User:Bigmoney/Sandbox13

Jump to navigation Jump to search

Combined Cyber Information Warfare Operational Group (Union State)

Combined Cyber Information Warfare Operational Group
Cepan Olochtli Ciberiximachocayaoyotl Tequitiliztli (Nahuatl)
Korea Computer Center.svg
Active9 March 2002; 22 years ago (2002-03-09)
Countries Pulacan
 Zacapican
AllegianceUnion State
TypeJoint military agency
RoleCyberwarfare, information warfare
Sizeest. 3,800
Garrison/HQAmatlan, Pulacan
XCITY, Zacapican
Nickname(s)Warriors of the Obsidian Mirror

The Combined Cyber Information Warfare Operational Group (Nahuatl: Cepan Olochtli Ciberiximachocayaoyotl Tequitiliztli, COCT) is a cyberwarfare and signals intelligence agency in Zacapican and Pulacan. Tasked during its inception with connecting the various cybersecurity agencies in the two nations, the group's mission has since expanded to facilitating various groups of both defensive and offensive network warfare specialists under a single umbrella.

The COCT is considered to be a core component of the Zacapine-Pulatec cooperation umbrella known as the Union State (Cetliliztli Tlatoloyan). The group's unifying presence has been cited as a major reason for the kickstarting of both Zacapine and Pulatec network security modernization in the 2000s and 2010s.

History

At the dawn of the Internet age, cybersecurity in both Pulacan and Zacapican was often underfunded and poorly-researched. Governments were slow to react to increasingly large threats as viruses and hacking became widespread in the 1990s. Though one of the first documented viruses on the Nahuatl Internet wreaked havoc in 1989, it was not until 1994 that the Pulatec United Legislative Assembly gave clear delineations to government agencies regarding powers of enforcement with cybercrime laws. In Zacapican, X. In both countries, government cybersecurity resources were simply spread too thin, and many private individuals and firms were left to fill the gaps.

During Pulacan's 1999 snap elections, a series of cybercrimes targeting the finances of then-candidate Moctezuma Tshireletso and the Nguzo Party highlighted the need for improved cyberdefense at the government level At this time, Zacapican had been exploring cybersecurity initiatives through Y. After Nguzo formed a coalition government with the technocratic United in Humanity party, the improvement of Pulacan's government cybersecurity infrastructure was made a priority. As Internet infrastructure is a government-provided utility in Pulacan, Tshireletso established that malware and other forms of cyberattack were to be treated as damaging exploits on government infrastructure. In order to supplement the increased resources towards cyberdefense, Tshireletso proposed the creation of a joint network security agency to the government of Zacapican in May of 2001. After some negotiations, the Combined Cyber Information Warfare Operational Group was formed on March 9th, 2002.

Initially, COCT was intended as a purely defensive cybersecurity agency. Relevant military and civil agencies from both nations were to share known malware and threat data, standardize security infrastructure, and to ensure the continued operation of networked state infrastructure like nuclear power stations and emergency dispatch centers. As the landscape evolved surrounding cybersecurity and acts of cyberwarfare became increasingly prevalent in the late 2000s and early 2010s, however, concerns began to grow about Zacapican and Pulacan maintaining military parity with other nations that were investing in exploring offensive cybernetic capabilities. The potential for a numerically small group of hackers to pose an asymmetrical threat to a state's vital infrastructure, both civilian and military, became increasingly apparent during this time. Though exact information is not publicly available, serious efforts to form offensive network groups under the COCT banner likely began around the year 2013. These groups, known as X officially, were tasked with the creation of worms, Illene horse programs and other forms of malware. These programs were tailor-made to target a state's major economic and governmental institutions, as well as infrastructure pieces like power stations, natural gas pipelines and military installations. It is believed that three of these groups were initially recruited, though around six or seven are believed to exist today.

The first instance of offensive cyberwarfare conducted by a COCT operative was the Paulworm exploit of 2014 in Belfras.

Function

The COCT works partly to

Structure