 So our first speaker of the day is Chris Rock. So Chris spoke last year in my speaking track, gave an excellent talk and it was only 20 minutes long but it was phenomenal. You guys are in for a real treat. Let's give Chris Rock a big hand. Thanks guys. Thanks for coming to the talk today guys. I know there's a lot of great talks at the moment. There's a lot of internet of things that you can go and see but I think you'll enjoy this talk. This is a talk that I thought I would never talk about. I was never going to talk about this because it was a little bit risky but I think now that this is the best time to do this talk not because of all the elections all that sort of stuff that's been happening now with the Clinton emails for example but there was an article that was released. I'll show you the slide. The US National Intelligence Director James Clapper said that cyber espionage came second. We came second to ISIS. Now I don't want to live in a world where ISIS is scarier than hackers especially in 2016. We previously held the title in 2013, 2014 and 2015 and to be honest I was a little bit disappointed when I saw this result. So I thought I'm in my 40s now. There's a lot of young hackers in the audience and I'm not going to pass the baton to you guys unless we have that number one spot back in our pile. So let's have a quick look at ISIS. A bit of a no-brainer here. When you have an occupier of an occupied country you have a terrorist organisation. Nothing has changed throughout history. I know it's a simplistic view but it is an accurate view. So the first thing we need to do is when we lose and we did lose we came second. We beat North Korea that's really good they got nukes they're pretty scary but we can hack anything we want. I know there's a lot of people in this audience could hack anything I asked them to hack. Banks, government, whatever. We just need to put it all together. So the first thing that we need to do is work out why we came second. So let's have a look at ISIS. Let's see how they fight. I just need some audio. Now this video is a little bit violent so if there's any kids in the audience that have come by roots I apologise but I showed it to my eight-year-old son and he was cool with it. If he's cool with it you guys would be cool with it. So let's have a look at our competition you guys but I think that was pretty embarrassing that we came second to that. So now that we've analysed our enemy let's have a look at ourselves. So the Sony hack that was a great hack I love watching those movies every week. The Ashley Madison hack my wife and her lawyer really love that hack seeing my name up on that list. Now the Pokemon Go hack. Now I know why we came second with that shit with that denial of service on Pokemon Go. Thank you Poodlecorp. And even my talk about death did not impress James Clapper enough to give us position number one. So the reason I'm giving this talk is to rectify that and to do that I need to escape away from our normal hacking environment and we need to skill up a little bit. The reason we did come second is we're a two tunnel focus. We had tunnel vision we didn't look outside. So I thought what I'll need to do is I contacted a mercenary. He'll be up to teach me some tactics in coups, revolutions and then I'll see if I can apply that and see if I can do a coup or revolution myself. So I contacted this guy his name is Simon Mann and I'll let you tell him I'll let him tell you about himself. My name is Chris Robb with his work to see if a coup d'etat put the overthrow of a regime could be achieved by computer hacking and by cyber warfare methods. My background to that is that I led the 2004 attempted coup against the regime of Equatorial Killing. That attempt failed. I was arrested. I spent five and a half years in prison for that. Prior to that in 1993 I was one of the founding people of executive outcomes. South African Private Military Contractor, which is credited with winning the ghastly civil wars first in Angola against the rebels. Unita and then in Sierra Leone against the rebels there. I served in the first Gulf War on the staff of Sapeyta de la Villier. My 10 years prior to all of that was as a British Army officer. I served in the Special Air Service as a troop commander and an anti-terrorist team commander as well as in the Scots Guards as a platoon commander and did tours in Northern Ireland with both of those units. So he's a master of his field and I'm a master of mine so I thought it'd be good if we could combine the two together. So why would we use mercenaries? Obviously the clandestine there's no governments that are linked to the mercenaries. They're loyal so as long as you pay them they're yours and it's not a war if you use mercenaries. So this is a traditional mercenary coup structure so the important position there is the architect and you can see a picture of Simon Mann there with the gun. Now he's the man that pulls the levers so above him for example we have special interest groups so this is traditional organizations such as the CIA or private companies who've got oil interests and things like finance years. Now under his direct personnel he has obviously advisers and that's an important role too. So when you guys are looking at doing this sort of stuff for real you might decide that you're an architect or advisor really depends on how you think and you can see Simon would have ground air and he would also have sea but now he's developed the digital domain as well which you'll see in the future because let's face it the digital main in terms of intelligence about what we can pull is very important and again there's the ground people as well so we've got Rambo down there and Tom Cruise but these are the grounds in terms of a cyber perspective we're talking about hackers. So for example in Simon