SlideShare ist ein Scribd-Unternehmen logo
1 von 31
The Cyber Warfare Initiative the Good, the Bad, and the Ugly LiveSquare Security www.LiveSquare.com
Overview ,[object Object]
Cyber what?
A recent example
The Players
Why Now? ,[object Object]
The Bad
The Ugly
What next?
Resources
Cyber Warfare - Hype? ,[object Object]
” Titan Rain” - started 2003  Titan Rain hackers gained access to many U.S. computer networks, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA.  China.
Estonia – March 2007, Ukrain – November 2007
Lithuania – June 2008, Georgia – November 2008, Kyrgistan 2008
” GhostNet” – 2008 to present – China, KyLin OS (BSD or ???)
DOD, White House, Congress, Lockheed Martin (F35 fighter)
Dali Lama, Germany, France, India, Australia
Iran
The battle is fought every day.  ,[object Object]
Cyber What? ,[object Object]
” Everyone is attacking everyone.”
Country vs. Country, Entity vs. Country, Entity vs. Entitiy, Entity vs. Individual ,[object Object],[object Object]
Political / Military –  strategic asset identification.  Intelligence, Target optimization.  Economic pressure and articulation.  Revenge.  Combined kinetic and info attack to paralyze enemy, disinform, weaken, force them to expend resources.
Social –  why are you targeted?  Why did/does Isreal socially map US phone calls?  If you own a business, are in IT, or especially if you operate a security consulting practice why does your web site get visited daily by folks in China?  Why is Identity Theft so huge?  Do you facilitate money laundering?
Cyber war: What to do ,[object Object]
Disrupt and mix up commercial / financial transactions ,[object Object],[object Object]
Cause enemy to expend resources and time on futile tasks
Create crisis of confidence in enemy's currency, leadership,  perceived stability, etc
Modify / Destroy information sources, infrastructure, systems – change reality / history
A Recent Example: Iran ,[object Object]
Twitter – stopped regular maintenance to aid coordination of dissent in Iran.  Aided by State Dept. and a few others.

Weitere ähnliche Inhalte

Was ist angesagt?

Welcome to my presentation on dependency theory
Welcome to my presentation on dependency theoryWelcome to my presentation on dependency theory
Welcome to my presentation on dependency theoryOjhor Shrabon
 
Who makes chinese foreign policy
Who makes chinese foreign policyWho makes chinese foreign policy
Who makes chinese foreign policyibrahimkoncak
 
The foreign policy of china
The foreign policy of chinaThe foreign policy of china
The foreign policy of chinaASIF Raza
 
Structural realism lecture presentation
Structural realism lecture presentationStructural realism lecture presentation
Structural realism lecture presentationibrahimkoncak
 
The Union Of The Soviet Socialist Republics
The Union Of The Soviet Socialist RepublicsThe Union Of The Soviet Socialist Republics
The Union Of The Soviet Socialist RepublicsSchool
 
11.terrorism and role of media
11.terrorism and role of media11.terrorism and role of media
11.terrorism and role of mediaAlexander Decker
 
2013-2014 International Relations Lecture Slides
2013-2014 International Relations Lecture Slides2013-2014 International Relations Lecture Slides
2013-2014 International Relations Lecture Slidesabhishekmaity
 
Radical feminism
Radical feminismRadical feminism
Radical feminismMarxism
 
Realist theories of global politics
Realist theories of global politicsRealist theories of global politics
Realist theories of global politicsbentogo
 
Foreign policy of china
Foreign policy of chinaForeign policy of china
Foreign policy of chinaduawahab
 
Realism and liberalism
Realism and liberalismRealism and liberalism
Realism and liberalismBob Croft
 
02a types of international conflict
02a types of international conflict02a types of international conflict
02a types of international conflictfatima d
 
Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism Mian Muhammad Zafar
 
Soft Power Vs Hard Power
Soft Power Vs Hard PowerSoft Power Vs Hard Power
Soft Power Vs Hard Poweredvill666
 
Gender and ethics in practice: experiences of researchers conducting qualitat...
Gender and ethics in practice: experiences of researchers conducting qualitat...Gender and ethics in practice: experiences of researchers conducting qualitat...
Gender and ethics in practice: experiences of researchers conducting qualitat...resyst
 
India – United States of America Relations.pptx
India – United States of America Relations.pptxIndia – United States of America Relations.pptx
India – United States of America Relations.pptxPrachiRawat28
 

Was ist angesagt? (20)

