So our first speaker of the day is Chris Rock. So Chris spoke last year in my speaking track, gave an excellent talk, and it was only 20 minutes long but it was phenomenal. You guys are in for a real treat. Let's give Chris Rock a big hand. Thanks, guys. Thanks for coming to the talk today, guys. I know there's a lot of great talks at the moment. There's a lot of internet of things that you can go and see, but I think you'll enjoy this talk. This is a talk that I thought I would never talk about. I was never going to talk about this because it was a little bit risky, but I think now that this is the best time to do this talk, not because of all the elections and all that sort of stuff that's been happening. I think it's a good time to do this talk. happening now with the Clinton emails, for example, but there was an article that was released. I'll show you the slide. The US National Intelligence Director James Clapper said that cyber espionage came second. We came second to ISIS. Now, I don't want to live in a world where ISIS is scarier than hackers, especially in 2016. We previously held the title in 2013, 14, and 15, and to be honest, I was a little bit disappointed when I saw this result. So I thought, I'm in my 40s now. There's a lot of young hackers in the audience, and I'm not going to pass the baton to you guys unless we have that number one spot back in our pile. So let's have a quick look at ISIS. A bit of a no-brainer here. When you have an occupier of an occupied country, you have a terrorist organisation. Nothing has changed throughout history. I know it's a simplistic view, but it is an accurate view. So the first thing we need to do is when we lose, and we did lose, we came second. We beat North Korea. That's really good. They got nukes. They're pretty scary. But we can hack anything we want. I know there's a lot of people in this audience could hack anything I ask them to hack. Banks, government, whatever. We just need to put it all together. So the first thing that we need to do is work out why we came second. So let's have a look at ISIS. Let's see how they fight. I just need some audio. That jack. Talk. Talk. Talk. Now, this video is a little bit violent, so if there's anything else that I should talk about, start by commenting, and I'll be right back. kids in the audience that have come by roots I apologize but I showed it to my eight-year-old son and he was cool with it if he's cool with it you guys would be cool with it so let's have a look at our competition oh here comes the now I don't know about you guys but I'm gonna try to pick up some of your I think that was pretty embarrassing that we came second to that. So now that we've analysed our enemy, let's have a look at ourselves. So the Sony hack, that was a great hack. I love watching those movies every week. The Ashley Madison hack, my wife and her lawyer really love that hack, seeing my name up on that list. Now the Pokemon Go hack, now I know why we came second with that shit, with that denial of service on Pokemon Go. Thank you, Poodle Corp. And even my talk about death did not impress James Clapper enough to give us position number one. So the reason I'm giving this talk is to show you that there's a lot of people out there who want to rectify that, and to do that I need to escape away from our normal hacking environment and we need to skill up a little bit. The reason we did come second is we're too tunnel focused. We had tunnel vision, we didn't look outside. So I thought what I'll need to do is I contacted a mercenary. He'll be able to teach me some tactics in coups, revolutions, and then I'll see if I can apply that and see if I can do a coup or revolution myself. So I contacted this guy, his name's Simon Mann, and I'll let him tell you about himself. My name is Simon Mann, and I'm helping Chris Rock with his work to see if a coup d'etat, a push, the overthrow of a regime, could be achieved by computer hacking and by cyber warfare methods. My background to that is that I led the 2004 attempted coup against the regime of Equatorial Guinea. That attempt failed. I was arrested. I spent five and a half years in prison for that. Prior to that, in 1993, I was one of the founding people of Executive Outcomes, South African private military contractor, which was credited with winning the ghastly civil wars, first in Angola against the rebels, UNITA, and then in Sierra Leone against the rebels there. I served in the first Gulf War on the staff of Sir Peter de la Villiere. My ten years prior to all of that was as a British Army officer. I served in the Special Air Service as a troop commander and an anti-terrorist team commander, as well as in the Scots Guards as a platoon commander, and did tours in Northern Ireland with both of those units. So he's a master of his field, and I'm a master of mine, so I thought it'd be good if we could combine the two together. So why would we use mercenaries? Obviously, the clandestine, there's no governments that are linked to the mercenaries. They're loyal, so as long as you pay them, they're yours, and it's not a war if you