Mike Kemp
Type of lecture: night talk
Language: EN
Held on 2010-07-10 18:30:00 (length: 50 min)
Location: WerkzeugH
North Korea scares people. Allegedly DPRK has a super l33t squad of killer haxor ninjas that regularly engage in hit an run hacks against the US Defense department, South Korea, or anyone else who pisses of the Glorious Leader. DPRK also has no real Internet infrastructure to speak of (as dictators don’t like unrestricted information), although it does have a number of IP blocks (unused?). This talk examines some of the myths about DPRK, and some of their existing and emerging technologies. In 2008, Orascom Telecom formed a partnership with the DPRK government and set up the state run mobile carrier, Koryoloink, and DHL are part of the European Business Association (presumably for when dictators need to 'Add Value, Be Valued').
This talk examines some of the available infrastructure associated with DPRK (funnily enough some of which is in South Korea and Japan) and explores the potential technical threats posed by a pernicious regime, as well as exposing some of the huge gaps in logic that have led to the world potentially engaging in chicken little syndrome when it comes to DPRK (and indeed, the whole concept of 'Information Warfare'). No 0days will be demonstrated, however this talk will discuss some new information that hasn't yet been made public.
Michael Kemp is an experienced UK based security consultant, with a specialization in the penetration testing of web applications and the testing of compiled code bases and DB environments to destruction. As well as the day job, Michael has been published in a range of journals and magazines, including heise, Network Security, Inform IT and Security Focus. To date, Michael has worked for NGS Software, CSC (Computer Sciences Corporation), British Telecom, and a host of freelance clients throughout the globe. Presently, Mike is working in a day job for Xiphos Research Labs (which he doesn't really have much choice in as he is the company co-founder). When not breaking things, Michael enjoys loud music, bad movies, weird books and writing about himself in the third person. Mike has previously presented at security conferences in Jakarta, Krakow, Hawaii, New York, Los Angeles, Warsaw, Krakow, Prague, Zagreb and London (on subjects as diverse as virtualization, malware, and why the government suck), and is always keen to embarrass himself in new and exotic locales.