NRI Republic Cyber Corps: Difference between revisions
mNo edit summary |
|||
(3 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
|name = [[Novus Romanum Imperium]] Republic Cyber Corps | |name = [[Novus Romanum Imperium]] Republic Cyber Corps | ||
|native_name = | |native_name = | ||
|image = | |image = NRI_Republic_Cyber_Corps_Seal.png | ||
|caption = Seal of the Cyber Corps | |caption = Seal of the Cyber Corps | ||
|image2 = | |image2 = | ||
Line 60: | Line 60: | ||
==Red Team== | ==Red Team== | ||
Red Team Command is the smaller of the two {{wpl|cyberwarfare}} commands. The Red Teams operate as {{wpl|Black hat (computer security)|black hat}} hackers against nations and groups that launch {{wpl|Cyberattack|cyber attacks}} against the NRI. Because of the second strike doctrine of the NRI, the Red Team Command has to wait for a group to attack cyber infrastructure that falls under the Republic Cyber Corps' jurisdiction before a counter cyber attack can be launched. | |||
The majority of the {{wpl|cyberwarfare}} seen by Red Team Command is against non-state actors. Due to the deterrence of mutual retaliation against nation-states, most do not launch cyber {{wpl|Cyberattack|cyber attacks}} on the NRI. This is a principal similar to {{wpl|mutual assured destruction}} in nuclear war theory. | |||
===Privateers=== | ===Privateers=== | ||
In 2013, the Senate passed legislation giving the government the ability to issue {{wpl|Letter of marque|letters of marque}} in the time of war to {{wpl|Black hat (computer security)|black hat}} hackers to launch {{wpl|Cyberattack|cyber attacks}} against the enemy nation. The {{wpl|Black hat (computer security)|black hat}} hackers are able to keep anything they take during their infiltration of the enemy systems. There are strict conditions on the {{wpl|Letter of marque|letters of marque}} to prevent the abuse of the latitude given to the {{wpl|Black hat (computer security)|black hat}} hackers. | In 2013, the Senate passed legislation giving the government the ability to issue {{wpl|Letter of marque|letters of marque}} in the time of war to {{wpl|Black hat (computer security)|black hat}} hackers to launch {{wpl|Cyberattack|cyber attacks}} against the enemy nation. This law was passed to supplement the Roman militarys' {{wpl|red team}} due to the small size of it. The {{wpl|Black hat (computer security)|black hat}} hackers are able to keep anything they take during their infiltration of the enemy systems. There are strict conditions on the {{wpl|Letter of marque|letters of marque}} to prevent the abuse of the latitude given to the {{wpl|Black hat (computer security)|black hat}} hackers. | ||
==Purple Team== | ==Purple Team== | ||
Purple Team Command operates both as a purple team, communicating with both Red and Blue Team Commands. In times of need, personnel in Purple Team Command can switch their hats, and directly support either the Blue or Red Team Commands. This Command also works as an evaluating entity for the other two commands, helping to maximize cyber capabilities through continuous feedback and knowledge transfer. | |||
Additionally, the Republic Cyber Corps' administrative staff falls under this command. | |||
===Bug Bounties=== | ===Bug Bounties=== | ||
Since its inception in 2019, the Purple Team Command. and Republic Cyber Corps at large, has offered a {{wpl|bug bounty program}} to {{wpl|white hat}} hackers. This program, called Operation Continuing Security, is a volunteer program where cybersecurity professional can, in their free time, attempt to find exploits in Roman cyber infrastructure. In return for finding these exploits, the Republic Cyber Corps provides a significant amount of money. This has been likened to issuing {{wpl|Letter of marque|letters of marque}} to attack Roman systems. The difference, however, is that the {{wpl|white hat}} hackers cannot exfiltrate any information during their exploitation, and if they do, will incur serious jail time. | |||
=Uniforms= | =Uniforms= |
Latest revision as of 14:41, 27 April 2022
This article is incomplete because it is pending further input from participants, or it is a work-in-progress by one author. Please comment on this article's talk page to share your input, comments and questions. Note: To contribute to this article, you may need to seek help from the author(s) of this page. |
Novus Romanum Imperium Republic Cyber Corps | |
---|---|
Founded | 2019 |
Current form | The Republic Cyber Corps |
Service branches | Red Team Command Blue Team Command Purple Team Command |
Headquarters | Cyber Wing, Imperium Joint Defense Headquarters |
Leadership | |
Commander In Chief | Gallus Paesentius Belletor |
Minister of the Cyber Corps | Decius Calpurnius Tibullus |
Cyber Chief of Staff | Augustus Aebutius Egnatius |
Reaching military age annually | (2022) |
Related articles | |
Ranks | Ranks of the NRI Armed Forces |
The NRI Republic Cyber Corps was originally created to protect the New Roman Imperium from cyber threats. The branch is largely based on defensive cyber capability, however, it does have effective cyber attack capabilities as well. This branch largely falls under the Second Strike doctrine of the Roman military.
About the Republic Cyber Corps
History
Major Commands
Blue Team
Blue Team Command is the larger of the two cyberwarfare commands because the Republic Cyber Corps is largely defensive in nature. Operatives in the Blue Team command respond to cyber attacks on critical Roman infrastructure and systems. A subcommand in Blue Team Command is responsible for hardening the cyber infrastructure against attacks.
Red Team
Red Team Command is the smaller of the two cyberwarfare commands. The Red Teams operate as black hat hackers against nations and groups that launch cyber attacks against the NRI. Because of the second strike doctrine of the NRI, the Red Team Command has to wait for a group to attack cyber infrastructure that falls under the Republic Cyber Corps' jurisdiction before a counter cyber attack can be launched.
The majority of the cyberwarfare seen by Red Team Command is against non-state actors. Due to the deterrence of mutual retaliation against nation-states, most do not launch cyber cyber attacks on the NRI. This is a principal similar to mutual assured destruction in nuclear war theory.
Privateers
In 2013, the Senate passed legislation giving the government the ability to issue letters of marque in the time of war to black hat hackers to launch cyber attacks against the enemy nation. This law was passed to supplement the Roman militarys' red team due to the small size of it. The black hat hackers are able to keep anything they take during their infiltration of the enemy systems. There are strict conditions on the letters of marque to prevent the abuse of the latitude given to the black hat hackers.
Purple Team
Purple Team Command operates both as a purple team, communicating with both Red and Blue Team Commands. In times of need, personnel in Purple Team Command can switch their hats, and directly support either the Blue or Red Team Commands. This Command also works as an evaluating entity for the other two commands, helping to maximize cyber capabilities through continuous feedback and knowledge transfer.
Additionally, the Republic Cyber Corps' administrative staff falls under this command.
Bug Bounties
Since its inception in 2019, the Purple Team Command. and Republic Cyber Corps at large, has offered a bug bounty program to white hat hackers. This program, called Operation Continuing Security, is a volunteer program where cybersecurity professional can, in their free time, attempt to find exploits in Roman cyber infrastructure. In return for finding these exploits, the Republic Cyber Corps provides a significant amount of money. This has been likened to issuing letters of marque to attack Roman systems. The difference, however, is that the white hat hackers cannot exfiltrate any information during their exploitation, and if they do, will incur serious jail time.