 After two years we are back to DEF CON and this year we wanted to talk about something new actually also two years ago we were talking about something new but We will talk about asymmetric digital warfare What is it? What is the point today? What will happen in the future and we will take a very good example, which is the Department of Defense FCS program which stands for future combat system Before starting I want to tell you that you will not get all the information you need out from this picture directly Because the speech comes together with the release of the second episode of our comics If you go on zoneh.org website We already published one month ago The first sample actually of hacker comics ever Which was quite successful and I suggest you to go there and download it. It's for free of course and The second episode it is complimentary to the speech We are going to have today if you want to understand everything what we are going to talk and if you want to get even more deep examples You definitely have to go either to download the the comic from our website or we will distribute later to all of you a CD Which is actually was signed originally also by us. We are the authors of the comic and This is the PDF file containing the the comic book There will not be any Questions and answers section. We don't have the time but we will ask you a couple of questions to those who are capable to answer We will give a nice t-shirt with the cover of our Comic book, which is that one? Anyway, my name is Roberto Prattoni. I am the founder of zoneh.org, which is the last Mirror the basement mirror archive all of the others they closed it's a hell of job to do it Maybe one the next year in Defconn. I will try to explain to the people what is a mirror archive the reason of existing of Such thing and the efforts Which are behind but not today First of all the credits I I have to give two credits the first credit goes to the MIT technology magazine I was in vacation the last year I was reading a very good article on the MIT technology magazine and this article brought to my attention the problem that the American Army had during the second Gulf War we will see what kind of problems and The second credit I want to credit global security.org It is a very nice website you can get any kind of possible information about military system You can spend years downloading material and Watching stuff of course most of the thing are traditionally military weapons, but due to the fact that the fcs future combat system It is a known Program under development you can find also references on global security org another thing I want to say before Starting it is all the material you will find here and on the slide which you have on your CD I guess it's public we didn't hack anything so you can get it by yourself if Johnny Lunger is around Can teach you how to use Google in the proper way to download such material and to find it first of all There are several good reason to download zone H comic Beside the fact that it is necessary to understand our speech We have the dark tangent Defqon's mastermind himself playing as a guest star in in in the comic and the second reason You can see my ass basically Which I don't want to tell you it's even better than the first reason but up to you actually I don't have it So flat it's a little bit more rounded My friend here is Fabio Gionni and He is one of the person One of the best expert in my opinion in asymmetric warfare Anti-terrorism matter if you read his CV is very long You can get it actually from the Defqon website and Actually, it's your turn you can say we will talk a little bit me a little bit him Now it's a little bit me So a symmetric warfare, I don't want to bore anybody with conventional things, but some things must be said before And there are a lot of things which are misunderstood for example the definition of asymmetric warfare and the definition of unconventional For unconventional so you understand the rest of the speech of course so for unconventional weapons Or unconventional means a given example you have a fork For key use it to eat of course a steak or whatever then an unconventional use of this fork is to stick it in the eye of this guy over here So that's the thing Then there is another thing an image a very good drawing that I saw in a newspaper a few years back where there was a big marine soldier and the small I would say Iraqi guy You know these drawers on newspapers and those more Iraqi guys had the you know huge marine soldier with full of weapons everywhere and millions of dollars of research and the smaller Iraqi guy with Some sand in his hand and he threw to send in the eyes of the big soldier and he said that's not fair That's unconventional So that's unconventional and then a symmetric for a symmetric there was there is a thing very interesting when I was in Cuba about a year ago to see Ramiro Valdez Ramiro Valdez is one of the heroes of the revolution in Cuba hero in Cuba not everywhere else, of course and I remember that he said among other things he said Americans they invented the term a symmetric because they want to invade us and they said that we are Preparing for a symmetric warfare. Actually, they are not because they don't have even lines phone lines to get the connection on the internet, but that's one thing and What does that mean that it's country it means that the country that doesn't have the means to combat the war Which is systemic, which is a huge expensive war uses? Whatever it has unconventional means that that is one of the meanings of a symmetric the other thing is for example Islam and A nation like for example the USA or another nation So if you have a France against Germany, it's symmetric. You have territory of people You have whatever nation against another nation if you have Islam Islam is scattered everywhere You can have people working in your country. Okay, you can have people everywhere. That's asymmetric religious matters and everything like that so When it is used this is I just basically explained