5 April 2002. Thanks to Anonymous, and Thomas Greene who writes:
You're welcome to publish this e-mail, and my addy: thomas.greene@theregister.co.ukI received the attached PowerPoint file from an anonymous source. It appears to be a Codex Data Systems marketing presentation touting something called TOAST (Tactical Overload Assured System Termination), which is a DDoS tool for governments. I'm not convinced that it's genuine, but I think it's worth a look. Perhaps readers can comment on it. If anyone knows something about this 'tool', I'd be pleased to hear from them.
If it's real, it's undeniably the most moronic thing Frank Jones has yet conceived. Imagine, encouraging governments to infect computers indiscriminately to target an opponent for a denial of service? What makes it seem plausible is that Jones has a history of re-packaging 31337 toys which are available free on the Web and selling them to governments at a high price. This would fit that pattern. On the other hand, there's something about the graphics that look decidedly un-Codex to me and to an acquaintance of mine. It could well be that this is a very clever parody. Of course, even then it's got solid entertainment value ;-)
Original PowerPoint file Zipped: http://cryptome.org/TOAST.zip (1.0MB)
Related Codex Data Systems files: http://cryptome.org/dirt-files.htm
[20 slides.]
Tactical Overload Assured System Termination
The Dawn of the Digital Age has changed the way we must think...
Technology has made civilization computer dependant in the year 2000
...on those who resist change
Several countries presently have cyberwar capabilities
do you?
We are no longer separated by vast oceans and great distance
We're connected by silicon, satellites and fiber optics
International boundaries aren't even a speedbump!
The Net
We have the capability to reach anyone worldwide in seconds
The enormous power of the Internet is also its greatest weakness...
National Infrastructures are vulnerable to cyber attack from anywhere in the world in seconds
Coordinated Cyberwar is potentially more potent than an atomic bomb
Government Agencies
Military & Defense Commands
Power & Communications Infrastrucutre
Water & Fuel Suplies
Banking & Stock Exchanges
Air/Rail/Ground Transportation
By harnessing the omnipotent power of the electron its possible to deny service to any number of critical computer based infrastructures in the world
T.O.A.S.T.TM was designed...
...to distribute an anonymous worldwide denial of service attack on any single or multiple set of computer targets
A unique software application creates a small stealth program which is uploaded via the Internet.
This program "infects" multiple computers worldwide and commands them to launch a coordinated attack on a computer target
There is no defense...
Each computer worldwide that carries the attack software launches a massive data attack on the target system...
The distributed data attack is so devastating, the target system cannot function and crashes.
Efforts to get the target system back online will fail
Because the attack cannot be filtered...
The attack could be coordinated using over 100,000 launching pads located worldwide...
Security personnel have no chance to stop or investigate them all...
Anything that man invents... man can defeat...
However...this type of data attack would NOT be traceable back to the source simply because there is no direct link...
...the attacks are not coming directly from you...
A skilled computer technician, a PC or laptop and T.O.A.S.T.TM software
You'll need to do do some "due diligence" on your target and acquire Internet addresses of their computers
That's all...
Of the global network, it's possible to launch the attack from anywhere in the world at any time... even from a
laptop...
Mobility adds to operation security and anonymity...
Depending on your operational requirements, multiple field
agents could launch a coordinated strike from the four
corners of the globe...
There is no heavy or restricted equipment to carry, only an ordinary laptop...
The applications are only limited by your imagination...
Military
Political
Economic
Covert Ops
T.O.A.S.T.TM the opposition
When you need to end the
game...
Stand alone machine with multi-strike capability
Site license is available
T.O.A.S.T.TM Minimum system requirements:
Windows 95/98/2000/NT operating system
Intel Pentium processor recommended
32 Meg Ram
Internet Connectivity - Dial-Up or LAN
Free upgrades for one year from date of initial purchase
D.I.R.T.TM
Data Interception by Remote Transmission
I-D.I.C.E.TM
Intrusion Detection, Identification
&Counterstrike Eradication
B.A.I.T.TM
Binary Audit Identification Transfer
Creates Trackable Electronic Documents
PC PhoneHomeTM
Theft Protection & Recovery Software
for Laptops & PCs
143 Main Street
Nanuet, New York 10954 USA
Tel: 845-627-0011
Fax: 845-627-0211
E-Mail: sales@codexdatasystems.com
Web Site: www.codexdatasystems.com
© 2000-2001, Codex Data Systems. All rights reserved