Staying Connected during a Revolution or Disaster

Video thumbnail (Frame 0) Video thumbnail (Frame 4079) Video thumbnail (Frame 5539) Video thumbnail (Frame 7912) Video thumbnail (Frame 13285) Video thumbnail (Frame 14874) Video thumbnail (Frame 17398) Video thumbnail (Frame 32993) Video thumbnail (Frame 34758) Video thumbnail (Frame 36203) Video thumbnail (Frame 37189) Video thumbnail (Frame 44663) Video thumbnail (Frame 48464) Video thumbnail (Frame 50155) Video thumbnail (Frame 53550) Video thumbnail (Frame 58817) Video thumbnail (Frame 61714) Video thumbnail (Frame 64521) Video thumbnail (Frame 66045) Video thumbnail (Frame 67147)
Video in TIB AV-Portal: Staying Connected during a Revolution or Disaster

Formal Metadata

Staying Connected during a Revolution or Disaster
Title of Series
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Release Date

Content Metadata

Subject Area
Abstract During the recent revolutions in Africa and the Middle East, governments have shut down both Internet and Phone services in an attempt to quell communication among demonstrators. In addition, during natural disasters, people have been left without a means of finding out the latest news regarding emergency services. We will discuss methods that can circumvent severed telecommunication infrastructures, including the use of mobile devices to act as ad hoc network access points. At the end of this talk, a new open source project will be announced, with the goal of developing the capabilities to generate spontaneous networks in times of crisis using current cellular phone technology. Thomas Wilhelm is a Senior Security Consultant within the Penetration Test practice at Trustwave's SpiderLabs. SpiderLabs is the advanced security team responsible for application security, incident response, penetration testing, physical security and security research for Trustwave's clients. Thomas has been involved in Information Security since 1990, where he served in the Army for eight years as a Signals Intelligence Analyst / Russian Linguist / Cryptanalyst. Thomas is also a Doctoral student who holds Masters degrees in both Computer Science and Management, and has written numerous articles and books; the latest being "Ninja Hacking," published by Syngress. Twitter: thomas wilhelm

Related Material

Video is accompanying material for the following resource
Slide rule Computer program Mobile app Installation art Link (knot theory) Android (robot) 1 (number) Electronic mailing list Stress (mechanics) Bit Cartesian coordinate system Shareware Surface of revolution Shareware Number Connected space Uniform resource locator Process (computing) Natural number Different (Kate Ryan album) Hacker (term) Message passing Electric current
Slide rule Information Interior (topology) Computer Computer network Bit Student's t-test Student's t-test Event horizon Public key certificate Degree (graph theory) Degree (graph theory) Event horizon Telecommunication Information Identity management
Point (geometry) Dependent and independent variables Service (economics) Information Dependent and independent variables Information and communications technology Video game Information and communications technology Insertion loss Limit (category theory) Event horizon Message passing Event horizon Insertion loss Telecommunication Web service Telecommunication Representation (politics) Video game
Transportation theory (mathematics) Multiplication sign Workstation <Musikinstrument> Principle of maximum entropy Insertion loss Chaos (cosmogony) Perspective (visual) Insertion loss Information Local ring Area Workstation <Musikinstrument> Service (economics) Chaos (cosmogony) Instance (computer science) Flow separation Telecommunication Internet service provider Order (biology) Different (Kate Ryan album) Website Energy level Transportation theory (mathematics) Service (economics) Dependent and independent variables Information and communications technology Cellular automaton Mass Power (physics) Hypothesis Broadcasting (networking) Telecommunication Internetworking Energy level Mobile Web Dependent and independent variables Information Cellular automaton Information and communications technology Operator (mathematics) Basis <Mathematik> Denial-of-service attack Power (physics) Uniform resource locator Personal digital assistant Video game Codec Pressure Family Local ring
Laptop Dialect Dependent and independent variables 1 (number) Vermaschtes Netz Mereology Perspective (visual) Surface of revolution Power (physics) Internetworking Drahtloses vermaschtes Netz Modem Physical system Area Focus (optics) Dependent and independent variables Information Computer network Line (geometry) Exterior algebra Internetworking Software Telecommunication Order (biology) Smartphone Wireless LAN Modem Laptop
State of matter Multiplication sign Direction (geometry) Workstation <Musikinstrument> Range (statistics) 1 (number) Mereology Stack (abstract data type) Medical imaging Web service Type theory Single-precision floating-point format Vertex (graph theory) Area Workstation <Musikinstrument> Service (economics) Theory of relativity Software developer Point (geometry) Moment (mathematics) Open source Stress (mechanics) Data storage device Range (statistics) Bit Portable communications device Demoscene Connected space Type theory Wave Computer configuration Tower Telecommunication Order (biology) Natural number Self-organization Smartphone Right angle Sinc function Router (computing) Laptop Point (geometry) Laptop Mobile app Service (economics) Open source Dependent and independent variables Information and communications technology Mobile Web Cellular automaton Vermaschtes Netz Plastikkarte Portable communications device Surface of revolution Internetworking Natural number Software Authorization Router (computing) Mobile Web Mobile app Dependent and independent variables Information Forcing (mathematics) Information and communications technology Computer network Denial-of-service attack Multilateration Cartesian coordinate system Power (physics) Database normalization Word Uniform resource locator Software Algebraic closure Integrated development environment Web service Operating system
Standard deviation Information Information and communications technology Computer network Plastikkarte Stack (abstract data type) Focus (optics) Power (physics) Software Internetworking Smartphone Communications protocol Electric current
Windows Registry Statistical hypothesis testing Matching (graph theory) Software Mereology