it so that's When you are invading a country or you are combating an enemy, which has Means which are too big to be compared to like for example the United States right now is the only country which can fight a systemic war which is a war You have like bombs intelligent bombs, you know hit the third window on the left on the 20th floor and kill the man Who is taking a pee in that moment, but don't kill the cat. It is in the room. So that's That's intelligent bomb then if you kill the cat it's a shit didn't work. So we didn't spend that much money and The the country where this many is and is taking a pee and the cat was killed But he didn't have to be killed etc. Etc. They don't have the money to fight this war. So they use whatever they have Okay, so it's called a symmetric. It's also called dirty war. It's called in many ways So for example Did everybody see the black Hawk down movie? So whoever didn't see it. I mean, that's a it's a very famous or very important example of Of a symmetry in a war Okay, and the use of unconventional means so you have this big Sikorsky helicopter, which is very expensive and it costed a lot of money in researching this and development You have soldiers. You have weapons. You have maintenance I mean you would never believe how much does it cost to to maintain an helicopter after a hundred hours of flight It must be maintained for a lot of million dollars again. So you have all this thing and then you had a little boy With you know a watch and a cell phone actually was a satellite phone and he saw the helicopters coming he called the guys on the base and he said they are coming and The whole thing went, you know Went like that the black Hawk went down and and that battle was lost So the big expense the Delta Force and all the millions dollars spent satellite Recognition and everything or was spent for nothing because this little guy which I mean how much does it cost it? It's this little guy. You only have to feed him something and A satellite phone so you have to pay the phone bill and that's it and he destroyed everything This is Everybody nowadays does the example of the twin towers. So you have the 19 man 19 cutters And then you have the 11 September thing Okay, all the intelligence expenses that have been done from In the years before I didn't prevent this episode like many other episodes Of course, there are a lot of things that have been prevented, but we will never know what they are so Why are we saying this because in this in these years the electronic Warfare the electronic mean is the best way to hit The countries which are Technologically developed. Okay, so we have for example all the Western Bloc countries These countries depend that almost totally on digital systems on telematic system on Electronic systems so the critical infrastructures telecommunication infrastructures Food supply banking system and military systems even for example in the United States and missiles I think they have IP addresses. So everything depends on electronic and telematic systems So what do you need to do to hit such a country? You might use electronic means if you know where to hit of course, so you need to do some research before some intelligence but Both the intelligence and the fighting you do it using a computer like this one you connect to the network and if you Are good to search or to find things and you are good also on on exploiting them Then you might hit a critical infrastructure and create a blackout You know that in the past years there have been several blackouts around the Western countries For example in Italy where I come from there was a huge blackout about two years ago Where all the country went black totally The government say that it was a tree some tree that fell over some type of wire It was totally impossible explanation. So who will ever know what happened? Nobody and the same thing happened also in the United States Three years ago, I think or a couple of years ago too and in other countries So they said it was Switzerland You know need to be they say it was Switzerland that we fell over some kind of wire and then everything went black Out the whole country. It was incredible. I was there At night I was out tapping at night. Actually, I never saw this type of darkness. It was totally scary. So you can hit this critical infrastructure and The thing is that you can create more damage doing this than doing a lot of other things So for example the bombings that were in London last week, okay, or two weeks ago Or what did they do they killed people? Okay, 50 people died but After these 50 people died The country what did they suffer? Okay, there was a human life. Okay, and that's Nobody can contest the fact that it is valuable, but nothing changed. Okay, those structures were totally there It was psychological. It was mediatic. He was a public opinion. It was all these kind of things So that's what terrorists want to hit at that moment But if they really wanted to create damage they didn't have to kill those 50 people They could just stop a nuclear power reactor or Damage it somehow. You don't need to do very sophisticated things to exploit the critical infrastructure You just need to do a little thing that just creates havoc Okay, so this is the thing then I will go on later and I give the microphone back to this guy It might sound strange, but the main difference Between the first and the second Gulf War was a bandwidth difference In the next 10 years US has developed the way to Distribute information to collect information and Basically in the second Gulf War the US troops they were enjoying 42 times more bandwidth than in the first Gulf War How this bandwidth was actually used? Well the picture on the center. It's a typical command center command and control center Which collects a lot of data which could be Data and voice interception or data coming from spies deployed on the territory. They are going to be fed actually into the system from Stealth planes which are actually flying over the territory and watching the situation