[spectre] tactical.virii

Atle Barcley atle.barcley@anart.no
Mon, 10 Sep 2001 12:54:27 +0200


Dear SPECTRE


	think("virus");
	add("politics");
	unthink("virus");
	return;


1-3-5 (REPEATED) STEPS
concept <--> concept testing
--> beta programming <--> beta testing
--> completion


STEP 1


2 ROLES

1. In cold conflicts, gathering intelligence is the primary objective. 
Customized applications can be used to gather technical data on network 
structures, as well as grabbing pieces of classified information - 
strategic documents, budget reports, et cetera.

2. In hot conflicts, impairing the operative range and agility of the 
adversary becomes a critical objective. Offensive software applications 
can be deployed to add an edge to offensive actions - by seeding confusion 
within an enemy organization, thereby spreading doubts regarding the 
stability of the organization, and by paralyzing internal and external 
communications.


4 RULES

1. Offensive applications must be capable of identifying and striking 
specific targets - single corporations and isolated networks. In this 
respect, the offensive application is different from common computer virii,
  which tend to attack indiscriminately.

2. Offensive applications must be capable of striking with accurately 
predictable effects. This requires software which can administer damage on 
a scale of severity, from a gentle nudge to a full scale attack.

3. Autonomous offensive applications must be alterable after their 
deployment, in order to adapt to constant and rapid developments in 
tactical situations. For example, they must be capable of entering "sleep"
  or "stealth" modes.

4. The applications must be deployable without demanding technical 
knowledge on an expert level. Effective deployment of this class of 
offensive software already requires political expertise.


3 PARTS

Corresponding to the 4 rules above, we can divide the process of producing 
and deploying offensive software into three parts; the Autonomous 
Application, the Editor, and the Command Centre.

1. The Autonomous Application is the executive part - this is the element 
which deletes the adversary's data, makes copies of their e-mail, and so 
forth. The Autonomous Application must incorporate mechanisms for 
self-destruction, in order to destroy all vital data in the event of 
compromised security. Such data could be the location of the command 
centre (see below) or configuration specs which may reveal tactical info.

2. The Editor is used to compile the Autonomous Apps. All operative 
instructions for the deployed Application are defined within the working 
space of the Editor. Examples of such instructions include which network 
areas to patrol, how long the Application should be active, et cetera. To 
simplify this process, a set of archetypal configuration presets will be 
available (see templates below).

3. The Command Centre feeds the Autonomous Applications altered 
instruction sets. The Command Centre can be located anywhere in the Net; 
in an anonymous ftp account, hidden in an article on a news site, et 
cetera. The location of the Command Centre is defined in the Editor while 
the Autonomous Application is being compiled. Applications scan the 
Command Centre at regular intervals to check for altered instructions.


6 TEMPLATES

1. Sniffer: harvests username and password combinations and sends these to 
a specified address.

2. Mapper: maps the inventory of host harddisks and sends the data to a 
specified address.

3. Eraser: deletes data on the adversary computer. The types or classes of 
data targeted for deletion are defined in the Editor and can be altered 
later with new instruction sets in the Command Centre.

4. Snapper: scans host computers for documents of a predefined type or 
characteristic and sends these to a specified address. Obvious applied 
tasks for this class of Application is to smuggle out financial budgets 
and other pieces of classified information held by the adversary 
corporation.

5. Replacer: replaces a document with a new, identically named document. 
The contents of the new document is defined in the Editor when the 
Application is compiled, or supplied through the Command Centre. The 
replacement operation can be limited to documents carrying a given name. 
For example, the Application may be instructed to only replace files with 
the name "strategy2002.doc"

6. Blocker: floods the adversary computer with a large amount of requests,
  blocking out normal traffic. Several clones of the Blocker App can attack 
in formation, and several machines within a network neighbourhood can be 
attacked simultaneously. Potentially, this can result in the blocking of 
an entire corporate network.


STEP 1