use mercenaries. So this is a traditional mercenary coup structure. So the important position there is the architect, and you can see a picture of Simon Mann there with the gun. Now, he's the man that pulls the levers. So... Above him, for example, we have special interest groups. So this is traditional organisations such as the CIA or private companies who've got oil interests, and things like financiers. Now, under his direct personnel, he has, obviously, advisers, and that's an important role too. So when you guys are looking at doing this sort of stuff for real, you might decide that you're an architect or an adviser. It really depends on how you think. And you can see Simon would have ground air, and he would also have... I don't know if you can see, but now he's developed the digital domain as well, which you'll see in the future. Because, let's face it, the digital domain, in terms of intelligence about what we can pull, is very important. And again, there's the ground people as well, so we've got Rambo down there, and Tom Cruise, but these are the grounds. So in terms of a cyber perspective, we're talking about hackers. So for example, in Simon Mann's failed coup in 2004, his special interest groups were people like, who provided finance, were the Spanish government. There was also Sir Mark Thatcher, which was Margaret Thatcher's son, who provided finance and an airplane to move the mercenaries around. So here's some traditional mercenary companies. So you can see the CIA down the bottom in the left-hand corner. And you'll see, obviously, Blackwater. You guys know Blackwater quite well. But you'll see also in the middle, with the... the buffalo sign in the middle, there was a 32 battalion in South African Defence Force. They were guerrilla fighters. They fought in Angola and modern-day Namibia, and that was part of the South African Defence Force. After apartheid was abolished in 93, these guys were out of a job, so they became mercenaries. So the companies to the right of the buffalo, such as Executive Outcome, Aegis and Sandline, for example, are companies that were set up by... mercenaries who... who came out of that battalion. So when you guys are looking at overthrowing a government, you really have three options. We have the election, so rigging in election. Now, election is a legitimate way of changing government every three or four years, not in every country, but most countries. We can incite a revolution or a coup. So your guys are experiencing this at the moment, so the election. You're already seeing some email leaks with Trump and Hillary Clinton. I was watching this morning about... someone was talking about the size of Trump's hand, which I thought was ridiculously. But I think what they're doing, what WikiLeaks is doing. Releasing this information is great, but it's just not really what I'd be looking for in terms of using an election to overthrow our government. So I'd be looking... at like a 12 days before Christmas or 12 days before an election tack it doesn't have to be real we already own everything we already own banks investment companies so we can use the items on the right hand side just to fake whatever we want so when someone goes towards an election they can just use those things there on the right hand side so you can actually move money between the parties and we'll have a look at that in depth a bit later on in my country Australia we got an SMS just before we went to the polls medicare is a bit like your Obamacare and it looked like the SMS was from medicare and it was pretty much to scare people into voting for the other party so a technique that you can use to throw an election and again the wiki leaks for email leaks as I said this one's been going for too long these things should be done in rapid succession to get into the you know the the the the the the the the the the the the the the the the the the the the vote is mine just before they go to vote okay the second method we have is a revolution so here's a couple of revolutions in history you guys have had one we had Egypt in 2011 and Ukraine 2014. so for those who don't know Ukraine 2014 the president of Ukraine was about to sign a deal with the EU get seven uh 700 million dollars in loans and then Putin stepped in and offered them two to three million dollars in loans in 2014 and then Putin stepped in and offered them two to three billion to get rid of that. So the people revolted against that, and we'll have a look at that a little bit later on. The other option is the coup, the coup d'etat. You saw that recently in Turkey, where a small portion of the army, or in our case, mercenaries, tried to overthrow the government by force. And you'll see there there are just some examples of coups, and the American government was involved in the first two of those. So in terms of where we'd want to start in overthrowing a government, we start down the bottom. So we have what's called tactical operations, or low-intensity operations. So this is where you want to weaken the government with insurgency, sanctions, or really just telling them they're