This document discusses strategies for taking a more proactive "blitzing" approach to network defense. It recommends gathering intelligence on attackers through monitoring social media, pastebins, Google alerts and more. It also suggests deceiving attackers through honeypots and misinformation while closely monitoring systems. The goal is to shorten attackers' time on the network through increased detection, delay and disruption techniques.