Slide 1

Slide 1 text

RETICLE: DROPPING AN INTELLIGENT F-BOMB Brendan O’Connor, CTO/DSS Malice Afterthought, Inc. Think again. a decentralized botnet for disposable computing

Slide 2

Slide 2 text

BRENDAN O'CONNOR • CTO/DSS, Malice Afterthought, Inc • Rising 2L at the University of Wisconsin School of Law - IANAL,Y • I've done DARPA stuff, security research, and even Network Warfare teaching for DoD (want to hire me? I'm always looking, so ping me!) • BTW, No One Authorized Me To Say ANYTHING! I speak for nobody.

Slide 3

Slide 3 text

DARPA CYBER FAST TRACK

Slide 4

Slide 4 text

ROADMAP • Scenarios (The Problem) • F-BOMB (The Hardware) • Reticle (The Software) • Missions (What It Does) • Next

Slide 5

Slide 5 text

SCENARIO 1: ENVIRONMENTAL RESEARCH

Slide 6

Slide 6 text

SCENARIO 2: BAD MEN WITH GUNS

Slide 7

Slide 7 text

SCENARIO 3: OCCUPY

Slide 8

Slide 8 text

WHAT WE WANT • A system for cheap, disposable computers • Deployable by untrained personnel • Reconfigurable post-deployment • Capable of independent or coordinated action • With sufficient processing power to take on high-level tasks • @Dakami - “Ever deployed hardware? It’s not fun.” I disagree!

Slide 9

Slide 9 text

ROADMAP • Scenarios (The Problem) • F-BOMB (The Hardware) • Reticle (The Software) • Missions (What It Does) • Next

Slide 10

Slide 10 text

FALLING/BALLISTICALLY-LAUNCHED OBJECT THAT MAKES BACKDOORS • Design Goals • Cheap -- < $75, < $50 if possible • Reconfigurable Hardware for Different Sensors • Ultimately, this will require USB for cheapest sensors • Light enough to be flown on a UAV, or thrown, hard • Durable enough to land poorly (we’ll come back to this) • Ubiquitous enough to be deniable-- no bespoke PCBs

Slide 11

Slide 11 text

WHY NOT THE PWNIE PLUG?

Slide 12

Slide 12 text

WHY NOT THE MINIPWNER?

Slide 13

Slide 13 text

WHY NOT THE WASP?

Slide 14

Slide 14 text

F-BOMB, VERSION 1 PogoPlug (v2/v3) Core Flash Drive 2x RTL8188 PogoPlug POGO-B01 Mainboard

Slide 15

Slide 15 text

BRIGHT PINK INFILTRATION

Slide 16

Slide 16 text

RECONFIGURABLE

Slide 17

Slide 17 text

No content

Slide 18

Slide 18 text

EXCESSIVELY REAL-WORLD TESTING

Slide 19

Slide 19 text

WHOOPS

Slide 20

Slide 20 text

ROADMAP • Scenarios (The Problem) • F-BOMB (The Hardware) • Reticle (The Software) • Missions (What It Does) • Next

Slide 21

Slide 21 text

RETICLE

Slide 22

Slide 22 text

RETICLE DESIGN GOALS • Minimum Viable Hardware - exploit local WiFi for comms • Deniable Deployment • Encrypted storage, with no local key storage! • Encrypted communications • No Central C&C Server - fully peer-to-peer, no SPOF • Resistance to Central Compromise / Node Compromise • As easy to deploy as a life jacket, but still with crypto.

Slide 23

Slide 23 text

NOT DESIGN GOALS • Mesh Network • Really great research, but hard for untrained users in the field to deploy in an efficient way • Instead we’ll use “the Cloud” as our mesh! • Synchronous Communication / Simultaneous Command

Slide 24

Slide 24 text

PROBLEMS TO SOLVE • Enough hardware to test performance on embedded systems

Slide 25

Slide 25 text

SOLUTION: A CLONE ARMY

Slide 26

Slide 26 text

PROBLEMS TO SOLVE • Enough hardware to test performance on embedded systems DARPA • How do we have encrypted storage without storing the key on-disk but still easy to use?

