Jump to content

Transmission to the Kingdom of Cochin


JEDCJT
 Share

Recommended Posts

Ever since it's formation, NovCorp had largely established a monopoly on the nation's media. Most, if not all, of the Republic's media outlets were effectively under NovCorp's control, and that control were growing stronger and stronger every day. But with such considerable amount of power, sanctioned by the Noverian government, also came considerable responsibilities, including but not limited to safeguarding the nation against external and internal threats, namely cyberwarfare. Although cooperating with the Noverian military in regards to this, the CEOs of NovCorp found that they had limited means and knowledge of which to implement the appropriate and proper security measures that would insulate the nation from cyber threats.

And so, in conjunction with the Directorate of Public Relations, NovCorp sent a classified telegram to the Government of the Kingdom of Cochin. Owing to the Kingdom of Cochin's prominence in communication and media technology - especially these that.could be utilized for national defense - the Kingdom of Cochin was a sensible choice to contact.

[b]CLASSIFIED TO KINGDOM OF COCHIN:[/b]

[quote]Greetings,

We at NovCorp are interested in setting up a meeting with your experts in regards to information technology, especially cyber and network security. This is in the interests of enhancing the Republic of Noveria's cyber security, and to set the basis for possible future cooperation between Noveria and Cochin in related matters. If you wish to meet with us, we can hold a meeting in the City of Hanshan (OOC: Kamloops), or if you wish, we can meet in the Kingdom of Cochin in a place of your choosing. Please let us know if interested.

Regards,
Julius Stockton,
CEO of NovCorp[/quote]

OOC: phew, this took a while to type out on my phone, lol :P

Link to comment
Share on other sites

Maj. Gen. Visakh Nair, the head of National Reconnaissance Agency would travel to City of Hanshan as per orders from the King of Cochin relayed through Gen. Mohammad Faraz, Commander of Royal Cochin Police Forces. As the head of the principal counter intelligence agency in the Kingdom, cyber security and almost all forms of Fifth Generational Warfare comes under his purview. Major General Nair would be the principal point of contact for dealings with NovCorp. On arrival at City of Hanshan he would contact NovCorp to inform them about his arrival. If things work out well things would be arranged so that information about his arrival and his status as liaison would be made known to NovCorp only an hour before his flight hands at City of Hanshan to ensure security and secrecy for the meeting. He would however be travelling with his diplomatic passport.

Link to comment
Share on other sites

Major General Nair's arrival and status was, indeed, known to NovCorp some time before his scheduled arrival, and NovCorp officials undertook preparations and precautions, down to the exact detail. The Director of the Interior contacted the Airline Security Administration (ASA) to inform the Hanshan International Airport to set aside a specific area to receive the Cochin aircraft, and the oncoming Cochin aircraft was duly contacted and notified of such. When Maj. Gen. Nair arrived, he would be greeted by a small team of NovCorp officials and escorted to a NovCorp-chartered SUV (they told him that a limousine would've been too obvious) and driven to the NovCorp Headquarters building, a magificent yet imposing building located in Hanshan's city center. Due to NovCorp's monopoly on the media, there were no news reporters or journalists that would expose the purpose of Nair's visit.

Upon arrival, the Cochin head of the National Reconnaissance Agency would be escorted into the building and taken to the Conference Room. Inside, CEO Julius Stockton was sitting at one of the chair, dressed up in a dark business suit, standing up with a smile. A small team of engineers and experts from various NovCorp departments and government directorates were seated around the conference table as well. They had notepads and pens at the ready as well as laptops.

"Welcome to the Republic of Noveria, and to NovCorp Headquarters. A pleasure to meet with you." Stockton greeted with a smile as he held out a hand for the Cochin head to shake. "Before we get down to business, do you want me to get you anything to drink?" He inquired as he gestured at the chairs where Nair could take a seat. The others gave their formal greetings.

Link to comment
Share on other sites

"Just a glass of water would do, Mr. Stockton. These long flights do dehydrate one out," Major General Nair replied. He was glad that the NovCorp were professional enough to determine the details of his arrival and conduct his escort in a thoroughly subtle and professional manner. So at least they were well versed in the fundamentals of Clandestine Operations.

