Feral Jundi

Tuesday, May 31, 2011

Building Snowmobiles: The Cyber Lance

I want to thank Matt from Facebook for bringing up this quote from Starship Troopers. I found the movie clip of the quote and it clearly shows the weakness of cyber warfare. It shows why you must have a direct action/physical security component mixed with your cyber warfare/information operations unit.

The simple reason why is that all it takes for your enemies to ruin your ‘hacking’ ventures, is for them to kill your hacker and physically destroy his equipment. To ‘throw a knife into the hand of the guy that pushes the buttons’, to paraphrase the quote up top.

Or worse, that hacker could be tortured and key information could be extracted in order to conduct a larger attack. The value of what that hacker knows (a nation or company’s secrets), or what they know how to do (hacking a nation or company), makes them a high value target.

In other words, today’s freelance hacker or even government/military hacker, is a highly valuable asset to a nation or a company. That highly valuable asset must be defended, and have a highly evolved physical and cyber offensive capability in order to compete and survive in today’s world.

So in order to deal with this new reality I have developed and defined a new term that I wanted to share with the readership. Enter the ‘cyber lance’.

Basically, a cyber lance is a combined arms team within a privateer company or military unit. Or it could be an outsourced team. The lance part comes from the french term Lances fournies, or ‘lances fournished’. Here is the definition from wikipedia.

The Lances fournies (French: “lances furnished”) was a medieval army squad that would have surrounded a knight in battle, consisting of a four to ten man team built of squires, men-at-arms (usually mounted swordsmen), archers, attendants (pages) and the knight himself. These units formed companies under a captain either as mercenary bands or in the retinue of wealthy nobles and royalty.
A Lance was usually led and raised by a knight in the service of his liege, yet it is not uncommon in certain periods to have a less privileged man, such as a sergeants-at-arms, lead a lance. More powerful knights, also known as a knight bannerets, could field multiple lances.

And of course the cyber is used to refer to anything to do with the internet or computing. I particularly like this etymology of cyber from wikipedia:

By the 1970s, the Control Data Corporation (CDC) sold the “Cyber” range of supercomputers, establishing the word cyber- as synonymous with computing. Robert Trappl credits William Gibson and his novel Neuromancer with triggering a “cyber- prefix flood” in the 1980s.

What’s cool about a cyber lance, is that a company can actually define it’s size to a client. They can say ‘we have 20 cyber lances’ or ‘cyber lancers’ (whatever sounds better to the user)
The other reason why I like the cyber lance concept, is that it mixes physical security with cyber security. It also mixes physical offense, with the cyber offense.  You must have one with the other as the world of cyber warfare continues to evolve. The cyber lance defines that combined arms group of hackers and shooters. The way I envision it, it could be as simple as a protective detail assigned to a hacker, or as involved as a special forces type team that does both the protection of a hacker, and conducts offensive operations based upon the information gained by that hacker. It is a fusion of the cyber and the physical, and all the potential actions that can come out of that combination.
I also like the etymology of lance corporal.  If you have ever served in the Marines, you more than likely were a ‘Lance Corporal”. Although the lance part refers to lancepesade.

From the Italian lanzia spezzata, which literally means “broken lance” or “broken spear”, but which was used to denote a seasoned soldier (the broken spear being a metaphor for combat experience, where such an occurrence was likely).

Or if you have ever heard of the term ‘free-lance photographer’ or ‘free-lancer‘ (etymology- medieval mercenary warrior) , then now you know the origins of the term. I think it works pretty nicely for cyber lance. So to me, cyber lance makes perfect sense in the context of what I am talking about here.
The cyber lance is also flexible in it’s usage. They could be all military units, or a  private cyber lance contracted out to the government or companies. A cyber privateer or cyber pirate company would have several groups of cyber lances as an organizational idea. Each cyber lance is just a unit or term to describe this hardened ‘hacker team with teeth’. It also goes back to the idea of combined arms, or mutually supporting groups within a unit. This concept is very much a part of the building snowmobiles mindset.

Combined arms is an approach to warfare which seeks to integrate different branches of a military to achieve mutually complementary effects (for example, using infantry and armor in an urban environment, where one supports the other, or both support each other). Combined arms doctrine contrasts with segregated arms where each military unit is composed of only one type of soldier or weapon system. Segregated arms is the traditional method of unit/force organisation, employed to provide maximum unit cohesion and concentration of force in a given weapon or unit type.

