Application for assisting in conducting covert cyber operations
First Claim
Patent Images
1. A method, comprising:
- activating a persona within a covert application, wherein the persona comprises a persistent digital identity that represents a user'"'"'s presence on the Internet, wherein the covert application comprises a persona builder module user interface that displays a plurality of selectable buttons, and wherein the activating the persona further comprises clicking on one of a displayed build persona button or a developed persona button of the plurality of selectable buttons;
configuring one or more network environment attributes of the persona within the covert application;
configuring one or more operating system environment attributes of the persona within the covert application; and
configuring one or more application environment attributes of the persona within the covert application,wherein the activating the persona further comprises configuring a locale for the persona, wherein the locale is a geographic location where the persona purports to be located, which is different from an actual geographic location of the persona where network traffic originates,wherein the configuring the one or more network environment attributes of the persona is based on the locale that is configured for the persona, andwherein the configuring the one or more network environment attributes comprises altering identifiers that comprise location information within one or more network packets transmitted by the covert application at a direction of the persona;
generating a communication within the covert application;
rerouting the network traffic of the communication to the purported geographic location that is different from the actual geographic location of the persona where the network traffic originates;
identifying an attempt to transmit the communication over a network connection;
scanning the communication and performing a unified check of the communication based on one or more rules;
transmitting the communication over the network connection, when the communication complies with the one or more rules; and
displaying a warning message, when the communication does not comply with the one or more rules,wherein the one or more rules include a time rule, an email address rule, a cultural rule, or a persona rule.
2 Assignments
0 Petitions
Accused Products
Abstract
A covert application, including one or more modules can be provided to assist individuals in conducting covert cyber operations. Furthermore, the covert application can operate in a secure operating environment, which provides a reliable and protected computing environment from which a user can conduct cover cyber operations. The covert application can allow a user to create and utilize one or more personas. Personas created by the covert application can appear to originate from any part of the world, and personas can allow a user of the covert application to interact through various Internet services, such as email, instant messaging, online forums, and website browsing.
-
Citations
26 Claims
-
1. A method, comprising:
-
activating a persona within a covert application, wherein the persona comprises a persistent digital identity that represents a user'"'"'s presence on the Internet, wherein the covert application comprises a persona builder module user interface that displays a plurality of selectable buttons, and wherein the activating the persona further comprises clicking on one of a displayed build persona button or a developed persona button of the plurality of selectable buttons; configuring one or more network environment attributes of the persona within the covert application; configuring one or more operating system environment attributes of the persona within the covert application; and configuring one or more application environment attributes of the persona within the covert application, wherein the activating the persona further comprises configuring a locale for the persona, wherein the locale is a geographic location where the persona purports to be located, which is different from an actual geographic location of the persona where network traffic originates, wherein the configuring the one or more network environment attributes of the persona is based on the locale that is configured for the persona, and wherein the configuring the one or more network environment attributes comprises altering identifiers that comprise location information within one or more network packets transmitted by the covert application at a direction of the persona; generating a communication within the covert application; rerouting the network traffic of the communication to the purported geographic location that is different from the actual geographic location of the persona where the network traffic originates; identifying an attempt to transmit the communication over a network connection; scanning the communication and performing a unified check of the communication based on one or more rules; transmitting the communication over the network connection, when the communication complies with the one or more rules; and displaying a warning message, when the communication does not comply with the one or more rules, wherein the one or more rules include a time rule, an email address rule, a cultural rule, or a persona rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus, comprising:
-
a memory configured to store one or more modules, wherein the persona comprises a persistent digital identity that represents a user'"'"'s presence on the Internet; a processor configured to execute the one or more modules stored on the memory, wherein the processor is further configured, when executing the one or more modules stored on the memory, to, activate a persona within a covert application, wherein the persona comprises a persistent digital identity that represents a user'"'"'s presence on the Internet, wherein the covert application comprises a persona builder module user interface that displays a plurality of selectable buttons, and wherein the activating the persona further comprises clicking on one of a displayed build persona button or a developed persona button of the plurality of selectable buttons; configure one or more network environment attributes of the persona within the covert application; configure one or more operating system environment attributes of the persona within the covert application; configure one or more application environment attributes of the persona within the covert application; generate a communication within the covert application, wherein the activating the persona further comprises configuring a locale for the persona, wherein the locale is a geographic location where the persona purports to be located, which is different from an actual geographic location of the persona where network traffic originates, wherein the configuring the one or more network environment attributes of the persona is based on the locale that is configured for the persona, and wherein the configuring the one or more network environment attributes comprises altering identifiers that comprise location information within one or more network packets transmitted by the covert application at a direction of the persona; reroute the network traffic of the communication to the purported geographic location that is different from the actual geographic location of the persona where the network traffic originates; identify an attempt to transmit the communication over a network connection; scan the communication and performing a unified check of the communication based on one or more rules; transmit the communication over the network connection, when the communication complies with the one or more rules; and display a warning message, when the communication does not comply with the one or more rules, wherein the one or more rules include a time rule, an email address rule, a cultural rule, or a persona rule. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer program, embodied on a non-transitory computer-readable medium, configured to control a processor to implement a method, the method comprising:
-
activating a persona within a covert application, wherein the persona comprises a persistent digital identity that represents a user'"'"'s presence on the Internet, wherein the covert application comprises a persona builder module user interface that displays a plurality of selectable buttons, and wherein the activating the persona further comprises clicking on one of a displayed build persona button or a developed persona button of the plurality of selectable buttons; configuring one or more network environment attributes of the persona within the covert application; configuring one or more operating system environment attributes of the persona within the covert application; and configuring one or more application environment attributes of the persona within the covert application, wherein the activating the persona further comprises configuring a locale for the persona, wherein the locale is a geographic location where the persona purports to be located, which is different from an actual geographic location of the persona where network traffic originates, wherein the configuring the one or more network environment attributes of the persona is based on the locale that is configured for the persona, and wherein the configuring the one or more network environment attributes comprises altering identifiers that comprise location information within one or more network packets transmitted by the covert application at a direction of the persona; generating a communication within the covert application; rerouting the network traffic of the communication to the purported geographic location that is different from the actual geographic location of the persona where the network traffic originates; identifying an attempt to transmit the communication over a network connection; scanning the communication and performing a unified check of the communication based on one or more rules; transmitting the communication over the network connection, when the communication complies with the one or more rules; and displaying a warning message, when the communication does not comply with the one or more rules, wherein the one or more rules include a time rule, an email address rule, a cultural rule, or a persona rule.
-
Specification