Statistical hypothesis testing Point (geometry) Windows Registry Slide rule Computer program Group action Service (economics) Multiplication sign Range (statistics) 1 (number) Online help Plastikkarte Stack (abstract data type) Focus (optics) Surface of revolution Power (physics) Web service Component-based software engineering Internetworking Hacker (term) Algebraic closure Encryption Physical system Area Matching (graph theory) Information Information and communications technology Computer network Denial-of-service attack Control flow Cartesian coordinate system Connected space Type theory Exterior algebra Internetworking Software Personal digital assistant Natural number Connectivity (graph theory) Smartphone Encryption Quicksort Local ring Electric current
Ocean current Commutative property Service (economics) User interface Open source INTEGRAL Moment (mathematics) Disintegration Mereology Broadcasting (networking) Causality Hash function Information Message passing Data integrity User interface Default (computer science) Email Information Software developer Moment (mathematics) Projective plane Open source Computer network Cartesian coordinate system Uniform resource locator Kernel (computing) Broadcasting (networking) Software Internet service provider Smartphone Resultant Electric current
Service (economics) Information Moment (mathematics) Disintegration Open source Infinity Computer network Bit Denial-of-service attack Line (geometry) Mereology Loop (music) Broadcasting (networking) Software Kernel (computing) Hash function Smartphone Information Message passing Electric current Data integrity
INTEGRAL Multiplication sign View (database) 1 (number) Disk read-and-write head Public key certificate Area Online chat Information Local ring Information security Physical system Data integrity Area Service (economics) View (database) Infinity Bit Public-key cryptography Thread (computing) Type theory Message passing Telecommunication Natural number Smartphone Information security Online chat Slide rule Mobile app Service (economics) Information and communications technology Infinity Event horizon Number Broadcasting (networking) Natural number Message passing Loop (music) Information Key (cryptography) Chemical equation Projective plane Computer network Denial-of-service attack Cartesian coordinate system Limit (category theory) Timestamp Word Loop (music) Software Personal digital assistant Video game Key (cryptography)
Android (robot) Game controller View (database) Multiplication sign Disintegration Mereology Shareware Power (physics) Revision control Frequency Web service Kernel (computing) Information Physical system Distribution (mathematics) Scaling (geometry) Information Software developer Android (robot) Bit Cartesian coordinate system Limit (category theory) System call Shareware Type theory Kernel (computing) Function (mathematics) Telecommunication Video game Right angle Figurate number Operating system
Slide rule Message passing Touchscreen Information Android (robot) Right angle Cartesian coordinate system Shareware
Robot Message passing Information Online help Robotics Personal digital assistant Multiplication sign Real number Bit Smartphone Quicksort Number
Computer program Android (robot) Public key certificate Link (knot theory) Online help Open source Android (robot) Online help Coma Berenices Cartesian coordinate system Public key certificate Power (physics) Revision control Message passing Process (computing) Hooking Hacker (term) Video game Physical system
so today's talks going to be a little bit different than some of the other ones I've had in the past this is a little bit I guess a little bit more focused on trying to help out other people before it's been about you know cool little things or just having fun so what we're going to talk about today is how do we stay connected during a disaster or natural a natural disaster or revolution sorry I'm going to put up a slide here there's a link to it for
those who are actually interested in participating in the demo it's only android users unfortunately the guy who is working with me doing the programming for this app which is still in the process of being developed it's just mostly for demonstration purposes he didn't doesn't really like iphone so we pretty much did screw it i don't know if i'm going to be able to you friends with them after this but anyway so if you want to see what the demo is there's going to be some screenshots for those that don't have an android phone what you'll need to do is actually download an application you'll need to make sure that your phone is able to handle that and one of the things i want to tell you about is there is a button on there for emergency and if you push it don't send it if you do send it then you will actually broadcast to anybody else that's got the app your phone number and your actual location alright so just so you know all right so let me go ahead and talk about what the idea behind this is just a little bit as I said what do we do during a revolution what do we do during a natural disaster there's been a lot of proposals out there and I'm going to propose again another idea that we can add to the list this is more of a brainstorming idea as opposed to this is how we should do it and so I'm actually hoping that at the end of this talk there's going to be some people who show up for QA and discuss some things because there are some issues that need to be worked out and as a community as a hacker community I think that we can do an outstanding job of this all right so like I said this isn't me telling you what to do this isn't me saying this is how need to do it this is an idea that I'm proposing and hopefully it will gain some traction the reason why I'm even talking about this I figured that by now this kind of stuff would have already been hammered out since Katrina's bent for a few years and Egypt was not too long ago but it hasn't evolved fast enough or hasn't even involved properly so people are still I mean there's still the phrase I heard today as people are dying in silence so it's something that we can do as a community to change that all right okay so let me tell you a
