Star 0

Abstract


Hubris is retired from the USAF, where he spent his last four years as a Computer, Network, Cryptography, and Telephone Switching Technician (2E2x1). His military qualifications include: Theater Battle Management Core Systems (TBMCS), Fedora System Administration, Sun Solaris, Combat Communications, Equipment Control Officer, Wire Dog. Hubris has spoken at Dartmouth University(RF-ID attack vectors, Modern Electronic Warfare), Hope(Hacking Terrorist Networks), Defcon2011(Modern Cyber Warfare), Phreaknic(Social Engineering), Pump-Con(Trolling for Sensitive Information), Toor Camp(Trolling for Sensitive Info).

Missions: Global War on Terrorism, Joint Expeditionary Force Experiment, Global Strike, maintained 24 hours Combined Air and Space Operations Center(CAOC)

Educating the listeners on the methods used by the elite North Korean hackers to gain access to the systems of the West. To show that North Korea is a serious threat to national security in the realm of cyber space. Demonstrate how to use their proprietary operating system as a attack os. To show the built in features of spyware, and how the enemy uses it to monitor its own citizins in North Korea. Finally how the Red Star Os can be taken over by a malicious user to undermine the Great Leader. For educational purposes only, All copys of Red Star os should be considered rooted by the DPRK!