30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10...

21
30-Jun-08 Defcon16 2008 1 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3

Transcript of 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10...

Page 1: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 1

Open Source Warfare

Origins

Use

Transformations

Day Three: Sunday, August 10

10:30 am

Track 3

Page 2: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 2

…Oh my….What is Asymmetric Warfare

•Is it purely defensive•Does it rely on traditional

concepts•How does an established fighting

group use it•Does it overlap with other computer security issues

Gosh….What is Open Source Warfare

•Who uses it•Who is it used against

•Are there any defenses•Is it successful

•Where is it used

Page 3: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 3

Warnings

A few things to remember:

• Although this stuff in very interesting it is used primarily in warfare….that means people actually die

• If you think you’re smart enough to try this on your own you are wrong! …and you could go to jail….

• Because of all this we will keep the examples simple, well known and generic…

• Importantly, this is a value neutral technical presentation: that means that we’ll only look at techniques and not evaluate whether the people using these methods are “right” or “wrong”, “justified” or “unjustified”

Page 4: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 4

What types of things are used in OSW

• In a funny way this is a lot like McGyver

• Almost anything can be used…toothpicks, tin foil, matchbooks, string…..

• But on the contemporary battlefield it depends more heavily on things like mobile phones, microwave ovens, remote controlled aircraft, toy robots, digital cameras, sniffer tools

• But don’t think that ethics isn’t important! Please!

Page 5: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 5

Open Source Contrast in Pictures

• Boston Dynamics/DARPA Bigdog project

• Traditional method of pack animal transportation

Page 6: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 6

A Gratuitous Photo

• The element of myth….

Page 7: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 7

The Importance of Communications

Page 8: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 8

Let’s look at telecommunications

• Lebanon is a good example

– You may remember a few months ago that there was tremendous upset when the government attempted to quash third-party telecommunications networks

– In fact, it led to major fighting in the street

– To complicate matters the country also faces a number of external forces, Syria, Iran, Israel

– As well as a number of internal forces

Page 9: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 9

Let’s look at telecommunications

• So what was the problem

– Third party groups had co-opted the telecom network set up by the government

• This was accomplished by “extending” copper networks• Creating new optical networks• Piggybacking on Mobile networks

– This also required technical knowledge as well as a heavy reliance on openly available public encryption, VOIP, chat room, message boards, anon email etc. communication methods

– So big did this become that it pretty much became an unsolvable issue for the government

Page 10: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 10

So, let’s take a look at this map with overlays:

•First we see the regional context•Next lets look at the geographic issues•Now, the overlays of the networks

•Secondly, lets look at why it was so difficult for these networks to be eliminated

•Thirdly, lets look at why publically available software/hardware tools have been so essential to the “success or failure” of the parties

•Finally, a word about undersea cables disruptions

Page 11: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 11

Variants of this: SF

• Let’s look at the concept of triangulation

• Here’s a pretty picture of San Francisco:Sense Networks & loopt

Page 12: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 12

Food for thought….

Page 13: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 13

Variants of this

• How do we triangulate?

• You can run but you can’t hide

• Now let’s think of this picture as a battlefield– We’ll add some conceptual drones– And figure out how to target an individual or group– Note: this is a very useful method already employed –

think in terms of sniffer networks, GPS networks, geo-location web 2.0 “tricks”

• IT’S ALL ABOUT THE MATH!!!!! (and Black Swan events)

Page 14: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 14

Open Source Platform

• Let’s take a look at OS surveillance platforms

• Here is a series of pictures of a RC helicopter with HD cam

• Range: 2000 ft alt., 1 mile radius, 20 min battery life, encrypted com link

• Price $400.00 off the shelf

• (no, I don’t have the vendors name, sorry)

Page 15: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 15

Page 16: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 16

A quick look at OS uses in the field

• Microwaves, IEDs, and the battle space– (

http://www.youtube.com/watch?v=1KcD3KQ38CM) for fun

• Defeating LED and surveillance cameras– Quick word on a counter measures

• The mobile phone quandary– And the jamming quandary

• And of course the guys over at CVORG who demo’d their hardware hack of a Linksys router yesterday…impressive!

Page 17: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 17

DIY HREF?

Page 18: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 18

A quick look at OS derivates

• Defcon 15 presentation regarding GPS device hacking– Here’s a simulation example

• Defcon 14 presentation regarding war rocketing– Here’s a simulation example– And here is an open source example of how

model rockets utilize telemetry for guidance– (yikes!)

Page 19: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 19

• Excellent starting-point for rocketry control

Page 20: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 20

And Finally

• Overview of “mass-communication” methods meant to influence a populace

– Prep for a pending “attack”– Mass influence techniques– Reliance upon the “hacker” community for

tools and methodology– Utilizing existing structures (e.g. social

networks) for influence (good or ill)– Setting up a “Zeitgeist” scenario for

influence

Page 21: 30-Jun-08Defcon16 20081 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3.

30-Jun-08 Defcon16 2008 21

Thank you

• Since this is a very brief presentation feel free to contact me after this for any additional input

• Thanks again!!!