Welcome to my presentation on dependency theory
Welcome to my presentation on dependency theoryWelcome to my presentation on dependency theory
Welcome to my presentation on dependency theory
 
Bush doctrine for submission 1
Bush doctrine for submission 1Bush doctrine for submission 1
Bush doctrine for submission 1
 
Who makes chinese foreign policy
Who makes chinese foreign policyWho makes chinese foreign policy
Who makes chinese foreign policy
 
Realism ppt
Realism pptRealism ppt
Realism ppt
 
The foreign policy of china
The foreign policy of chinaThe foreign policy of china
The foreign policy of china
 
Structural realism lecture presentation
Structural realism lecture presentationStructural realism lecture presentation
Structural realism lecture presentation
 
The Union Of The Soviet Socialist Republics
The Union Of The Soviet Socialist RepublicsThe Union Of The Soviet Socialist Republics
The Union Of The Soviet Socialist Republics
 
11.terrorism and role of media
11.terrorism and role of media11.terrorism and role of media
11.terrorism and role of media
 
Balance of power in asia
Balance of power in asiaBalance of power in asia
Balance of power in asia
 
2013-2014 International Relations Lecture Slides
2013-2014 International Relations Lecture Slides2013-2014 International Relations Lecture Slides
2013-2014 International Relations Lecture Slides
 
Radical feminism
Radical feminismRadical feminism
Radical feminism
 
Realist theories of global politics
Realist theories of global politicsRealist theories of global politics
Realist theories of global politics
 
Foreign policy of china
Foreign policy of chinaForeign policy of china
Foreign policy of china
 
Women in business: the path to leadership
Women in business: the path to leadershipWomen in business: the path to leadership
Women in business: the path to leadership
 
Realism and liberalism
Realism and liberalismRealism and liberalism
Realism and liberalism
 
02a types of international conflict
02a types of international conflict02a types of international conflict
02a types of international conflict
 
Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism
 
Soft Power Vs Hard Power
Soft Power Vs Hard PowerSoft Power Vs Hard Power
Soft Power Vs Hard Power
 
Gender and ethics in practice: experiences of researchers conducting qualitat...
Gender and ethics in practice: experiences of researchers conducting qualitat...Gender and ethics in practice: experiences of researchers conducting qualitat...
Gender and ethics in practice: experiences of researchers conducting qualitat...
 
India – United States of America Relations.pptx
India – United States of America Relations.pptxIndia – United States of America Relations.pptx
India – United States of America Relations.pptx
 

Ähnlich wie CWFI Presentation Version 1

Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaStefano Maccaglia
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceBrian Arellanes
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI CenturyJyrki Kasvi
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacynetapprad
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fiskJulesroa
 

Ähnlich wie CWFI Presentation Version 1 (20)

Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
114-116
114-116114-116
114-116
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - Maccaglia
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSource
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fisk
 

Kürzlich hochgeladen

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Kürzlich hochgeladen (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

