Coding Is Maneuver

3,411 views

Published on

Presented at first annual USAF Cyber Symposium, November 2007

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
3,411
On SlideShare
0
From Embeds
0
Number of Embeds
48
Actions
Shares
0
Downloads
53
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Coding Is Maneuver

  1. 1. Coding is Maneuver And a few other very rapidly delivered thoughts and axioms on Cyber Warfare Jim Stogdill CTO, Gestalt jstogdill@gestalt-llc.com www.limnthis.com
  2. 2. 1. Coding is Maneuver It needs to turn when you push the stick
  3. 3. From a blog post that seemed to resonate
  4. 4. In Physical Domain You Have: Air + Physics + S.H. Physical Assets
  5. 5. But, in Cyber... • The Domain is Code • The “platforms” are code • And “the stick” inputs are often code You can’t make up for crappy code with supremely performing physical assets in a domain without any.
  6. 6. What kind of code? • Coding an exploit for a newly discovered vulnerability • Adding a new attack vector to an existing tool • Creating on-the-fly visualizations for newly discovered or suspected attack vectors • Defending an exploit (patching in real time) • Modifying an attack tool to mask it’s OS • ...
  7. 7. So, in the Cyber Domain, technological agility will matter even more, because there will be no compensating physical assets.
  8. 8. 2. Cyber SA is Different But it should be related to the geo-spatial battlespace
  9. 9. How do this...
  10. 10. this...
  11. 11. and this...
  12. 12. relate to this?
  13. 13. If you were the JFACC, wouldn’t you want to know?
  14. 14. For the public Internet, are you prepared to use things like Quova and Plazer (commercial / public) to find out where network devices are?
  15. 15. Are you building a “Cyber MIDB” that can cleanly integrate with the one with physical targets? (you’ll want your COI talking to the C2 COI)
  16. 16. 3. Culture Matters, you can’t do this on an island & it’s not your Internet
  17. 17. Would you hire this guy?
  18. 18. Do you have a problem with these?
  19. 19. Do you think callsigns should be: Goose Maverick Viper
  20. 20. Instead of: r0m1 & Sp3w
  21. 21. don’t let cultural “signals” get in the way
  22. 22. SOF has a very different culture for important reasons, maybe Cyber will evolve one too.
  23. 23. Get out in the world, participate in Communities of Practice
  24. 24. Attend stuff like this:
  25. 25. And this:
  26. 26. Subscribe to this:
  27. 27. And figure out how to get this guy engaged and believing in what you are doing and he’ll join your Civil Cyber Patrol
  28. 28. Otherwise, you are so gonna get
  29. 29. 4. You’ll Have to Use Open Source Or, Coding is Still Maneuver
  30. 30. To use this
  31. 31. And this
  32. 32. And, of course, this (You don’t want to have the only hackers on the planet whose attack can be identified coming from Solaris!)
  33. 33. Finally, all that other stuff could theoretically be bought, but...
  34. 34. Participate to get stuff you can’t otherwise get, to gather intelligence on what everyone else is doing, and make sure you can change your source code fast when you need to.
  35. 35. And, to wrap up, a few questions to ponder...
  36. 36. Does 8th AF heritage imply global strike on public public / sovereign networks?
  37. 37. If so, Are you learning by doing; playing Cowboy’s and Cossacks? If you aren’t bumping into them, you ain’t learning.
  38. 38. During Bosnian intervention redux flying missions out of Aviano... Do you know what you would do if Serb- sympathizing Russian hackers “Estonia’d” Italy? Would you be prepared to help your ally?
  39. 39. Are we thinking about cyber power the way they thought about air power?
  40. 40. With as many as a million machines in botnets, who owns them? Are some state owned? Can the exploits be exploited without having to build them?
  41. 41. If you had to guess, whose cyber force do you think has more American educated pHD’s in uniform? US Cyber Command or Chinese PLA?
  42. 42. Are you considering how to incorporate Social Engineering into your attack vectors?
  43. 43. And... Why not call it the EOC (effects operations center)? -and- Will there ever be a JFCCC?
  44. 44. Oh, just one more thought experiment... If this were Cyber’s1948 and we were standing up the USCF, how would we organize it to focus on all of the missions? TCF? SCF? CMC?
  45. 45. Thanks! Jim Stogdill jstogdill@gestalt-llc.com www.limnthis.com

×