I Am The Cavalry at Derbycon 2015

The Cavalry rides again to Derbycon – a meeting of the horsemen, if you will! The organizers have again seen fit to offer us space for the weekend so we can congregate. Two years ago we held the first Hacker Constitutional Congress at Derbycon which helped solidify the vision, mission, and areas of focus. This year we will provide insight into what we’ve learned, as well as workshops so you can learn along with us.

Friday, September 25, 2015
12.00-12.30 | Introduction and Overview | Beau Woods and Katie Moussouris
We will provide a brief overview of I Am The Cavalry, as well as outline the weekend’s activities. Participants who have yet to be introduced to the initiative will be; those who are familiar will be updated on activities and progress over the last year. Even if you miss this first session, you can join for any of the others.

12.30-1.00 | Automotive Overview and Update | Craig Smith
Overview of the Automotive space and update from the past year. This will be a revealing talk where we can give more details of what has been happening around the automotive industry, how the security community has engaged, and what the road ahead looks like.

1.00-2.00 | Automotive Q&A, and Gaming Demo | Craig Smith
Craig Smith will lead a technical discussion and answer questions about automotive security research. For instance: What is the CANBus, how do you tap into it, and how do you decode its protocol? What’s the product development lifecycle, how does the supply chain fit into that, and why does that make it hard to get vulnerabilities fixed? Craig will also demonstrate a game where you race around a virtual track by sending hacked messages to the engine control units, steering, and other car computer components!

2.00-3.30 | Legislative Overview | Jen Ellis and Bekah Brown
Overview of the legislative landscape, and how it affects the stakeholders in the various ecosystems. Be ready to learn to hear the legislative vernacular – that means “cyber” – and learn why you should care about what is going on inside the beltway.

3.30-4.00 | Medical Device Overview and Update | Jay Radcliffe
Overview of the Medical Device space and update from the past year. This will be a revealing talk where we can give more details of what has been happening around the healthcare and medical device ecosystem, how the security community has engaged, and what the road ahead looks like.

4.00-5.00 | An Hour with a Medical Device Researcher | Jay Radcliffe
Curious to how research gets done and the process that occurs? Have you always wanted to ask a researcher why it takes so long to get research done? Here’s your chance! Jay Radcliffe, a medical device security researcher will be on hand to talk about some of the process he takes when doing research on IoT/Medical Equipment. He’ll also field questions from the audience on how research is done so you can go out and advance your skill set to the next level.

Saturday, September 26, 2015
10.00-12.00 | Effective Communications | Beau Woods and Adam Brand
Workshop: Beau and Adam will provide coaching to help improve communications outside the echo chamber. You’ll learn why and how to communicate with others, as a dependency for your career as well as creating change in the world. Exercises cultivate empathy, understanding, and self-reflection to empower you to improve.

12.00-1.00 Lunch

1.00-4.00 | Media Training Workshop | Jen Ellis and Steve Ragan
Free, professional media training. Jen and Steve will help you understand why and how to engage the Media API, and inject technically literate information into the press without getting misquoted. Understand the journalist’s perspective so you don’t end up on the wrong side of an interview. Live fire exercises build muscles needed to stay calm, stay on point, and be a voice of reason to the world.

There will also be several talks that look to be closely related. A few of these are listed below:
Friday, September 25, 2015
12.00-12.50 | APT Cyber Cloud of the Internet of Things | Joey Maresca (@l0stkn0wledge)
3.00-3.50 | Current Trends in Computer Law | Matthew Perry

Saturday, September 26, 2015
12.00-12.50 | Security Hopscotch | Chris Roberts
4.30-4.55 | Latest Tools in Automotive Hacking | Craig Smith
4.00-4.50 | Medical Devices: Pwnage and Honeypots | Scott Erven “windshield wipers” and Mark Collao

Sunday, September 27, 2015
11.00-11.50 | Disecting Wassenaar | Tyler Pitchford
11.00-11.50 | Practical hardware attacks against SOHO Routers & the Internet of Things | Chase Schultz “f47h3r”

We hope to see you there!

I Am The Cavalry Track at BSides Las Vegas, 2015

If you were in Las Vegas last week, you were no doubt there for some combination of BSides Las Vegas, Black Hat, or DEF CON. These three conferences measure the pulse of the information security community and industry. Thanks again to the great support from the BSides Las Vegas team, I Am The Cavalry had a day of sessions at the event. As is always the case, Irongeek has posted them faster than anyone would have thought possible.

To kick off the day, we had Beau Woods, Josh Corman, and Nick Percoco giving an overview of the initiative and the day’s activities. There was a special guest during the talk: Hannes Molsen of the medical device maker Draeger announced a commitment to publishing a vulnerability disclosure program, and commented that researchers are key allies to his company and others.

The second talk of the day was delivered by Keren Elazari. As was true last year, she inspired the audience to tackle the big problems, fueled by the small ones – bits controlling atoms. We must start prioritizing control, trust, and safety over privacy and secrets. With effort, we can manually override our own inhibitions and make a difference. Superheroes without the masks.