Mann's failed coup in 2004 his special interest groups were people like who provided finance were the Spanish government there was also Sir Mark Thatcher which was Margaret Thatcher's son who provided finance and an airplane to move the mercenaries around. So here's some traditional mercenary companies so you can see the CIA down the bottom in the left-hand corner and you'll see obviously black water you guys know black water quite well but you'll see also in the middle with the the buffalo sign in the middle that's there was a 32 battalion in South African Defense Force they were guerrilla fighters they fought in Angola and modern day Namibia and that was part of the South African Defense Force after apartheid was abolished in 93 these guys were out of a job so they became mercenaries so the companies to the right of the the buffaloes such as executive outcome ages and sand line for example companies that were set up by mercenaries who who came out of that battalion. So when you guys are looking at overthrowing a government you really have three options we have the election so rigging in election now election is a legitimate way of changing government every three or four years not in every country but most countries we can incite a revolution or a coup. So you guys are experiencing this at the moment so the election you're already seeing some email leaks with Trump and Hillary Clinton I was watching this morning about someone was talking about the size of Trump's hand which I thought was fucking ridiculous but I think what they're doing what Wikileaks doing is is releasing this information is great but it's just not really what I'd be looking for in terms of using an election to overthrow a government so I'd be looking at like a 12 days before Christmas or 12 days before an election tack. It doesn't have to be real we already own everything we already own banks investment companies so we can use the items on the right-hand side just to fake whatever we want so when someone goes towards an election they can just use those things there on the right hand side so you can actually move money between the parties and we'll have a look at that in depth a bit later on. In my country Australia we got an SMS just before we went to the polls Medicare is a bit like your Obamacare and it looked like the SMS was from Medicare and it was pretty much the scare people into voting for the other party so a technique that you can use to to throw an election and again the Wikileaks for email leaks that as I said this one's been going for too long these things should be done in rapid succession to get into the voters mind just before they go to vote. Okay the second method we have is a revolution so here's a couple of revolutions in history you guys have had one we had Egypt in 2011 and Ukraine 2014 so for those who don't know Ukraine 2014 the president of Ukraine was about to sign a deal with the EU get 700 million dollars in loans and then Putin stepped in and offered them two to three billion dollars to go to to get rid of that so the people revolted against that and we'll have a look at that a little bit later on. The other option is the coup the coup d'etat so you saw that recently in Turkey where a small portion of the army or in our case mercenaries tried to overthrow the government by force and you'll see there the system examples of coups and American government was involved in the first two of those so in terms of where we'd want to start and overthrowing a government we start down the bottom so we have what's called tactical operations or low intensity operations so this is where you want to weaken the government with insurgency sanctions or really just telling them they're doing a bad job. Example I put up there for the revolution so if those fail we have the revolution which we saw in Ukraine and the picture there is the deputy PM in 2013 before the revolution was complaining that the American government were doing exercises called tech camp and they're actually teaching the people of Ukraine on how to organize protests via Twitter and Facebook and he's complaining the American government are causing the revolution before it happened. If a revolution is not going to work then we look at the coup so the Iran coup over 51 to 53 was done by the British government and the US government and if that fails we're looking at invasion so before Panama was invaded there were five failed coups before Manuel Noriega was replaced in 1989. Things you need to watch out for when you're doing a revolution these are the five things that will try to stop your revolution so the government in power for example saying that they're going to have new or fresh elections something called strategic handletting which is separating the insurgents from the population using the Vietnam War the third one which we'll talk about a bit later called cash grants so you're pretty much bribing the people to shut them up the third one is a middle alternative so we have a left party a right party and you offer a middle party these are all techniques just to quiet the population down you just have to be aware of these because they may happen if you're kind of trying to set up a revolution and the last one is economic development organizations and hospital school building so when you see the military invaded country for example like Iraq and they're building schools and all that sort of crap it's all just bullshit they're just keeping an eye on the population to stop a revolution happening post that event that's good publicity as well some techniques for preventing coups so the private army or the mercenary private military contractor so Colonel Gaddafi with his 3,000 revolutionary guards the soil sorry the Saudi royal family with its 25,000 white army and you guys have your own National Guard your private