little bit about myself got a couple master's degrees i'm working as a PhD student I've been in the US Army doing signals intelligence and I've got a bunch of those certifications that stand behind my name i'm also an employee to trustwave probably tell by the slides all right so current events one of the things that have hit home recently in the news is the Egypt and Middle East specifically and then what's happened is the a lot of these revolutions were created by social networking and that's actually one of the reasons why the telecommunications systems have been shut down the revolutions themselves are typically decentralized and the natural disasters there's been an earthquake tsunamis hurricanes you name it there's communities that are hit every year that are basically devoid or lose their telecommunication capabilities and there has to be a way of around that to get information to individuals all right so
I'm just going to go over some of the details I mean this has been pushed in the news a lot but this is the reason why we need to develop a better way of communicating in these kind of situations the biggest one obviously is the loss of life there's there's really excuse me there's really no reason why we can't do something to try to alleviate that and the emergency services themselves are desperate to try to figure out a way to get help to those individuals that need it and so because of the telecommunication loss there's obviously lots of life there's limited response by emergency services like I said they don't know where to go because they have no information and then there's disruption of organized events there's a if you go back to Katrina and trying to get people medical treatment or get them at least get them to the the dome that it just didn't happen like it would need it to and there's the economic loss that's the actual impact of the telecommunication that's not what I'm going to focus on here but we need to be able to create a different method for communicating besides just relying on the current infrastructure of the telecommunication system the representative Louisiana the senator I'm sorry of Louisiana de louisiane said and I'm going to read this quote because it's really pretty important that said that during the Katrina people cannot communicate it they it got to the point that people were literally writing messages on paper putting them in bottles and dropping them from helicopters to other people on the ground that's how bad it got so what
actually happens during the communication breakdown will talk about both natural disasters and then if the
government intervenes so natural disasters naturally wipe out the tellun telecommunication infrastructure and it does actually require in some cases days to be able to get mobile devices on site in order to stat reestablish some of the telecommunications but in essence it really takes months to be able to reconstruct that so a lot of people are out for a very long time under a government suppression it's different obviously they the infrastructure remains attack basically what happens is somebody just turns off a switch like they did in Egypt and shut down most of telecommunications internet and things like that and based on our history our limited history with this it's down for only a few days usually it comes back up because of the economic pressure more than anything else so what actually happened in the instance with the Japanese earthquake and the tsunami it was impacting the cell phone landline phones it interrupted the power all transportation was pretty much shut down and it actually impacted the undersea communication as well so we're looking at shut off of Internet services in the region we're also looking at the inability to get emergency services to the location under governor the government and the corporate response to this was to use loudspeakers you've seen the the you may even seen it happen but people governments have vehicles they'll drive around the broadcast this information over loudspeakers the television television nude bras news broadcast they were trying to provide information to the individuals that were affected but you also have to remember is that because of power issues they were unable to receive a lot of that information mobile cellular basis were actually brought into the area in order to try to reconnect and then there was an increased use of Wi-Fi hotspots this wasn't necessarily in the area affected this was in areas outside of it so basically as people were able to get out of the impacted area they were able to communicate with family friends and things like that at different hot spots that were not impacted so let's talk about Hurricane Katrina the impacts were cellular landline phones same thing as before the local television stations they were decimated the broadcast information was broadcast outside of the area so basically surrounding communities ended up picking up information that they needed to provide to the mem the people in that we're in the affected area it does again it doesn't necessarily help anybody in that area simply because power is down things like that power obviously was lost in transportation again so the response was relocation of the new services like I said they move them out of that area entirely in the hopes that somebody would be able to at least press on the information but at least it would get out there again mobile cellular base stations were pretty much on site within 72 hours and then there was actual increase of use of amateur radio operators which is one of the things I'm going to briefly mention and more from a perspective of a multi-tier approach and I think this is an outstanding method of communicating but it's not a pervasive enough in our community to be able to affect positively affect situations all right
so let's talk about the human impact of kanina the communication breakdown actually did cause des I mentioned the loss of life before well here's an actual quote from an individual who is writing a thesis master's thesis lieutenant colonel heather k needs army national guard you wrote this when he was at in war college i believe and the quote is i'll read the quote straight out with communications breakdown critical information could not be transmitted the levees broke and no other no one other than local residents knew about the massive flooding for several hours victims could not communicate with possible responders which increase the lack of response and devastation lack of communications at all levels increase the chaos death and destruction in the aftermath of Hurricane Katrina right there that that's pretty damning of the infrastructure in the response so basically what we're going to talk about it later on is how we can try to improve that that's really the gist of it alright so let's talk about what