The third session was a panel discussion with Tim Krabec moderating, Chris Nickerson, Beau Woods, and Tod Beardsley. Special guests Wim Remes, Keren Elazari, and the entire room were brought into it, as we learned how to lead in a “do”ocracy. Taking on a problem and pursuing it – working towards a solution, not just fluttering by the problem.

After lunch, Beau Woods and Scott Erven gave an overview of the last 12 months in the medical device security space. Special guest Suzanne Schwartz from the FDA joined to recap what she and her agency have done, and why they believe researchers are a valuable part of a healthy medical ecosystem…and hinted that maybe the FDA will come to “summer camp” next year. Beau and Scott also covered a lot of the current and future activities. (Slides for the talk are here.)

The final session of the day was Josh Corman, covering the very busy past 12 months in automotive cyber safety. This included the initial launch of our Five Star Cyber Safety Framework, reaction from the various industry stakeholders, and some of the activities that have gone on. Josh also talked about some of the current events going on like the high-profile talks across town at Black Hat and DEF CON.

DEF CON 22 Videos

DEF CON fans and aficionados– the wait is over. The videos from DEF CON 22 are now available online. While this is not a complete list of all available videos, it showcases many of the ones of interest to the Cavalry and Cavalry followers. If you are looking for the latest that internet security researchers have to offer, enjoy!

 

DEF CON 22: August 7 – 10, 2014

DEF CON Talks
Hacking US (and UK, Australia, France, etc.) traffic control systems, by Cesar Cerrudo
This presentation discusses how to manipulate traffic signals, including how the devices were acquired, the research, on site testing demos (at Seattle, New York and Washington DC), vulnerabilities found and how they can be exploited, and finally some possible NSA style attacks.
 

Hacking 911: Adventures in Disruption, Destruction, and Death, by Christian Dameff, Jeff Tully & Peter Hefley

Emergency medical services (EMS) are the safety nets we rely on every day for rapid, life-saving help in the absolute gravest of circumstances, but these services rely on antiquated infrastructures that were outdated twenty years ago with vulnerabilities large enough to drive an ambulance through, little municipal governmental support for improved security, and a severe lack of standardized security protocols.Quaddi, r3plicant, and Peter- two MDs and a security pro review the archaic nature of the 911 dispatch system and its failure to evolve with a cellular world, the problems that continue to plague smaller towns without the resources of large urban centers, how the mischief of swatting and phreaking can quickly transform into the mayhem of cyberwarfare, and the medical devastation that arises in a world without 911.
 

The Cavalry Year[0] & a Path Forward for Public Safety, by Josh Corman & Nick Percoco

At DEF CON 21, The Cavalry was born. In the face of clear & present threats to “Body, Mind & Soul” it was clear: The Cavalry Isn’t Coming… it falls to us… the willing & able… and we have to try to have impact. Over the past year, the initiative reduced its focus and increased its momentum. With a focus on public safety & human life we did our best “Collecting, Connecting, Collaborating” to ensure the safer technology dependence in: Medical, Automotive, Home Electronics & Public Infrastructure. We will update the DEF CON hearts & minds with lessons learned from our workshops & experiments, successes & failures, and momentum in industry and with public policy makers. Year[0] was encouraging. Year[1] will require more structure and transparency if we are to rise to these challenges… As a year of experimentation comes to an end, we will share where we’ve been, take our licks, and more importantly outline a path forward…
 

Hack All The Things: 20 Devices in 45 Minutes, by CJ Heres, Amir Etemadieh, Khoa Hoang & Mike Baker

When we heard “Hack All The Things,” we took it as a challenge. So at DEF CON this year we’re doing exactly that, we’re hacking everything. We’ve taken all of our previous experience exploiting embedded devices and used it to bring you a presentation filled with more exploits than ever before™. This presentation will feature exploits for over 20 devices including but not limited to TVs, baby monitors, media streamers, network cameras, home automation devices, and VoIP gateways. Gain root on your devices, run unsigned kernels; it’s your hardware, it’s internet connected, and it’s horribly insecure.
 

The Internet of Fails: Where IoT Has Gone Wrong and How We’re Making It Right, by Mark Stanislav & Zach Lanier

This presentation will dive into research, outcomes, and recommendations regarding information security for the “Internet of Things”. Mark and Zach will discuss IoT security failures both from their own research as well as the work of people they admire. Attendees are invited to laugh/cringe at concerning examples of improper access control, a complete lack of transport security, hardcoded-everything, and ways to bypass paying for stuff.Mark and Zach will also discuss the progress that their initiative, BuildItSecure.ly, has made since it was announced this past February at B-Sides San Francisco. Based on their own struggles with approaching smaller technology vendors with bugs and trying to handle coordinated disclosure, Mark and Zach decided to change the process and dialog that was occurring into one that is inclusive, friendly, researcher-centric. They will provide results and key learnings about the establishment of this loose organization of security-minded vendors, partners, and researchers who have decided to focus on improving information security for bootstrapped/crowd-funded IoT products and platforms.
 