military force protecting each state I mean it's a great anti-coup measure so you really don't have any central point to overthrow the government of the U.S. there's also spies so Assad for Syria for example has these spy agencies that spy on the military and spy on each other to make sure that no overthrow takes place there's no coup and that works quite well they work so well that a civil war is in our place in Syria as you guys know and obviously you guys have a lot of intelligence organizations for this as well one thing I want to bring up is the fake coup you got to be aware of the fake coup so on the on the screen you'll see some different coup types and you welcome to study those and there's some material on your CDs which talk about different types of coups but when your opposition is getting close you want to arrest them and just say that they're causing a coup this work well in Turkey in early 2000 where the AKP party arrested generals and journalists to say that they were creating a coup now this actually didn't really happen there was digital evidence had been modified and these guys were cleared and then obviously there was another coup just recently we don't know whether it's fake or not yet there's a little bit of theory the guys to get you started and I wanted to talk to you I'm not really much of a theory guy I need to know how to create a coup or a revolution but now I want to apply it to a real country operation nanny goat 2011 so you guys would have heard of Q8 small oil producing country nestled between Iraq Saudi Arabia about 3 or 4 million people that's a picture of Q8 actually it looks like this pretty close now seriously this is what Q8 so beautiful city so what we'll do is let's have a look at Q8 city this is the government and also family tree there is pretty much exactly the same thing we have the Amir up the top you might see a common link in the last names al-Saba all the way through so we have the Amir crown prince the Prime Minister his name is NASA al-Saba and then you can see the foreign affairs and defence ministries now what we want to do here is we want to overthrow Prime Minister NASA and for those you know the unit or unit oil scandal the bribery scandal they referred to him as the big cheese so this is the standard intelligence that mercenaries or militaries will use you guys probably will know these sort of stuff like the NSA and also embassies spies and five eyes but what can we use so we can also we can use private intelligence agencies WikiLeaks for example and I don't know if you guys can you guys from read that but the what they referred to shake NASA al-Saba is perceived as politically incompetent practical wonk his record is tarnished by his failure to construct and effectively manage his cabinet but I believe the best intelligence is when you hack yourself and I want to hack all the government to find out what he's up to okay so looking at the intelligence we think corruption is going to be the big point in this one here's a map of Kuwait and you can see the green which is the oil fields of Kuwait and the people are not happy that the government of rich and the people feel really poor now corruption is not going to work in every country you're gonna have to find the weakness in each country for example Nigeria sorry anonymous thought they would attack Nigeria on their corruption which is pretty fucking pointless because that is Nigeria's biggest export it won't work there so what are our options for overthrow elections no there's no real elections those three top parties there the mere crown prince and the prime minister there's no elections for those guys the elections are for the guys below that so we're not going to look at the election who did tar now it's too hot so here's a map of Kuwait the white dots is the US military bases the green is the Kuwait army and the purple is the Air Force they also have 7,000 soldiers protecting the royal family so Ku I'm not a big fan of racing against those forces so it looks like revolution is our only option so in 2011 you guys will probably remember this was the hour of spring so on the left-hand side you'll see the countries that recently fell and on the right-hand side you'll see a timeline of the countries in that region that either fell by revolution to assassination or just protest and you can see Kuwait down the bottom in light blue cabinet resigns so here's an extract from Edward Lutwak if you guys want to do these sort of coups of revolutions unique I'm gonna have to study up on this guy he's a he's pretty much a master for strategy and this illustration shows what the intelligence agencies need to go through to find out whether it's a coup taking place so on the y-axis we have all the data the intelligence agencies are gonna go through on the a in Ku planning leakage that is when I'm planning a co-operation of what's gonna leak out when I talk to my advisors and the hackers the blue line above is noise or levels and the green line here Ku plus noise data is all the intelligence has come through and the little X point is when the Ku is uncovered obviously you want to keep your offset quite low so you don't get detected so without cyber mercenary structure same to the is the traditional mercenary we're going to use things such as denial of service attacks social engineering and all our normal hacking stuff and it's your job as the architect to employ the advisors to get the people on the ground such as hackers from your country or overseas countries you'll need to map out all the targets of the country that you want to hack so we're talking about government media electricity oil gas all those sort of agencies and you want to map out what you want to hack now I'm not really much of a strategic in terms of what items I want to hack so I just hacked them all at least