization and gradient effects becomes an issue. This idea of uniformity in training is not a realistic approach. Similarly, training the entire civilian population in counter terrorism techniques is not a realistic approach to terrorism. If the act of cyber war is viewed as an act similar to terrorism, then chaos can erupt as people begin to imagine and see (desert illusion) enemies behind every tree. Their heightened awareness, if recklessly pursued, becomes an annoyance to others. Therefore, the most realistic approach is the reaction of teams trained to identify… engage, and neutralize. Let the hospitals be hospitals, airports be airports, and water treatment facilities be water treatment facilities.

This sounds great and it seems almost workable, except for one problem. Exactly how reliant and how widespread is the use of software? The next problem is the manpower of monitor and response time. There is some centralization in the military and there are solutions in the military system; however, outside of this jurisdiction, there is only privatization and nobody wants to give up privatization.

Satellite warfare is much easier to understand then cyber warfare. Satellite warfare or SATWAR has three vital components. Each of the three components needs to be separate and independent while in constant contact with each component for security. The three components make up a single independent unit and interact directly with each other. The components will consist of the following:

  1. the defensive or offensive unit
  2. the remote command center
  3. the target acquisitioning system or weapons

The reason why it is important to have a unit breakdown is because in SATWAR you do not know where the attack or target is from and what level of firepower is being deployed. SATWAR is an open variable of unknowns. If you are able to see the battlefield, then your opponent will also make engagement when that opponent believes they have equal firepower. There is only a determinant threat when that firepower is surpassed. An opponent will always be in check as long as the invisible line is never surpassed, it is an invitation to expend critical time, resources and work which is never available. So what you see they see; this is why the open variable exists; you do not know the firepower or the strength in the unknown. Do not cross that line or contest to that line, do not challenge the unknown. Do not let other SATWAR forces who claim to be allies contest that line, be suspicious of their intentions without breaking the suspicion of diplomacy. In the event this status of allies is ever challenged, the invisible line will never be surpassed regardless of all or any efforts. Respect others differences but never compromise your security, they will do the same with certainty.

When a SATWAR attack is engaged, the first primary goal is identification. Identification is based on the idea that the attack is remote, automatic or single. An automatic attack is classified as persistent and is a long drawn out engagement which can even be indefinite. This initial part is the most vital part of SATWAR, the time it takes to identify and trace the attack. The best of opponent on earth may force SATWAR forces to up to sixty minutes to locate them anywhere on the earth or the universe. It does not have to be a pinpoint location because the retaliation is based on a SATWAR footprint. The command center will advise of deception tactics or delay tactics which can be painful but essential to identification. As long as the acquisition is within a percentage of error, the advantage will always be in the hands of the surprising party. Therefore, this aspect of SATWAR must constantly be drilled for speed. This speed will determine the survivability. The idea is not first strike or counter strike when attacked; the idea is surviving it and retaliating. Therefore, the time it takes to acquire the target will be based on the time it takes to identify the source of the attack or the defense. The ability to identify is solely based on the ability of surveillance because this is a tremendous amount of territory being covered. The ideal time when an attack is underway would be five seconds from the beginning of the attack to when the source is identified.

The next component is the command center. The command center is the brain and the heart of SATWAR. If the command center wishes to survive the initial attack and respond in kind, it cannot engage or reveal its identification. Therefore, it is simply the switching center where information is processed and routed to the third component, the target acquisition system. The command center can be automatic or manned by a remote human source. The function of the command center is to process the information and relay it to the weapons with the identification. It is more beneficial to place a human controller to operate this critical command in case a problem arises. When the identification reaches the command center, the threat analysis must be made.

SATWAR threat analysis range in levels of lethality, surveillance, harassment and probing techniques intent on menacing more then purpose. Due to the blindness of the matter, probing is the most common type of attack followed by surveillance. When an enemy becomes frustrated or compelled to harass a target, then the situation begins to take a new dynamics. This is when the engagement phase begins. Satellites are usually only used for surveillance and most if not all threats are for information dissemination, not for a first strike capability. However, once this line of surveillance is crossed, then there are levels of threats and responses. Do not make a habit of panic because senseless actions only reveal critical information. Critical information can expose targets, reveal force strength, and endanger a lot more than personnel.