How to Disclose an Exploit Without Getting in Trouble, by Jim Denaro & Tod Beardsley

You have identified a vulnerability and may have developed an exploit. What should you do with it? You might consider going to the vendor, blogging about it, or selling it. There are risks in each of these options. This session will cover the risks to security researchers involved in publishing or selling information that details the operation of hacks, exploits, vulnerabilities and other techniques. This session will provide practical advice on how to reduce the risk of legal action and suggest several approaches to responsible disclosure.
 

Cyberhijacking Airplanes: Truth or Fiction?, by Dr. Phil Polstra & Captain Polly

There have been several people making bold claims about the ability to remotely hack into aircraft and hijack them from afar. This talk will take a systematic look at the mechanisms others are claiming would permit such cyberhijacking. Each of the most popular techniques will be examined myth buster style. Along the way several important aircraft technologies will be examined in detail.Attendees will leave with a better understanding of ADS-B, ADS-A, ACARS, GPS, transponders, collision avoidance systems, autopilots, and avionics networking and communications. No prior knowledge is assumed for attendees.
 

Just what the Doctor Ordered?, by Scott Erven & Shawn Merdinger

You have already heard the stories of security researchers delivering lethal doses of insulin to a pump, or delivering a lethal shock to a vulnerable defibrillator. But what is the reality of medical device security across the enterprise? Join us for an in-depth presentation about a three-year independent research project, encompassing medical devices across all modalities inside today’s healthcare landscape. Think they are firewalled off? Well think again. Scarier yet, many remain Internet facing and are vulnerable to strategic attack with the potential loss for human life. And yes you will be amazed at what we found in just 1 hour! We will prove that an attacker can access medical devices at thousands of healthcare facilities from anywhere in the world with the potential loss of human life.This discussion will also highlight the fallout from security standards not being a requirement for medical device manufacturers, and our experience in identifying and reporting vulnerabilities. We will provide our insight into what needs to be done for healthcare organizations to respond to the new threat of cyber-attack against medical devices. We are working towards a future where cyber security issues in medical devices are a thing of the past. We will discuss the recent success and traction we have gained with healthcare organizations, federal agencies and device manufacturers in addressing these security issues. The train is now moving, so please join us to find out how you can get involved and make a difference by ensuring patient safety.
 

A Survey of Remote Automotive Attack Surfaces, by Charlie Miller & Chris Valasek

Automotive security concerns have gone from the fringe to the mainstream with security researchers showing the susceptibility of the modern vehicle to local and remote attacks. A malicious attacker leveraging a remote vulnerability could do anything from enabling a microphone for eavesdropping to turning the steering wheel to disabling the brakes.Last year, we discussed 2 particular vehicles. However, since each manufacturer designs their fleets differently; analysis of remote threats must avoid generalities. This talk takes a step back and examines the automotive network of a large number of different manufacturers from a security perspective. From this larger dataset we can begin to answer questions like: Are some cars more secure from remote compromise than others? Has automotive network security changed for the better (or worse) in the last 5 years? What does the future of automotive security hold and how can we protect our vehicles from attack moving forward?
 

Learn How to Control Every Room at a Luxury Hotel Remotely: The Dangers of Insecure Home Automation Deployment, by Jesus Molina

Have you ever had the urge to create mayhem at a hotel? Force every hotel guest to watch your favorite TV show with you? Or wake your neighbors up (all 290 of them!) with blaring music and with their blinds up at 3 AM?For those with the urge, I have the perfect place for you. The St. Regis ShenZhen, a gorgeous luxury hotel occupying the top 28 floors of a 100 story skyscraper, offers guests a unique feature: a room remote control in the form of an IPAD2. The IPAD2 controls the lighting, temperature, music, do not disturb light, TV, even the blinds and other miscellaneous room actions. However, the deployment of the home automation protocol contained several fatal flaws that allow an arbitrary attacker to control virtually every appliance in the hotel remotely. I discovered these flaws and as a result, I was able to create the ultimate remote control: Switch TV off 1280, 1281, 1283 will switch off the TV in these three room. The attacker does not even need to be at the hotel – he could be in another country.

This talk provides a detailed discussion of the anatomy of the attack: an explanation of reverse engineering of the KNX/IP home automation protocol; a description of the deployment flaws; blueprints on how to create an Ipad Trojan to send commands outside the hotel; and, of course, solutions to avoid all these pitfall in future deployments. Attendees will gain valuable field lessons on how to improve wide scale home automation architectures and discussion topics will include the dangers of utilizing legacy but widely used automation protocols, the utilization of insecure wireless connection, and the use of insecure and unlocked commodity hardware that could easily be modified by an attacker.