doing a bad job. Example I'll put up there for the revolution. So if those fail, we have the revolution. We saw in Ukraine. And the picture there is the deputy PM in 2013, before the revolution, was complaining that the American government were doing exercises called tech camp, and they're actually teaching the people of Ukraine on how to organize protests via Twitter and Facebook. And he's complaining the American government are causing the revolution before it happened. If a revolution is not going to work, then we look at the coup. So the revolution is not going to work, then we look at the coup. So the revolution is not going to work, then we look at the coup. The Iran coup over 51 to 53 was done by the British government and the US government. And if that fails, we look at an invasion. So before Panama was invaded, there were five failed coups. Before Manuel Noriega was replaced in 1989. Things you need to watch out for when you're doing a revolution. These are the five things that will try to stop your revolution. The first is to try to stop the revolution. So the government in power, for example, saying that they're going to have new or fresh elections. Something called strategic hand-letting, which is separating the insurgents from the population using the Vietnam War. The third one, which we'll talk about a bit later, called cash grants. So you're pretty much bribing the people to shut them up. The third one is a middle alternative. So we have a left party, a right party, and you offer a middle party. These are all techniques just to quiet the population down. You just have to be aware of these. Because they make a lot of sense. They may happen if you're going to try to set up a revolution. And the last one is economic development organisations and hospital school building. So when you see the military invade a country, for example, like Iraq, and they're building schools and all that sort of crap, it's all just bullshit. They're just keeping an eye on the population to stop a revolution happening post that event. That's good publicity as well. Some techniques for preventing coups. So the private army or the mercenary, private military contractor. Colonel Qaddafi with his 3,000 Revolutionary Guards, the Saudi Royal Family with its 25,000 White Army. And you guys have your own National Guard. Your private military force protecting each state. It's a great anti-coup measure. So you really don't have any central point to overthrow the government of the US. There's also spies. So Assad for Syria, for example, has these spy agencies that spy on the military. And spy on each other to make sure that no overthrow takes place, there's no coup. And that works quite well. They work so well that a civil war is now in place in Syria, as you guys know. And obviously you guys have a lot of intelligence organisations for this as well. One thing I wanted to bring up is the fake coup. You've got to be aware of the fake coup. So on the screen you'll see some different coup types and you're welcome to study those. And there's some material on your... CDs which talk about different types of coups. But when your opposition is getting close, you want to arrest them and just say that they're causing a coup. This worked well in Turkey in early 2000 where the AKP party arrested generals and journalists to say that they were creating a coup. Now this actually didn't really happen. There was digital evidence that had been modified and these guys were cleared. And then obviously there was another coup just recently. We don't know whether it was fake or not yet. There's a little bit of theory, guys, to get you started and I wanted to talk to you. I'm not really much of a theory guy. I need to know how to create a coup or a revolution, but now I want to apply it to a real country. Operation Nanny Goat, 2011. So you guys would have heard of Kuwait, a small oil-producing country nestled between Iraq and Saudi Arabia, about three or four million people. That's a picture of Kuwait. Actually, it looks like this, so it's pretty close. No, seriously, this is what Kuwait is, it's a beautiful city. So what we'll do is let's have a look at Kuwait City. This is the government and also family tree. There is pretty much exactly the same thing. We have the emir up the top. You might see a common link in the last names. Al-Sabah. All the way through. So we have the emir, crown prince, the prime minister. His name is Nasser Al-Sabah and then you can see the foreign affairs and defence ministries. Now what we want to do here is we want to overthrow Prime Minister Nasser. And for those who know the Una Oil scandal, the bribery scandal, they referred to him as the big cheese. This is the standard intelligence. This is the intelligence that mercenaries or militaries will use. You guys probably will know this sort of stuff, like the NSA and also embassies, spies and Five Eyes. What can we use? So we can also use private intelligence agencies, Wikileaks, for example. And I don't know if you guys can read that, but what they referred to Sheikh Nasser Al-Sabah is perceived as politically