In Defense of Facts: Setting Standards Against Information Threats
This presentation discusses the challenges of identifying and quantifying risks associated with misinformation and disinformation campaigns targeting election infrastructure. It highlights the use of social media monitoring and physical security assessments to detect potential threats against election staff and facilities. The speaker emphasizes the need for organizations to establish clear definitions and thresholds for what constitutes a credible threat to effectively allocate security resources. The talk focuses on organizational policy and threat intelligence rather than specific technical exploits.
Beyond the Keyboard: Why Physical Recon and Social Media OSINT Are Your Next Big Vulnerabilities
TLDR: Modern security assessments often ignore the intersection of physical reconnaissance and digital OSINT, leaving organizations exposed to non-technical threats. This talk highlights how attackers use social media to map physical security gaps and target personnel, proving that the most effective exploit is often human-centric. Security teams must integrate physical threat modeling into their standard workflows to defend against these real-world, high-impact vectors.
Security professionals spend their careers obsessing over memory corruption, misconfigured S3 buckets, and complex authentication bypasses. While those remain critical, the most dangerous threat to an organization is often the one that doesn't require a single line of shellcode. Recent research and real-world incidents, particularly those targeting election infrastructure, demonstrate that attackers are increasingly shifting their focus toward the physical and social layers of an organization. If you are only testing the digital perimeter, you are missing the most effective path of least resistance.
The Mechanics of Non-Technical Exploitation
Attackers are not just looking for zero-days; they are looking for information. The techniques discussed in this research mirror standard OSINT methodologies, but they are applied with a specific, malicious intent to map physical vulnerabilities. When an attacker monitors social media, they are not just looking for leaked credentials. They are looking for photos of badge readers, floor plans, staff schedules, and even the physical layout of server rooms.
Consider the example of a "router password" posted on a wall in a sensitive facility. An attacker doesn't need to brute-force a firewall if they can simply scrape a high-resolution image from a public social media feed. This is T1593.001, searching open technical databases, but the "database" is a public Instagram post. Once the physical layout is mapped, the attacker can transition to T1592, gathering victim organization information, to identify the best time for a physical intrusion or a targeted social engineering campaign.
Quantifying the Unquantifiable
One of the most significant challenges for any security team is quantifying the risk of these "soft" threats. We are comfortable with CVSS scores because they provide a standardized, albeit imperfect, metric for technical vulnerabilities. However, how do you assign a score to a threat actor staking out a facility in tactical gear?
The research suggests that organizations must move toward a more robust definition of a "credible threat." For a pentester, this means your engagement scope should include physical reconnaissance. If you are performing a red team exercise, your report should not just list the SQL injection you found on the public-facing web portal. It should also include the fact that you were able to walk into the building, take a photo of the server room, and identify the specific hardware in use because the staff was not trained to recognize social engineering or physical surveillance.
The Pentester’s Role in Physical Threat Modeling
During a standard engagement, you are likely already performing some level of reconnaissance. To make your work more impactful, start documenting the physical security gaps you encounter. If you can see a badge reader from the parking lot, or if you can identify staff members through their social media profiles, that is a finding.
The impact of these vulnerabilities is often higher than a remote code execution bug because they are harder to patch. You cannot "update" a human being or a physical door lock as easily as you can update a library. When you present these findings to a client, frame them in the context of the business risk. Use the CISA Election Infrastructure Security guidelines as a reference point, as they provide excellent frameworks for defining what constitutes a credible threat to critical infrastructure.
Defensive Strategies for the Physical-Digital Divide
Defending against these threats requires a fundamental shift in how organizations view their security posture. It is not enough to have a firewall; you need a culture of security awareness. This includes:
- Social Media Hygiene: Training staff to understand the risks of posting photos from inside the office.
- Physical Threat Modeling: Regularly assessing the facility from the perspective of an attacker.
- Incident Response Integration: Ensuring that physical security incidents are treated with the same urgency as digital breaches.
If your organization does not have a clear, documented process for what constitutes a "credible threat," you are flying blind. You need to establish thresholds that trigger specific incident response protocols. Without these, your security team will be overwhelmed by white noise, unable to distinguish between a harmless social media post and a genuine, actionable threat.
The next time you are on an engagement, look beyond the terminal. The most critical vulnerability in the system might be the one you can see with your own eyes. Start documenting the physical and social gaps you find, and you will provide your clients with a level of insight that a standard vulnerability scanner could never achieve. The goal is not just to find bugs; it is to understand the adversary's entire playbook.
Tools Used
Target Technologies
All Tags
Up Next From This Conference
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Counter Deception: Defending Yourself in a World Full of Lies