 

Attacking the Internet of Things using Time, by Paul McMillan

Internet of Things devices are often slow and resource constrained. This makes them the perfect target for network-based timing attacks, which allow an attacker to brute-force credentials one character at a time, rather than guessing the entire string at once. We will discuss how timing attacks work, how to optimize them, and how to handle the many factors which can prevent successful exploitation. We will also demonstrate attacks on at least one popular device. After this presentation, you will have the foundation necessary to attack your own devices, and a set of scripts to help you get started.
 

Optical Surgery; Implanting a DropCam, by Patrick Wardle & Colby Moore

Video Monitoring solutions such as DropCam aim to provide remote monitoring, protection and security. But what if they could be maliciously subverted? This presentation details a reverse-engineering effort that resulted in the full compromise of a DropCam. Specifically, given physical access and some creative hardware and software hacks, any malicious software may be persistently installed upon the device.Implanting a wireless video monitoring solution presents some unique opportunities, such as intercepting the video stream, ‘hot-micing’, or even acting as persistent access/attack point within a network. This presentation will describe such an implant and well as revealing a method of infecting either Windows or OS X hosts that are used to configure a subverted DropCam.
 

Playing with Car Firmware or How to Brick your Car, by Paul Such & Agix

A lot of papers have already been done/produced on hacking cars through ODB2/CanBus. Looking at the car firmware could also be something really fun :) How to access the firmware, hidden menus & functionalities, hardcoded SSID, users and passwords (yes, you read right), are some of the subjects we will cover during this short presentation.
 

Elevator Hacking – From the Pit to the Penthouse, by Deviant Ollam & Howard Payne

Throughout the history of hacker culture, elevators have played a key role. From the mystique of students at MIT taking late-night rides upon car tops (don’t do that, please!) to the work of modern pen testers who use elevators to bypass building security systems (it’s easier than you think!) these devices are often misunderstood and their full range of features and abilities go unexplored. This talk will be an in-depth explanation of how elevators work… allowing for greater understanding, system optimizing, and the subversion of security in many facilities. Those who attend will learn why an elevator is virtually no different than an unlocked staircase as far as building security is concerned!

 

Monthly Update: October/November 2014

Good news:

The last several weeks have been a hurricane of engagement and progress – especially surrounding our initiatives with Connected Vehicle safety/security.

 

Bad news:

The travel and supporting work delayed our “monthly” update a bit.

 

Back to Good News:

That means we have even more to report below… (as this is but a sampling).

 

While we’ve been crazy busy, it’s the good kind of crazy busy…

Thank you to all of you who have shown support and helped to Collect, Connect, Collaborate, and Catalyze… to drive safety into connected technologies.

It’s working…

 

Josh Corman

 


Highlights:

 

  • Invitation to join Auto Industry group (SAE) to help with Cyber Safety
  • White House Briefing on 5 Star Automotive Cyber Safety Letter/Framework
  • Flood of briefings with Auto Makers, Suppliers, Government & Industry Groups

 


 

 

Achievements:

The Cavalry invited to join Auto Industry group (SAE) to help with Cyber Safety

SAE International (Society of Automotive Engineers), a global association of more than 138,000 engineers and technical experts in the aerospace, automotive and commercial-vehicle industries, invited I Am The Cavalry to present to their monthly meeting. After a detailed overview and discussion of our initiative and framework, they invited us to nominate a representative to join their regular meetings and collaborate on issues of automotive cyber safety.

 

White House Briefing on 5 Star Automotive Cyber Safety Letter/Framework

Met onsite with members of the White House National Security Staff for Cyber Security. The staff was impressive and very pleased with our approach and content in the 5 Star Automotive Safety Framework. I believe the headline was “Love it!” They also recognized immediately how its approach and abstraction applies to Medical Devices, Connected Homes and Critical Infrastructure – specifically in context of the NIST Cyber Security Framework (CSF). They are bringing our framework to contacts in US DHS, DOT, GSA, NIST and other relevant stakeholders.

 

Flood of briefings with Auto Makers, Suppliers, Government & Industry Groups

We hoped to Collect, Connect, Collaborate, and Catalyze… and boy did we. For at least the 1st 5 weeks after the 5 Star Framework posted at DEF CON, we averaged about a briefing per business day with automotive industry players. These briefings ranged from government – such as US Dept of Transportation (DOT) to technology suppliers, insurers, think tanks, car makers, consortiums and even dealer associations. While there were pockets of skepticism or caution, the overall tone has been quite positive. This week, in fact, the Cavalry is participating in a “connected car” working group with US DHS/DOT.

 

 


 

 

Conferences and Events of Note:

Several events (both past and upcoming) showcase the I Am The Cavalry mission. Here are a few of them; if you know of others or would like to get involved let us know at info@iamthecavalry.org.