taking pictures Spidrons and men vehicles from satellite and Also from the blue force tracker, which is a very important system for The American army it is the system if you see in the movie when they are I don't know on the enemy territory And they open the laptop and the laptop to be showing some red triangles on the map Which is this is the enemy and some blue triangles This is us actually this system is not science science fiction. It is existing and they're really using it successfully Well, I want to tell you one thing if you open Google Maps or if you ever use the Downloading the trial version not cracked of course of keyhole the software which it was used by CNN To show you Basically the toilet in which the guy was pissing and beside it was the cat from the front from the satellite Do you have any idea how many? Megabytes geeks. It's actually taking a picture Taking from from a satellite huge amount now if you have a satellite Which is taking picture on the territory on the enemy territory and you have to download to give this picture to the troops Then you need bandwidth You can't do the 800 times 600 jpeg picture. This is good for browsing Britney Spears website, but not To to go at war. This is the reason why us army developed such a large bandwidth network Was it working no When us troops Entered into the territory they started to Experience a lot of troubles Now focus your attention. Do you remember exactly the day when they started to invade Iraq? The guy was sitting the CNN guy was sitting on the top of the US tank, which was running 120 kilometers per hour. I don't know it in miles. You can do calculation by yourself and it was 75 and It was running and running and running and the journalist was saying there is nobody nobody is facing us but we don't see the enemy and that was the problem because They were running too fast and they were losing connectivity try to Hook yourself into a Wi-Fi network while you are on your car and you are driving fast. You can't and And Basically the Humvees which were in front of the US troops they had to stop Even for 12 hours to download the tactical data now Do you know the difference between? Strategical and tactical data tactical data are the data which are necessary to survive in the next five minutes Because it's telling you where the enemy is From which point you should Expect to be attacked where should you go not to be attacked what you should do and Because the command and control center is telling you is telling you to do this this and that And if you rely on connectivity For having such service, it's good as long as you have connectivity But if you don't have any more connectivity, what is happening? You don't know where your enemy is while your enemy know very well where you are because you are stopped in the middle of the desert and And How was organized the system for the second Gulf War basically we had two command and control center one was located in Qatar the second was located in Kuwait and All the data Gathered by the probes Was actually fed into a system which was producing too much of intelligence Try to it is like if you enable all of your ideas messaging Or if you are using zonal arm and you tell it you tell to zonal arm to pop up the window each time you are receiving a strange packet now it will pop up every five seconds and What it will be the end that you will switch off the pop-up thing too much of information equal no information And this was a problem The second problem was that the information was fed into a satellite system the satellite system was downloading sending sorry through a traditional Sorry traditional radio streaming to a vehicle, which was located back of the US troops and from the vehicle Which was actually supposed to act as a router to distribute information The data were sent using a Eye of sight Micro with beam I guess for Security reason they didn't want to have the high technology enemy, which is the Iraqi troops Intercepting the data of the US troops But this system is working as long as you can see The vehicle which is on your back But if you're running 75 miles per hour because you don't face the enemy Then you're losing this this link and you are not capable to get any data This was the reason why they had to stop and wait 12 hours to get the data and they were killed actually, sorry US soldiers lost life Also due to this because they didn't have the backup of the intelligence telling them where the enemy is They were facing the enemy in the same moment. They realized it was existing and at the same time the bullets they were Flying over the head now The blue force tracking system. It's the system who tells you where the enemy is Luckily luckily when they developed it They assigned a search a certain amount of bandwidth to the BFT, which is actually working Using the satellite. It doesn't work using Direct microwave beams It means you can always receive it actually the same system you are using on your car for your GPS system Very similar very similar Luckily the amount of bandwidth developed from the very beginning to supply information through the blue force tracking system Was more than it was actually needed. So the developers Having such extra bandwidth they were thinking What we are going to do are we going to use this bandwidth or not? Yes. What do we do? Let's build an email system You never know it might come in handy and actually came in handy because the whole Iraqi invasion Having the first system not working was actually organized through emails You as a was at war in the sense that through the email coming from the blue force tracking system They were capable to finally coordinate their own action. This was the past Now a question for you and to the one who is going to answer to me. I'm going to give a t-shirt. What is this? Can you tell me what is this? Excuse me What is it? The trigger no no no no no no not a landmine. No no no no no no no No diesel pump. No no no no no you have it in your kitchen. I you have diesel pumps in your kitchen. What are you