A cyber lance also promotes the idea of ‘team’, as opposed to an individual.  I believe cells or teams are far more capable for the attack and defense, as opposed to just an individual. The security of a nation or company, or the prosecution of that nation or company’s best interest would best be placed into the hands of a team, as opposed to just one individual.  Primarily because teams would actually have the ‘teeth’ necessary to capture or kill ‘individuals’, or defend against an attacking force. A cyber lance could also be attacked by a cyber lance, or a group of cyber lances that would make up a cyber privateer company.

Another key component of the cyber lance is it’s ability to work within the borders of another country or navigate the complexities of the commons called cyber space. A small team can be surgical and have a light foot print.  It also falls in line with the concepts of netwar, and offense industry which was a past building snowmobiles post.
Finally, as hackers become more valuable and more capable, it will be of national interest to protect these assets. The cyber lance could very well be the next chapter or paragraph in the world of combined arms and cyber warfare. It will also take the combination of the hacker’s mind and the tactical and strategic thinking of a special operations team to think of all the ways a cyber lance could be used for the defense or offense. The end result could lead to the destruction of a nation’s key national security assets, or the preservation of a nation’s vital national security assets. That is what makes a cyber lance a very important and lethal building snowmobiles concept. –Matt

Thursday, May 19, 2011

Technology: The Multi-Band Video Receiver MVR IV, By Coastal Defense Inc.

Hat tip to Nathan Hodge for this one.  The weight of this system is an outstanding two pounds! It is also a lot less obtrusive than the system being used in that Switchblade video below. I am telling you, the day when Drone Archers become a reality in infantry units and special forces units is coming.

The next step is to take micro drones like the Switchblade and make them launchable from Gustavs, SMAWs or similar hand held rocket launchers. If you watch that Switchblade video, these things are tube launched from a basic mortar type launcher, which I assume are disposable. Perhaps they should make the Switchblade launchable from an actual mortar tube? Or the other concept would be to make a micro drone that could be launched from an RPG. Or make it like a LAW or AT -4?

The reason why I say make them launchable like this, is so that you can get these drones on top of the enemy as soon as possible. The enemy will have a running start if they see a force hand launch this drone. But if a team could shoot that UAV immediately above the battle space, then getting eyes on for the kill or for tracking purposes becomes more efficient and increases success. It can end the fight a lot quicker, if this was possible. I imagine the electronics would have to be pretty sturdy to withstand this kind of launch, but after all, they have done it with systems like the Javelin.

What is interesting too, is that drone archers would be more successful while the fight is in progress. Accurate fires in the direction of the enemy would help to keep them in place and behind cover, while at the same time the drone archer can get a UAV above that enemy element and go for a kill or for over watch purposes to help develop the situation and contribute to a team’s OODA. Interesting stuff. –Matt

 

Photo from Wired's Danger Room and the company website for MVR IV

Multi-Band Video Receiver (MVR IV)
Overview
The MVR-IV is a hand-held unit that receives real-time, full-motion video. Designed to work over the L, S and C bands, it provides situational awareness to ground troops from aircraft, UAV, or ground based video sources. The unit is compatible with standard-issue eyepiece and can be interfaced to a portable computer for video capture, manipulation (John Madden), retransmitting and storage. It is modular in design, is upgradeable for unit specific requirements (to include digital encoding), and works with all legacy video transmission systems. Digital link encryption for all bands is available.

(more…)

Wednesday, April 20, 2011

Technology: UFED Physical Pro–Handheld Mobile Phone Forensics Tool

Now this is some cool technology. I could see how this would be very helpful to law enforcement for investigations. But of course, the ACLU has shown some concern about such devices being used and how they could infringe on privacy rights. That is a legal issue, and I am more concerned about the utility of such a device.

This is what I was thinking as soon as saw the thing. The US military/contractors should have these devices at every major FOB where local nationals are working at, and every cellphone that comes through the gates or is held at the gate, should be scanned.  I would even do it without the individuals knowing that it was done.  All is fair in love and war, and if folks are using their cellphones to make communications with the enemy, I think it is within our best interest to find that out.

