Digital Eldest Son Pt. 2
Manufactured Splinternets & Creating Deniable Events
Manufactured Splinternets through Sabotage disguised as defects
OK, digital eldest son part two. I am not going to outside of a broad 50,000 feet view overview. I am not going to be repeating the concern of other people in this community of software engineers, tech professionals, and Infosec and cybersecurity professionals. Outside of the fact that I think we’re way beyond, like, I told you so, right?
Previously, we covered something about how we can use a Vietnam War era method from special operators to effectively sabotage the information warfare machine of our adversaries as well as preventing attempts of lone wolf or stochastic terrorism, by shipping and weaponizing flawed AI/LLM to our adversaries to undermine their efforts by spreading and conflating hallucinative misinformation with minimal casualties.
There are actually two more parts that I want to talk about that are darker, potentially darker. as I have in my notes and we will be talking about them once I park and get my stuff.
All right, so going into the second tactic that we’re not talking about first, I want to point out that this acquires a lot of network engineering, but particularly knowledge for proprietary technology, all right?
So the idea is we all know SONET or fiber optics, are self-healing. It’s the standard of any CISSP exam. This is the standard of any Network+ certification to understand how this works. But there are things that are not so resilient. Specifically, Layer 2. So we can attack and inject logic bombs into the firmware of Layer 2 optical multiplexers. But this acquires a specialized, very rare skill and there are a single digit handful of companies that possess this proprietary technology by bypassing the network layer Layer 3 we’re going to operate it on the Layer 1, the physical and the data link layer. And to create a customized splinternet that appears to be errors when it’s actually sabotage. to create an area of denial effect. Let me go through my notes so Ciena is the—Ciena, Nokia, formerly known as Alcatel-Lucent, Cisco, and Infinera and Fujitsu are the main creators of this and they create things like Digital Cross-connect Systems, which is a switch of SONET. And they are extremely resilient, as well as for obvious reasons Many of these areas are heavily locked down to prevent people from accessing the Dense Wavelength Division Multiplexing and it’s not something as simple as a network engineer running up to a switch or some sort of device to reboot it So you can harm or tamper with the framing ASIC and you can cause it to cause a device to drop packets periodically so in a set randomized time range of perhaps 48 hours to a week.
So this form of sabotage would be inserted into crisis zones along with charging other things like Reconfigurable Optical Add-Drop Multiplexers. Let me look through my notes And the reason why I proposed this method I am merely refining my previous transcript is that the alt-right voices are being amplified, not by Americans. We are literally having MAGA tears wiped away by foreign adversaries that wish us harm and they have no interest in actually embracing the divisive ideologies that radicalize the United States, which is the true Enemy from Within from they do not actually embrace it. They just want to destabilize us. Just imagine that some person that shits in a muddy ditch actually truly believes that they would love or embrace some sort of all-inclusive multiracial Nazism, which is the most comically dumb thing.
“Cyber Gun Kata”
OK, I just watched this video. Yeah, he doesn’t want to talk about it, fine. I just gave you several strategies of fighting foreign misinformation, but since I basically am retired from offensive operations within digital space, right? I told you a lot about myself and, you know, capabilities development to everyone, by the way. To former social media outlets where I used to have clout, but I decided, okay, I’m just [going to] fuck off of YouTube. LinkedIn, not so much. That’s why I’m pivoting to the Substack. You know, I don’t even have a real account on Twitter, really.
And so I already proposed several solutions. Manufacturing [a] Splinternet through multiple splinternets around the world, through sabotage of Layer 1 and 2 components that interact with SONET [Synchronous Optical Networking]. That, regardless of whether or not SONET actually can heal, it provides unpredictable levels of disruption to make their enemy’s ability to communicate to us with misinformation to be much less reliable. Either to be increased... [to] increase unpredictable amounts of latency to cut them off, or, you know, basically in another method of applying Carlos Slim’s and Ricardo’s method of controlling the pipes, all right?
However, technologies like Starlink—as they become more prevalent—well, this will not be as powerful. However, as you know, things like Starlink still require modems (Ground Stations), all right? Modem is just short for ‘modulator and demodulator’ to help decode signals that are basically received over the wire or across the air, right? Wireless technology is eventually connected to some form of wireless analog [which] is eventually connected to some form of digital switch, the physical cable of some sort, either copper or fiber optic, from a top-down complicated view.