doing? What what Microwave magnet run Please it's a magnet run and you have it in your Microwave oven and it's a system can be used actually to disrupt Direct microwave beams as it was used in the Iraqi invasion We will see later some other Example how to use such thing. Anyway This was the past and us army Actually didn't want to experience any more such problem. No bandwidth. No connectivity. No tactical data equal death so They decided to develop a new system, which is called FCS Which stands for future combat system and it is a 21 billion dollar program But it is going to be upgraded already. It's in the in exactly in the middle of its own development It's not science science fiction. Some prototypes have been already developed and this is the system which is meant to totally Substitute the way the US is doing the war in the future in which way We will come to the hacking part later. Don't worry The old war concept was that you should have heavy war equipment the big Abram tank With having massive fire powers. I want to shoot once and they want to kill them all Large battlefronts full division deployed on the territory Let's occupy hit destroy having low-tech infantry Because high-tech influence infantry cost a lot and of course having vehicles which were Driven by by real people now under the FCS program things are going to be changed Not anymore heavy war equipment, but light war equipment instead of the big Abram tank They are going to develop small lighter tank More faster than than than the Abram one Having not a massive firepower, but having a minimal firepower But they are so fast that it can shoot you and then move and shoot you again and then move and shoot again And again and again like if you are surrounded by a lot of bees basically, you don't know You are you're going to to to get hit from a lot of different Directions instead of a large division of of soldiers deployed on the territory They're going to deploy small families called families of soldiers typically in the 12 12 people unit So I put 12 people here 12 people there 12 people there if you know where they are they are very much vulnerable You can kill them very easily, but there is a trick We have a large use of intelligence What does it mean? It means that I am I must be capable to supply through the FCS system Information immediate information to the people to the troops deployed on the battlefield So that even if they are small families of soldiers, they will be constantly Aware about what is going on and the trick is that when the enemy think that They identified our troops. We are already capable to understand it We moved the troops somewhere else and we hit the enemy and then we are going to move them and again and again and again and Finally having a large use of automatic vehicles We have some example here public data from global security.org Some of them especially the one in the box. You already saw the the drones the spy drones. They're already In force some other are prototypes You can see also the size of the vehicle compared to the human being they are much smaller than what we were used to see a long time ago and These are the working prototypes of combat drones in our comic our heroes they have to Actually get rid of one of these combat drones which gets hijacked by an enemy's hacker and It's used against its own troops now Always from public data, we can see that this is the Timing the gun diagram basically on how the FCS is meant to be deployed in the in the following years when they developed this in 2001 and one thing you can note it is that it's saying That the problem actual problem is that there is a lack of artificial intelligence, so they are drones But they have limited capability of understanding the surroundings, which means They can drive around by themselves, but in combat situation If you have the risk to kill one of your own soldier better not to take such risk such vehicles will be taken over by a US Army Soldier and they will be remotely controlled by by him Which will actually tell to the drone where to shoot and how to shoot Now the question is from the hacker point of view to receive the The signal the control signal It must be hooked to a network and there is a network. We will see later If there is a network it means such a thing is permanently connected and authenticated to the network good but it can get for example can get stuck into a hole or The the wheels can blow up and the thing that the whole thing will be stopped in the middle of somewhere So what if the enemy is going to put its own hands over it? It is dangerous to have a thing which is permanently connected to your network because the enemy can put the hands over the network So I guess I didn't find any reference, but I expect there are some there might be some System to protect in such situation like self-destroying system self-destroying It doesn't mean it's going to be blown up Because it might be dangerous because it might be close to your own soldiers Self-destroying means that you will destroy the digital contents of the drones leaving just basically a piece of art Do you remember this the American spy plane which was landing on the Chinese island a few years ago? The American soldiers before landing on the Chinese island was a spy plane Basically, it was connected to the US Army network. They destroyed the not physically but logically all the content in the airplane The Chinese authorities they were capable to put the hands over a piece of hardware without the software And you know better than me that if you have the hardware without the software It's basically a little bit more than nothing now then if it if it has really such auto-destruction system The smart hacker employed by the by the enemy My think ways to trigger the system of the self-destruction Not doing it today, but doing it the day you need it and this thing it is deployed on the battlefield You are relying on the its usage, but the hacker will actually Destroy the content triggering the self-destruction mechanism How this thing works