Slide 27

Slide 27 text

GRENADE-STYLE KEY MANAGEMENT

Slide 28

Slide 28 text

PROBLEMS TO SOLVE • Enough hardware to test performance on embedded systems DARPA • How do we have encrypted storage without storing the key on-disk but still easy to use? USB Drive • Obfuscating Traffic Endpoints

Slide 29

Slide 29 text

SOLUTION: TOR

Slide 30

Slide 30 text

PROBLEMS TO SOLVE • Enough hardware to test performance on embedded systems DARPA • How do we have encrypted storage without storing the key on-disk but still easy to use? USB Drive • Obfuscating Traffic Tor • Easy Local Storage

Slide 31

Slide 31 text

SOLUTION: COUCHDB

Slide 32

Slide 32 text

PROBLEMS TO SOLVE • Enough hardware to test performance on embedded systems DARPA • How do we have encrypted storage without storing the key on-disk but still easy to use? USB Drive • Obfuscating Traffic Tor • Easy Local Storage Couch • Peer-to-Peer Replication

Slide 33

Slide 33 text

SOLUTION: COUCHDB

Slide 34

Slide 34 text

PROBLEMS TO SOLVE • Enough hardware to test performance on embedded systems DARPA • How do we have encrypted storage without storing the key on-disk but still easy to use? USB Drive • Obfuscating Traffic Tor • Easy Local Storage Couch • Peer-to-Peer Replication Couch • Encrypted, Revokable Communications

Slide 35

Slide 35 text

SOLUTION: COUCHDB?

Slide 36

Slide 36 text

STEP 3.5: FILE A BUG REPORT

Slide 37

Slide 37 text

PROBLEMS TO SOLVE • Enough hardware to test performance on embedded systems DARPA • How do we have encrypted storage without storing the key on-disk but still easy to use? USB Drive • Obfuscating Traffic Tor • Easy Local Storage Couch • Peer-to-Peer Replication Couch • Encrypted, Revokable Communications

Slide 38

Slide 38 text

SOLUTION: NGINX

Slide 39

Slide 39 text

PROBLEMS TO SOLVE • Enough hardware to test performance on embedded systems DARPA • How do we have encrypted storage without storing the key on-disk but still easy to use? USB Drive • Obfuscating Traffic Tor • Easy Local Storage Couch • Peer-to-Peer Replication Couch • Encrypted, Revokable Communications Nginx • Initial introductions to the peer-to-peer network

Slide 40

Slide 40 text

EXPLANATION: I WISH I HAD FRIENDS

Slide 41

Slide 41 text

STEP 6.1: REMEMBER USENET?

Slide 42

Slide 42 text

STEP 6.2: THE SASSAMAN MEMORIAL HACK

Slide 43

Slide 43 text

PROBLEMS TO SOLVE • Enough hardware to test performance on embedded systems DARPA • How do we have encrypted storage without storing the key on-disk but still easy to use? USB Drive • Obfuscating Traffic Tor • Easy Local Storage Couch • Peer-to-Peer Replication Couch • Encrypted, Revokable Communications Nginx • Introductions to the peer-to- peer network Usenet

Slide 44

Slide 44 text

PROFIT!

Slide 45

Slide 45 text

ROADMAP • Scenarios (The Problem) • F-BOMB (The Hardware) • Reticle (The Software) • Missions (What It Does) • Next

Slide 46

Slide 46 text

TESTING MISSIONS

Slide 47

Slide 47 text

MISSIONS SO FAR • Blinkenlights • Stalkr • OKCreepy • Private Web Browsing (Auto-Tor) • Note that we get wireless bridging / area extension for free!

Slide 48

Slide 48 text

OTHER EASY MISSIONS • P25 listeners (SDRs are now $25!) • A shout-out to Matt Blaze / Travis Goodspeed • “Why (Special Agent) Johnny (Still) Can’t Encrypt” • ...a thousand other things (and reconfigurable on the fly) • Also missions aren’t exclusive, though Reticle doesn’t attempt to negotiate sharing of devices; this isn’t designed as a public resource network

Slide 49

Slide 49 text

ROADMAP • Scenarios (The Problem) • F-BOMB (The Hardware) • Reticle (The Software) • Missions (What It Does) • Next -- and how you can help!

Slide 50

Slide 50 text

NEXT STEPS FOR RETICLE • Opportunistic Replication • Change the scan+connect script to run continuously, and replicate whenever we find a connection • MIT did this, but won’t release the source code :-( • Data Visualization for hordes of data • New hardware (F-BOMB v2) - mmm, Raspberry Pi!

Slide 51

Slide 51 text

NEW PROJECT: SPOTLIGHT

Slide 52

Slide 52 text

SPOTLIGHT • Hide and Seek • No trained “seekers” • We’ll use bicycle couriers and bored students • 20 Reticle Nodes • 12 Hours • 10 Targets (5 mobile, 5 static)

Slide 53

Slide 53 text

SPOTLIGHT Anyone want to come play with us? We’d love to partner. [email protected]