There are harassment responses, there are warning responses, and then there are proper usage of incapacitates. Incapacitates are used to suppress a threat or used to stop an attack. Incapacitates is an open door and can range from a small mega joule to maybe several thousand mega joules[2]. There is no way to predict or prepare for what occurs in an engagement, however, there are probabilities which aid in predicting how the conclusion will be. The skill and leadership of the human controllers are a significant determinant in the outcomes. Personnel who show off or use SATWAR in a senseless manner need to be rid of for a lack of discipline. That lack of discipline is the biggest threat to SATWAR and the biggest problem with human reliance. The infallibility of the human personnel will be the biggest danger of them all because every principle of SATWAR can easily be compromised by one or more individual error. Do not gamble with anything bust the best, the most disciplined and the most perfect because there is no turning back once that senseless line is crossed. Do not let politics decide decisions or leaders who are prone to error, character flaws, emotions, proving themselves and mistakes. Do not settle on the cards which you are dealt, deal your own cards and do not let anything hold that decision to pressure or influence. One error can amount to total breakdown and total compromise; the strength of characters is the only lifeline, do not be rash to judgment.

Although there are three components, the arrangement of the three components must be in a grid manner where technical problems can be rerouted to an equal parallel component. If you are an open target, then expect to be hit by an attack. If you have proper defenses, then there may be some cushioning of the attack. Technical error and enemy capability may infiltrate one level or one component, but it cannot take the grid down or launch such a massive attack to shut down the weapons system as long as the rerouting process is functioning.

Here is a brief example of a SATWAR battle. You have an unknown enemy SATWAR force bunkered in the isolated waters off the North Pole. They have three ranges of orbital capabilities due to their location, you have two and they know this. They simply engage with harassment and to say hello. On the receiving end you would, first, notify the command center of the incident; second, several seconds would follow where the target systems acquire and identify; third, the next day a stealth jet drops leaflets that says “hi, how are youJ” along with a box of GI Joe dolls with a response. That is a typical SATWAR battle and a rudimentary day to day operation, sheer boredom.

How do you define a SATWAR enemy? You do not, you let it define itself. It is impossible to defend or define an enemy. Unless or until you have a crystal ball of certainty, the ability to reach into the unknown is not available. Do not reach into the unknown and draw conclusions, which are disciplined. Should you be completely paranoid about enemies? No, a healthy paranoia is fine but some people are so flawed that absolute paranoia is the only way they are expected to be careful. They will be overcome with fear unless they can think their way out of a massive attack; that absolute paranoia will overcome them and they will not be able to focus on the objectives or maintain aggressiveness. You must be able to accept your fate while making complex mathematic calculations. Remember, it is not known to a science but it can be taught if the basic principles are adhered to. You are drawing from infantry characteristics and the mental faculty of rocket scientists, along with the disciple of perfection; two out of three is not good enough. When it is impossible to defend, you must look at the grand strategy and the war, not the battle. You will loose a couple battles and question if it was a lack of offense or defense.

The reason why ideal candidates have strong knowledge of infantry skills is the safety and proper usage of firearms, safety and danger. It is not a political appointment for service or some theatrics of the political system, it is private and in the hands of private individuals. There is a lot of discipline, training, and self pursuit which only the best have in their genes. There is no amount of government training which will be sufficient and should not be any. You want the absolute best that have the concern of proper safety, the ability to make complex calculations well under pressure, but most of all have the concern for safety of others. It is just like any other instrument of power or instrument which instills human beings with the confidence of power. in the hands of cowards or people who do not understand danger, is disastrous.