the fcs system? It is managed by a huge network the largest network after internet actually if I think Which is called mosaic mosaic network. It is meant to manage the whole war infrastructure of of US Army ships Submarines airplanes Infantry drones everything will be connected somehow to this network The network the mosaic network it is meant to have a kind of quality of service Feature based of on The importance of the packet if the packet is coming from the command and control center This packet has priority in the meshed network because it is a meshed network It means if even if the network is Congestioned blocked somehow Overloaded the packets coming from the high priority centers will be routed correctly to the end Having the other packets waiting for that and in our comic We can't say it here, but we can say it on the comic Because the comic is science fiction We actually imagine the way to exploit such a system just Flooding it by high priority in packets by replicating them and saturating saturating the network now The fcs system it is a system a daring system They already tried the some of the pieces some of the equipment and the network It is TCP IP based and it's basically using traditional network equipment and several of the Drones are actually Linux based a miniaturized version of Linux of course with harder stacks Maybe less holes you never know But it's still something which is public and based on public networking system and Now comes the problem What I call the Apollo 14 Effect do you actually know what was the real reason why the Apollo 13? Had the problem you remember that the oxygen tank exploded If you know the reason you can get the second t-shirt Which was the real reason why the oxygen tank of the Apollo 14 exploded? Not communication problems wiring almost Excuse me a Short in the oxygen center, but why? Electrical yes, almost we're close No, no, no, well if nobody is you No voltage voltage The Apollo 13 Project was a huge project a lot of suppliers Rockwell Boeing and so on they were helping NASA to develop the systems From Apollo 12 to Apollo 13 the difference it is that they decided to increase the voltage Which was used to run the the systems of in the Apollo 14? Yeah, so all the developers all the subcontractors they were informed of course except one Rockwell and Which is by the way one of the subcontractor of the SCS system, but anyway Not being informed about this such increase in the voltage Their own they were supplying the oxygen tank and it blown up because it was overloaded by voltage You can get the t-shirt anyway Now Why it happened? It's actually normal in my experience when I work besides on H I do penetration test with my own company and One of the one of the thing that I notice it is when you have complex systems made up for example by different subcontractors the Implementation of the such system it is introducing more vulnerabilities Rockwell was one of a new vulnerability for the Apollo 13 Program now I expect given the fact that we have FCS Being a consortium much bigger than the Apollo 14 one of company most of it mostly American company The leader of the consortium is Boeing you can see actually advertising on CNN in these days Not specifically related to the FCS system, but the images they're showing are belonging to the FCS system So the general public start to be aware about such system The Apollo 13 sorry the FCS system it is led by Boeing having also a large consortium of company To be actually managed as a project manager We can say actually Boeing is the the FCS project manager On behalf of the Department of Defense Now how does it work the US Congress tell to us army? Yes You have to develop a new system they assign a budget and then they they name a project leader Boeing Then the system are divided in subsystems and in consortium. There is the consortium of companies Which are developing robotics artificial intelligence then there is a consortium of companies which is developing Unmanned vehicles another consortium of companies, which is developing weaponry and so on each company has to report to Boeing how things are going on and Of course each consortium itself has a consortium leader the consortium leader has to act as a Sub-project manager to the rest of the companies belonging to the same consortium Each consortium and each company in the consortium has its own project manager Internal company project manager who has to lead the activity of the programmers for example Which are developing within the company a particular piece of the SCS system Now you can imagine if you add all the programmers each programmer Developing the system by the way FCS system it is 31 millions of code Software 31 millions of lines of code you can imagine how many conceptual and practical Vulnerabilities they might be introduced by people who never developed for example such software because nobody did it before it is a totally new Thing and when a lot of programmers belonging to a company Which is put together with a lot of other different companies which are belonging to a consortium Which is which are put together with several other consortium are going finally to integrate What they produced the software you can imagine the huge amount of shit that can come out now as a personal experience and also analyzing the data coming from Zonache We have one million of cyber crimes The way with the face me. Okay, let's call it with the face me filed in our archives for each we know how it happened and The reason of the attacks We can say today most of the hacks which we See every day two and a half thousand server hacked per day. This is the amount of data. We're receiving as donation org 80% of the time the system is hacked through the application layer and FCS system is mostly application Now I do I want to say they are better than the average. Okay, it will it will be vulnerable maybe at 40% on the application level, but still there are Possible vulnerabilities to be introduced by the system integration. For example, the protocol might be