  •     -44CON in London – September, 2014
  •     -Intel Developers Forum – September, 2014
  •     -DerbyCon in Louisville, KY – September, 2014
  •     -ISC2 Congress in Atlanta, GA – September, 2014
  •     -Hack In the Box Malaysia – October, 2014
  •     -FDA Workshop: Collaborative Approaches for Medical Device and Healthcare Cybersecurity  – October, 2014
  •     -GIGAOM Structure Connect – October, 2014
  •     -0redev IoT Summit – November, 2014
  •     -DHS/DOT Connected Car Security Workshop – November, 2014
  •     -SANS penetration testing summit – November, 2014
  •     -CISO Summit Mumbai – November, 2014
  •     -CiscoSecCon – December, 2014
  •     -NH-ISAC / SANS Healthcare – December, 2014
  •     -SAE Automotive in DC – January, 2015
  •     -OWASP APPSEC Southern CA conf – January, 2015
  •     -ShmooCon – January, 2015
  •     -RSA USA 2015 – April, 2015
  •     -SAE Automotive in Detroit – April 2015

 

44CON

44CON is an annual information security conference and training event taking place in London.  Put on by Sense/Net Ltd, 44CON is intended to provide current security information to business and technical information security professional. At this event, I am The Cavalry was introduced to UK students, researchers and industry professionals.

Intel IDF

A good deal of the Internet of “all the things” is going to involve techolgy stacks like Intel. They have been receptive to much of the Cavalry mission and setup a Panel (including Josh Corman and Chris Valisek) and several meetings with internal teams to make sure they are on the right track and connected to the right initiatives.

Derbycon

Derbycon is a conference for security professionals interested in sharing and learning the latest from the infosec community in a fun and family-style atmosphere.  Space Rogue and Beau Woods discussed the I Am The Cavalry mission and Year[0] review, activities over the past year, and vision forward.  Jen Ellis and Steve Ragan conducted a very well received, half day media training workshop. Here is a link to the short talk which came just prior. Many thanks to Dave Kennedy and company for their continued support!

ISC2 Congress

ISC2 was incredibly supportive of I am The Cavalry – and generous with their annual congress. We were praised by their Executive Director Hord Tipton during opening ceremonies. We were given a talk in the solutions theatre. We got to share our mission during the Safe & Secure Online training workshop. Josh Corman delivered the keynote for the ISLA Awards dinner (where our own Tony Vargas was honored with the President’s Award!) Lastly, we got to kick off the 1st our of their Chapter Leadership meetings to plan for next year. What was clear is that they have a ready made network and resources, are highly supportive of our initiative, share many of our values (especially on their lesser know 501c3 Foundation side), and are actively looking for ways we can work together.

Loopcast

Loopcast is DC/Beltway based podcast (outside of the security echo chamber) featuring political, technical and legal issues of the day. This episode featured discussions of automotive security, our 5 Star Cyber Safety Framework, society and the law.

GIGAOM Structure Connect 2014

I am The Cavalry joined a short (but high impact) discussion on IoT Safety & Security with the CEO of ElectricImp [VIDEO]. The well-vetted crowd stimulated a great deal of follow-up and we got to make some connections to large device manufacturers who want the help. We may even have convinced ElectricImp to make it easier for researchers to get their kit… (tbd).

#0redev IoT Sweden

In it’s 10th year as a Developer Conference, 0redev added its 1st IoT summit in Malmö, Sweden last week. The diverse speakers and topics made for speakers dinners and hallways tracks worth the trip alone: Disco Mode lighting to Fashionable Wearables to BioHacking to IoT Security… the lineup is here. Most of the videos posted here.

CiscoSecCon 2014

The Cavalry was invited to speak (along with other solid outside thinkers/researchers) at their internal security event in early December. Given the line-up of topics and speakers, it looks like they too are getting serious about the role(s) they will play in IoT Security.

NH-ISAC (National Health) / SANS Healthcare Cyber Security Summit

In early December, a few of us will be attending and speaking at the Healthcare Summit in San Francisco. If you’re planning to be there, let us know!

 


Related News:

 

Mainstream Media

 

The mainstream media news is a great way to get introduced to the Cavalry and the subject of connected device security.  Here you will learn the major industry concerns in non-technical language, and how various researchers are influencing the discussion with projects and fact supported assertions.

 

  • 007 Nemesis Le Chiffre Bolsters France in Cyber Attacks [Bloomberg]
  • First Online Murder Will Happen by End of Year, Warns US Firm [The Independent]

o   This hotly debated article (and others) stimulated a lot of “What’s FUD? what’s “junk research”? What’s of legitimate concern?

o   The existence of these debates is all the the more reason we should be a credible,  voice of reason and technical literacy on these issues.

 

 

 

Security/Technology Industry Media

 

Here is a sample of current industry news about I Am The Cavalry, targeted at the IT, security and high-technology community.

 

o   I Am The Cavalry conducted an interview for Danish Radio.  The segment starts at about 24 minutes.

 

 


 

 

Ongoing Projects:

Research Library

The Cavalry is creating a library indexing recent research and articles related to connected device security.  This library will provide security experts with a launching pad for recent work in the field, and serve as a quick reference for those outside of the echo chamber.  If you would like to submit content or help build the library, please email in…@iamthecavalry.org.

