×

Application for assisting in conducting covert cyber operations

  • US 9,965,133 B1
  • Filed: 07/18/2012
  • Issued: 05/08/2018
  • Est. Priority Date: 07/22/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • activating a persona within a covert application, wherein the persona comprises a persistent digital identity that represents a user'"'"'s presence on the Internet, wherein the covert application comprises a persona builder module user interface that displays a plurality of selectable buttons, and wherein the activating the persona further comprises clicking on one of a displayed build persona button or a developed persona button of the plurality of selectable buttons;

    configuring one or more network environment attributes of the persona within the covert application;

    configuring one or more operating system environment attributes of the persona within the covert application; and

    configuring one or more application environment attributes of the persona within the covert application,wherein the activating the persona further comprises configuring a locale for the persona, wherein the locale is a geographic location where the persona purports to be located, which is different from an actual geographic location of the persona where network traffic originates,wherein the configuring the one or more network environment attributes of the persona is based on the locale that is configured for the persona, andwherein the configuring the one or more network environment attributes comprises altering identifiers that comprise location information within one or more network packets transmitted by the covert application at a direction of the persona;

    generating a communication within the covert application;

    rerouting the network traffic of the communication to the purported geographic location that is different from the actual geographic location of the persona where the network traffic originates;

    identifying an attempt to transmit the communication over a network connection;

    scanning the communication and performing a unified check of the communication based on one or more rules;

    transmitting the communication over the network connection, when the communication complies with the one or more rules; and

    displaying a warning message, when the communication does not comply with the one or more rules,wherein the one or more rules include a time rule, an email address rule, a cultural rule, or a persona rule.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×