There are very valuable ways to draw in attacks, prolong attacks, repel them immediately, lessen an attack, force identification, deter attacks, prevent attacks, play dead or play along, and present any kind of emotional response needed to survive until proper force is determined. The process of identification can be or become very painful while essential, it is also up to the command center to give proper guidance on the level of success. Once success is achieved the tide can be turned. The capability of the command center will be able to regulate the level of pain in the attack because they have to scramble to make identification. If their capabilities are insufficient and if they have been outmatched, the situation will be very precarious, revert to contingency and backup. The command center must now call in more forces or make appropriate adjustments while the contingency is enforced. Once identification is made, the options are unlimited. There will always be menacing and irritating threats, do not mistake them for determinant threats. Let the appropriate forces and authorities deal with menacing threats while focusing on determinant ones. Win the trust of the authorities and seek their cooperation is needed; if this option is not available, and then make sure force strength can neutralize the threat once that threat is identified. Do not define the enemy, let the enemy define themselves. Menacing and irritating annoyances are unavoidable yet very distracting. Also, speed and power will always determine the outcome; the opponent will never be a factor in making this decision. Do not let any opponent determine or obtain the upper hand by using their own hatred and flaws to determine the outcome of a battle. Speed and power is decisive, the angry and hateful enemy is not. That is how they sit in the same foxhole together for indefinitely.

People revolt and rebel for many reasons. Mostly, they revolt because their parents are inhospitable or too hospitable. However, the political left revolts for a whole another cause, famine and hunger. We know why they fight and we know why they want others to fight for them. We know why they fight is sometimes not the most admired reason but it is the result of famine and hunger, a life impoverished. It is not what they tell you or what they educate you on, it is what they fall short of telling others or fail to educate others which make people suspicious. Right now, there is a cat and mouse game with the lives of children and the lies of human beings. You may be able to recognize this cat and mouse game when it is in front of you or you may not, that is an individual choice to be respected. This book is about why we fight and what we fight. It was either by fate or misfortune that we woke up one morning and became a delicious meal for the political coffers of the left and the taxonomy of the right. Why would anyone revolt or rebel if they were in the same shoes is for them to decide; however, we give them an opportunity to explain themselves. If they fail to do so or do it in such an incompetent and vile manner, then there is not excuse and there is nothing to justify why their demise has any consequence on anyone. Sometimes it is better to be quiet and sometimes it is better to revolt; but to choose terrible leaders after being properly educated is not a proper excuse. That is false consciousness and the process of being misguided. There are people out in this world that can go before a camera and put on the most inviting, charming, sweet, caring, trusting, kind, loyal and entertaining smile. Give them a chance and see if they will base their life on falsehoods and lies or will they will choose to be more trusting and be less clandestine. Give them a chance and chances they fail do or do it in such an incompetent and vile manner, then there is not excuse and there is nothing to justify why their demise has any consequence on anyone. Speeches are meaningless when they do not contain real words; speeches need to be written with real words for them to have any life.

The left views radical thought and revolutionary movements as heroism and now it is an integral part of the American society. It is selfish to take others down with your demise has no effect on anyone. It is also a senseless life of seeking kindness and revenge when that same defeat has no strategic bearing on anyone. All it has is a senseless act and senseless violence on others. On the other hand, the standard of living will actually be better when this senseless kindness is gone. The secret formula is to respect the differences of others, not irritate them with one effort after another. The secret formula is not to put on the best smile and put others under attack so they will be a hostage or prisoner to this senseless kindness or take them down with your confidence and ignorance. That is why the entire society is broken. The left is more concerned about image and theatrics than cleaning up their senseless act and dream of global domination. This is how the left senselessly define themselves and their actions. Human beings are nothing but in the way.

When people are selfish and want to take you down with them or hold you hostage because they feel the truth is a crime, it is clear they have no sense of right and wrong. Even if they did, would they even consider it. If you put this “toy” in the hands of thespians who claim to know the concept of justice, you will be looking down the barrel of a world of problems. Hence, this is exactly what we see when we look at history. This basic and simple concept of justice is just beyond these people. They are cruel, vicious, vile, manipulative, angelic liars and they deserve all the pain and grief that life has to offer. They should have released their hostages a long time ago rather than wait until 2008 to figure out how they can continue doing such if this option was available or if they could get away with it. It is very irritating to have to spend 24/7 getting to know and sharing life with a hostage taker and a revolutionary hero who wishes to be in the cyber and satellite warfare program. It is also very irritating when they force you to spend 24/7 with them or else cut off all funding and hold you prisoner.