5-Star Collateral

In response to specific requests from automotive companies, the Cavalry is creating collateral around the 5-Star Cyber Safety Framework.  The first project is the creation of a whitepaper documenting the safety framework and suggestions to the automotive community.  This content will enable automotive industry experts to present safety ideas internally or disseminate information at conferences.

Minor Website Updates

We’re always adding and improving our web content.  If you see an issue, please let us know and we will update the pages accordingly.

 

Long Range Future Plans:

Incorporation

We are currently evaluating several different options for incorporating as a non-profit educational foundation. Alternately we are evaluating existing non-profit organizations who want to adopt our message and mission as theirs.   A legal corporate structure will allow us to continue to serve our mission in the way we have been – collecting, connecting, collaborating and catalyzing – and to expand our reach and capabilities. At Derbycon last month we had a chance to sit down for large chunks of time (face-to-face) and update what such an organization might look like, in terms of long-term vision, activities to undertake, etc. A year smarter and with more experiences will help us finalize our business plan and formal instantiation.

BSides Las Vegas 2015

We are working with BSides Las Vegas organizers to plan I Am The Cavalry activities for BSidesLV 2015. If you have organizational or content suggestions for next year’s conference, please post them to the discussion list or send them to us privately. Videos of some of the sessions from this year’s event can be found on the Irongeek website.

 


How to Get Involved:

  • We are looking for volunteers to contribute to the Connected Device Security blog in the areas of Home Electronics, Automotive, Medical or Public Infrastructure.  Feel free to write your perspective on the latest in IoT developments and any security concerns or news in the aforementioned verticals.  Please contact info@iamthecavalry.org for more information.
  • We need assistance with administration of the website.  If you have web admin experience and interest in IoT security, please contact info@iamthecavalry.org.
  • We need assistance with building, sustaining and managing the research library.  This is a great way to get involved if you are new to connected device security.  Please contact in…@iamthecavalry.org for more information.
  • We are looking for people to do research and contribute to building out a matrix of carmakers and their capabilities from our Five Star Automotive Cyber Safety Framework. If you are interested, please email info@iamthecavalry.org.

 

Monthly Update: September 2014

Welcome to the September edition of an I Am the Cavalry Monthly Update Newsletter!

This monthly update is dedicated to publishing regular information regarding IATC accomplishments, upcoming activities and our targeted long range plans. This newsletter will inform our colleagues and teammates of the ongoing progress we are making in the public and private sectors as well as how we are positively impacting security and safety in the connected technology landscape.

I’d like to thank the teammates who helped pull this together and nudge us to improve communication. Constructive feedback (and help) is welcome!

We look forward to communicating with you over the coming months!
Sincerely,
Josh Corman

 

Highlights:

 

Achievements:

1st Birthday!

We celebrated our 1st birthday while in Vegas for BSidesLV and DEF CON 22. My how time flies. We decided to give it at least 1 year to see if this was a pursuit capable of having impact. We end Year[0] encouraged. We begin the next year with more experience, more earned wisdom, and more momentum.

 

We published our 1st Open Letter and Security Framework:

5-Star Automotive Cyber Safety Framework

See also the more detailed overview of the Framework:

Detailed 5-Star Automotive Cyber Safety Framework

 

As you might imagine, the Open Letter stimulated a flurry of interest and catalyzed discussions with automakers, OEMs, regulatory bodies, insurers, government, and even the White House. Stay tuned for updates as we can share more. Cliff Notes: “You guys are SPOT ON!”

 

 

Ongoing Projects:

Research Library

The Cavalry is creating a library indexing recent research and articles related to connected device security.  This library will provide security experts with a launching pad for recent work in the field, and serve as a quick reference for those outside of the echo chamber.  If you would like to submit content or help build the library, please email in…@iamthecavalry.org.

5-Star Collateral

In response to specific requests from automotive companies, the Cavalry is creating collateral around the 5-Star Cyber Safety Framework.  This content will enable automotive industry experts to present safety ideas internally or disseminate information at conferences.

I Am the Cavalry Slide Insert

This project aims to create a slide or two that can be added to a presentation slide deck and serve as an easy launching point for connected technology safety discussions.

FAQ

An FAQ is an easy way to centralize and maintain knowledge about our positioning and external messaging. We’d love to receive samples of questions and/or answers you’ve received since becoming a member of this mailing list. Please send FAQ suggestions to in…@iamthecavalry.org.

5-Star Matrix

This matrix is a preliminary draft for categorization and classification of major carmakers and their 5-Star cyber safety capabilities.

Minor Website Updates

We’re always adding and improving our web content.  If you see an issue, please let us know and we will update the pages accordingly.

 

Long Range Future Plans:

Legal Information

Certain activities require legal incorporation, such as engaging with government entities, industry bodies, etc.  We are currently finalizes a few different options for incorporating as a non-profit educational foundation. This corporate structure will allow us to continue to serve our mission in the way we have been – collecting, connecting, collaborating, and catalyzing.

