Coding Is  Maneuver
Upcoming SlideShare
Loading in...5

Like this? Share it with your network


Coding Is Maneuver



Presented at first annual USAF Cyber Symposium, November 2007

Presented at first annual USAF Cyber Symposium, November 2007



Total Views
Views on SlideShare
Embed Views



5 Embeds 47 35 9 1 1 1



Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Coding Is Maneuver Presentation Transcript

  • 1. Coding is Maneuver And a few other very rapidly delivered thoughts and axioms on Cyber Warfare Jim Stogdill CTO, Gestalt
  • 2. 1. Coding is Maneuver It needs to turn when you push the stick
  • 3. From a blog post that seemed to resonate
  • 4. In Physical Domain You Have: Air + Physics + S.H. Physical Assets
  • 5. But, in Cyber... • The Domain is Code • The “platforms” are code • And “the stick” inputs are often code You can’t make up for crappy code with supremely performing physical assets in a domain without any.
  • 6. What kind of code? • Coding an exploit for a newly discovered vulnerability • Adding a new attack vector to an existing tool • Creating on-the-fly visualizations for newly discovered or suspected attack vectors • Defending an exploit (patching in real time) • Modifying an attack tool to mask it’s OS • ...
  • 7. So, in the Cyber Domain, technological agility will matter even more, because there will be no compensating physical assets.
  • 8. 2. Cyber SA is Different But it should be related to the geo-spatial battlespace
  • 9. How do this...
  • 10. this...
  • 11. and this...
  • 12. relate to this?
  • 13. If you were the JFACC, wouldn’t you want to know?
  • 14. For the public Internet, are you prepared to use things like Quova and Plazer (commercial / public) to find out where network devices are?
  • 15. Are you building a “Cyber MIDB” that can cleanly integrate with the one with physical targets? (you’ll want your COI talking to the C2 COI)
  • 16. 3. Culture Matters, you can’t do this on an island & it’s not your Internet
  • 17. Would you hire this guy?
  • 18. Do you have a problem with these?
  • 19. Do you think callsigns should be: Goose Maverick Viper
  • 20. Instead of: r0m1 & Sp3w
  • 21. don’t let cultural “signals” get in the way
  • 22. SOF has a very different culture for important reasons, maybe Cyber will evolve one too.
  • 23. Get out in the world, participate in Communities of Practice
  • 24. Attend stuff like this:
  • 25. And this:
  • 26. Subscribe to this:
  • 27. And figure out how to get this guy engaged and believing in what you are doing and he’ll join your Civil Cyber Patrol
  • 28. Otherwise, you are so gonna get
  • 29. 4. You’ll Have to Use Open Source Or, Coding is Still Maneuver
  • 30. To use this
  • 31. And this
  • 32. And, of course, this (You don’t want to have the only hackers on the planet whose attack can be identified coming from Solaris!)
  • 33. Finally, all that other stuff could theoretically be bought, but...
  • 34. Participate to get stuff you can’t otherwise get, to gather intelligence on what everyone else is doing, and make sure you can change your source code fast when you need to.
  • 35. And, to wrap up, a few questions to ponder...
  • 36. Does 8th AF heritage imply global strike on public public / sovereign networks?
  • 37. If so, Are you learning by doing; playing Cowboy’s and Cossacks? If you aren’t bumping into them, you ain’t learning.
  • 38. During Bosnian intervention redux flying missions out of Aviano... Do you know what you would do if Serb- sympathizing Russian hackers “Estonia’d” Italy? Would you be prepared to help your ally?
  • 39. Are we thinking about cyber power the way they thought about air power?
  • 40. With as many as a million machines in botnets, who owns them? Are some state owned? Can the exploits be exploited without having to build them?
  • 41. If you had to guess, whose cyber force do you think has more American educated pHD’s in uniform? US Cyber Command or Chinese PLA?
  • 42. Are you considering how to incorporate Social Engineering into your attack vectors?
  • 43. And... Why not call it the EOC (effects operations center)? -and- Will there ever be a JFCCC?
  • 44. Oh, just one more thought experiment... If this were Cyber’s1948 and we were standing up the USCF, how would we organize it to focus on all of the missions? TCF? SCF? CMC?
  • 45. Thanks! Jim Stogdill