incompetent, prodigal wonk. His record is tarnished. His record is tarnished. He's a failure to construct and effectively manage his cabinet. But I believe the best intelligence is the one you hack yourself, and I want to hack all the government to find out what he's up to. Okay. So looking at the intelligence, we think corruption is going to be the big point in this one. Here's a map of Kuwait, and you can see the green, which is the oil fields of Kuwait. And the people are not happy that the government are rich, and the people feel really poor. Now, corruption is not going to work in every country. You're going to have to find the weakness in each country. For example, anonymous thought they would attack Nigeria on their corruption, which is pretty fucking pointless, because that is Nigeria's biggest export. It won't work there. So what are our options for overthrow? Elections? No. There's no real elections. Those three top parties there, the emir, crown prince, and the prime minister, there's no elections for those guys. The elections are for the guys below that. So we're not going to look at the election. Who did tar? No, it's too hot. So here's a map of Kuwait. The white dots is the US military bases. The green is the Kuwait army. And the purple is the Air Force. They also have 7,000 soldiers protecting the royal family. So Ku, I'm not a big fan of racing against those forces. So it looks like revolution is our only option. So in 2011, you guys will probably remember this was the Arab Spring. So on the left-hand side, you'll see the countries that recently fell. And on the right-hand side, you'll see a timeline of the countries in that region that either fell or didn't. And you can see Kuwait down the bottom in light blue, a cabinet resigns. So here's an extract from Edward Luttwak. If you guys want to do these sort of coups or revolutions, you're going to have to study up on this guy. He's pretty much a master for strategy. And this illustration shows what the intelligence, intelligence agencies need to go through to find out whether there's a coup taking place. So on the y-axis, we have all the data the intelligence agencies are going to go through. On the a in coup planning leakage, that is when I'm planning a coup operation of what's going to leak out when I talk to my advisors and the hackers. The blue line above is noise or levels. And the green line here, Ku plus noise data, is all the intelligence that's come through. And the little x point is when the Ku is uncovered. Obviously, you want to keep your OPSEC quite low, so you don't get detected. So, with our cyber mercenary structure, same as the traditional mercenary, we're going to use things such as denial of service attacks, social engineering, and all our normal hacking stuff. And it's your job as the architect to employ the advisors to get the people on the ground, such as hackers from your country or overseas countries. You'll need to map out all the targets of the country that you want to hack. So, we're talking about government, media, electricity, oil, gas, all those sort of agencies. And you want to map out what you want to hack. Now, I'm not really much of a strategic in terms of what items I want to hack, so I just hacked them all. At least then I had the options of what lever I wanted to pull. So, as a hacker, we know what sort of tools we use on a normal day-to-day basis. You're going to have to learn some new techniques and tools. Not hard. You just need to do a little bit of research. I've just got a couple of them up there. A lot of them have to do with misinformation. So, when we're hacking into banks, we want to move money around to make it look really dodgy. And also things like professional agitation. So, we want to employ people to do protests, like union members and also university students. Now, you're going to have to learn some new techniques and tools. You're going to have to learn how to finance this operation. I probably wouldn't recommend this method. We nearly got our goal. But by using the chart below, you say that we got... It didn't take long before we got uncovered. So, I'm a big fan in robbing banks. They've got lots of money. So, we'll use the bank's money. You can also use the banks for depositing fake corruption payments. And I'll show you that in a second. Terrorism payments or breaking into banks, such as removing all the money from the banks. And then Hillary Clinton pretty much said here that we've got the green light to attack these countries here. Saudis, Qataris and Kuwaitis need to stop their citizens from funding extremist organisations. Another tactic you can use is move money between private accounts. From these terrorists into private accounts such as Hillary Clinton. And use that evidence to paint a bad picture of her. Or Trump. I don't care who wins. They're both lunatics. So, let's get into the real world. Here's the central bank of Kuwait. That's what it looks like in 2011 on the left-hand side. And that's what it looks like now in 2016. Obviously, if you can't hack in through the front door, use the stuff that