BSides Las Vegas 2015

We are working with BSides Las Vegas organizers to plan I Am the Cavalry activities for BSidesLV 2015. If you have organizational or content suggestions for next year’s conference, please post them to the discussion list or send them to us privately. Videos of some of the sessions from this year’s event can be found on the Irongeek website.

 

Conferences and Events:

Securing the Internet of Things (SIOT) Masters

SIOT Masters was put on by CyberTECH, BuildItSecure.ly and I Am the Cavalry.  It was an afternoon of presentations and conversations about security, privacy and critical infrastructure. At this year’s SIOT Masters, 50 researchers and industry professionals from the Automotive, Medical Device, Public Infrastructure and Home/IoT markets came together to explore how IoT will change lives forever and what must be done to build security into the very fiber of all things.

BSidesLV (Las Vegas)

BSides is an information/ security conference put on by and for the community.  It is 100% volunteer organized and strives to provide the latest security information for free.  At this year’s event, I Am the Cavalry provided a one day track including an introduction, overview and update of our latest activities and accomplishments.  We also hosted interactive presentations and discussions focused on Media, Legal, Public Policy, Career, Burnout, Extreme Altruism, Disclosure and Communication. Videos of some of the sessions can be found on the Irongeek website.

DEF CON 22

DEF CON is the largest and most famous hacker conference, drawing over 15,000 people.  It is a venue for community, networking and the latest information about hacking research and security.  At DEF CON 22, I am The Cavalry kicked off Saturday in the Penn & Teller Theatre with a summary of “Year[0]” : mission, strategy, activities and forward looking plans. We also announced the 5-Star Automotive Cyber Safety Framework.

Reddit Ask Me Anything (AMA)

For the first time, I Am the Cavalry hosted an AMA.  The event is intended to better communicate our messaging and dispel any misinformation and miscommunications in the industry.  The online Q&A event was well attended, and received 80+ comments.

Peggy Smedley Show

Patty Smedley had Ben Feinstein on the show and he introduced I Am the Cavalry, its mission, strategy and activities to an IoT and M2M audience.

Robot Overlordz

This podcast featured Josh Corman talking to and answering questions from Mike Johnston and Matt Bolton of Robot Overlordz on the subject of connected device security.

IT Security Guru

I am The Cavalry members Katie Moussouris, Nick Percoco and Joshua Corman joined Dan Raywood, Editor of IT Security Guru, to discuss the IATC’s activities to promote security considerations when building IoT devices.

 

Current & Upcoming Events:

44CON | London, UK | September 10-12, 2014

Beau Woods: I Am the Cavalry: Year [0]

 

Intel IDF | San Francisco, CA | September 10-12, 2014

Joshua Corman: Panel: When Light Bulbs Meet Hacker (incl Chris Valasek)

 

Derbycon | Louisville, KY | September 24-28

Space Rogue and Beau Woods: I Am the Cavalry: Year [0]

“The Cavalry Isn’t Coming… It Falls to All of Us” @iamTheCavalry Workshops

What can YOU do to affect public safety and human life? Please join @iamthecavalry at DerbyCon for workshops on: Medical & Automotive Device Security, Media Training, Communication Skills, and a Knowledge Project to discern which InfoSec beliefs & practices should (and shouldn’t) be taken to the industries we seek to collaborate with.  Thanks to DerbyCon, this year “no ticket” is “no problem”!

Cavalry Workshops and Media Training:

Like last year, the Kennedy/Derby posse is being generous and supportive by donating the same room we used last year for our “Congress”. It will take place at DerbyCon on that Friday, Saturday and Sunday and if you missed out on a Derby Ticket… fear not… no ticket is required.

 

ISC2 Congress | Atlanta, GA | September 29 – October 02, 2014

Joshua Corman: ISLA Keynote and Chapter Leadership Forum Keynote

Joshua Corman will represent I am The Cavalry as both keynote for the ISLA Awards Gala and in an address the International ISC2 Chapter Leads.

 
Related News:

Mainstream Media

The mainstream media news is a great way to get introduced to the Cavalry and the subject of connected device security.  Here you will learn the major industry concerns in non-technical language, and how various researchers are influencing the discussion with projects and fact supported assertions.

 

Hacking group wants to play nice with automakers [Reuters]

How to Keep Your Car from Becoming a High-Tech Death Trap [Huffington Post]

While you were enjoying the weekend: DEF CON edition [Politico]

Hackers Tell Car Makers: Secure Your Vulnerable Vehicles Now [Forbes]

Security experts take aim at the Internet of (unsafe) Things [USA Today]

Hackers to Automakers: Protect Cars From Cyberattacks [NBC News]

The House of Hacking Horrors [BBC News]

 

 

Security/Technology Industry Media

Here is a sample of current industry news about the Cavalry, targeted at the IT, security and high-technology community.