The cyber and satellite warfare program began as an advanced infantry tactical command to meet current threats in the late 1980s; it was based solely on infantry combat when it began. Due to the cost of fielding it, the numbers were extremely limited. We were the first here. Since its beginning, there has been a tremendous amount of advancements. It is literally a paradigm to open a new world. This cost to field it meant that damage and repairs to the program were gravely strained and even deadly; therefore, it was left in a complacent surmise of development. It was slowly being developed as current crisis called for it to be. However, it has not been fielded due to several problems outlined in this book. By the time it was fielded, the Cold War was over; so it was considered for the same fate as the stockpiles of graveyards in the desert. So far, this entire matter is asking quite a bit from what was intended to be for advanced infantry tactical command.

What is also a falsehood is the use of audible devices implanted underneath the derma or the involuntary use of devices implanted in children. The cyber and satellite warfare program is not in the business of mind control or putting thoughts in the mind of others. The best soldiers in the world do have that taken out of their training but the cost of it is much too expensive of an endeavor along with the ethical issues. The same applies to the use of illegal substances. It is sheer terror enough to be sitting next to someone who has an audible device implanted or is zonked out on illegal substances while their discipline and moral character is being judged. The cyber and satellite warfare program is familiar with this practice but it is not being used or advocated. We are the commanders and we make critical decisions which others have to live with, not revolt about. If in the future this threat is encountered or detected, then proper corrections will be made at that time. For now it is not in use or in practice unless an enemy chooses that method of demise because it is an ethical problem. Albeit, one of those forces may even have super human powers or the firepower of an entire division of men, numbers is not a concern or worry. We do not use or advocate any surgery for bionics.

SATWAR is a strategic level war which requires the minimum of one unit. Nevertheless, there is current exploration of tactical use and tactical constellations. If the price and the cost can be economical, then the military will receive a tremendous boost in their weapons system. This tactical use will be the beginning of automated warfare or remote infantry warfare. It will be a long development but it is a very worthy addition which can solve the increasing problem with personnel needs and dangerous conflicts which cost valuable national treasures. The infantry tactical fighting power will be surpassed on a level where the price of war will be too costly to even consider. This was the basis of nuclear destructive technology and nuclear deterrence. It is also the basis of mutually assured destruction of SATWAR. The eventual goal is to bridge the gap between conventional and nuclear forces where nuclear forces will no longer be necessary when the destructive power has been equaled by technology.

To recap and to summarize, SATWAR has three vital components. Each of the three components needs to be separate and independent while in constant contact with each component for security. The three components make up a single independent unit and interact directly with each other. The components will consist of the following:

  1. the defensive or offensive unit
  2. the remote command center
  3. the target acquisitioning system

The reason why it is important to have a unit breakdown is because in SATWAR you do not know where the attack or target is from and what level of firepower is being deployed. SATWAR is an open variable of unknowns. If you are able to see the battlefield, then your opponent will also make engagement when that opponent believes they have equal firepower. There is only a determinant threat when that firepower is surpassed. An opponent will always be in check as long as the invisible line is never surpassed, it is an invitation to expend critical time, resources and work which is never available. So what you see they see; this is why the open variable exists; you do not know the firepower or the strength in the unknown. Always keep the open variable and the determinate threat will be known. Do not cross that line or contest to that line; do not challenge the unknown unless it is within you to do so. Do not let other SATWAR forces who claim to be allies contest that line, be suspicious of their intentions without breaking the suspicion of diplomacy. In the event this status of allies is ever challenged, the invisible line will never be surpassed regardless of all or any efforts. Respect others differences but never compromise your security, they will do the same with certainty. Do not be afraid to say no or ask if human beings are only savage beasts who only aspire to be civilized. Good luck, we have put over twenty years of experience in this and it is insanity at the highest levels.