happened during the Egyptian revolution impact that the social networks mobile phones television network coverage internet which started in january twenty seventh and then extended for a few days till january 31st any because the mobile phone system was down that eliminated the ability to do SMS messaging I mean that's part and parcel and then landlines were disconnected as well so anybody that wanted to communicate with anybody else basically had that removed the the primary focus of the Egyptian revolution was to undermine the the movement of people and also to prevent information from that movement going outside of the of the area so what did the what was the response by the individuals in that area that still had power they just didn't have the telecommunication capabilities so they started using smartphones as modems they also used land lines with modems the ones that they could actually find working they used fax machines which is good too but again you need a line in order to be able to do that and then amateur radio so now what I another proposed alternative that came out of that and i'm not sure if it actually did occur during the revolution or not but it got a lot of press afterwards is the idea of using a wireless mesh network using laptops and what we'll talk about that and i think it's a good idea but that's not necessarily something we're going to focus on today okay so my focus is on handheld technology I'm
specifically talking about cell phones I mean that's ubiquitous enough where and they're intelligent enough from a computational perspective that we have a device that can set up infrastructure's at hawk and so that's why this talk because it has that we're at that capability now alright so the way that
that we can create ad hoc networks and that's really what we're talking about as opposed to the established telecommunication networks there's a couple ways we can do that we can do it through a flooding relay or a routing relay and what ends up happening is just like what they were talking about with the the laptops the ad hoc wireless connections using the laptops we can also apply that to our cell phones as well the idea behind a mesh network besides the flooding and the routing is that demidov dissemination goes to each of these nodes each note itself then becomes a relay so what ten ends up happening is you capture and then disseminate the information this isn't this isn't new this isn't something I'm proposing this is something that already exists and it's basically what has been proposed using the laptops there's two types flooding and routing I already alluded to that flooding and I'll actually have a demonstration or a image of that later flooding basically hits every single network or every single note I'm sorry and then the routing one has predetermined directions of where it's going to go some of the interesting examples of ad hoc networks that are out there there's a mobile ad hoc network and a vehicular ad-hoc network I'm going to let you guys look more that up again we're not going to talk about it but it is some interesting proposals nothing really has been pushed out as a standard or you know it's more in the learning stages more in the demonstration stages but it's clever and it could actually be applied into emergency situations like this right so the purpose of an ad hoc technology as I mentioned before there was some traction in the news after the revolution in Egypt but the idea behind it is to disseminate information the idea is we're going to push out revolutionary activities any evacuation notices some weather alerts and then also to decrease information missing the misinformation and also eliminate some of the fears because that's pretty rampant in any of these circumstances especially during a national disaster where people don't know how to communicate emergency services they need to be communicated with obviously as well fire police ambulance hospital locations and closures there was a ton of closures in Louisiana and a lot of people ended up going to hospitals that were shut down and people who are in desperate need of support there's also something that kind of gets pushed by the wayside is communication with relatives that doesn't seem to be as important to a lot of people but as far as the government and but on and honestly the first thing you care about when the dad the disaster happens is you know where your loved ones and what are they doing and you want to make sure that you can communicate with them and if the telecommunication system is down it makes it very difficult all right so i mentioned ad hoc nodes using laptops let's talk about some of the advantages of that so the laptops already have tcp/ip stacks integrated the advantage to that obviously is then it's easy to talk straight to the Internet it's just a straight leap into if you can find an access point that connects out you're good to go laptops actually meet or exceed the capabilities of routers depending on what you have and they're also extremely flexible you can load up apps you can use data storage there's a lot of accessories that you can add into it so there's definitely a good reason to use laptops as an ad-hoc node and I'm not going to dissuade that from people from using that at all i think that's going to be a critical especially communicating into the internet some of the disadvantages that it's expensive it's also very not very portable extremely power-hungry and does require a pre-existing software to be installed in order to be part of that node if you're talking about a revolution or telecommunication disaster where you cannot connect to the internet you can't just selectively decide that you want to be part of that node simply because you don't have any way of downloading the software that's nice that's needed for that amateur radios like I said I was going to talk about this a little bit I think that the more traction we have in amateur radio enthusiasm across the world the batter honestly it only makes sense that they've been a big proponent of being able to exist in emergency situations that's why a lot of people get into it to be able to provide a relay across the world the advantages of amateur radio it can be both huge massive towers it can be very small down to handheld amateur radio will actually be able to send information over tcp/ip it's very portable like I said in if you're