Lessons from a digital mercenary: Beware the 鈥極ctober Surprise'
Cybersecurity expert Chris Rock researched ways to overthrow a government using only his computer for a talk at the DEF CON hacker conference in Las Vegas 鈥 and he says there are some lessons for the US elections.
Cybersecurity expert Chris Rock researched ways to overthrow a government using only his computer for a talk at the DEF CON hacker conference in Las Vegas 鈥 and he says there are some lessons for the US elections.
Turns out, you don鈥檛 need a stash of guns and bombs to overthrow a government. All you need, according to researcher Chris Rock, is a capable team of hackers with a diverse set of skills to break into different systems, from banks to the power grid. And the creativity and determination to manipulate people into believing whatever you tell them.
Mr. Rock鈥檚 research for his talk on 鈥淗ow to overthrow a government鈥 at the DEF CON hacker conference in Las Vegas, began well before the news that suspected Russian hackers breached the Democratic National Committee servers and leaked private emails to WikiLeaks. Yet the resulting political impact of the embarrassing public emails 鈥 the resignations of political leaders, the public鈥檚 questions about foreign interference in the election system 鈥 made the lessons from his talk eerily timely for Americans. 聽
An Australian and chief executive of the聽Kustodian cybersecurity firm, Rock says聽Americans need to start paying close attention to the world鈥檚 new phase of information warfare and the potential for hackers or foreign adversaries to try to interfere with their elections by releasing stolen 鈥 or faked 鈥 information. 鈥淭his is the first, not the last鈥 operation like this in the US elections, he says.
Passcode spoke to Rock in Las Vegas. Edited excerpts follow.
Passcode: How did you get the idea for your research project?
Rock: I wanted to overthrow a government using only digital means 鈥 using the traditional methods that mercenaries use. I鈥檝e been working with a mercenary, because I wanted to get out of my own field of hacking or penetration testing, and work with a traditional mercenary who uses coup techniques such as blowing up power stations and stuff like that.
Passcode: So, when you say 鈥渕ercenary鈥 you mean an actual mercenary. That's not some sort of new cybersecurity slang.
搁辞肠办:听No, a real mercenary. With guns, soldiers, tanks, helicopters. I reached out and contacted someone on Twitter. His name is Simon Mann, he was in the British Army and then turned mercenary. He鈥檚 fought in Sierra Leone and Northern Ireland. He planned a coup in Equatorial聽Guinea. He鈥檚 pretty much a coup architect. He got arrested and spent years in jail. I thought he鈥檇 be pretty much the perfect person to learn from.
I reached out and said, 鈥淚鈥檇 like to work with you, to learn the techniques you use.鈥 Using my own digital techniques, I can cut the power, shut off the gas, the oil, the water, that stuff. But I don鈥檛 know in what order. I can turn it off and be malicious but I don鈥檛 know why you would do it, if your goal is to heat the population enough they would revolt against the government. So I was his apprentice.
笔补蝉蝉肠辞诲别:听In your plan, did you pick a specific country?
搁辞肠办:听Kuwait. I鈥檇 already done work with that government before. I wanted his take on what methods he鈥檇 use, to refine my art.
笔补蝉蝉肠辞诲别:听But you don鈥檛 mean 鈥渨ork鈥 in the sense of overthrowing the government, right? You mean actual work?
搁辞肠办:听We were hired before the Arab Spring to look at their government from a cyber perspective. Their banks, their critical infrastructure 鈥 power, water, gas. They wanted to see how secure they looked from an outside perspective. At the same time, it was the Arab Spring and there were allegations of corruption that the prime minister of Kuwait moved money from reserve banks into private bank accounts and out of the country.
笔补蝉蝉肠辞诲别:听So when you decided to 鈥渙verthrow鈥 the government years later, what鈥檚 the first thing you need?
搁辞肠办:听A team. You need coup architects at the top. There were a group of advisers underneath Simon Mann the mercenary 鈥 the Navy, Air Force, ground troops to provide intelligence. For me, I鈥檇 need professional hackers, social engineers, denial of service specialists. People who can hack into banks and critical infrastructure. And you need intelligence, to find out what would overthrow the government. The country we chose, we knew corruption would be a huge thing in the Arab Spring in 2011.
笔补蝉蝉肠辞诲别:听Let's say you have your band of hackers, what鈥檚 the first move?
搁辞肠办:听To finance it. What we鈥檇 do is what Simon Mann the mercenary would do. He needs funding for the assignment. He needs to get funding for his coup. He planned a coup in Equatorial Guinea. His boss had to organize the finances, to pay bribes for what they call professional agitation. He had to contact people like Mark Thatcher, who is [former Prime Minister] Margaret Thatcher鈥檚 son, to provide funds.
For us, I wanted a full cyber perspective. No blood, no one loaning money.
笔补蝉蝉肠辞诲别:听How do you get the money then?
搁辞肠办:听The first thing we wanted to do is get access and compromise the central bank. It doesn鈥檛 matter what hacking methods we use. You can go through the front door, and hack through the firewall. Or pay a cleaner to put a key-logger [software that can record every keystroke you make] or wireless access point on the inside. In Kuwait, the average cleaner earns $150 a week, or $600 a month. If you give him $2,000, if he doesn鈥檛 run away out of the country immediately, he鈥檒l put whatever you want inside the central bank.
In Kuwait, the central bank is owned by the royal family Al-Sabah.聽If we pwn the central bank, we can then manipulate private banks. I might move money from central bank 鈥 government community money 鈥 into private banks or offshore accounts to implicate people on fraud or bribery. You could then release that the media.
