Open Source Warfare Origins Use Transformations Day Three

  • Slides: 21
Download presentation
Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10: 30 am

Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10: 30 am Track 3 30 -Jun-08 Defcon 16 2008 1

Gosh…. What is Open Source Warfare • Who uses it • Who is it

Gosh…. What is Open Source Warfare • Who uses it • Who is it used against • Are there any defenses • Is it successful • Where is it used …Oh my…. What is Asymmetric Warfare • Is it purely defensive • Does it rely on traditional concepts • How does an established fighting group use it • Does it overlap with other computer security issues 30 -Jun-08 Defcon 16 2008 2

Warnings A few things to remember: • Although this stuff in very interesting it

Warnings A few things to remember: • Although this stuff in very interesting it is used primarily in warfare…. that means people actually die • If you think you’re smart enough to try this on your own you are wrong! …and you could go to jail…. • Because of all this we will keep the examples simple, well known and generic… • Importantly, this is a value neutral technical presentation: that means that we’ll only look at techniques and not evaluate whether the people using these methods are “right” or “wrong”, “justified” or “unjustified” 30 -Jun-08 Defcon 16 2008 3

What types of things are used in OSW • In a funny way this

What types of things are used in OSW • In a funny way this is a lot like Mc. Gyver • Almost anything can be used…toothpicks, tin foil, matchbooks, string…. . • But on the contemporary battlefield it depends more heavily on things like mobile phones, microwave ovens, remote controlled aircraft, toy robots, digital cameras, sniffer tools • But don’t think that ethics isn’t important! Please! 30 -Jun-08 Defcon 16 2008 4

Open Source Contrast in Pictures • • 30 -Jun-08 Boston Dynamics/DARPA Bigdog project Traditional

Open Source Contrast in Pictures • • 30 -Jun-08 Boston Dynamics/DARPA Bigdog project Traditional method of pack animal transportation Defcon 16 2008 5

A Gratuitous Photo • The element of myth…. 30 -Jun-08 Defcon 16 2008 6

A Gratuitous Photo • The element of myth…. 30 -Jun-08 Defcon 16 2008 6

The Importance of Communications 30 -Jun-08 Defcon 16 2008 7

The Importance of Communications 30 -Jun-08 Defcon 16 2008 7

Let’s look at telecommunications • Lebanon is a good example – You may remember

Let’s look at telecommunications • Lebanon is a good example – You may remember a few months ago that there was tremendous upset when the government attempted to quash third-party telecommunications networks – In fact, it led to major fighting in the street – To complicate matters the country also faces a number of external forces, Syria, Iran, Israel – As well as a number of internal forces 30 -Jun-08 Defcon 16 2008 8

Let’s look at telecommunications • So what was the problem – Third party groups

Let’s look at telecommunications • So what was the problem – Third party groups had co-opted the telecom network set up by the government • This was accomplished by “extending” copper networks • Creating new optical networks • Piggybacking on Mobile networks – This also required technical knowledge as well as a heavy reliance on openly available public encryption, VOIP, chat room, message boards, anon email etc. communication methods – So big did this become that it pretty much became an unsolvable issue for the government 30 -Jun-08 Defcon 16 2008 9

So, let’s take a look at this map with overlays: • First we see

So, let’s take a look at this map with overlays: • First we see the regional context • Next lets look at the geographic issues • Now, the overlays of the networks • Secondly, lets look at why it was so difficult for these networks to be eliminated • Thirdly, lets look at why publically available software/hardware tools have been so essential to the “success or failure” of the parties • Finally, a word about undersea cables disruptions 30 -Jun-08 Defcon 16 2008 10

Variants of this: SF • Let’s look at the concept of triangulation • Here’s

Variants of this: SF • Let’s look at the concept of triangulation • Here’s a pretty picture of San Francisco: Sense Networks & loopt 30 -Jun-08 Defcon 16 2008 11

Food for thought…. 30 -Jun-08 Defcon 16 2008 12

Food for thought…. 30 -Jun-08 Defcon 16 2008 12

Variants of this • How do we triangulate? • You can run but you

Variants of this • How do we triangulate? • You can run but you can’t hide • Now let’s think of this picture as a battlefield – We’ll add some conceptual drones – And figure out how to target an individual or group – Note: this is a very useful method already employed – think in terms of sniffer networks, GPS networks, geolocation web 2. 0 “tricks” • IT’S ALL ABOUT THE MATH!!!!! (and Black Swan events) 30 -Jun-08 Defcon 16 2008 13

Open Source Platform • Let’s take a look at OS surveillance platforms • Here

Open Source Platform • Let’s take a look at OS surveillance platforms • Here is a series of pictures of a RC helicopter with HD cam • Range: 2000 ft alt. , 1 mile radius, 20 min battery life, encrypted com link • Price $400. 00 off the shelf • (no, I don’t have the vendors name, sorry) 30 -Jun-08 Defcon 16 2008 14

30 -Jun-08 Defcon 16 2008 15

30 -Jun-08 Defcon 16 2008 15

A quick look at OS uses in the field • Microwaves, IEDs, and the

A quick look at OS uses in the field • Microwaves, IEDs, and the battle space – (http: //www. youtube. com/watch? v=1 Kc. D 3 KQ 38 CM) for fun • Defeating LED and surveillance cameras – Quick word on a counter measures • The mobile phone quandary – And the jamming quandary • And of course the guys over at CVORG who demo’d their hardware hack of a Linksys router yesterday…impressive! 30 -Jun-08 Defcon 16 2008 16

DIY HREF? 30 -Jun-08 Defcon 16 2008 17

DIY HREF? 30 -Jun-08 Defcon 16 2008 17

A quick look at OS derivates • Defcon 15 presentation regarding GPS device hacking

A quick look at OS derivates • Defcon 15 presentation regarding GPS device hacking – Here’s a simulation example • Defcon 14 presentation regarding war rocketing – Here’s a simulation example – And here is an open source example of how model rockets utilize telemetry for guidance – (yikes!) 30 -Jun-08 Defcon 16 2008 18

 • Excellent starting-point for rocketry control 30 -Jun-08 Defcon 16 2008 19

• Excellent starting-point for rocketry control 30 -Jun-08 Defcon 16 2008 19

And Finally • Overview of “mass-communication” methods meant to influence a populace – Prep

And Finally • Overview of “mass-communication” methods meant to influence a populace – Prep for a pending “attack” – Mass influence techniques – Reliance upon the “hacker” community for tools and methodology – Utilizing existing structures (e. g. social networks) for influence (good or ill) – Setting up a “Zeitgeist” scenario for influence 30 -Jun-08 Defcon 16 2008 20

Thank you • Since this is a very brief presentation feel free to contact

Thank you • Since this is a very brief presentation feel free to contact me after this for any additional input • Thanks again!!! 30 -Jun-08 Defcon 16 2008 21