you've got around. We don't have to use a zero-day. We've got a thousand targets to hack. Don't get all fancy-pants on me and use zero-day. Just use whatever you can. So, whether it be a LAN turtle or a Raspberry Pi or... You can see the little box there. I don't know if you guys know what that is. The fourth picture along, that's an NSTLU slug. It's an ASBOX, which you use as a PC or a rat. It's a physical rat within an organisation. Or what we did is we just hacked in the front door. If you can't hack in through the front door, just pay a cleaner and they will put one of these implants in for you. Average cleaning salary in Kuwait is about $150 a week. So, you give them two grand, which you'll use from robbing the banks. They'll plant them in there for you. So, what we want to do for corruption is we want to steal money from the government and put it in private banks' accounts of the government. So, there's a picture of Nasser. And there's a couple of banks in Kuwait. And an offshore bank. So, now that we own the central bank, we need to hack private banks. Now, we didn't know from our intelligence which banks he had bank accounts with. So, we just hacked them all. By hacking them all, we can then move money between those bank accounts. So, we used government money and funded the private bank accounts. By doing this too, we could also create bribe payments as well. Also, there's a lot of money in stocks and finance too. So, you want to hack those as well, even to crash the stock market. And again, we went through the front door. So, you want to know what your government's up to, whether they're on to you. Or you just want to see what weaknesses there are in the government. So, you'll need to hack into the government too. Listen to their emails, their phone calls, the interior ministry, the judges, everything. These are live shots of hacked government departments. One thing you want to hack too is the telco. So, telcos are not just phone calls these days. Telcos are media. Telcos are internet. You want to siphon their emails. You want to hack the internet or you want to squish the internet, for example. This is a prime case where you want to kill the internet at the right time or keep it open if they try and close it. So, obviously, MPLS, point of presence pops. You want to hack into those. You want to be up to stream your own media to get the people angry. Obviously, companies now are using telcos for cloud services and security services. So, Zegil is the biggest company in Kuwait. Who also provides security services for these companies. So, you want to hack in just like what we did. That way you can control the flow of information. You own the ISP. You own the country. Which brings us to global warming. You might think, why are we talking about global warming? So, obviously, in... They wanted to make sure they reduced emissions by 2050. And the G8 and the EU came together and said, what we need to do is map out current infrastructure such as oil, gas and find out what's going on with global warming. So, we can use websites like Anypedia to find out where things are such as power, oil and nuclear plants. So, you just plug in your country and it'll show you all the maps. Now, why would you want to cut these services? It's a no-brainer. When you want to do a revolution or coup, you want to cut the power at specific times or cut the water to piss people off. And that does piss people off when they live in the desert. And also, your energy sector as well, for example. There's studies online if you want to have a look at that. High-voltage transformer units make up less than 3% of transformers in the US but carry 60% of the power. So, how do you map those out? You guys have websites that do that for you. So, all you do is just tick high-voltage transformer lines and it'll just tell you where all the power comes from if you want to disrupt power. So, you're going to need to study what a power station looks like to disrupt it. So, when I was talking to Simon, Simon Mann, he said to me, just blow it up. I said, I'm not Zoz. I don't have a C4. I'm just going to chuck on the bloody thing. So, he said, what you need to do is disrupt power. Okay, no worries. So, I thought, well, I can hack into power so why don't I just shut it off that way. So, here we have a transformer. This is not an American picture so this is not your critical infrastructure, Your Honour. This is a picture... This is an Australian transformer. So, the transformer's down below. And up the top, we have what we call mineral oil that keeps it cool. And when a transformer doesn't have oil, it doesn't work. So, there's no power. In 2014, in California, someone was shooting at these things, drained the oil, and then you guys were out of power for 27 days and they just had to reroute power from another substation. So, Simon suggested if you want to get hands-on, you can shoot them, drill them, or angle grind them. To drain that oil. And I thought, well, I'm not going to do that. And I failed to hack in. I fucked up. I couldn't do it. So, you guys have probably seen these before. They're