“Thanks A Lot” lyrics by Third Eye Blind

It's all in your mind; she said the darkness and the light

The clock, it bleeds for you but you never got the time-in right

(I woke you up and I slit the throat of your confidence)

And we laughed in the night, and I felt alright

Woo!

All hands on deck boys 'cause this ship was made to sink

Your squabbles salutes you now, but I know what he's thinking

(I woke you up and I slit the throat of your confidence)

And we laughed in the night, and I felt alright

(Chorus)

Thanks a lot

Thanks a lot

Don't even know

Thanks a lot

The clothes she wears mis-fit, and she's nervous when she speaks

Her zombie mom and dad live in a separate house of freaks

(I woke you up and I slit the throat of your confidence)

And we laughed in the night

And I felt alright

(Chorus)

I'm the one for you

'Cause I know all the dirty things you like to do

I'm the fear in your eyes; I'm the fire in your flies

I'm the sound that's buzzing around your head

Day...

Glow...

(Chorus)

Thanks a lot…

“Headstrong” lyrics by Trapt

Circling, circling

Circling your head

contemplating everything you ever said
Now I see the, truth I got a doubt
A different motive in your eyes, and now I'm out
See you later
I see your fantasy, you want to make a reality paved in gold
See inside, inside of our heads
Well that's over
I see your motives inside, and decision to hide

[Chorus]
Back off we'll take you on
Headstrong to take on anyone
I know that you are wrong
Headstrong we're Headstrong
Back off We'll take you on
Headstrong to take on anyone
I know that you are wrong and
This is not where you belong

I can't give anything away
I won't give everything away

Conclusions manifest

your first impressions got to be your very best
I see you're full, of sh** and that's alright
That's how you play I guess you get through every night
Now that's over
I see your fantasy, you want to make it a reality paved in gold
See inside, inside of our heads
Well that's all over
I see your motives inside, and decision to hide

[Chorus]
I can't give anything away
I won't give everything away

(Repeat)

I know, I know all about
I know, I know all about
I know, I know all about
I know, I know all about your motives inside and decision to hide
[Chorus]

Where you belong

This is not where you belong
I won't give everything away
I can't give anything away

This is not where you belong

“Sam’s Town” lyrics by the Killers

Nobody ever had a dream round here,
but I don't really mind that it's starting to get to me
Nobody ever pulls the seams round here,
but I don't really mind that it's starting to get to me

I've got this energy beneath my feet
like something underground's gonna come up and carry me,
I've got this sentimental heart that beats
but I don't really mind that it's starting to get to me now

(Chorus)
Why do you waste my time?
Is the answer to the question on your mind
And I'm sick of all my judges
so scared of what they'll find
But I know that I can make it
As long as somebody takes me home,
every now and then...

Well have you ever seen the lights?
Have you ever seen the lights?

I took a shuttle on a shockwave ride
where people on the pen pull the trigger for accolades
I took a bullet and I looked inside it
Running through my veins as an American masquerade

I still remember grandma Dixie's wake
I've never really known anybody to die before
Red white and blue upon a birthday cake
My brother, he was born on the fourth of the July...and that's all

(Chorus)
Wooooooo!
(Every now and then)
(Every now and then)

You know I see London, I see Sam's Town
holds my hand and let's my hair down
Rolls that world right off my shoulder
I see London, I see Sam's Town

Now…

“Read My Mind” lyrics by The Killers


On the corner of main street
Just tryin' to keep it in line
You say you wanna move on and
You say I'm falling behind

(Chorus)
Can you read my mind?
Can you read my mind?

I never really gave up on
Breakin' out of this two-star town
I got the green light
I got a little fight
I'm gonna turn this thing around

(Chorus)


The good old days
The honest man
The restless heart
The promised land
A subtle kiss
That no one sees
A broken wrist
And a picture piece

Oh well I don't mind
If you don't mind
Coz I don't shine
If you don't shine
Before you go

Can you read my mind?