"Mr. Stockton, the Kingdom of Cochin is honored being asked to help you out in the realm of cyber security. Over the years we have noticed the ease and destructiveness with which Fifth Generational Warfare has been conducted. As a nation which has had its measure of enemies during its long history, we are very concerned about securing our defenses in all realms and Cyber Security is as vital if not a more vital realm of defense. So how may we assist you?"

Link to comment
Share on other sites

Stockton gestured for an aide to get the Major General a glass of water. As the aide set the glass down on the table in front of Nair, Stockton began.

"Indeed, the ease and destructiveness of Fifth Generational Warfare has taken frightening proportions to these unprepared for it, and trust me, Noveria does not want to be unprepared." Stockton chuckled a bit as he glanced at the team of engineers and experts who were either taking notes, listening to the exchange intently, or typing away on their laptops.

"You can assist us to implement (or at least determine which) cyber security programs, measures, and engineering would enable Noveria to resist and overcome wide-ranging cyberattack tactics and other advanced methods. Can you help us to determine what programs, methods, and technology that would be needed, indeed required, to maintain a secure flow of information around the country, and to do so in a way that it would be difficult for potential foes to intrude into Noveria from the outside? However, we are aware that this involves data management, processing, and data networks, but you have more knowledge and expertise in the field."

The Noverian experts had their pens on their notepads, ready to jot down, their fingers on their laptops, ready to tap away.

Link to comment
Share on other sites

"Surely you must understand that the precise means and methods, I am not permitted to share with NovCorp without authorization, however basic guidelines for our 5GW defense rests on securing absolute control over all communication spectrum. In any modern society the majority of telecommunications is carried out through wired media. Internet, telephone lines all require a handful of Tier I ISP Gateways to go outside the nation. These gateways are usually through transcontinental submarine optical fiber communication cables. You may have hundreds and thousands of Tier II and Tier III Internet Service Providers but ultimately only a few Tier I carriers provide international connectivity. Ensuring total control over these gateways would ensure that you can regulate communications on a massive manner. From these gateway points you can route a parallel stream of traffic to your Cyber Security database.

To maintain national communication security ensure that any and all Communication service providers be it local based or international conglomerates have dedicated mechanisms to route a parallel of every traffic to your own database. Finally a thorough monitoring of all unlicensed radio frequency bands, majority of which are already easy to track.

The biggest problem is to find the needle in the hay stack. The rare VHF or EHF transmission aka satellite communications that bypass the wired communication pathways. Through an efficient and time calibrated filtering mechanism these communications can be tracked and regulated. Then you only need to be aware of a rogue communication to know that an espionage activity is going on. Knowledge of the attack is as we say, half the battle won.

However the crux of any highly secure communication network is the analysis for any presence of threats. That is where the database I mentioned earlier plays its part. The database must have sufficient excesses of computing capability to process vast amounts of data at immensely fast rates so that the one in trillionth attack can be detected and prevented against.

So after tracking the communication channels, and computing the traffic for threats, it finally comes to creating defenses. That is where the need for effective cyber and network security professionals play their part. At the heart of all these billions of Rupees worth of equipment is a team of human professionals whose expertise is the ultimate defense against attacks on the nation.

So if you are interested in our model, we shall assist you to fortify your Cyber defenses on a consultative and contractual basis with sharing of technological expertise where required and imparting of specialized training when required. While a full access cannot be given for our own security purposes, if we are given the contract we shall also provide you with a real time tour at some of our facilities so that you would have an idea of what we are actually talking about." Major General Visakh Nair said.

Link to comment
Share on other sites

Stockton listened intently and carefully to Nair's detailed explanation, his mind soaking up all the information and storing it deep somewhere inside his brain. His team of experts and engineers were fervently taking notes.

"So, the basis of a successful cyber security system rests on total control of the three-tiered ISP gateways; the monitoring, tracking, and regulation of other means of communications such as radio frequency bands and satellite communications; the maintenance of a vast cyber security database; and a team of dedicated, professional cybersecurity personnel." Stockton summarized as he sipped his glass of water.

"I understand your security reasons," The CEO said as he interwined his hands together, "and of course, I would be interested in a cyber security system based on your model, and NovCorp is willing to sign a contract with you and to work together with you in this project."

Link to comment
Share on other sites

[quote name='JEDCJT' timestamp='1312657522' post='2773623']
Stockton listened intently and carefully to Nair's detailed explanation, his mind soaking up all the information and storing it deep somewhere inside his brain. His team of experts and engineers were fervently taking notes.