CWFI Presentation Version 1

  • 1. The Cyber Warfare Initiative the Good, the Bad, and the Ugly LiveSquare Security www.LiveSquare.com
  • 2.
  • 6.
  • 11.
  • 12. ” Titan Rain” - started 2003 Titan Rain hackers gained access to many U.S. computer networks, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA. China.
  • 13. Estonia – March 2007, Ukrain – November 2007
  • 14. Lithuania – June 2008, Georgia – November 2008, Kyrgistan 2008
  • 15. ” GhostNet” – 2008 to present – China, KyLin OS (BSD or ???)
  • 16. DOD, White House, Congress, Lockheed Martin (F35 fighter)
  • 17. Dali Lama, Germany, France, India, Australia
  • 18. Iran
  • 19.
  • 20.
  • 21. ” Everyone is attacking everyone.”
  • 22.
  • 23. Political / Military – strategic asset identification. Intelligence, Target optimization. Economic pressure and articulation. Revenge. Combined kinetic and info attack to paralyze enemy, disinform, weaken, force them to expend resources.
  • 24. Social – why are you targeted? Why did/does Isreal socially map US phone calls? If you own a business, are in IT, or especially if you operate a security consulting practice why does your web site get visited daily by folks in China? Why is Identity Theft so huge? Do you facilitate money laundering?
  • 25.
  • 26.
  • 27. Cause enemy to expend resources and time on futile tasks
  • 28. Create crisis of confidence in enemy's currency, leadership, perceived stability, etc
  • 29. Modify / Destroy information sources, infrastructure, systems – change reality / history
  • 30.
  • 31. Twitter – stopped regular maintenance to aid coordination of dissent in Iran. Aided by State Dept. and a few others.
  • 32.
  • 33. The monitoring capability was provided, at least in part, by a joint venture of Siemens AG, the German conglomerate, and Nokia Corp., the Finnish cellphone company, in the second half of 2008, Ben Roome, a spokesman for the joint venture, confirmed. Source WSJ
  • 34. Iran uses kinetic attack to stop university students from communicating to the outside world. Students killed.
  • 35. Iran plays whack-a-mole with phones, sat phones, ”rogue” Internet connections
  • 36. Bans all foreign media, blocks farsi news sites outside Iran, etc.
  • 37. Iran declares an ”official end” to freedom of expression, people reject this...
  • 38. Using a phone, if you mention the wrong keyword, your line goes dead
  • 39. Pro-iran regime “hacktivists” breach the U of Oregon and leave a message...
  • 40.
  • 41. ” Turning off the Internet” does as much damage as good
  • 42.
  • 43.
  • 44. China – National network configuration enhancing cyber defense, KyLin, ”green dam”, email trojans – known to have penetrated 103 countries, especially email systems. - military value
  • 45. RBN – email malware, identity theft, BOTnets
  • 46. The Brits, Israel (info and kinetic e.g. Gaza), Palestinians, Islamic Jihad, Al Qaeda, Russia to Uzbekistan relating to American Base.
  • 47. Anyone who wants to play
  • 48.
  • 49. The Cyber Warfare Forum Initiative – US and allies
  • 50.
  • 51. Formal and excellent training in hacking / cracking systems
  • 52. Financial funding and rewards for success to anyone
  • 53. Russian Business Network and other organized crime
  • 54. The East has a plan is is doing well
  • 55.
  • 56.
  • 57.
  • 58. Building secure microprocessors with a secure operating system that runs on those chips
  • 59. National connectivity is designed to move through ”gateways”
  • 60.
  • 61.
  • 62. National communications infrastructure a disadvantage – nearly 100% privately owned
  • 63. Capabilities largely from large US security firms that will not cooperate well
  • 64. Successes: Trojan hardware, communications intercept
  • 65.
  • 66. The security industry in general sees an opportunity to resolve long standing issues.
  • 67. Members of the security industry got together to form a ”community” driven effort to cross contaminate and share information to induce improvements and knowledge sharing.
  • 68.
  • 69. Debate rages on who should be the top dog: person, agency, budget authority: lots of dialogue and posturing
  • 70. Security vendors see wash of funds and line up with their suits on
  • 71. The security community suddenly sees the need to help people to understand where we are and what is going on.
  • 72.
  • 73. we may have ”the capabilities” we need, but can we mobilize and utilize them? In time?
  • 74. it should be ”self-evident” that we both need and want to improve our footings
  • 75. The US faces a more difficult task in cyber defense than others due to network design, laws, and other issues.
  • 76.
  • 78.
  • 79. Can we define the problems?
  • 80.
  • 81.
  • 82. When can the military ”shut down” domestic ISPs?
  • 83. Does the Constitution allow for the government to ”take control” of the cyber security issue for everyone or just itself?
  • 84.
  • 85.
  • 86. When will I be safe?
  • 87.
  • 88.
  • 89. OWASP - Open Web Application Security Project
  • 92. OpenDNS for small business and consumers
  • 93. Numerous web sites with links to resources... the pieces of the puzzle are out there
  • 94. We are the most innovative people on the planet...
  • 95.
  • 96.
  • 97. China's new wall has limited ex-filtration from the country and therefore, sources of attacks cannot easily be determined as they are aliased. Infiltration is shut down by shutting down the gateways. A comprehensive strategy exists in China. The US, not so much.
