Lets Pretend

September 25th, 2011 in Interactive Telecommunications by 0 Comments

Assignment: Design a scheme to interfere with mobile internet.
Position: Attacker of free mobile communications

Dear Great Nation of (–Enter country/org of choice–),

We live in troubled times. Gone are the days when we could easily control the masses with a simple order. Gone are the days where people feared and respected us. Gone are the days people depended on us. Why are these days gone, you ask? Some blame the youth, while others blame themselves. The answer, my friends, is that we are falling back in technology.

It seems today’s opposition have a good sense of technology. Who could blame them? Give them something that is free and they will hold it close and dear to their hearts. They trust their technology, and I propose we should exploit their trust.

Some of my competitors today said we should attack the OSI model. I agree with them, but to an extent. Attacking the Physical Layer is not the way to go. Attacking this layer will just stoke the oppositions fire, plus its too blunt. We are men of elegance & complexity, and as so we must attack with elegance and complexity.

My company and I will conduct a technical and psychological attack on mobile technology and its users. The technical attack will be spread across three layers of the OSI Model: Application, Transport, and Network.

In the Application Layer, we modify the browser to visually hide any tampering we might do with their data. The opposition typed a https address, we make the application made a http request instead, and visually hide that by making sure https is shown instead.

The psychological attack is also in the Application Layer. By modifying their view to look as what they requested, the opposition will have a false sense of confidence that they are winning and their data not being track. They will begin to lower their guard, which will lead them to be more bold and provide evidence of all their wrongdoing right in front of our noses.

In the Transport Layer, we sniff their data. Now that we’ve switched from https to http, we can easily capture and tamper with the data packets. The opposition will never know because the application layer shows that they are still on what they believed they typed into the address bar.

In the Network Layer, we dynamically switch all https requests with http. So, for example, the opposition goes to check their email, we send them to a non-secure version of their email. This will allow the Transport layer to sniff every single packet going to and from.

Using this technique, not only will your organization be able to know all opposition knowledge, but also have the knowledge that they have no clue they are under constant surveillance.

A toast, my friends, to a future where we control the opposition.

Author: ezraezra

I see you looking...

Leave a Reply