"So, the basis of a successful cyber security system rests on total control of the three-tiered ISP gateways; the monitoring, tracking, and regulation of other means of communications such as radio frequency bands and satellite communications; the maintenance of a vast cyber security database; and a team of dedicated, professional cybersecurity personnel." Stockton summarized as he sipped his glass of water.

"I understand your security reasons," The CEO said as he interwined his hands together, "and of course, I would be interested in a cyber security system based on your model, and NovCorp is willing to sign a contract with you and to work together with you in this project."
[/quote]

"Yes, Mr Stockton, you have summed it up perfectly. Like any other realm of defense Fifth Generational Warfare rests as much upon technology as it does on human expertise gained through experience. As is norm for any counter intelligence agency the biggest job as ever is analysis of risks and vulnerabilities. Our 5GW is as much a part of our conventional intelligence apparatus as the goals are the same, just the technologies are different.

Now as regards the establishment of such defense in your nation, what level of cooperation do you seek with us? In a purely consultative model we can give you exact design requirements for the Cyber Security framework which you would be building using your own resources. In a supplier-consultant model we can sell you the know how and the specialized equipments including the software and super computers and other hardware devices which you would be assembling and operating on your own. In a total vendor model we would build the cyber security apparatus for you and as each sector is being built would train your operatives in our own security environment so that they can take over from our monitoring personnel while each sector is being commissioned. In very sensitive areas of defense we claim the right to limit ourselves to supplier-consultant model.

Strategic Engineers Corps would be doing the construction and installation of premises under oversight from National Reconnaissance Agency. Most of the hardware peripherals would be from Tratum Infosystems and software from Tratum Infosystems and Varma Institute of Fundamental Research. If the source code of the programs are required additional costs would be incurred."

Link to comment
Share on other sites

[quote name='king of cochin' timestamp='1312701608' post='2774073']
"Yes, Mr Stockton, you have summed it up perfectly. Like any other realm of defense Fifth Generational Warfare rests as much upon technology as it does on human expertise gained through experience. As is norm for any counter intelligence agency the biggest job as ever is analysis of risks and vulnerabilities. Our 5GW is as much a part of our conventional intelligence apparatus as the goals are the same, just the technologies are different.

Now as regards the establishment of such defense in your nation, what level of cooperation do you seek with us? In a purely consultative model we can give you exact design requirements for the Cyber Security framework which you would be building using your own resources. In a supplier-consultant model we can sell you the know how and the specialized equipments including the software and super computers and other hardware devices which you would be assembling and operating on your own. In a total vendor model we would build the cyber security apparatus for you and as each sector is being built would train your operatives in our own security environment so that they can take over from our monitoring personnel while each sector is being commissioned. In very sensitive areas of defense we claim the right to limit ourselves to supplier-consultant model.

Strategic Engineers Corps would be doing the construction and installation of premises under oversight from National Reconnaissance Agency. Most of the hardware peripherals would be from Tratum Infosystems and software from Tratum Infosystems and Varma Institute of Fundamental Research. If the source code of the programs are required additional costs would be incurred."
[/quote]

Stockton thought about the offered options for a moment, receiving differing suggestions from his team of engineers and experts. Finally he spoke: "We choose the supplier-consultant model. I feel that such an option would be beneficial to us. NovCorp can shoulder the costs involved if needed be, and would be willing to purchase the software and hardware equipment." He said with a smile.

Link to comment
Share on other sites

  • 2 weeks later...

Maj. Gen. Visakh Nair would reply, "In that case we will sign agreement including a special Non Disclosure Agreement. The Kingdom of Cochin would undertake not to divulge any sensitive information learned during the contract with NovCorp and you would have to undertake not to share proprietary technologies and methods to a third party. As we sign this agreement a larger team of professionals would arrive from Cochin to assist you in the basic infrastructural planning. After a joint assessment of your requirements we shall prepare a detailed Purchase Order which we shall start supplying. Our consultants would be available at every step of the work to be availed of by your experts but the installation works would be for major part be done by your own people. Over the next few weeks we shall oversee subcontracts with the other major vendors involved in this project. We thank you for this deal and congratulate you on this wise step taken to fortify your cyber defenses."

