Closure — the AI orchestrator for synchronized eviction
The AI orchestrator for synchronized eviction. The planning-and-validation bridge between Fulcrum’s and Bulwark’s research output and the carrier-and-CISA operation that actually evicts a resident Salt-Typhoon-class attacker. Proposed design, not yet operational. If built, a dual-use coordination CLI that falls under EAR ECCN 4D004.
Closure exists because of a single load-bearing line in the August 2025 CISA / NSA / FBI joint advisory AA25-239A: “Where possible, gaining a full understanding of the APT actors’ extent of access into networks followed by simultaneous measures to remove them may be necessary to achieve a complete and lasting eviction. Partial response actions may alert the actors to an ongoing investigation and jeopardize the ability to conduct full eviction.”1 Synchronized eviction is a planning problem. For a tier-1 carrier with thousands of POPs and a five-layer trust graph (BGP, OSPF/ISIS, MPLS LDP, TACACS+, SNMPv3), no public tool currently produces the simultaneous-cut plan at the scale and tempo a real eviction window requires. Closure is the proposed agent loop to fill that gap.
Phase 1 · Pre-eviction
Planner
- Inventory — enumerate the affected device estate from the carrier’s IPAM and PSIRT scan data.
- Map — build the trust graph: BGP / OSPF / ISIS adjacencies, MPLS LDP sessions, TACACS+ clients, SNMPv3 EngineID trust, console-server access paths.
- Plan — produce the simultaneous-cut schedule: maximum-parallelism set within ops-team capacity and dependency constraints (don’t clean device A before its upstream B).
- Coordinate — allocate personnel (field engineers, console-server techs, vendor TAC), pin the out-of-band comms plan (since on-band admin is potentially compromised), emit the cut-window briefing packet.
Phase 2 · Post-eviction
Validator
- Re-inventory — pull the carrier’s post-eviction running images, ROMMON hashes, golden-config fingerprints.
- Variant-hunt — re-run the Bulwark pipeline against the declared post-eviction image set; produce the unresolved-variant report.
- Drift audit — diff post-eviction configs against the carrier’s golden template; flag any persistence-kit indicators (GRE tunnels,
sshd_operns/57722, AAA-server-IP changes, created users, Guest Shell enable). - Document — emit the Milestone-3 sign-off packet against the six closure criteria below.
Closure does not touch the carrier’s production gear, hold carrier AAA credentials, sign Cisco TAC tickets, or dispatch field engineers. Both phases are research-flavored artifacts: the planner produces a coordination document, the validator produces a verification report. The carrier owns execution; Closure owns the bookends that make execution auditable. By design, the eviction-plan artifact and the validator report exit only through coordinated handoff to the carrier’s PSIRT, the CISA hardening-guidance lead, or (for federally-supervised LI rebuilds) the FBI / FCC liaison — broker channels structurally invalid in the EVRP enum, the same constraint that pins disclosure terminals for Fulcrum and Bulwark.
# salt-typhoon-cut-plan.yaml — sample Closure synchronized-eviction plan.
# Phase 1 (planner) output: consumed by carrier ops + CISA IR lead.
operation:
name: carrier-x-salt-typhoon-eviction
intent: synchronized-eviction
cut_window: 2026-08-15T03:00Z — 2026-08-15T07:00Z
audit: firestore://closure_ops/{op_id}
estate:
# Discovered from carrier IPAM + Bulwark persistence-indicator scan.
# 412 devices on Cisco IOS XE / IOS Classic / NX-OS; 17 EOL platforms.
total_devices: 412
platforms:
- family: ios-xe
version_floor: 17.18.1a # for factory-reset all secure
count: 361
- family: ios-classic
version: 12.x # EOL; physical replacement
count: 17
- family: nx-os
count: 34
trust_graph:
ibgp_peers: derived://carrier_x_bgp_topology
igp: ospf-area-0, isis-l2
aaa_dependency: tacacs-east, tacacs-west
snmpv3_engines: 4 distinct EngineID trust groups
# Dependency ordering: clean PE before CE within the same trust group;
# clean TACACS+ servers ahead of any device that authenticates against them.
cut_schedule:
# Maximum-parallelism within ops-team capacity (60 simultaneous
# console-server sessions, 24 field-engineer truck rolls in window).
- wave: 1
scope: tacacs-server-rebuild # clean AAA first
parallelism: 2 servers
duration: 45 minutes
- wave: 2
scope: pe-routers-east
parallelism: 60 console sessions
duration: 80 minutes
- wave: 3
scope: pe-routers-west + ce-routers-region-1
parallelism: 60 console sessions
duration: 80 minutes
- wave: 4
scope: eol-platforms-physical-swap
parallelism: 24 field engineers
duration: 180 minutes
personnel:
carrier_ops: 60 console-server techs
field: 24 field engineers (national-guard signal units possible)
vendor_tac: 6 Cisco TAC engineers on-shift (ROMMON validation)
federal_ir: CISA Cyber Hunt and Incident Response Team liaison
comms_lead: out-of-band; PKI-backed bridge call
comms_plan:
# On-band admin email + chat assumed compromised per CISA AA25-239A.
primary: pki-bridge://ops.carrier-x.local
fallback: paper-sop-distributed-at-each-pop
forbidden: [admin-email, slack, teams, on-band-jabber]
handoff:
# Plan artifact pinned to coordinated handoff — same EVRP constraint
# that pins Fulcrum / Bulwark disclosure terminals.
allowed: [carrier-psirt, cisa-hardening-lead, fbi-ci-liaison]
forbidden: [broker, public-release-pre-cut]
constraints:
