5 April 2002. Thanks to Anonymous, and Thomas Greene who writes:

You're welcome to publish this e-mail, and my addy: thomas.greene@theregister.co.uk

I received the attached PowerPoint file from an anonymous source.  It appears to be a Codex Data Systems marketing presentation touting something called TOAST (Tactical Overload Assured System Termination), which is a DDoS tool for governments.  I'm not convinced that it's genuine, but I think it's worth a look.  Perhaps readers can comment on it.  If anyone knows something about this 'tool', I'd be pleased to hear from them. 

If it's real, it's undeniably the most moronic thing Frank Jones has yet conceived.  Imagine, encouraging governments to infect computers indiscriminately to target an opponent for a denial of service?  What makes it seem plausible is that Jones has a history of re-packaging 31337 toys which are available free on the Web and selling them to governments at a high price.  This would fit that pattern. On the other hand, there's something about the graphics that look decidedly un-Codex to me and to an acquaintance of mine.  It could well be that this is a very clever parody. Of course, even then it's got solid entertainment value ;-)

Original PowerPoint file Zipped: http://cryptome.org/TOAST.zip (1.0MB)

Related Codex Data Systems files: http://cryptome.org/dirt-files.htm


[20 slides.]

T.O.A.S.T.TM

Tactical Overload Assured System Termination

Codex Data Systems


A new age...

The Dawn of the Digital Age has changed the way we must think...

Technology has made civilization computer dependant in the year 2000


Time is running out...

...on those who resist change

Several countries presently have cyberwar capabilities

do you?


It's a small world

We are no longer separated by vast oceans and great distance

We're connected by silicon, satellites and fiber optics

International boundaries aren't even a speedbump!


What links us?

The Net

We have the capability to reach anyone worldwide in seconds

The enormous power of the Internet is also its greatest weakness...


Weakness?

National Infrastructures are vulnerable to cyber attack from anywhere in the world in seconds

Coordinated Cyberwar is potentially more potent than an atomic bomb


We're all linked...

Government Agencies

Military & Defense Commands

Power & Communications Infrastrucutre

Water & Fuel Suplies

Banking & Stock Exchanges

Air/Rail/Ground Transportation


Exploiting the
link...

By harnessing the omnipotent power of the electron its possible to deny service to any number of critical computer based infrastructures in the world

T.O.A.S.T.TM was designed...

...to distribute an anonymous worldwide denial of service attack on any single or multiple set of computer targets


How is it done?

A unique software application creates a small stealth program which is uploaded via the Internet.

This program "infects" multiple computers worldwide and commands them to launch a coordinated attack on a computer target

There is no defense...


What happens next?

Each computer worldwide that carries the attack software launches a massive data attack on the target system...

The distributed data attack is so devastating, the target system cannot function and crashes.

Efforts to get the target system back online will fail


Why will they fail?

Because the attack cannot be filtered...

The attack could be coordinated using over 100,000 launching pads located worldwide...

Security personnel have no chance to stop or investigate them all...


Is it traceable?

Anything that man invents... man can defeat...

However...
this type of data attack would NOT be traceable back to the source simply because there is no direct link...

...the attacks are not coming directly from you...


What do I need?

A skilled computer technician, a PC or laptop and T.O.A.S.T.TM software

You'll need to do do some "due diligence" on your target and acquire Internet addresses of their computers

That's all...


Taking advantage

Of the global network, it's possible to launch the attack from anywhere in the world at any time... even from a
laptop...

Mobility adds to operation security and anonymity...


One is enough?

Depending on your operational requirements, multiple field
agents could launch a coordinated strike from the four
corners of the globe...

There is no heavy or restricted equipment to carry, only an ordinary laptop...


Multiple Applications

The applications are only limited by your imagination...

Military

Political

Economic

Covert Ops

T.O.A.S.T.TM the opposition


T.O.A.S.T.TM

When you need to end the
game...


T.O.A.S.T.TM availability

Stand alone machine with multi-strike capability
Site license is available

T.O.A.S.T.TM Minimum system requirements:
Windows 95/98/2000/NT operating system
Intel Pentium processor recommended
32 Meg Ram
Internet Connectivity - Dial-Up or LAN

Free upgrades
for one year from date of initial purchase


Other CDS Software Products

D.I.R.T.TM
Data Interception by Remote Transmission

I-D.I.C.E.TM

Intrusion Detection, Identification
&Counterstrike Eradication

B.A.I.T.TM

Binary Audit Identification Transfer
Creates Trackable Electronic Documents

PC PhoneHomeTM

Theft Protection & Recovery Software
for Laptops & PCs


Codex Data Systems

143 Main Street
Nanuet, New York 10954 USA
Tel: 845-627-0011
Fax: 845-627-0211
E-Mail: sales@codexdatasystems.com
Web Site: www.codexdatasystems.com

© 2000-2001, Codex Data Systems. All rights reserved