Its funny how you just break down
Waitin' on some sign
I pull up to the front of your driveway
With magic soakin' my spine

(Chorus)

The teenage queen
The loaded gun
The drop dead dream
The chosen one
A southern drawl
A world unseen
A city wall
And a trampoline

Well I don't mind
If you don't mind
Coz I don't shine
If you don't shine
Before you joke
Tell me what you find
When you read my mind

Slippin in my faith
Until I fall
He never returned that call
Woman, open the door
Don't let it sting
I wanna breathe that fire again

She said
I don't mind
If you don't mind
Coz I don't shine
If you don't shine
Put your back on me
Put your back on me
Put your back on me
(Wooooooo)

The stars are blazing
Like rebel diamonds
Cut out of the sun
Con you read my mind?

“In the Air Tonight” lyrics by Phil Collins


I can feel it coming in the air tonight, Oh Lord
I've been waiting for this moment, all my life, Oh Lord
Can you feel it coming in the air tonight, Oh Lord, Oh Lord

Well, if you told me you were drowning
I would not lend a hand
I've seen your face before my friend
But I don't know if you know who I am
Well, I was there and I saw what you did
I saw it with my own two eyes
So you can wipe off the grin, I know where you've been
It's all been a pack of lies

And I can feel it coming in the air tonight, Oh Lord
I've been waiting for this moment for all my life, Oh Lord
I can feel it in the air tonight, Oh Lord, Oh Lord
And I've been waiting for this moment all my life, Oh Lord, Oh Lord

Well I remember, I remember don't worry
How could I ever forget, it's the first time, the last time we ever met
But I know the reason why you keep your silence up, no you don't fool me
The hurt doesn't show; but the pain still grows
It's no stranger to you or me

And I can feel it coming in the air tonight, Oh Lord...

“Destroyer” lyrics by The Kinks

Met a girl called Lola and I took her back to my place

Feelin guilty, feelin scared, hidden cameras everywhere

Stop! Hold on. Stay in control

Girl, I want you here with me

But I’m really not as cool as Id like to be

Cause there’s a red, under my bed

And there’s a little yellow man in my head

And there’s a true blue inside of me

That keeps stopping me, touchin ya, watchin ya, lovin ya

Paranoia, the destroyah.

Paranoia, the destroyah.

Well I fell asleep, and then I woke feelin kinda queer

Lola looked at me and said, ooh you look so weird.

She said, man, there’s really something wrong with you.

One day you’re gonna self-destruct.

You’re up, you’re down, I can’t work you out

You get a good thing goin then you blow yourself out.

Silly boy ya self-destroyah. Silly boy ya self-destroyah

Silly boy you got so much to live for

So much to aim for, so much to try for

You blowing it all with paranoia

You’re so insecure you self-destroyah

(And it goes like this, here it goes)

Paranoia, the destroyah

(Here it goes again)

Paranoia, the destroyah

Dr. Dr. help me please, I know you’ll understand

There’s a time device inside of me, I’m a self-destructin man

There’s a red, under my bed

And there’s a little green man in my head

And he said, you’re not goin crazy, you’re just a bit sad

Cause there’s a man in ya, knawin ya, tearin ya into two.

Silly boy ya self-destroyah.

Paranoia, the destroyah

Self-destroyah, wreck your health

Destroy friends, destroy yourself

The time device of self-destruction

Light the fuse and start eruption

(yea, it goes like this, here it goes)

Paranoia, the destroyah

(heres to paranoia)

Paranoia, the destroyah

(hey hey, here it goes)

Paranoia, the destroyah

(and it goes like this)

Paranoia, the destroyah

(and it goes like this.)