these spinning blades that they put on a helicopter that chop trees away from power lines. For those who haven't seen it, just a quick look. Pretty cool. Chopped trees from power lines. Now, I thought, well, that's pretty cool, but I actually want to chop power lines myself. Well, I don't have a helicopter, but why don't I use a drone? So, I thought, I'll make my own. So, what we have here is two 8-inch circular blades attached to part of a bike frame. And those just spin really fast, attached to a cordless drill. And you'll see that on the second picture, I've actually removed the battery, and I've actually removed the battery from the pack, only because the battery kept getting caught on the power line, so I removed it. So, how does it work? I'll show you. So, that's a great device for cutting power lines. So... That's the five-pound model, and you can actually reduce it, and you can make it... We can get it under three pounds, so you can do it to the weaker drones. So, you just use a series of drones, put the coordinates in, and it'll just run straight through the power lines. The cables I used there were copper, the ones that are on power lines are aluminium, so it'll go straight through those. If you're going to make one of these, be really fucking careful, so... There is no safety shit involved. Now, if you're a bit of a tight ass, and you've got a small drone, just hook a 10-metre hose to your drone with a piece of wire, and run it over the power line, and once it hooks onto the power line, it will drag it across and drop it over the power lines, and just arc them. So, that's the cheap version. So, now that we own everything, and we can hack everything, including the banks, we need to understand how the media works, so we need to reverse engineer them. And that's what we do for a living, so why don't we do it with the media? So, what we do is we apply what's called the two-source rule. So, the media need two sources to use it as a story, and I've got the sources on the right-hand side and types of sources, so you want to need at least two sources to fool the media. Or you can actually pawn a few media outlets that we did from the telco, publish information, and then just release it. You want to release the information to the news agency that will release that information when they've been questioning it. So, for example, Fox News, you want to use the Hillary Clinton information. They'll publish it and they won't even give a shit. You don't want to do it in reverse because they're not going to publish it. They've got no interest in doing that. So, what we did is, in 2011, we used Kuwait Central Bank. We already own them, so we used unnamed government officials to transfer millions of dollars outside their accounts into their private bank accounts. And we used the New York Times to do the same thing using that two-source rule. Now, one of my idiot advisors thought this would be a great idea. He thought using a Kuwaiti prince to convert to Christianity would be a good idea and went with it. He did get the publicity he was after. We got a hundred media outlets that went with that, but it was just a stupid idea. You need to use the people in this. When the CIA are using... When the CIA are planning a coup revolution, you need to get the people on side. You've got money in your hands. You need to use bribes. So, use this sort of money to pay people to put implants within companies, professional agitation, misinformation, or get corporate people to do stuff for you. You've got to heat the population up enough to give a shit to overthrow the government. So, for example, the professional agitators, you would have a group of people that you would pay to cause a protest, and then you would get another group of protesters dressed in police uniforms to bash them up, and then you get that on the news. And if they won't publish it on the news, you publish your own news. You own the telco. When you're planning the operation, you need to plan it down to the absolute detail, and you need to be flexible, because shit just won't go right. You might lose a rat. You just need to have to plan for changes in your operation. So, I've talked a lot, and I want to show you how it works in the real world. So, I've put a video together just to show you how it works. And if that doesn't work, I'm here to help. It's a great opportunity. He's a lot to say. are you worries. What's the point of waiting for me? But I know what I'm doing. you're so smart, but you're only trying to make the best of yourself. You're the best. You're the best. And you're the best. You're the best. All right, all right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. All right, all right. Hamid Al Ahmad Al Sabah is accused of failing to stem endemic corruption in Kuwait. Okay guys, what I want to leave you with now is for the new hackers in the new generation is just think bigger. So don't try and hack bigger targets, but combine multiple targets and look outside of your industry to combine multiple things together. That's it guys, and then we'll be number one again. Thank you.