 

At DEF CON, hacker coalition calls for safer computer systems in vehicles [Computer World]

DEF CON’s latest challenge: Hacking altruism [IT World]

Security movement urges automakers to collaborate with researchers [SC Magazine]

Can you stop The Cavalry? [IT Security Guru]

Let us help you defend cars from cyber-attacks: Hacking group to ‘Automotive CEOs’ [TechTimes]
How to Get Involved:

  • We are looking for volunteers to contribute to the Connected Device Security blog in the areas of Home Electronics, Automotive, Medical or Public Infrastructure.  Feel free to write your perspective on the latest in IoT developments and any security concerns or news in the aforementioned verticals.  Please contact in…@iamthecavalry.org for more information.
  • We need assistance with administration of the website.  If you have web admin experience and interest in IoT security, please contact in…@iamthecavalry.org.
  • We need assistance with building, sustaining and managing the research library.  This is a great way to get involved if you are new to connected device security.  Please contact in…@iamthecavalry.org for more information.
  • We are looking for people to do research and contribute to building out a matrix of carmakers and their capabilities from our Five Star Automotive Cyber Safety Framework. If you are interested, please email in…@iamthecavalry.org.

The Cavalry In Europe

The Cavalry made our first appearance at a European conference. Josh Corman was invited to The Hague as the closing keynote for the National Cyber Security Center’s One Conference. In his keynote he chose to revisit the theme of his TEDx talk, which highlights issues that The Cavalry is addressing. 

Claus Houmann, a strong supporter of The Cavalry, and someone who has urged us to come deliver our messages in person across the Atlantic, gave us a warm welcome post entitled Call to arms! Fellow Europeans, mount up. Thanks, Claus. We look forward to many good interactions on your Continent.

Security of Things Forum

The first inaugural Security of Things Forum was held May 7th. The forum, organized by The Security Ledger Editor in Chief, Paul Roberts, was keynoted by Dan Geer. Mark Stanislav of Duo Security and BuildItSecure.ly, and Josh Corman of Sonatype also spoke at the conference.

CSO Online wrote an article, predominantly driven by Josh’s talk, an updated version of his Swimming with Sharks TEDx presentation.

In the Digital Ocean, predators outnumber protectors

Just because something is scary doesn’t mean it’s a figment of your paranoid imagination…. There is reason to be afraid because the dangers in the digital “ocean” are as real as swimming in a physical ocean of sharks, with blood in the water.

Editor in Chief of IoT World, Rich Quinnell also took the opportunity to write about security of the Internet of Things and introduced his readers to I Am The Cavalry and BuildItSecure.ly.

Security Cavalry is Coming to the Internet of Things

One of the biggest concerns many people have about the Internet of Things is its security. Each point of connection between our systems and services and the wide area network is a potential point of vulnerability to cyberattack, yet security is at best an afterthought in many IoT designs. Something in the way we handle IoT security has got to change, and that is a key goal for a new grassroots organization [called I Am The Cavalry].

Finally, Channelnomics wrote a detailed account of the forum and the security issues in the Internet of Things. Definitely worth a read.

A Dose of Reality in the Rush to Connect All Our Things

“Security is the absence of unmitigatable surprise,” [keynote speaker Dan] Geer told SECoT attendees. “My design goal is ‘no silent failure’.” It the end, it’s not about raining on the IoT parade, said [Forum organizer Paul] Roberts, but rather moving the conversation into a more prudent and defensible space by bringing the vendors and the often insular communities together.

THOTCON & BSides Chicago 2014

The Cavalry will be holding workshop sessions at both THOTCON and BSides Chicago next week. Details are below. We look forward to seeing you there.

THOTCON – Friday, April 25, 2014

Where/When: Lab 5/6, 2pm to 4pm
Approx. Capacity: 150 people

When What Who
2:00-2:30 WHY The Cavalry Josh Corman & Nick Percoco
2:30-3:00 Medical Device Security Landscape & Challenges Scott Erven
3:00-3:30 IoT Security Landscape & Challenges Mark Stanislav (BuildItSecure.ly)
3:30-3:50 Cavalry Mission, Discrete Progress & Activities Adam Brand
3:50-4:00 Next Steps & How to Get Involved Josh Corman

BSides Chicago – Saturday, April 26, 2014

Where/When: Workshop, 11:00am to 2:30pm (with lunch break)
Approx. Capacity: 25 people

When What Who
11:00-11:15 WHY The Cavalry Nick Percoco & Beau Woods
11:15-11:45 Getting Started with Medical Device Hacking Scott Erven
11:45-12:15 Automotive Security Landscape & Challenges Craig Smith (Open Garages) & Adam Brand
12:15-1:00 Getting Started with Car Hacking Craig Smith (Open Garages) & Adam Brand
1:00-1:30 Lunch & Open Q&A All
1:30-2:00 Car Hacking Demos & Q&A Craig Smith (Open Garages) & Adam Brand
2:00-2:15 Next Steps & How to Get Involved Adam Brand & Beau Woods