bugged the transmission protocol might be bugged the hardware integration might introduce vulnerabilities and also of course information leakage hackers are Actively looking to get information about the FCS. I met personally a guy in Rome which was representing US Navi and He was investigating on leaks He didn't name to me the FCS system itself. He told me We are looking for information about Hackers coming from the east Europe stealing a piece of information about the military Software or military programs under development Well, the only military program under development so far big is the FCS system and No need to name it actually it was clear to me that they were they are having such problem already. There are spies who are actually using Hacker means to get information about this new system now if There are software problems that might be software problems again read the comic and you will get a very good hint on how to hack the mosaic network There are also other problems first of all with the FCS system. It is organized following the lobbying standard procedure in the American way, so The president got a lot of money for his campaign from Boeing therefore Boeing for example, I'm just Doing some science fiction Boeing is named as a project leader But then also other people they were sustaining the campaign then they they also have to have a little piece So it is not always distributed as it should be the work Lobbism has a big part in the decision to which company assigned a project or not Then the military software is not open source. Of course, you know Linux is the most audited code ever still we are finding vulnerabilities still Firefox Everybody using Firefox because it was open source two years ago Well, you never I don't know anybody who was actually reading the source But they were saying oh, it's open source so I can use it. It's it's safe, but still are coming out new vulnerabilities Because it's open sourced a closed source platform Basically, it is a never-audited platform because who is going to audit the FCS system the same people who are developing it And you know better than me that you can't audit your own job The job should be outsourced by somebody else, but because it's Military you can't do it therefore I expect by my experience to find a lot of vulnerability in the application level and within the lines Then if the FCS system is leading your troops on the battlefield Losing somehow connectivity or being hacked That Leads to a lot of trouble because you don't have any more a large battle front which is capable to defend itself Now you have small families of soldiers well soldiers dispersed in the territory They don't get shit from the satellite or information. They don't know where they are They don't know where the enemy is they don't get the command From the command the control says they don't know what to do. They're blind basically. They are slow because they are without heavy equipment and They're very vulnerable target Now if I am an enemy of the United States today, definitely I would start a program For collecting information as much information information as I can about such FCS system because nobody can fight against the United States using the same System because you need a lot of money. There is no Symmetric power as an enemy for the United States The only way you can fight United States if United States it's adopting such system It is to use a symmetric ways and one of the ways it is to hack the servers of the companies Which today are going to develop such System and to try to steal information and what one of the things which we did we were imagining to be I don't know hackers Coming from North Korea or hackers coming from Iran and to see how much of information we could find on the internet To hack the system. It's not done. So This is a question. I put there just a little forward to the question the most vulnerable system as everybody knows is a Our brain, right? So it's the human being the human being with all its vulnerabilities and its ways to be Bought or exploited? So that's why I put this question there who is Who are the best security where managers or people in the world history? Phareos They got a lot of people to build the pyramids and then at the end they killed them all I didn't find any slide with the people being killed afterwards So I didn't put it but that's the thing so We cannot do it now. So the right way would be we make we build a future combat system And then we kill everybody that build it then we wouldn't have anybody to maintain it, but that's not a problem It's illegal. But what the hell? so This is just to explode what I was saying before This slide that took I borrowed it from a Swedish study from a university there That's actually pretty I liked it very much because it explains all the phases of the conflict. You have a The mechanical war at the center, which is you know, big armies facing each other with the guns and going forward and shooting And everybody falls down the end only one soldier remains in that army one and There was the old way to fight then you have the dirty war, which is terrorism or Resistance war depends from the viewpoint, you know, if you win its resistance if you lose its terrorism and Then you have a peace war, which is you know the war that was fought between the eastern block and the western block when there was the Soviet Union and the systemic war which is the only war the world that can be fought only by United States right now It's the big difference between all the other types of war and systemic war is money and the other ones are people more people more money And you know little windows that you can hit with the intelligent bombs and then you have the ICT war ICT war is a type of dirty war, which can be fought only by By subjects which have the capability or which are linked which have a high technological Situation in their countries and can be fought only against another country, which has the same situation For example, you cannot fight an ICT war against Iran because they