Or, you just take all the money out of the bank and use it for the exercise itself. Banks are critical.聽
笔补蝉蝉肠辞诲别:听How do you convince the media, presumably who you'd want reporting on this banking "fraud," that you鈥檙e a credible source?聽
搁辞肠办:听The first thing we need to do is figure out how the media works 鈥 basically, reverse engineer the media. Online there鈥檚 a handbook for journalists from Reuters, telling us what鈥檚 a documented source, an unsupported source. So we have to make sure we tick your journalistic boxes. Can it be validated by someone else? Things like WikiLeaks makes it really easy because nothing鈥檚 vetted. But for The Wall Street Journal or The New York Times or something, you have to make sure you tick the boxes so your story goes to the editor and goes through.
You need two verifiable sources to get the media.聽If I can hack a bank, I can add a picture of myself on the website like I work for the bank. I can phone from the bank, to call a reporter to release a story about whatever I wanted it to be.
[To verify the source], we鈥檇 need to compromise the government itself. The Ministry of Interior. The judges. We could swap phone numbers out 鈥 so when you call to verify I am who I say I am, it goes to a special Skype number [for someone on my team].
笔补蝉蝉肠辞诲别:听Wow. So let鈥檚 say you succeed and the articles come out. What鈥檚 next?
搁辞肠办:听We need to heat the population to boil to do a coup or revolution.聽In Kuwait, there are no legitimate elections; the royal family is the royal family. If the population aren鈥檛 protesting [from the news] you make them protest.
You can use the funds from the banking exercise to get them to protest 鈥 hiring people from unions and universities to start the population off. They don鈥檛 know our end exercise, they just know they need to show up at certain time, throw bottles, rocks.
笔补蝉蝉肠辞诲别:听OK. So maybe the media will come and film the protests, which could incite the population even further. How do you make sure they revolt?
搁辞肠办:听You need a full plan of what you want to leak at certain times. A 12-step plan to keep that heat up so the population actually goes through with a revolt.
笔补蝉蝉肠辞诲别:听Does the information have to be real?
搁辞肠办:听That鈥檚 the beauty of it. We can make it real. What鈥檚 the difference between real or fake?
Take the banking exercise. As an example, today, I could put money in your bank account from the Islamic State, and get the media to contact you. They鈥檇 ask, 鈥淲hy are you receiving money?鈥 You鈥檒l say you鈥檙e not. Then we鈥檒l move money from your account to somewhere else. It looks really bad for you, and you spend the next three weeks proving you鈥檙e innocent. By the time it comes out you鈥檙e innocent, it鈥檚 too late.
笔补蝉蝉肠辞诲别:听So moving this into the real world, what do you think about the suspected Russian hacks on the Democratic National Committee servers?
搁辞肠办:听Right now, everyone wants to know who and what the motive is. I鈥檓 not really interested, except for the techniques they used. They gave it to WikiLeaks who would not vet it before the release, without giving it to the media who would vet it. That is quite important.
笔补蝉蝉肠辞诲别:听After all your research, what do you make of the way it was carried off? It鈥檚 causing quite an uproar.
搁辞肠办:听The technique was correct but the timing was off. It鈥檚 all about timing.
There鈥檚 no point in talking about it now, whether it鈥檚 Russia or whoever. It鈥檚 too far out. The American population has got no time for that. 聽You need repeat drops of information, a campaign every day for 12 days 鈥 I鈥檓 calling it the 12 days before Christmas attack. And something will stick before the election.
笔补蝉蝉肠辞诲别:听So now the hackers, maybe from Russia, have earned some credibility here in the US. People accept the premise that DNC emails were real and stolen and released. Are you predicting there will be some kind of October Surprise in the run-up to the election? A real or a fake one?
搁辞肠办:听My prediction is there鈥檚 going to be another leak. I don鈥檛 care whether it鈥檚 real or fake. Release something that鈥檚 fake. By the time is vetted and deemed fake, it鈥檚 too late.
You can say Hillary Clinton accepted donations from ISIS. The National Rifle Association. Whatever it is. Dump it to WikiLeaks or media who don鈥檛 follow two source rule. We all know you can dump a piece of information to certain media and 100 other media will follow it by using that as single source. So you can manipulate the media into doing what you want.
I hate to say it, but it鈥檚 happening all over the world. Even in Australia, people got a text that appeared as if it was from Medicare (a publicly funded universal health care plan) 鈥 while they were in the polls. It said, 鈥淚f you vote for this government, you鈥檙e going to lose all these medical rights.鈥
These types of attacks are going to get bigger, and smarter. In the US, this is the first not the last operation like this. It is information warfare 鈥 and if it鈥檚 not done by military it鈥檒l be done by mercenaries or people like myself.
笔补蝉蝉肠辞诲别:听That is, well, pretty depressing. And confusing, if there鈥檚 all kinds of potentially fake information flying around. What can voters and technologists do about it?
搁辞肠办:听A lot of people presenting at Black Hat and DEF CON are so single focused on security. My talk was meant to get people to think outside their skill sets. Instead of just looking for bigger targets 鈥 like airlines 鈥 think about reverse engineering other industries.
And obviously, America is looking now at Russia for the possible cause for leaks, but they should be vigilant. Coming up to the election period, they should be vigilant for a kind of 12 days before Christmas attack.
Editor's note: This version corrects the name of the country in which Simon Mann helped architect a coup. It is Equatorial Guinea.聽