CYBER MARINES Taken from darknetdairies podcast episode 50 PROCEDURES * In uniform * Sitting infront of 4 screens * Take offense * Take years for recon (2014-2016 as an example) * Code must be reviewed and greenlit * Operations are tested * Operations are executed as fast as possible * Operations' intention is to extinguish communications GOALS * Reverse engineer the network: people, networks, accounts. * Take out the network and sustain control. JOBS 4-6 teams are formed from the following jobs: Operator ("hacker"): setting up infrastructure, execute objectives Signals analyst: understands the intracacies of the target network Intel analyst: understands the people network / information (addresses, faces, names, locations...) TARGETS Email is the pivot point - the key to access anything else. Access to any accounts is useful.