46
Coding is Maneuver And a few other very rapidly delivered thoughts and axioms on Cyber Warfare Jim Stogdill CTO, Gestalt [email protected] www.limnthis.com

Coding Is Maneuver

Embed Size (px)

DESCRIPTION

Presented at first annual USAF Cyber Symposium, November 2007

Citation preview

Page 1: Coding Is  Maneuver

Coding is ManeuverAnd a few other very rapidly delivered thoughts and

axioms on Cyber Warfare

Jim StogdillCTO, Gestalt

[email protected]

Page 2: Coding Is  Maneuver

1. Coding is ManeuverIt needs to turn when you push the stick

Page 3: Coding Is  Maneuver

From a blog post that seemed to resonate

Page 4: Coding Is  Maneuver

In Physical Domain You Have:

Air + Physics +

S.H. Physical Assets

Page 5: Coding Is  Maneuver

But, in Cyber...

• The Domain is Code

• The “platforms” are code

• And “the stick” inputs are often code

You can’t make up for crappy code with supremely performing physical assets in a domain without any.

Page 6: Coding Is  Maneuver

What kind of code?

• Coding an exploit for a newly discovered vulnerability

• Adding a new attack vector to an existing tool

• Creating on-the-fly visualizations for newly discovered or suspected attack vectors

• Defending an exploit (patching in real time)

• Modifying an attack tool to mask it’s OS

• ...

Page 7: Coding Is  Maneuver

So, in the Cyber Domain, technological agility will matter even more, because there will be no compensating physical

assets.

Page 8: Coding Is  Maneuver

2. Cyber SA is DifferentBut it should be related to the geo-spatial battlespace

Page 9: Coding Is  Maneuver

How do this...

Page 10: Coding Is  Maneuver

this...

Page 11: Coding Is  Maneuver

and this...

Page 12: Coding Is  Maneuver

relate to this?

Page 13: Coding Is  Maneuver

If you were the JFACC, wouldn’t you want to

know?

Page 14: Coding Is  Maneuver
Page 15: Coding Is  Maneuver

For the public Internet, are you prepared to use things like

Quova and Plazer (commercial / public) to find out where network devices

are?

Page 16: Coding Is  Maneuver

Are you building a “Cyber MIDB” that can cleanly

integrate with the one with physical targets?

(you’ll want your COI talking to the C2 COI)

Page 17: Coding Is  Maneuver

3. Culture Matters,you can’t do this on an island & it’s not your Internet

Page 18: Coding Is  Maneuver

Would you hire this guy?

Page 19: Coding Is  Maneuver

Do you have a problem with these?

Page 20: Coding Is  Maneuver

Do you think callsigns should be:

Goose

Maverick

Viper

Page 21: Coding Is  Maneuver

Instead of:

r0m1&

Sp3w

Page 22: Coding Is  Maneuver

don’t let cultural “signals”

get in the way

Page 23: Coding Is  Maneuver

SOF has a very different culture for important reasons, maybe Cyber will evolve one

too.

Page 24: Coding Is  Maneuver

Get out in the world, participate in

Communities of Practice

Page 25: Coding Is  Maneuver

Attend stuff like this:

Page 26: Coding Is  Maneuver

And this:

Page 27: Coding Is  Maneuver

Subscribe to this:

Page 28: Coding Is  Maneuver

And figure out how to get this guy engaged and believing in what you are doing and he’ll join your

Civil Cyber Patrol

Page 29: Coding Is  Maneuver

Otherwise, you are so gonna get

Page 30: Coding Is  Maneuver

4. You’ll Have to Use Open Source

Or, Coding is Still Maneuver

Page 31: Coding Is  Maneuver

To use this

Page 32: Coding Is  Maneuver

And this

Page 33: Coding Is  Maneuver

And, of course, this

(You don’t want to have the only hackers on the planet whose attack can be

identified coming from Solaris!)

Page 34: Coding Is  Maneuver

Finally, all that other stuff could theoretically be bought, but...

Page 35: Coding Is  Maneuver

Participate to get stuff you can’t otherwise get, to gather intelligence on what everyone else is doing, and make sure you can change your source code fast when you need to.

Page 36: Coding Is  Maneuver

And, to wrap up, a few questions to ponder...

Page 37: Coding Is  Maneuver

Does 8th AF heritage imply global strike on public public / sovereign networks?

Page 38: Coding Is  Maneuver

If so, Are you learning by doing; playing Cowboy’s and Cossacks?

If you aren’t bumping into them, you ain’t learning.

Page 39: Coding Is  Maneuver

During Bosnian intervention redux flying missions out of Aviano...

Do you know what you would do if Serb-sympathizing Russian hackers “Estonia’d” Italy?

Would you be prepared to help your ally?

Page 40: Coding Is  Maneuver

Are we thinking about cyber power the way they thought about air power?

Page 41: Coding Is  Maneuver

With as many as a million machines in botnets, who owns them? Are some state owned? Can the

exploits be exploited without having to build them?

Page 42: Coding Is  Maneuver

If you had to guess, whose cyber force do you think has more American educated pHD’s in uniform? US Cyber

Command or Chinese PLA?

Page 43: Coding Is  Maneuver

Are you considering how to incorporate Social Engineering into your attack vectors?

Page 44: Coding Is  Maneuver

And...

Why not call it the EOC (effects operations center)?

-and-Will there ever be a JFCCC?

Page 45: Coding Is  Maneuver

Oh, just one more thought experiment...

If this were Cyber’s1948 and we were standing up the

USCF, how would we organize it to focus on all of the

missions?

TCF? SCF? CMC?