dealing with the smaller handsets and it does have a very long signal reach since it's just using radio waves the disadvantage is specialized knowledge now I'm not saying that it's complicated I'm just saying that the average person has no idea what to do with it other than pretend it's a walkie-talkie and it's also not ubiquitous it's not in everybody's hand i would say that ninety ninety-five percent of the people here have a cell phone but i would say to be pushing it even in this environment where ten percent have amateur phones on them or amateur radios on them so that's the problem that I see with amateur radios is that it's not every where it needs to be at the moment so there are some corporate and government ad-hoc nodes as well and I mentioned some of them already were specifically some of the loudspeakers mobile cellular base stations and then the television now whether you really can call that a note or not is questionable but it is one way of providing information to individuals in the affected area may not be the most effective the advantage to this one though is that it's or authoritative you know that it's coming from an official source when you're dealing with natural disasters that's a really big thing you don't want to go by word of mouth you want to know what the the real official word is the disadvantage is slow to respond extremely slowly respondent we saw that in Katrina it was really bad and it does require infrastructure's base stations have to show up tell the television stations have to assume you can't just pick up and move them easily and it does consume resources helicopters mobile police force etc and the other thing that ends up happening too is and we saw that in Katrina and not in Japan but people got very hostile with any authority organizations whether it was police forces on the scene or helicopters they were getting shot at all the time so that's that's something else that needs to be taken into consideration ok so now let me talk a little bit about the advantages of using cellular smartphones in an ad hoc node so we've got this is also assuming that there is no telecommunication infrastructure that's available again like I said it's everywhere it's accepted technology everybody including my mom has a cell phone and for my mom and have any technology is amazing it has lower lower power consumption than a lot of the other devices that we talked about it's very portable and it's extremely flexible just like the the laptops as well we're dealing with apps data storage and accessories some of the disadvantages it does have some limited range and it does require a pre-existing software to be installed now I'm going to talk about later on the application that you guys downloaded I'm just going to give you I'm going to get up on a soapbox later on but at this point there's no reason why the operating system developers don't have something like what we're going to talk about where you can create ad hoc networks using cell phones without a telecommunication infrastructure should be no reason why that doesn't already exist in their operating system and so we need to actually push that to be spread out into the OSS as they're distributed to the telecommunication companies right all right as I mentioned before the use of laptops is important the use of amateur radios is extremely important as well I don't think that there's any reason to take one of those solutions over another when you're talking about natural disaster you're definitely talking about redundancy and you need to have that so cell phone services are very vulnerable to disruption so that's one of the reasons why we need to have this power outages impact most responses both from the emergency services and also from citizens trying to get information to the emergency service as well portability is extremely critical because circumstances will change whether or not a new storm front comes in or new waves of a disaster you never know what's going to happen and then there needs to be some interoperability and this is actually I don't have a quote for this but this is a serious problem that has been identified by the government as well during the Katrina is that a lot of organizations had no way of actually communicating with each which is it's sad but it's just the state of being okay so the next thing I
might actually talk about is the smartphone technology and I'm going to do a proposal for the future ad hoc communication methods and that's we're going to get into okay so smart phones
that's what we're going to get into so the communication protocols that exist now you guys know this I Tripoli a be 8020 dot11 a B&G and then there's Bluetooth and that we're focusing on this so we have an idea like I said this is more of a a brainstorming effort and this is what we have to deal with it when we're talking about smartphones so as far as messaging and data we have the ability to use pop3 imap for an SMS which obviously gets impacted and then we also have within the device as well a gps antenna it most smartphones that it's pretty much standard now so a mobile ad-hoc network this actually uses the internet technology tcp/ip stacks and it has a longer range basically
because that's power we lose power I lost power up here as well yep it's not just this outlet yeah what I need is a smart phone that can actually push this information to everybody else's smartphone that would be fantastic we lost power so we starting to come 35 right and doing it a lot its own
bear with us here folks as we deal with some minor technical difficulties you guys are really bored we can do the jeopardy theme test us all right so while we're waiting for this I actually wanted to bring up another topic while I'm up here is that I'm actually running the be the match bone marrow donor registry and what ended up happening is
last year I ran it and we got some people to sign up but this year barcode which is part of the midget network he