You could also set up check points throughout a city of interest in a war zone, to randomly collect cellphone data. Because cellphones are being used everywhere in the war zones and developing world, it is dumb not to tap into that resource and use it for some kind of tactical advantage.

Of course this technology is nothing new or radical, and I am sure the FBI and others have been using it for awhile. What is interesting though is the ease of how to collect and organize this information. Next step will be scanners that folks walk through, and the phones are automatically scanned without having to hook them up to anything.  These scanners could be hidden and placed in key places within cities, and anyone with a cellphone/smart phone, will be scanned without knowing it. Then with data mining software, all that information could be scanned for patterns or for red flag numbers, etc. This could even be added to a census program–which we have learned in places like in Iraq that this kind of data is vital for understanding the terrain in which you fight. Lots of interesting uses for this stuff. –Matt


UFED Physical Pro
Recover hidden and deleted data from mobile phones and GPS devices
The Cellebrite UFED Physical Pro is a high-end, all-in-one solution for logical and physical extraction. The UFED Physical Pro expands your current device capabilities to extract deleted mobile device data, user passwords, file system dumps, and physical extraction from GPS devices.
With expanded coverage that now includes more than 3000 phones and a growing list of GPS devices, UFED Physical Pro provides the most complete mobile forensics solution available on the market.
Utilizing UFED’s simple and field-proven user interface, a complete high-speed hex dump of the phone memory is delivered without the need of cumbersome PC drivers. Critical data such as user lock codes, and deleted information such as text messages, call history, pictures, and video are sorted and retrieved by Cellebrite’s Physical Pro engine. The UFED Physical Pro also includes robust search tools for manual hex dump analysis, as well as an expert mode, which allows advanced capabilities for researchers. (more…)

Tuesday, April 12, 2011

Cool Stuff: The Milidroid Blog

This is neat.  A friend of FJ and fellow security contractor has started a blog that deals with mobile apps for the Android operating system.  This smart phone/operating system is awesome, and it definitely is winning over contractors, police and military folks alike. So if you are an Android user, this blog is for you.  Definitely subscribe via RSS, use the badge below, or sign up for the Facebook page. And definitely ‘Tweet’ and ‘Like’ his posts if you support the content and want more of it.

On an artistic and technical note, they have a great little logo/brand and the website is very SEO friendly and easy on the eyes. –Matt

Welcome to Milidroid!
March 21, 2011
Milidroid is your one stop source for all thing military related to the android platform and associated equipment. We bring you industry news, articles on apps that may be of interest to those in the military, product announcements and reviews.
We are also looking for your input what are you using with your Android? Let us know what equipment, apps and accessories you find useful. If you are a developer give us the scoop and we’ll help you get the word out.
Mission Statement:
Milidroid is here to provide a resource for those seeking information on military specific uses for the Android platform and associated apps, devices, and equipment.
Mobile Browser Compatable
Milidroid is Android readable right our of the box. No need to install a special app just visit the site in your browser and read.

Easy Downloads
The “Android Market Badge” is a multifunction feature. For starters it’s a link that will take you to the app in the Android Market whether you’re browsing on your computer or Android device. It also has an embedded QR Code that can be scanned with your phone if you have a barcode scanning app, which will also take you directly to the app in the Android Market.
Link to blog here.
Link to Milidroid Facebook here.

Wednesday, February 16, 2011

Building Snowmobiles: Man Vs. Machine–Steam Engine, Deep Blue, Ziggy, Watson…..Boyd?

     In The Art of War, Sun Tzu advised that one of the most important rules of warfare is to “know thine enemy.” At the chess table, the more you know about your opponent — how he has played in the past, his favorite moves, his strengths and weaknesses — the more likely you are to defeat him. Knowing these things requires sorting through a wealth of information — and that’s where computers come in…. 

     Kris says today’s chess players have absolutely benefited from the technology: “They are better players because of it, and they’re achieving more at a younger age. Bobby Fischer was considered an anomaly when he earned the grandmaster title at 15. Today, if you aren’t a GM by the age of 14 or 15, you probably won’t go far in chess. Talent will always matter, but technology is helping talented players learn faster and better.”

