1 / 21

Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3

Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3. Gosh…. What is Open Source Warfare Who uses it Who is it used against Are there any defenses Is it successful Where is it used. …Oh my…. What is Asymmetric Warfare Is it purely defensive

gyula
Télécharger la présentation

Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Open Source WarfareOriginsUseTransformationsDay Three: Sunday, August 1010:30 amTrack 3 Defcon16 2008

  2. Gosh…. • What is Open Source Warfare • Who uses it • Who is it used against • Are there any defenses • Is it successful • Where is it used • …Oh my…. • What is Asymmetric Warfare • Is it purely defensive • Does it rely on traditional concepts • How does an established fighting group use it • Does it overlap with other computer security issues Defcon16 2008

  3. Warnings A few things to remember: • Although this stuff in very interesting it is used primarily in warfare….that means people actually die • If you think you’re smart enough to try this on your own you are wrong! …and you could go to jail…. • Because of all this we will keep the examples simple, well known and generic… • Importantly, this is a value neutral technical presentation: that means that we’ll only look at techniques and not evaluate whether the people using these methods are “right” or “wrong”, “justified” or “unjustified” Defcon16 2008

  4. What types of things are used in OSW • In a funny way this is a lot like McGyver • Almost anything can be used…toothpicks, tin foil, matchbooks, string….. • But on the contemporary battlefield it depends more heavily on things like mobile phones, microwave ovens, remote controlled aircraft, toy robots, digital cameras, sniffer tools • But don’t think that ethics isn’t important! Please! Defcon16 2008

  5. Open Source Contrast in Pictures • Boston Dynamics/DARPA Bigdog project • Traditional method of pack animal transportation Defcon16 2008

  6. A Gratuitous Photo • The element of myth…. Defcon16 2008

  7. The Importance of Communications Defcon16 2008

  8. Let’s look at telecommunications • Lebanon is a good example • You may remember a few months ago that there was tremendous upset when the government attempted to quash third-party telecommunications networks • In fact, it led to major fighting in the street • To complicate matters the country also faces a number of external forces, Syria, Iran, Israel • As well as a number of internal forces Defcon16 2008

  9. Let’s look at telecommunications • So what was the problem • Third party groups had co-opted the telecom network set up by the government • This was accomplished by “extending” copper networks • Creating new optical networks • Piggybacking on Mobile networks • This also required technical knowledge as well as a heavy reliance on openly available public encryption, VOIP, chat room, message boards, anon email etc. communication methods • So big did this become that it pretty much became an unsolvable issue for the government Defcon16 2008

  10. So, let’s take a look at this map with overlays: • First we see the regional context • Next lets look at the geographic issues • Now, the overlays of the networks • Secondly, lets look at why it was so difficult for these networks to be eliminated • Thirdly, lets look at why publically available software/hardware tools have been so essential to the “success or failure” of the parties • Finally, a word about undersea cables disruptions Defcon16 2008

  11. Variants of this: SF • Let’s look at the concept of triangulation • Here’s a pretty picture of San Francisco: Sense Networks & loopt Defcon16 2008

  12. Food for thought…. Defcon16 2008

  13. Variants of this • How do we triangulate? • You can run but you can’t hide • Now let’s think of this picture as a battlefield • We’ll add some conceptual drones • And figure out how to target an individual or group • Note: this is a very useful method already employed –think in terms of sniffer networks, GPS networks, geo-location web 2.0 “tricks” • IT’S ALL ABOUT THE MATH!!!!! (and Black Swan events) Defcon16 2008

  14. Open Source Platform • Let’s take a look at OS surveillance platforms • Here is a series of pictures of a RC helicopter with HD cam • Range: 2000 ft alt., 1 mile radius, 20 min battery life, encrypted com link • Price $400.00 off the shelf • (no, I don’t have the vendors name, sorry) Defcon16 2008

  15. Defcon16 2008

  16. A quick look at OS uses in the field • Microwaves, IEDs, and the battle space • (http://www.youtube.com/watch?v=1KcD3KQ38CM) for fun • Defeating LED and surveillance cameras • Quick word on a counter measures • The mobile phone quandary • And the jamming quandary • And of course the guys over at CVORG who demo’d their hardware hack of a Linksys router yesterday…impressive! Defcon16 2008

  17. DIY HREF? Defcon16 2008

  18. A quick look at OS derivates • Defcon 15 presentation regarding GPS device hacking • Here’s a simulation example • Defcon 14 presentation regarding war rocketing • Here’s a simulation example • And here is an open source example of how model rockets utilize telemetry for guidance • (yikes!) Defcon16 2008

  19. Excellent starting-point for rocketry control Defcon16 2008

  20. And Finally • Overview of “mass-communication” methods meant to influence a populace • Prep for a pending “attack” • Mass influence techniques • Reliance upon the “hacker” community for tools and methodology • Utilizing existing structures (e.g. social networks) for influence (good or ill) • Setting up a “Zeitgeist” scenario for influence Defcon16 2008

  21. Thank you • Since this is a very brief presentation feel free to contact me after this for any additional input • Thanks again!!! Defcon16 2008

More Related