“Sympathetic” lyrics by Seether

And my words will be here when I’m gone
As I’m fading away against the wind
And the words you left me linger on
As I’m failing again now, never to change this

(Chorus)
And I’m sympathetic,
Never letting on I feel the way I do
As I’m falling apart again at the seam

And it seems I’m alone here, hollow again
As I’m flailing again against the wind
And the scars I am left with swallow again
As I’m failing again now, never to change this

Chorus

Chorus


The same old feelings are taking over
And I can’t seem to make them go away
And I can’t take all the pressure sober,
But I can’t seem to make it go away
The same old feelings are taking over
And I can’t seem to make them go away
And I can’t take all the pressure sober
(I can’t make it go away. I can’t make it go away)

Chorus

Chorus

And I’m falling, falling, falling,
Falling, falling, falling, falling
Apart again at the seam…

“Sad but True” lyrics by Metallica

Hey I’m your life

I’m the one who takes you there

Hey I’m your life

I’m the one who cares

They, They betray

I’m your only true friend now

They, they’ll betray

I’m forever there

(Chorus 1)

I’m your dream, make you real

I’m your eyes when you must steal

I’m your pain when you can’t feel

Sad but true

(Chorus 2)

I’m your dream, mind astray

I’m your eyes while you’re away

I’m your pain while you repay

You know it’s sad but true, sad but true

You, you’re my mask

You’re my cover, my shelter

You, you’re my mask

You’re the one who’s blamed

Do, Do my work

Do my dirty work, scapegoat

Do, Do my deeds

For you’re the one who’s shamed

(Chorus 1, 2)

I'm your dreams,

I'm your eyes,

I'm your pain

I'm your dreams

I'm your eyes

I'm your pain

I'm your dreams

I'm your eyes

I'm your pain

You know it’s sad but true

Hate, I’m your hate

I’m your hate when you want love

Pay, Pay the price

Pay for nothing’s fair

Hey, I’m your life

I’m the one who took you there

Hey, I’m your life

And I no longer care

(Chorus 1)

I’m your truth, telling lies

I’m your reasoned alibis

I’m inside open your eyes

I’m you…

Sad but true

"For Those About To Rock (We Salute You)" lyrics by AC/DC

We roll tonight to the guitar bite

Stand up and be counted for what you are about to receive

We are the dealers

We'll give you everything you need

Hail hail to the good times

Cos rock has got the right of way

We ain't no legends ain't no cause

We're just livin' for today

For those about to rock, we salute you

For those about to rock, we salute you

We rock at dawn on the front line

Like a bolt right outta the blue

The skies alight with a guitar bite

Heads will roll and rock tonight

For those about to rock, we salute you

For those about to rock, we salute you

For those about to rock, we salute you, yes we do

For those about to rock, we salute you

Salute

We're just a battery for hire with the guitar fire

Ready and aimed at you

Pick up your balls and load up your cannon

For a twenty one gun salute

For those about to rock

Fire

We salute you

For those about to rock

We salute you

For those about to rock

Fire

We salute you

Fire

We salute you

We salute you, c'mon

For those about to rock, we salute you

For those about to rock, we salute you

For those about to rock, we salute you

For those about to rock, we salute you

Shoot, shoot

Shoot, shoot

For those who give

For those who take

Those left high

And those on the make

We salute you

We salute you

We salute you

Fire!



[1] http://www.security-gurus.de/papers/cyberwarfare

[2] One joule is the work done, or energy expended, by a force of one newton moving an object one meter along the direction of the force. This quantity is also denoted as a Newton-meter with the symbol N·m. Note that torque also has the same units as work, but the quantities are not identical. (From Wikipedia)

About Me

My photo
My name is Alex. I am the father of both cyber and satellite warfare. I was retired from the US Army at a very young age. Life has been grand I think. I love a girl named "GOO" who I have not seen in over 7 years, I hope to find her again one day. My book, which may end up several books is called "Cyber and Satellite Warfare, By Way of Insanity" will be out soon. It is the last book anyone will need to read. They began as military manuals and transgressed to just a good read. I am the real and authentic father of both cyber and satellite warfare and this is as real as it will ever get. What you are reading are only several chosen chapters out of hundreds of chapters. Specifically, this book was written between 1989 and 1998 while in college and while in my mid twenties. I am in my mid 30s now. I am not sure if I will write a biography, I want to wait and include someone in it, it is boring now. CLICK ON FULL PROFILE FOR MORE READING. Right now we are trying to lock them up and issue the death penalty on all of them.