Bill Thompson
๐ค SpeakerAppearances Over Time
Podcast Appearances
How do we exploit all of that was one facet of my job.
And your question was, how did I get into all of that?
And that was the... How do you get into it?
So, you know, I'll stick to terms that are more generally understood by the public, but learning how to do things like war driving, collecting on networks, Wi-Fi endpoints, cell phones...
Understanding the ins and outs of them understanding how to do forensic analysis of them So after there was an operation and a bunch of gorillas have been sent in to kill a bad guy We could derive maximum intelligence value from the hand from the handset to plan other operations And so, you know, it would be passive
monitoring of networks to inform the intelligence picture which would lead to either combat operations or active computer network operations where now it's like well there's you know a I don't know a an Iraqi or an Afghani router
that hasn't been patched in three years.
And we think we can either write or find a zero day, which is just an exploit of those routers where we can muck with their router in a way where they think they're getting a good information and they're not, or they're, or erecting other things to mitigate risk for the commander.
And so that really, you know, exploded at that point.
And between that and human intelligence, which is kind of the,
the actual gathering of intelligence from other people.
You would call it spy or James Bond, but James Bond was a horrible spy.
Your job's to remain anonymous and you're walking into a casino and there's Goldfinger calling you by your first and last name.
It's not a great look.
You know, generally you don't want to be sleeping with your sources or, you know, using a real name or whatever.
So human intelligence.
And then my focus for the last 10 years was how does signals intelligence computer network operations become a force multiplier for people conducting overt and clandestine operations throughout the theater at that time?
My, you know, my deployments and my time was spent in