NRI Republic Cyber Corps: Difference between revisions

Jump to navigation Jump to search
mNo edit summary
 
Line 4: Line 4:
|name              = [[Novus Romanum Imperium]] Republic Cyber Corps
|name              = [[Novus Romanum Imperium]] Republic Cyber Corps
|native_name        =  
|native_name        =  
|image              =  
|image              = NRI_Republic_Cyber_Corps_Seal.png
|caption            = Seal of the Cyber Corps
|caption            = Seal of the Cyber Corps
|image2            =  
|image2            =  

Latest revision as of 14:41, 27 April 2022

Novus Romanum Imperium Republic Cyber Corps
NRI Republic Cyber Corps Seal.png
Seal of the Cyber Corps
Founded2019
Current formThe Republic Cyber Corps
Service branchesRed Team Command
Blue Team Command
Purple Team Command
HeadquartersCyber Wing, Imperium Joint Defense Headquarters
Leadership
Commander In ChiefGallus Paesentius Belletor
Minister of the Cyber CorpsDecius Calpurnius Tibullus
Cyber Chief of StaffAugustus Aebutius Egnatius
Reaching military
age annually
(2022)
Related articles
RanksRanks of the NRI Armed Forces

The NRI Republic Cyber Corps was originally created to protect the New Roman Imperium from cyber threats. The branch is largely based on defensive cyber capability, however, it does have effective cyber attack capabilities as well. This branch largely falls under the Second Strike doctrine of the Roman military.

About the Republic Cyber Corps

History

Major Commands

Blue Team

Blue Team Command is the larger of the two cyberwarfare commands because the Republic Cyber Corps is largely defensive in nature. Operatives in the Blue Team command respond to cyber attacks on critical Roman infrastructure and systems. A subcommand in Blue Team Command is responsible for hardening the cyber infrastructure against attacks.

Red Team

Red Team Command is the smaller of the two cyberwarfare commands. The Red Teams operate as black hat hackers against nations and groups that launch cyber attacks against the NRI. Because of the second strike doctrine of the NRI, the Red Team Command has to wait for a group to attack cyber infrastructure that falls under the Republic Cyber Corps' jurisdiction before a counter cyber attack can be launched.

The majority of the cyberwarfare seen by Red Team Command is against non-state actors. Due to the deterrence of mutual retaliation against nation-states, most do not launch cyber cyber attacks on the NRI. This is a principal similar to mutual assured destruction in nuclear war theory.

Privateers

In 2013, the Senate passed legislation giving the government the ability to issue letters of marque in the time of war to black hat hackers to launch cyber attacks against the enemy nation. This law was passed to supplement the Roman militarys' red team due to the small size of it. The black hat hackers are able to keep anything they take during their infiltration of the enemy systems. There are strict conditions on the letters of marque to prevent the abuse of the latitude given to the black hat hackers.

Purple Team

Purple Team Command operates both as a purple team, communicating with both Red and Blue Team Commands. In times of need, personnel in Purple Team Command can switch their hats, and directly support either the Blue or Red Team Commands. This Command also works as an evaluating entity for the other two commands, helping to maximize cyber capabilities through continuous feedback and knowledge transfer.

Additionally, the Republic Cyber Corps' administrative staff falls under this command.

Bug Bounties

Since its inception in 2019, the Purple Team Command. and Republic Cyber Corps at large, has offered a bug bounty program to white hat hackers. This program, called Operation Continuing Security, is a volunteer program where cybersecurity professional can, in their free time, attempt to find exploits in Roman cyber infrastructure. In return for finding these exploits, the Republic Cyber Corps provides a significant amount of money. This has been likened to issuing letters of marque to attack Roman systems. The difference, however, is that the white hat hackers cannot exfiltrate any information during their exploitation, and if they do, will incur serious jail time.

Uniforms