ended up the negatively impacted excellent test test anyway so he actually will eventually need a bone marrow transplant himself there's also other individuals in the community that has the need for bone marrow as well from leukemia and there's a lot of other diseases too it's not it's not surprising that a group this large that people are going to have a need for this type of medical assistance the bone marrow donation but to me the way I look at it it's actually one of the coolest human hacks that you can do actually was a donor myself and I'm telling you it's no big deal to go through but it's extremely life-changing when you do it so for me it's been an extremely positive influence it's unfortunate that we have individuals in our community that are in desperate need now but we have the ability to help and if you have the time later today if you could swing by the contest area in the center there's be the match we're doing a drive trying to get people up on the registry not everybody gets picked but the ones that do or extremely helpful too happy to help out and there's also a blood drive going on in barcodes name as well so definitely check out that if you're not willing to do the marrow as well okay so I think we're back up thank you I think we're back up on the slides let me go ahead and continue so we were talking about smartphones and we were talking about potential ad hoc networks and like I said the the proposal for a mobile ad hoc networks is uses current technology has longer ranges but it does require a phone be capable of relaying data which doesn't really isn't really programmed right now and then it also consumes power rapidly another alternative is the bluetooths ad-hoc network with lower power requirements and short ranges now I actually am going to propose today the bluetooth ad-hoc Network doing it and that way as opposed to the mobile ad-hoc Network where we use the tcp/ip stack I'm assuming that later on that somebody will be able to figure out a way to bridge the information from Bluetooth that gets on to a system and then it passes over to tcp/ip stack that should be pretty straightforward but the reason why I'm pushing the bluetooth is pretty much because of the power requirements much less intense than the the Wi-Fi and when you're talking about natural disasters specifically all that becomes a really critical component to being able to communicate externally and some of the solutions that people have been using is you know cars broken down the flooding in the streets whatnot but they're still able to power their devices because they usually carry around some sort of way of connecting into a vehicle battery of you know the through the cigarette lighter or whatnot so power is there is just not as easy to get to and the less power consumption that you use the better that's my personal viewpoint and that's why I'm going to push the Bluetooth ad hoc network so for pretty much from here on out that's what we're going to to do and I actually have a slide on why which one's better under the different circumstances the real ultimate goal is to be able to have the tcp/ip connection that especially during revolution but honestly just being able to get the information out is critical enough and the other advantage to the Bluetooth as opposed to the tcp/ip internet is that data stays local it's easier to disseminate the information to a very specific region if you're just using bluetooth because it won't pop onto the internet and they get to somebody in India when the services are needed in Louisiana okay so what exactly what data are we actually talking about that we need to send out so emergency service information is is probably the forefront of this discussion but i do want to mention that there are other things that we need to talk about like the revolutionary activities in fact then of course like i said evacuation notices weather alerts things like that now i will also say that there will be a need for encryption during this it's not the the application that i had you guys download for those that were willing to do it there is no encryption at this point but we'll talk about that here shortly ok so the
application that was written I'm not a good enough programmer to be able to do it myself so I got a buddy to help out and like I said right now we're dealing with the droid and I'm going to actually solicit people after this to start helping me out on some of the other platforms or at least start talking about them but I'm calling it the Autobahn and the reason why is it the
autobahn is actually I thought I'd yeah it's right here top automated broadcast ad hoc network that the made perfect sense and the idea behind the Autobahn open source project is to develop applications for cell phones actually the end result is to get applications installed as default on these smartphone devices I mean you already got your email you got your safari on iphone why don't you have something that can communicate with other phones in emergency circumstances so use existing smartphone technology to create ad hoc networks also find the shortest path possible to and from the emergency services and when we talk about the the broadcast routing then we'll get into that and then also allow people to join or drop conferences are part of the the channels as needed and then provide confidentiality integrity when you're thinking about revolutionary activity you want that cut the revolutionary individuals will want that confidentiality and that integrity to be able to push out the information to those individuals that need it we're doing this here at this location we're still going you want some way of knowing that it's from that individual and then also they will want to talk to some of the other people that are in charge of it or at least leading the cause and being able to do that in a confidential manner it also needs to have an extremely easy user interface like I said my mom's got smartphone so now it has to be extremely simple to use because if it's not she's never going to use it and then also integrated like I said into the kernel phone current phone kernels so that it will get pushed out for everybody that buys it and the other thing too is that by now you guys pretty pretty much figured out this is not going to be difficult to implement this should be very simple as I was thinking about it and trying to figure out why we haven't already done it it was one of those dumb moments where it it's so simplistic that it should have already been discussed and and online right so
when we're dealing with let me go back
so when we're talking about existing symone with smartphone technology this does limit some phone technology obviously it limits it just to you know we're dealing like the android phone and the blackberries and iphones and things like that some of the old older or less advanced cell phone tech of cell phones aren't going to be able to be a part of this but it's becoming a lot more popular the smartphones are becoming a lot more popular all right so let's talk