  • 98. US law and constitutional issues should prevent the ”solution” from being a government owned and operated entity. However, all seem to be looking to the government for ”the solution”.
  • 99. If the business community / private sector is the solution...
  • 100.
  • 101. The big security companies actively suppress the smaller companies via a multitude of means. This harms innovation. They are also not buying innovation from the smaller companies so they are simply shutting the other guys out.
  • 102. Not Invented Here (NIH) - Anybody else's products are crap.
  • 103. Turtle Complex - all issues within an organization must be concealed to prevent embarrassment or worse... questions.
  • 104. Hollywood Simplex I - if you are a security vendor at a client, you are the only one doing anything of value. The others are there to try to steal your spotlight.
  • 105. The Kids Clubhouse - if you are not a part of the *con speakers and/or attendees club then obviously you know nothing about security. Only people that attend or speak at conferences know anything worth while.
  • 106. Power User Macho - even if you really have little understanding about what is going on: be aggressive. Ignorance is best concealed behind a good offense.
  • 107. Megalomania - with this security product / concept / method - I shall rule the world. All others shall bow to me. Ah ha ha ha ha ha.
  • 108.
  • 109. Little collaboration combined with the stiffling of innovation = bad day for US.
  • 110.
  • 111. If people find out our problems I might lose my job... "So we are fine."
  • 112. We don't do anything with jet fighters, therefore our problems are much smaller and very different.
  • 113. We can't solve every problem, so we will focus on responding to the stuff that hits us. We will react to issues as they come up.
  • 114. We don't want to work with other companies. We want attackers to leave us alone and attack them. Our strategy is displacement.
  • 115. Alphabet-soup - even though the letters and credentials have no track record of success. It is still mandatory. Letters are cool.
  • 116. Job-dutious-abandoness - the more security stuff I/we do, the more likely it is to catch someone's eye and embarrass me/us. Wait for something bad, jump in and be a hero. Leaders are often shot in the back.
  • 117.
  • 118. Most programmers do not know how to secure code.
  • 119. Most companies don't allocate resources to security testing
  • 120. Most ”outsourced and off-shored” projects are never reviewed for security. That ends up biting us in the... e.g. FBI, RNC
  • 121. Controversial Assertion by me: ”Trusted Computing” is a fallacy
  • 122. Public Key / Private Key: PKI failed and has multiple defeats (SHA1)
  • 123.
  • 124. Our enemies are more patient than we are
  • 125.
  • 126. Our business' can see only one year at a time. This limits real or focused results.
  • 127. Cloud computing companies offer outstanding local attack centers.
  • 128. No such thing as an objective measurement or standard.
  • 129. Folks in government ”have to spend to much time and money” to test any new technology. Slows adoption or even sensible change.
  • 130. Breaches are so frequent, coupled with the very real problem of lingering infections from prior breaches, that quantifying and eradication of threats is nearly impossible.
  • 131. The sophistication of the attackers vs. our ability to defend is definitely a knife to a gunfight scenario.
  • 132.
  • 134. More of the same
  • 135. US becomes a distant third, 4th?
  • 136.
  • 137. Better co-operation in the security industry
  • 138. Large coalitions of collaborators (geocentric?)
  • 139. A ”caustic cauldron” for security testing (community based)
  • 140.
  • 141.
  • 142. Needs to be able to order ISP shutdowns, blocking of aggressors, and real time intelligent identification of aggressors in times of emergency / crisis
  • 143. May regulate by sector
  • 144.
  • 145.
  • 146. Small players – collaborate, continue your innovation, evangelize
  • 147. Big players – innovate or buy, stop the stifle, sub-contract
  • 148. Government – national testing labs (caustic cauldron) , don't go to the dark side, open up the gene pool
  • 149.
  • 150. White House Cyberspace Policy Review - http://www.cwfi.us/index.php?option=com_docman&task=doc_download&gid=2&Itemid=92
  • 151. Cyber Attacks Against Georgia: Legal Lessons Identified - http://www.carlisle.army.mil/DIME/documents/Georgia%201%200.pdf
  • 152. OWASP - http://www.owasp.org
  • 153. Dark Reading - http://www.darkreading.com
  • 154. Packet Storm - http://packetstormsecurity.org/
  • 155. Security Lists - http://www.seclists.org
  • 156. Sickurity - http://www.sickurity.com/
  • 157. SANS TOP 25 Most Dangerous Programming Errors - http://www.sans.org/top25errors/
  • 158.
  • 159. 2001 – Report to Congress on Cyber warfare - http://www.fas.org/irp/crs/RL30735.pdf
  • 160. Estonia Cyber Defense Center of Excellence - http://www.ccdcoe.org
  • 161. Searchable NIST Common Vulnerability Enumeration Database - http://www.livesquare.com/portal/cve.asp - FREE
  • 162. Common Attack Pattern Enumeration and Classification - http://capec.mitre.org - FREE
  • 163. LiveSquare's Daily Security Bulletin - http://www.livesquare.com/portal/dsb.asp – FREE to you!
  • 164.
  • 165. Thank you Arizona Security Practitioners Forum
  • 166. Thank you for coming!
  • 167. I thank those of you who have decided to participate moving forward and look forward to your contributions.