then I had the options of what lever I wanted to pull so as a hacker we know what sort of tools we use on a normal day-to-day basis you're going to have to learn some new techniques and tools not hard you just need to do a bit of research I've just got a couple of them up there a lot of them have to do with misinformation so when we're hacking into banks we want to move money around to make it look really dodgy and also things like professional agitation so we want to employ people to do protests like union members and also university students now you're going to have to finance this operation I probably wouldn't recommend this method we nearly got our goal but by using the chart below you say that we got it didn't take long before we got uncovered so I'm a big fan in robbing banks they've got lots of money so we use the banks money you can also use the banks for depositing fake corruption payments and I'll share that in a second terrorism payments all breaking in the bank such as removing all the money from the banks and then Hillary Clinton pretty much said here that we've got the green light to attack these countries here Saudis Qataris and Kuwaitis need to stop their citizens from funding extremist organizations another tactic and users move money between private accounts from these terrorists into private accounts such as Hillary Clinton and use that evidence to paint a bad picture of her or Trump I don't care who wins they're both lunatics so let's get into the real world here's the central bank of Kuwait that's what it looks like in 2011 on the left-hand side and that's what it looks like now in 2016 obviously if you can't hack in through the front door use the stuff that you've got around we don't have to use a zero-day we've got a thousand targets to hack don't get all fancy pants on me and use zero days just use whatever you can so whether it be a land toy a land turtle or Raspberry Pi or you can see the little box out I don't know if you guys know what that is the fourth picture along that's an NS tell you slug it's an as box which we use as a PC or a rat so physical rat within an organization or what we did is we just hacked in the front door if you can't hack in through the front door just pay a cleaner and they will put one of these implants in for you average cleaning salary in Kuwait is about $150 a week so you give them two grand which you'll use from robbing the banks they'll plant them in there for you so what we want to do for corruption is we want to steal money from the government and put it in private banks accounts of the government so there's a picture of Nasser and there's a couple of banks in Kuwait and an offshore bank so now that we own the central bank we need to hack private banks now we didn't know from our intelligence which banks he had bank accounts with so we just hack them all by hacking them all we can then move money between those bank accounts so we use government money and funded the private bank accounts by doing this to we could also create bribe payments as well also there's a lot of money in stocks and finance too so you want to hack those as well even to crash the stock market and again we went through the front door so you want to know what your government's up to whether they're on to you or you just want to see what weaknesses there are in the government so you'll need to hack into the government to listen to their emails their phone calls the interior ministry the judges everything these are live shots of hack government departments one thing you want to hack to is the telco so telcos are not just phone calls these days telcos are media telcos are internet you want to siphon their internet or you want to squish the internet for example this is a prime case where you want to kill the internet at the right time or keep it open if they try and close it so obviously MPLS point of presence pops you want to hack into those you want to be up to stream your own media to get the people angry obviously companies now using telcos for cloud services and security services so Zajil is the biggest company in Kuwait who also provide security services for these companies so you want to hack in just like what we did that way you can control the flow of information you own the ISP you own the country which brings us to global warming you might think why are we talking about global warming so obviously in they wanted to make sure they reduce emissions by 2050 and the G8 and the EU came together and said what we need to do is map out current infrastructure such as oil gas and find out what's going on with global warming so we can use websites like nupedia to find out where things are such as power oil and and and nuclear plants so you just plug in your country and I'll show you all the maps now why would you want to cut these services it's a no-brainer when you want to do a revolution or coup you want to cut the power at the specific times or cut the water to piss people off and that and that does piss people off when they live in the desert and also your energy sector as well for example the studies online if you want to have a look at that high high voltage transform units make up less than 3% of transformers in the US but carry 60% of the power so how do you map those out you guys have websites to do that for you so all you do is just tick high voltage transformer lines and it'll just tell where all the power comes from if you want to disrupt power so you're going to need to study what a power station looks like to disrupt it so when I was talking to Simon Simon man he said to me just blow it up I said I'm not Zolls I don't have C4 I'm just gonna chuck on the bloody thing so he said what you need to do is disrupt power okay no worries so I thought well I can hack into power so what I'm going to shut it off that way so here we