Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: Mariner

Identifying the source doesn’t require tracing the original attack vector backwards.

For argument’s sake, let’s assume a made up country we’ll call Wussia decides they want to conduct some information warfare. The Wussians have some variant of human command & control that directs some asset to infiltrate networks of some other sovereign nation we’ll call “America” to retrieve information for whatever reason. That Wussian C&C doesn’t operate in a black hole. They have a budget, a geographic footprint, administrative overhead, in other words they’re connected to all sorts of other nodes within the Wussian government.

Given that broader network, should “America” become aware of the intrusion, it might simply be a matter of deploying “America’s” own packages through some vector into one of those nodes and sniffing around for any information indicating Wussian responsibility for the initial intrusion. They may do this at multiple nodes in multiple countries with whom “America” has a history.

Purely hypothetical.


44 posted on 10/19/2016 10:49:53 PM PDT by delete306
[ Post Reply | Private Reply | To 4 | View Replies ]


To: delete306
For arguments sake, let's say agency "N" in America goes to those nodes and plants the evidence, later found by agency "C" in America.

Just hypothetically, of course.

53 posted on 10/19/2016 11:57:24 PM PDT by FredZarguna (And what Rough Beast, its hour come round at last, slouches toward Fifth Avenue to be born?)
[ Post Reply | Private Reply | To 44 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson