Cyber Guerrilla Warfare, OPSEC, etc... [re: kicks bucket]
On Mon, Oct 5, 2015 at 4:51 AM, Georgi Guninski <guninski@guninski.com> wrote:
The ... situation ... is quite grave. Assume very severe ... crisis hits ... relatively soon causing ...
"State Kicks the bucket" (and other use cases) bring about some discussion around cyber guerrilla warfare of sorts... Assume you're a terrist, warfighter, some flavor of activist / dissident, human rights worker, journalist, hacker, VIP, whatever... What is the time to a fix and physical intercept on your location? Possibly specified to within some radius such that you cannot escape without being captured, or at least being visually identified, etc. Modulo your own movement while on / off air. What are the capabilities of any particular chosen adversaries that are after your realtime fix? What is your loiter time before you must move to avoid capture? Consider some various theatres, densities, infrastructures, and situations in which you might operate... - War ravaged mideast "city" - Paris, New York, Tokyo - You're in soverign territory up against drones and monitoring / locating methods that ignore and cross political boundaries. - You're in soverign territory against local police forces. - On foot or on wheels. - Cameras everywhere, discretion kept how? - Whether you strictly follow "never use the same place twice", or not. - Locating tech deployed directly by adversary vs. adversary utilizing tech deployed by local utilities that serve the population. - How to operate on limited resources against the "haves". Land lines are out since you'd churn through safe lines, unless you're tapping into them. Also wifi, cellular, satcom, pamphleting. Some examples could be drawn from the "wars" in the mideast. ie: You're spotted and fixed by undercover CIA agent, then droned 15 min later. What are your goals as a cyber guerrilla or OPSEC oriented individual or group in various tactical and strategic situations that you have an affinity with? What are the greator goals? What are the likely interest areas of a cyber guerrilla beyond personal survival of water, food, shelter? Do wide and local comms channels have trade value? How to maintain them? Any any other things related to cyber war, OPSEC type things that keep you alive / valued when bucket is kicked, even if you're sheeple....
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Wed, 7 Oct 2015 02:13:17 -0400 grarpamp <grarpamp@gmail.com> wrote:
What is the time to a fix and physical intercept on your location?
The Oakland Privacy Working Group has been doing a lot of work insofar as STINGRAY/HAILSTORM/whatever next generation cellular device position tracking hardware is concerned. They would probably have some ideas on time-to-physical lock. It is relatively to suss out the vehicles that are so equipped based upon the antennae magmounted on the roofs or the trunk lids.
Modulo your own movement while on / off air.
Are you factoring street viewing securicams and shotspotter recording devices in? http://sanfrancisco.cbslocal.com/2014/05/21/shooting-crime-privacy-tech-oakl... http://www.businessinsider.com/the-nypds-newest-technology-may-be-recording-...
What are the capabilities of any particular chosen adversaries that are after your realtime fix?
The eternal question.
What is your loiter time before you must move to avoid capture?
How would one abscond while drawing a minimum of attention to oneself?
- You're in soverign territory up against drones and monitoring / locating methods that ignore and cross political boundaries.
Would the drones be operating at an altitude at which they could reasonably be taken out?
- Cameras everywhere, discretion kept how?
The manner in which Mahmoud Al-Mabhouh is fairly well documented, and illuminating.
- Locating tech deployed directly by adversary vs. adversary utilizing tech deployed by local utilities that serve the population.
Or local tech that has been subverted somehow. I often wonder how wigle.net can be abused to track someone...
Land lines are out since you'd churn through safe lines, unless
They are also becoming rare in some areas.
What are your goals as a cyber guerrilla or OPSEC oriented individual or group in various tactical and strategic situations that you have an affinity with? What are the greator goals?
Does one /have/ any greater goals? - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "Wait Dan! I've got something on the radar." -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJWFVhuAAoJED1np1pUQ8Rk8ecP/ivb1Ixk8p5NtXNlVZv2xizI TeiN3MqDQwpL7AeGzJSFQjqT/KSaUvq6lHoKQJ91wJLV0ucDvm6UHMnLmoc9FsjZ qaebbaPYPo1L7EMbXcC5OvmLy8QXUF4HOYqHw3THiG/t33d6qqBDG5TWb8hpoIx6 HcHTEEjIKxXLyxRl+H+bqQVvziRmacjVjbx0ZJD6VPO8h5L5glC7U7wWj5Qy1Dg6 KgC9y2YcBZwfHeRNL0mKLcGBlCs9Mlk2ulz5bPeqxPqnkNA/JZyc0uOGrdSMyTAs C2gSvcAMA/9mDT1BMgFE6de3MKjJYymQ7s4jPxFMgatNTouYbBc5RpSZyFE0y0g+ B/vKaB1jayFTemGTRf46xFJDT4s56wotKXQnAiC+JIJjTgznUxwMPxcu9hjl2wHB fpW7Tnh71guYszsDsAxCOR8dzWw8mOExGm7tiVbkhQuEFcdku3U8iAmaOnXmmpCa dazb9X6hbwIh3pKNENaYeMFZrQygtMr4/n/j5pZnEuKR70Xrs4B9JrWx8hJD0XE+ FA0KuVqssAaFYUSvym+SAmQFhQSW+p/93ceMSvIwmMNBVyKi399G9oQiAMtf2VCp sCf+IRr+6B8AAZuL0yOBtUQJjDcROQ+LwvUmtKeLuwaMoHBWXgIM87Q5mjLfeCrO OmDuxnG0W9DsJkHQQUEI =JvJc -----END PGP SIGNATURE-----
On Wed, Oct 7, 2015 at 1:37 PM, The Doctor <drwho@virtadpt.net> wrote:
What is the time to a fix and physical intercept on your location?
The Oakland Privacy Working Group has been doing a lot of work insofar as STINGRAY/HAILSTORM/whatever next generation cellular device position tracking hardware is concerned. They would probably have some ideas on time-to-physical lock. It is relatively to suss out the vehicles that are so equipped based upon the antennae magmounted on the roofs or the trunk lids.
Do cybers need an ops team?
Are you factoring street viewing securicams
Cams are surely of interest to those in the field.
and shotspotter recording devices in? http://sanfrancisco.cbslocal.com/2014/05/21/shooting-crime-privacy-tech-oakl...
The thread was intended about cyber operators... people moving around with backpacks (or on wheels) with wifi, cell, laptops, rf gear, buttsets, cabling tools, blackbag physical entry, etc, or even info operators.. chasing valuable paper, keys, objects, authentication, disguises / cloning, and so on. But it could be extended to analyze the situation facing AP, kidnap / ransom, or any plain old street thing where "shots" or other direct in person action with / against other humans are involved. Cyber doesn't have much of that beyond social engineering, bypass, etc.
Would the drones be operating at an altitude at which they could reasonably be taken out?
That's probably out of scope for a cyber op. Unless they're supporting some greater non cyber goal (war), for which the warfighters would try taking them out to provide cover.
I often wonder how wigle.net can be abused to track someone...
If they're walking around with the app turned on phoning home current finds...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hola, assuming some / most of these questions are posed as just open ones to reflect upon... nonetheless, I've tossed out a few "answers" anyway (take with healthy dose of salt) grarpamp:
On Mon, Oct 5, 2015 at 4:51 AM, Georgi Guninski <guninski@guninski.com> wrote:
The ... situation ... is quite grave. Assume very severe ... crisis hits ... relatively soon causing ...
"State Kicks the bucket" (and other use cases) bring about some discussion around cyber guerrilla warfare of sorts...
Assume you're a terrist, warfighter, some flavor of activist / dissident, human rights worker, journalist, hacker, VIP, whatever...
What is the time to a fix and physical intercept on your location?
This is generally happening / in process or has happened; you operate under the assumption that it is happening or has happened and plan time scale accordingly.
Possibly specified to within some radius such that you cannot escape without being captured, or at least being visually identified, etc. Modulo your own movement while on / off air. What are the capabilities of any particular chosen adversaries that are after your realtime fix?
Not always possible to identify in advance. Easier to ascertain assuming your goals / objectives are clear (thus narrowing possible adversaries) and understanding of people's customs, language, etc where you will be functioning (online and off).
What is your loiter time before you must move to avoid capture?
Don't loiter long
Consider some various theatres, densities, infrastructures, and situations in which you might operate... - War ravaged mideast "city" - Paris, New York, Tokyo - You're in soverign territory up against drones and monitoring / locating methods that ignore and cross political boundaries. - You're in soverign territory against local police forces. - On foot or on wheels. - Cameras everywhere, discretion kept how? - Whether you strictly follow "never use the same place twice", or not. - Locating tech deployed directly by adversary vs. adversary utilizing tech deployed by local utilities that serve the population. - How to operate on limited resources against the "haves".
Land lines are out since you'd churn through safe lines, unless you're tapping into them. Also wifi, cellular, satcom, pamphleting.
Some examples could be drawn from the "wars" in the mideast. ie: You're spotted and fixed by undercover CIA agent, then droned 15 min later.
What are your goals as a cyber guerrilla or OPSEC oriented individual or group in various tactical and strategic situations that you have an affinity with? What are the greator goals?
What are the likely interest areas of a cyber guerrilla beyond personal survival of water, food, shelter?
Local surfing conditions The sensation of the air as the wind blows The sound of a laugh A smile
Do wide and local comms channels have trade value? How to maintain them?
Carefully
Any any other things related to cyber war, OPSEC type things that keep you alive / valued when bucket is kicked, even if you're sheeple....
- -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJWFhcrAAoJEGxwq/inSG8CeKIH/A8AnU7C2ZsyK1wLOrfFOcO7 8tI8ljOj1B4vFLnj1lLdq0snzRcP0l8bZWC7vSqgP1RVeNs0dP44gxPPnipcqLga aYpwSx0tOR3aRwg8jbQQtw9gv6E4eFEDgFOCZV9uouw65GVp3XohhH5CrZh649pU f6kFx5RndqdtOCs8uMHScLLajTOu09V7XU5JE4gIHEPOOxAZGhGdiHtNiS2AcgtG 3gYxI5L8Nes1xGUj6sW+iDXbcYnswIpB/6mTVk7okuXFWNHHQ4HR27om5hXQ/nPw zRq8GvN5PDvG6As5gC7H2jb3LU74Ov/gLu9MeGPkkA6dJ3Fy8binBIWhNJVOQOU= =glIk -----END PGP SIGNATURE-----
participants (3)
-
grarpamp
-
odinn
-
The Doctor