Over the next few weeks lawyers from Quarter Master Command and Ministry of External Affairs would over see signing of the contract and the analysts would start coming in to do the assessment.

Link to comment
Share on other sites

Stockton replied in turn: "We can sign the Agreement, and I shall do so on behalf of NovCorp." He would duly sign the agreement when it was presented to him over the next few weeks under the oversight of the Cochin lawyers, and after the meeting (but not before shaking Maj. Gen. Nair's hand warmly and thanking him for his support and assistance), Stockton and his NovCorp would promptly get into business. Every branch of NovCorp's vast organizational network, most especially the Internet bureau, went to work in anticipation of the arrival of the Cochin professional analysts.

When the analysts duly arrived, a large team of NovCorp experts - especially Internet specialists, engineers, software designers, and the like - would work together with them, providing them detailed information regarding the system and its requirements they needed or requested for their assessment.

Link to comment
Share on other sites

The first of various teams of analysts to be sent by the Kingdom would be the IT Security Analysts from National Intelligence Agency. They would oversee a conglomeration of all Tier I, Tier II and Tier III Internet Service Providers in Noveria being made. All the primary gateways would be marked for tapping. This team is also tasked with mapping out all the communication services vendors including Telephone, Mobile Phone, Satellite Phone and Radio Stations in Noveria. They would instruct the NovCorp to instruct these providers to make suitable infrastructural and doctrinal changes so that all the traffic through their networks would be routed as parallel to the new COMINT Database.

Another joint team from the Strategic Command and National Reconnaissance Agency would assist the NovCorp in scouting out perfect locations for the COMINT databases. At least 3 Databanks would have to created geographically separated and doing parallel processing and storage of data. Ideally subterranean in location they should have adequate natural protection and physical protection. These data banks would naturally be of enormous size to be able to store thousands of databanks, several super computers and core team of analysts. Engineers from Strategic Engineers Corps would instruct the NovCorp on basic strength and security requirements for these facilities. The basic facilities should be built taking expansion needs for at least next 35 years in consideration.

Apart from the three separate databanks there should also be a Central Processing Center where the bulk of analysis of the data would be conducted.

Finally engineers from Strategic Engineers Corps would also instruct the NovCorp on the type and route of cabling to be done to ensure that the basic data collection and information dissemination network is secure.

While all this is happening a special team from NIA would also interact with the NovCorp to do a detailed Counter Intelligence Analysis of Noveria so that by the time basic infrastructure is completed particular holes in the security could be identified and fixed.

Link to comment
Share on other sites

NovCorp security experts would utilize their expertise and knowledge to conglomerate all Tier I, Tier II, and Tier III ISPs throughout the Internet in Noveria under the oversight of the Cochin experts. All marked primary gateways would be tapped as well. Given NovCorp's absolute control of the Internet within the borders of the Corporate Republic, through its control of the former DiNet corporation, it would be done with relatively little difficulty. The NovCorp experts followed the Cochin analysts' instructions and recommendations in implementing the appropriate changes. All media - ranging from telephone all the way to radio stations - stations were issued instructions to make suitable infrastructural and doctrinal changes so that the appropriate changes would take place.

As for locations for the COMINT databases and the Central Processing Center, the NovCorp experts would duly search out the right places to put them in, even suggesting at one time that one data bank be placed alongside the border between Columbina [British Columbia] and Nova Coimbra [Alberta]. Once the initial locations were determined, NovCorp would go to work in constructing the data banks to fully exploit the natural protection from the surrounding area. NovCorp strategic engineers would follow the Cochin engineers' instructions on constructing the data banks, as well mapping out the facilities' strength and security requirements. The same went for the Central Processing Center, where NovCorp engineers and other experts promptly went to work on constructing one as well implementing the recommended strength and security components.

As for cabling routes, NovCorp experts laid out the data cables according to instructions and specifications by the Cochin Strategic Engineers Corps, right down to the type of cabling to be installed in place. Ar around the same time, NovCorp counterintelligence experts worked with the NIA in conducting a detailed analysis of the Corporate Republic; they would be constantly kept informed of any updates from their associates in different fields.

The project was a vast one (with tens of thousands of NovCorp employees of all positions involved), would take years and years to even come near to complete, and consume untold amount of resources, effort, and funding, but with the invaluable cooperation and assistance from the Kingdom of Cochin, this would be done.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

×
×
  • Create New...