have a transformer this is not a picture this is not an American picture so this is not your critical infrastructure your honor this is a picture this isn't a Australian transformer so the transformers down below and up the top we have what we call mineral oil that keeps it cool and when a transformer doesn't have oil it doesn't work so there's no power in 2014 in California someone was shooting at these things drained the oil and then you guys were out of power for 27 days and they just had to rewrite route power from another substation so Simon suggested if you want to get hands-on you can you can shoot them drill them or angle grind them to drain that oil and I thought well I'm not going to do that and I've I failed to hack in I fucked up I couldn't do it so you guys have probably seen these before they're these spinning blades that they put on a helicopter that chop trees away from power lines but those who haven't seen it I'll just just a quick look pretty cool and it chopped trees from power lines now I thought well that's pretty cool but I actually want to chop power lines myself well I don't have a helicopter but why don't I use a drone so I thought I'll make my own so what we have here is two 18 circular blades attached to part of a bike frame and those just been really fast attached to a cordless drill and you'll see that on the second picture I've actually removed the battery and I've actually removed the battery from the pack only because the battery kept getting caught on the power line so I removed it so how does it work I'll show you so that's a great device for cutting power lines so that's the five pound model and you can actually reduce it and you can make it we can get it under three pounds so you can do it to the weaker drones so you just use a series of drones put the coordinates in and it'll just run straight through the power lines the cables I use there were copper the ones that you that are on power lines are aluminium so it'll go straight through those if you're gonna make one of these be really fucking careful so there is no safety shit involved if you're a bit of a tight arse just and you've got a small drone just hook a 10 meter hose to your drone with a piece of wire and run it over the power line and once it hooks onto the power line it will drag it across and drop it over the power lines and just arc them so that's the cheap version so now that we own everything and we can hack everything including the banks we need to understand how the media works so we need to reverse engineer them and that's what we do for a living so why don't we do it with the media so what we do is we apply what's called the two source rule so the media need two sources to use it as a story and I've got this the sources on the right hand side and types of sources so you want to need at least two stories sources to fool the media or you can actually pawn a few media outlets that we did from the telco published information and then just release it you want to release the information to the to the news agency that will release that information when they've been questioning it so for example Fox News you want to use the Hillary Clinton information they'll publish it and they won't even give a shit you don't want to do it in reverse because they're not going to publish it they've got no interest in doing that so what we did is in 2011 we use Q8 central bank we already own them so we use unnamed government officials to transfer millions of dollars outside the accounts into their private bank accounts and we use the New York Times to do the same thing using that two source rule now one of my idiot advisors thought this would be a great idea he thought using a Q80 Prince convert to Christianity Christianity would be a good idea and went with it he did get the publicity was after we got a hundred media outlets that went with that but it was just a stupid idea you need to use the people in this when the CIA using when the CIA planning a cool revolution you need to get the people on side you've got money in your hands you need to use bribes so use this sort of money to pay people to put implants within companies professional agitation misinformation or get corporate people to do stuff for you you've got to heat the population up enough to give a shit to overthrow the government so for example the professional agitators you would have a group of people that you would pay to cause a protest and then you would get another group of protesters dressed in police uniforms to bash them up and then then you get that on the news and if they won't publish it on the news you publish your own news you own the telco when you're planning the operation you need to plan it down to the absolute detail and you need to be flexible because shit just won't go right you might lose a rat you just need to have to plan for changes in your in your operation so I've talked a lot and I want to show you how it works in in the real world so I put a video together just to show you how it works so protesters outside q8's parliament chant the people wants to bring down the Prime Minister they are demanding the removal of Prime Minister Sheikh Nasr el-Mohammed al-Sabah whom they accuse of corruption as demonstrators break through gates and enter the main chamber police reportedly beat up protesters who were marching towards the Prime Minister's residence demanding he resign a member of the ruling family Sheikh Nasr Muhammad al-Mahdal Sabah is accused of failing to stem endemic corruption in q8 okay guys what I want to leave you with now is for the new hackers that in the new generation is just think bigger so don't try and hack bigger targets but combine multiple targets and look side out outside of your industry to combine multiple things together that's it guys and then we'll be number one again