So, another method, all right. I kind of, like, had this idea from... let me see. I kind of had this idea from Equilibrium. I explored this theory before. So in Equilibrium, Christian Bale is a Grammaton Cleric of the super-oppressed society [where] he slowly gets his personality back. And this thing, this ‘Kung Fu’ shit, which is physically impossible, is called Gun Kata. Which is physically impossible because Christian Bale would have died from the first person that popped out of cover behind a crate, basically.
But in informational warfare, Gun Kata is perfectly possible. Okay, Gun Kata can be performed by a ransom note. Gun Kata can be performed by adding misinformation. Like, you can send text messages and send phone calls entirely in memory using PowerShell, C#, [or] dynamically invoking native shellcode, dropping a VoIP dialer—VoIP dialer—onto their machine. Preconfiguring it with the XML file. There’s like 20 to 50 different VoIP installers. And then you can even dial up phone numbers.
I mean, the abstraction has gotten much wider or longer than taller than what it was like when you first had a dial pad VoIP client, right? Back in like the early 2000s. And back then, it really just rode on your 56K modem and just shared so you can get a free phone call for a few minutes. But these days, like, you can just telegraph misinformation and continue to muddy the waters ‘Gun Kata’ style—as in being able to shoot or hit multiple opponents in cyberspace at once in a targeted attack with pre-computed phone numbers.
There’s even formulas where you can calculate Chinese phone numbers, North Korean phone numbers—probably not Korean, I mean, it’s kind of restrictive. But you can actually mathematically compute a Russian phone number to text us some crazy shit, go run this malware loader, you know, in Russian.
Example number calculator in-memory C#
function Get-Digits {
param([int]$count)
$str = “”
for ($i = 1; $i -le $count; $i++) {
$str += Get-Random -Minimum 0 -Maximum 10
}
return $str
}
$countries = @(”India”, “USA”, “Russia”, “China”)
$choice = Get-Random -InputObject $countries
$result = “”
switch ($choice) {
“India” {
$first = Get-Random -InputObject @(6, 7, 8, 9)
$rest = Get-Digits -count 9
$result = “Country: India | Number: +91 $first$rest”
}
“USA” {
$area = “$(Get-Random -Min 2 -Max 10)$(Get-Digits -count 2)”
$exch = “$(Get-Random -Min 2 -Max 10)$(Get-Digits -count 2)”
$line = Get-Digits -count 4
$result = “Country: USA | Number: +1 ($area) $exch-$line”
}
“Russia” {
$prefix = “9$(Get-Digits -count 2)”
$subscriber = Get-Digits -count 7
$result = “Country: Russia | Number: +7 $prefix $subscriber”
}
“China” {
$second = Get-Random -Min 3 -Max 10
$rest = Get-Digits -count 9
$result = “Country: China | Number: +86 1$second$rest”
}
}
Write-Host “--- Randomly Selected Legitimate Number ---” -ForegroundColor Yellow
Write-Host $result
Example Gun-Kata Attack
You can reframe and create multiple deniable events from a single supposed Ransomware attack, pin the actual activity as a host-based intrusion on your first victim, and cause it to spread and worm. You can send text messages. You can send voice messages because a lot of this understanding of telecommunications has been abstracted away for us and it can almost be done entirely through software.
And I know, because I actually experimented with this. And, you know, it’s not a solution. It’s definitely not a solution to perpetual misinformation, but it’s a start. And of all the options I’ve presented so far, this vehicle to quote-unquote ‘shoot multiple opponents around the world at once’... I just told you that you can compute and predict phone numbers because each country has a trunk code, an international calling code, regional code, and its own algorithm to compute a legitimate phone number, by the way.
So you can do all of this, and instead of using OpSec [Operational Security] techniques to be quieter in your malware, you make your infected host—the first hop infected host—extremely loud to spread misinformation. Which helps muddy and misdirect attribution back to you and instead pin more crimes on your first victim using a Christian Bale Grammaton Cleric Gun Kata method.
Fortunately, I’ve been retired since May 2024. So I don’t give a shit, but I do know my Replacement is learning from me. So just presenting this to whoever’s listening.