ear: ECCN 4D004
allowlist_gated: true
rulebook: src/contracts/agent-rules.schema.json
# Illustrative output — design mock-up, not a real run.
$ trenchwork closure plan salt-typhoon-cut-plan.yaml --carrier carrier-x
[closure 11:02:11] inventory loaded — 412 devices, 17 EOL platforms
[closure 11:02:12] trust graph resolved — 4 SNMPv3 engine groups, 2 TACACS+ servers
[closure 11:02:13] cut schedule generated — 4 waves, 6h 5m total
[closure 11:02:13] personnel allocation feasible within stated capacity
[closure 11:02:13] OOB comms plan: pki-bridge primary, paper-SOP fallback
[closure 11:02:14] handoff terminals: carrier-psirt, cisa-hardening-lead
[closure 11:02:14] audit log: firestore://closure_ops/2026-08-10T11:02:11Z
# … carrier and CISA execute the cut against this plan …
$ trenchwork closure validate --op-id 2026-08-10T11:02:11Z --post-eviction-images ./carrier-x-post/
[closure 18:44:02] post-eviction image set: 412 devices reported
[closure 18:44:08] variant-hunt across declared image set: 0 unresolved (C3)
[closure 18:44:11] golden-config drift audit: 412/412 clean against template (C1)
[closure 18:44:14] persistence-kit indicators: 0 GRE tunnels / 0 sshd_operns / 0 guestshell (C1)
[closure 18:44:15] image SHA-512 estate scan: 412/412 vendor-matched (C2)
[closure 18:44:16] credential rotation log: signed by carrier-x identity lead (C4)
[closure 18:44:16] burn-in window: 90 days — tracking
[closure 18:44:16] milestone-3 packet drafted: carrier-psirt + cisa-hardening-lead signers required
If built, sale and use would be scoped under EAR ECCN 4D004 as a coordinated extension of the Fulcrum + Bulwark rulebook, with controls allowlist-gated, append-only audit-logged, and the planner artifact and validator report pinned to the same coordinated-handoff terminals.
Fulcrum Details →
- Driver
- Operator
- Cadence
- Per-engagement
- Scope
- Chosen target
- Intent
- CNE / CNA-shaped, disclosure-pinned
- Surface
- Variant research, exploit dev
Bulwark Details →
- Driver
- Schedule
- Cadence
- Continuous, unattended
- Scope
- Vendor surface deployed at scale
- Intent
- CND, coordinated-disclosure-pinned
- Surface
- Pre-empting the next variant
Closure this page
- Driver
- Planner + validator
- Cadence
- Per-eviction-operation
- Scope
- Affected device estate
- Intent
- Eviction bridge, coordinated-handoff-pinned
- Surface
- Synchronized-cut planning + post-eviction validation
References
- CISA, NSA, FBI, and international partners. Joint Cybersecurity Advisory
AA25-239A. August 27, 2025. cisa.gov/news-events/cybersecurity-advisories/aa25-239a. Source for the simultaneous-eviction discipline and the “partial response alerts the actor” constraint. - CyberScoop. U.S. government says Salt Typhoon is still in telecom networks. December 3, 2024. cyberscoop.com/u-s-government-says-salt-typhoon-is-still-in-telecom-networks. Source for the Jeff Greene quotes.
- CyberScoop. A house full of open windows: Why telecoms may never purge their networks of Salt Typhoon. cyberscoop.com/salt-typhoon-chinese-hackers-us-telecom-breach. Source for the carriers’ “purged/contained” statements and the official counter-assessment.
- U.S. Senate Committee on Commerce, Science, and Transportation. Statements on AT&T / Verizon failure to provide remediation documentation; Cantwell statement on the November 2025 FCC rollback. commerce.senate.gov — Cantwell on FCC rollback.
- Cisco Talos. Weathering the storm: In the midst of a Typhoon. February 2025. blog.talosintelligence.com/salt-typhoon-analysis/. Primary source for the persistence-kit inventory and the credentials-as-primary-vector finding.
- MITRE ATT&CK. Pre-OS Boot: ROMMONkit, Sub-technique T1542.004. attack.mitre.org/techniques/T1542/004/.
- Cisco. IOS XE Software Hardening Guide. sec.cloudapps.cisco.com/security/center/resources/IOS_XE_hardening.
- Department of Homeland Security · Office of Intelligence and Analysis. Salt Typhoon: Data Theft Likely Signals Expanded Targeting. Memo dated June 11, 2025. Source for the fusion-center / state-cybersecurity-partner downstream-exposure risk. See Salt Typhoon Research for the National Guard case study.