     What would a war game look like between a Boyd Machine(or just Boyd) and General Petraeus?  Or better yet, a general or political strategist with a Boyd Machine assisting in strategy and planning? These are some interesting concepts to ponder as militaries, companies, and politicians continue to seek that edge that will help them to defeat their opponents.

    If you look at the progression of machine development for Chess playing, Deep Blue was the end result of continuous improvements (kaizen) to the software.  Deep Blue ended up beating the human race’s top chess player and that is significant. It is a key point to remember when conceptualizing the Boyd Machine.

    Furthermore, I believe that Watson will at one point dominate Jeopardy.  It is doing very well now, and the four years of work on the machine is telling. Even if it doesn’t do it now, it will certainly do it in the near future because of Kaizen and because of Moore’s Law.

    So with these two examples of a machine evolution, is it a stretch to envision a computer defeating a top general or a team of generals in a war game? After all, war is the ultimate game of chess.

     I will take this a step further.  If not man versus machine in the endeavor of war, how about cyborg versus cyborg?  The way the human race is interfacing with machines in the present could easily classify us as ‘cyborgs’.  We carry around smart phones or cellphones, we check our computers daily and highly depend on both of these devices. Most humans have a hard time being away from their computer or phone, because they are so important to their lives.  This is reality.

    So with that said, imagine a general with a Boyd machine, versus another general with his machine?  Or a CEO hybrid versus a CEO hybrid.  You get the idea, and this is exactly the point of the various articles below.

     In the world of Chess, this reality has already presented itself. Will we see a similar future where strategists in political campaigns or military campaigns will be assisted by a machine for planning? I think so, because that is the natural progression, and the computing power is there thanks to Moore’s Law and Kaizen.

     Remember the rule of mimicry strategy?  Folks will copy the most successful strategies for winning, and add one little thing to it to give them the edge.  If everyone knows all the strategies and thought processes of all of mankind’s strategists and their opponent’s history, then what would give an edge to one side over the other?  Could a Boyd machine be that edge? Something that can analyze and synthesize faster than an opponent. Or help it’s human counterpart’s decision making cycle and come up with the winning strategies necessary to win that war, campaign, or competition in a market place? Interesting stuff.

    It would also be cool to see how such a Boyd machine would be constructed.  Take all of his theories and papers, as well as all of the material ever created in regards to strategy, and construct a machine that would think like Boyd?  There are plenty of individuals out there that could contribute as advisors to such a project. Best of all, it would be really cool to build a Sun Tzu machine or a Clausewitz  machine, and have cyborg teams war game against one another.  Al Qaeda or Taliban machines could be constructed as well, and I think war gaming in the future will greatly benefit from such efforts.  –Matt

Edit: 02/17/2011- Watson wins in Jeopardy, which to me is incredible because this was it’s first attempt! Watson won $77,147 to Mr. Jennings’s $24,000 and Mr. Rutter’s $21,600. Good job to the crew at IBM for building such an amazing machine.

Watson, the ‘Jeopardy!’ computer, has grander plans

IBM’s Watson Just Latest Edition of Man Vs. Machine Battle

The role of computers in planning chess strategy

The website for IBM’s Watson here.

TED: We Are All Cyborgs Now, Amber Case 

Watson, the ‘Jeopardy!’ computer, has grander plans

02/16/2011

By Hayley Tsukayama

Watson, the computer that’s winning hearts and cash on “Jeopardy!” this week, is more than just a pretty interface.

David F. McQueeney, vice president of IBM Research said that Watson’s real applications are far more practical. The computer is actually intended to help users get a handle on unstructured data such as text, e-mails and in-company mail messages.

“We’ve been working for a long time about helping humans navigate a large amount of data, ” McQueeney told Post Tech in an interview. “There’s all kinds of incredibly valuable information about the way an agency runs in unstructured data, and we’ve been working for decades on extracting meaning and structure from it.”

What McQueeney hopes IBM can do by showing Watson off on television is let people know machines have evolved to the point where they can help humans struggle with problems without having to modify all the data for a computer.

“I’m so pleased that the ‘Jeopardy!’ producers agreed to work with us,” he said, “and I’m as pleased as they are that the result was good science and good entertainment.”

(more…)

« Newer PostsOlder Posts »

Powered by WordPress