about the shortest path I mentioned that it's going to have a graphic here what ends up the reason why I'm proposing the flooding relay is because you don't have any writing information to worry about that's part of the advantages of having ad hoc so phones will be able to pass information and you see the red line basically going from the sender to the receiver as quickly as possible but the there are some problems you'll you'll see that there's going to be some spamming problems and there's also going to be infinite loop problems for anybody that is interested in the networking stuff all right and I'll talk a little bit about that as well all right so again
there in surest path all messages get sent to all available phones in the area but we should have the ability to filter out the ones that we want to view in other words we're going to create channels and I'll talk about on the next slide channels so that people can look to things that they're interested in ignore everything else but going back to that first bullet is that all messages get sent out to all cell phones so it you'll have emergency information in there as well as it detailed information from your mom all right just a matter of picking and choosing which ones you want to see and then I mention an infinite loop problem so to deal with that is going back to some of the ways that we deal with that network layer 2 layer 3 stuff is is to use timestamps and dropped after set time instead of time to life or just using timestamps and then the spamming problem phones can actually recognize who they connect to push the information to so they won't replicate messages they will continue to connect to them if they can with any additional messages that they have just not repeat anything that they've already sent all right so let's talk about some of the chat channels so users should be able to subscribe to the chat channels like i mentioned think of them as chat rooms that again prevents users from seeing all the messages that go across the network that way you don't get a flood of information you get just the information that you want but you also need to have in the app some pre-existing chat threads so that you can receive information from emergency services as well that way you know that they come from authoritative individuals as opposed to somebody who just want to with your head and then users should be able to create and view local chat channels as they need to and the ability to create them is actually critically important because when you're talking about like revolutionary type of activity you need to be able to create stuff on the fly and so if users want to be able to relay some information they just saw an event that occurred they need to pass that information on to somebody you can create a chat channel people will see it on their phone and be able to subscribe to it and their phones will continue to push that information on what others let's talk about security
confidentiality and integrity so security as this is obviously a big issue here on one of the things that I approached this project is with is that under certain circumstances specifically emergency medical services where you're in need you don't care about security you care about getting that message out so there has to be a little bit of balance between security and availability all right and that's always the case but the applications smartphones can use public private keys not necessarily pki we're not talking about infrastructure but the ability for people to create their own public and private keys and be able to push that information on two phones at or actually people being able to pull the that information the public key keys as they needed to so scenario is during revolutionary situation if people want to stay connected with this individuals communication they should be able to download a certificate for that particular chat channel it'll have that information in there and then they're able to know that it came from that person because it was signed by their their private key so that provides the confidentiality also if the person who is the revolutionary leader wants to restrict access to his messages you can just also limit who has access to that public key and then like I said integrity broadcast and public key to the world if you want to so everybody knows it comes from you and that was a problem in Egypt a lot is that they weren't sure if it was some of the messages were coming out from the individual who is considered the leader for that event under natural disaster the confidentiality integrity are both pretty much the same we need to have pre installed my view is we need to have pre installed public keys for emergency services on that phone in that application that way the emergency services can get that information out using a private key that has been distributed to them in a controlled manner and it also by using that it allows you to encrypt the information that you're sending to the emergency services so that they're the only ones that can read it as I gave a warning at the very beginning of this for anybody that downloaded the the app if you push the emergency button and you go through the system and you send that message it's going to send off a couple bits of information one is your longitude which if you're talking about I have a heart attack and I need somebody here now you'll want that information given out that's fine my personal view is I don't care if anybody sees that but the next thing that does go out also is your phone number that will also reduce the opportunity of abuse and that will also increase the opportunity should telecommunication systems come back online that people who are in dire need can get connected to or the emergency services can push the telecommunication services the mobile networks to allow access to that individual ok and then integrity is again if you want reliable information from a government entity public keys having that pre-installed and then making sure that the emergency services that the government whomever is using that private key then you're good to go ok as I mentioned we need to