have only two servers I think I mean the last time I checked was was a couple of mail servers in the mines and whatever ministry Etc. They don't have anything in the nuclear side. So that's unfortunate for the intelligence people here and But you can fight an ICT war between I don't know I'm just doing fiction Japan and whatever Korea. They are not at war, but if they would they would be the thing so If you want to this is taken from a book which is called unrestricted warfare I think everybody in the that has some interest in this has read it It was first translated by the CIA and then it was re-translated again because there were some points Which were not totally clear and they were the first that are restricted because they they Hypothized means any kind of means to fight a war there is there are no rules in fighting a war Which means that you can do just about anything the important thing is the result to win okay, and They were the first to say that one of the best means to fight a war would be to true Electronic means exploiting the electronics and the telematics So future combat system. This is all the material you will see from here on up to the last slide which is Done by something like center They're all being taken from open source. Nothing has been hacked Right Okay, so This is the distribution of the consortium's that work on the future combat system So if you want to do a research from an intelligence point of view You start from here. You see who is working for whom and on what and then you get Wow you get all the companies that work on what project and where they are located One two three four pages wow and then you get to wow what's that you get all the What is this? So this is the ah, okay, this is the specific project that that has been Assigned the description of the project the company and other little Informations about that and then you have one two and here here you go So this is all you need actually to do what you need to do if you want to start fighting this future combat system you have the companies you have the projects you have the The the the project managers the people do I sees their email address the email service in the phone number So what else do you want? We have two pages of that as an example because we didn't want to make the presentation too long So do you know of course that if you have already an email address of a person You can do a lot of things from remote because you can use a modern Trojan horses technologies or Things like that and I assure you that in the industrial espionage business, which is a business right now this type of Methods and exploiting is being used constantly and it is very well paid very well paid In the other hand if you don't have the technical capability You can just send the person with the with a bag full of money and you just find out how much one of these people Costs, maybe it's not happy, you know how people are bought in companies You know, maybe you didn't get your promotion. Maybe your boss was too harsh on you Maybe I don't know your wife left you and then you are not happy and then this person comes near to you at the bar and says I you should be I mean you are better than that I think you should do you know something for a better cause here is $10,000 $10,000 not too much is it $20,000 then the end somebody says, okay, let's do it so Another thing which you can see here is a system like the future combat system. What can exploit it? We said before I mean you just need to jam it You don't need to hack it actually because hackers are Perfect, you know, they want to do things It's the act of hacking which must be it's not always the result You know you want to do that thing and then you say, okay, it's easy to do it I say, nah, it is the easy thing is for is for You know no good shit you say in America So I want to do it in a very artistic way Maybe you take six months, but then you never get the result because it's too old by the time you get the result So you just sometimes need to jam something the communication for example in this case you have an EMP shock generator Which is a electromagnetic pulse shock generator. It's a bomb basically You can rent it for a research and discovery or a research and development Purposes if you can prove you are a researcher and a lot of people can prove it for $1,500 a month and then you can you can you have the option to buy it for eleven thousand dollars afterwards So this is a public I mean you can if you want to buy it. I thought about it actually and You put it in the middle of Square somewhere and then you activated you run very fast because you need to get about three miles far and then And everything in three miles, you know, it just burns out every circuit and all the people that are around the bomb But you know they also get the suntan the little bit so this I put because You know in the company where I work for There are a lot of consultants which are being paid a lot of money to do things like that You know, this is the security management learning model and it's supposed to tell you how to do security in a company or whatever and From my experience all the things that we just said and all the things that we we saw in the past I can tell you that this is just you know if you work for a company just don't pay people to do things like that They're very good. If you want to make a big picture or we say in Italy if you want to wrap fish You know you go and buy fish and you need paper to wrap it You know, that's that's the thing. So sorry if there is any big consultant in here And if you have any questions, we don't have enough time. So just write the same a Okay You can you can come here. We have the CD with with the comic you can get it And by the way, it was supposed to to be signed by the Dark Tangent But you know the little Cisco problem he had in the in the black hat Was keeping his in busy. So basically you will sign it Just if you if you show up yourself with a CD, he will sign it. We have to sign this CDs are there and we have a few keystraps