integrate this into the kernel here's a little bit of a soapbox we need to persuade the operating system manufacturers to include this type of application and all of their distributions and it actually needs to be interconnectivity so i don't care if it's iphone i don't care if it's blackberry they should all talk to each other and then there are is some some current roadblocks the droid phone is changing pretty rapidly the latest version is reduced a lot of these problems and I'll show you one of them that they will eliminate and in the latest version and then this can actually save lives but it's not profitable and so that's where our challenge really comes into play is that telecommunication companies don't have a reason to implement something like that they want people to use their telecommunication system they don't want I'm thinking I'm talking for them which is probably not appropriate but my personal view is that they would be reluctant to have something like this that would circumvent and could circumvent effectively and for long periods of time there telecommunication infrastructure I mean there's no reason why this kind of application couldn't be used on a broader scale a lot of people are already using bluetooth and so it's not a big surprise that it would be considered a problem if it was used consistently and daily and then but the problem shouldn't be about control of the information it really should be about getting the information to and from the individuals that need it the most during these kind of situations okay so now for those who have actually downloaded the android phone hopefully you've been playing with it but i'll show you some screenshots for those that don't as the demo part after the demo
there's a few more slides and and i'll discuss also some of the very briefly to some of the problems that we're facing and some of the things that need to be worked out and i'm actually going to invite everybody who's interested in talking about this to the QA room so we can even start hashing some of this out or it can get some people to start participating in development right so this is a very stripped down version it's very simplistic basically you need to turn on or turn it off I would actually think that in one of the one of the design requests that i have is that audubon automatically turns on when there is a period of time where it is not connected to a telecommunication system that way people can start automatically pushing this information back and forth between each other without even knowing about it it can also allow them to know that a disaster is going on when they open up their phone they can't figure out what's going on and it's right there for them the emergency service information is right there but in the meantime people should be able to start and stop the service as they as they see fit the second half on the right hand side this is one of the hurdles that is currently a problem but is actually being a limited's eliminated in future deployments of the android operating system is that it is a limited amount of time for other Bluetooth devices to be able to actually connect and discover discover and connect to the system we need this to be more pervasive we need it to be turned on and left on as needed yes it drains power but when we're talking about life Slim's eyesight or you know I know it's a it's an easy it's an easy call to say let's burn the power alright so once you if you click
on the only go back if you click on the
button at the very top it'll say emergency and you get this next screen right now it's got the medical police and fire but you know the homeland
defense has been talking about zombie infestation so I think that was probably appropriate as well so we've got an emergency for any of these and if you click on one it actually takes you on to the right hands slide which shows you basically it breaks down into what is your emergency circumstance so if you're dealing with a heart attack first thing you would click on is the medical and then it would say you know basically if it's personal if you're you know and it would break down whether or not it's life-threatening or not and then be able to provide that information as it like I said this is a simplistic for my mom to be able to handle she'd be able to click the right button and then it would be at the last thing that would end up happening is a message would be created this is actually available on the application that you can download now
where it produces a message that says your latitude your longitude your phone number and any sort of emergency information that you can additionally provide as well in this case the individual is under attack from Rob robots from the future so okay a little bit of humor in there but it is actually extremely in I think a very important discussion I'm not saying that the autobahn is the end-all be-all way to go with it I am proposing that this is the kind of thing that we need to see pushed onto all smartphone devices okay so
we're going to talk about conclusion real quick a couple more slides just and we've got plenty of time before you guys have to bail out it's only 12 45 so just
hold on for a second all right so I need your help i need programmers any Android iPhone Blackberry I also need people who are interested in becoming leads for any of this if the individual who is helping me out he's got a full-time job but he's able to he was able to do a lot and from his guidance I don't see this as a long complicated drawn-out process I can see this with a concerted effort a matter of months to be able to get something like this up and going especially with the the new versions of operating system coming out that allow more flexibility in this so this is an opportunity to actually do something that can benefit humanity saves life and extremely simple to be able to implement if you want to hook up with me and get this going or if you want to debate this or you telling me that this is crap idea and you have a better one I'm all ears you can contact me at Autobahn at hacker demia calm academia com also has a link to download the again and I'll just leave that up and as it progresses we'll add that as well alright so this is my thank you to everybody we're going to go to the breakout room afterward after this some of the problems that we need to discuss still as a community or between me and the program is it doesn't really matter we need to deal with power resupply application in Toronto probability pre-populated certificate message size and anything else you guys can think about alright that's going to be a gentleman and ladies I appreciate your attendance I know you've got a lot of things to do but I definitely appreciate you being here thank you