SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Presented by: Morris D Fedeli www.fedeli.nu
Parklane Hotel, Cebu City, September 7th 2012
“It’s the great irony of our Information
Age — the very technologies that
empower us to create and to build also
empower those who would disrupt and
destroy.”
The President Barack Obama
On Securing Our Nation's
Cyber Infrastructure
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
2
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
3
The EEA (ECONOMIC ESPIONAGE ACT) 1996
broadly defines “trade secret” to include all
“forms and types of financial, business, scientific,
technical, economic or engineering information . .
. .” In order for the information to be considered
a trade secret, its owner must “take reasonable
measures to keep such information secret.”
Therefore in the context of industrial espionage,
misappropriation is simply “the deliberate taking
of information one knows to belong to someone
else, whether or not the misappropriator
proceeds to use or disclose it.”
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
4
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
5
German KGB
recruit on USA
Google in China
Russian attack on
Estonia
Opel vs
Volkswagon
GhostNet Canada
vs China
Stealth Fighter
WikiLeaks
Cybersitter
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
8
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
9
The TRIPS Agreement sets a minimum standards of
intellectual property protection in all member
nations. Its purpose, as set out in the preamble, is
“to reduce distortions and impediments to
international trade . . . to promote effective and
adequate protection of intellectual property rights,
and to ensure that measures and procedures to
enforce intellectual property rights do not
themselves become barriers to legitimate trade.”
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
10
Enable collaboration and co-evolution of
man on an unprecedented scale and is
leveling the playing field offering new, low
cost and low risk opportunities for
espionage.
The art of Cyber Espionage practiced by a
few is becoming a major tool in the modern
world to gain advantage over corporate
competitors and even between countries.
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
11
Cuckoo's Egg:
http://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg
_%28book%29
Cyber-Espionage: A Growing Threat to the
American Economy :
http://commlaw.cua.edu/res/docs/articles/v19/19-
1/11-v19-1-O-Hara-Final.pdf
Chinese Hackers and Cyber Realpolitik:
http://blog.damballa.com/?tag=cyber-espionage
TRIPS:
http://en.wikipedia.org/wiki/Agreement_on_Trade-
Related_Aspects_of_Intellectual_Property_Rights
China: Effects of Intellectual Property Infringement
and Indigenous Innovation Policies on the U.S.
Economy:
http://www.usitc.gov/publications/332/pub4226.p
df
Safeguarding Australia Summit:
http://www.safeguardingaustraliasummit.org.au/up
loader/files/Cyber_Research_Paper_James_Farwell
-2.pdf
Wikipedia Espionage:
http://en.wikipedia.org/wiki/Industrial_espionage
Patent Infringement Update:
http://www.infringementupdates.com/china/
Wikileaks and cyber espionage:
http://xmaro.blogspot.com/2011/12/wikileaks-
tracking-cyber-espionage.html
Dr. James Canton, CEO Institute for Global Futures:
http://www.globalfuturist.com/images/docs/The%
20Top%20Ten%20Cloud%20Computing%20and%20
Big%20Data%20Trends.pdf
China: Effects of Intellectual Property Infringement
and Indigenous Innovation Policies on the U.S.
Economy :
http://www.usitc.gov/publications/332/pub4226.p
df
President Obama on Security:
http://www.whitehouse.gov/the-press-
office/remarks-president-securing-our-nations-
cyber-infrastructure
CyberSitter:http://www.pcworld.com/article/18591
7/cybersitter_files_lawsuit_against_china_over_gre
en_dam.html
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
12
Preventing cyber attacks
requires much more than
just a technical solution but
also business, legal and
diplomatic diligence
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
13
Presented by: Morris D Fedeli www.fedeli.nu
BEWARE, we are all a target!
The Means and Opportunity are here and now within the
reach of many, lest we find those with Motive to do so!
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
14

Weitere ähnliche Inhalte

Ähnlich wie Cyber Espionage: how to sell a country in 17 days!

Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...IJNSA Journal
 
Security in the Era of Big M2M Data
Security in the Era of Big M2M DataSecurity in the Era of Big M2M Data
Security in the Era of Big M2M DataGlen Koskela
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchLaVerne Kemp
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchLaVerne Kemp
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13Signals Defense, LLC
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismConference Papers
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...IJNSA Journal
 
Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and SecurityEMC
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Marco Morana
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International PerspectiveSteve Mitchinson
 
Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Robert Bromwich
 
Computer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageComputer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageIRJET Journal
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaEddan Katz
 

Ähnlich wie Cyber Espionage: how to sell a country in 17 days! (20)

News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Security in the Era of Big M2M Data
Security in the Era of Big M2M DataSecurity in the Era of Big M2M Data
Security in the Era of Big M2M Data
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Gibson final
Gibson  finalGibson  final
Gibson final
 
ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism Analysis
 
Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and Security
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?
 
Computer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageComputer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate Espionage
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 acta
 

Mehr von Morris Fedeli MBA | Sustainable Business Solutions (7)

Thrive SPS Brochure v2.2
Thrive SPS Brochure v2.2Thrive SPS Brochure v2.2
Thrive SPS Brochure v2.2
 
Thrive sps brochure v2.2
Thrive sps brochure v2.2Thrive sps brochure v2.2
Thrive sps brochure v2.2
 
Thrive SPS brochure
Thrive SPS brochureThrive SPS brochure
Thrive SPS brochure
 
Unicorn company distribution worldwide
Unicorn company distribution worldwideUnicorn company distribution worldwide
Unicorn company distribution worldwide
 
Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...
Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...
Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...
 
The challenges of transitions towards a more sustainable business v1.3
The challenges of transitions towards a more sustainable business v1.3The challenges of transitions towards a more sustainable business v1.3
The challenges of transitions towards a more sustainable business v1.3
 
Third conference on NBM - Sofia, Bulgaria 2018
Third conference on NBM - Sofia, Bulgaria 2018Third conference on NBM - Sofia, Bulgaria 2018
Third conference on NBM - Sofia, Bulgaria 2018
 

Kürzlich hochgeladen

Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 

Kürzlich hochgeladen (9)

Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 

Cyber Espionage: how to sell a country in 17 days!

  • 1. Presented by: Morris D Fedeli www.fedeli.nu Parklane Hotel, Cebu City, September 7th 2012
  • 2. “It’s the great irony of our Information Age — the very technologies that empower us to create and to build also empower those who would disrupt and destroy.” The President Barack Obama On Securing Our Nation's Cyber Infrastructure 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 2
  • 3. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 3
  • 4. The EEA (ECONOMIC ESPIONAGE ACT) 1996 broadly defines “trade secret” to include all “forms and types of financial, business, scientific, technical, economic or engineering information . . . .” In order for the information to be considered a trade secret, its owner must “take reasonable measures to keep such information secret.” Therefore in the context of industrial espionage, misappropriation is simply “the deliberate taking of information one knows to belong to someone else, whether or not the misappropriator proceeds to use or disclose it.” 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 4
  • 5. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 5
  • 6. German KGB recruit on USA Google in China Russian attack on Estonia Opel vs Volkswagon GhostNet Canada vs China Stealth Fighter WikiLeaks Cybersitter 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 8
  • 7. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 9
  • 8. The TRIPS Agreement sets a minimum standards of intellectual property protection in all member nations. Its purpose, as set out in the preamble, is “to reduce distortions and impediments to international trade . . . to promote effective and adequate protection of intellectual property rights, and to ensure that measures and procedures to enforce intellectual property rights do not themselves become barriers to legitimate trade.” 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 10
  • 9. Enable collaboration and co-evolution of man on an unprecedented scale and is leveling the playing field offering new, low cost and low risk opportunities for espionage. The art of Cyber Espionage practiced by a few is becoming a major tool in the modern world to gain advantage over corporate competitors and even between countries. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 11
  • 10. Cuckoo's Egg: http://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg _%28book%29 Cyber-Espionage: A Growing Threat to the American Economy : http://commlaw.cua.edu/res/docs/articles/v19/19- 1/11-v19-1-O-Hara-Final.pdf Chinese Hackers and Cyber Realpolitik: http://blog.damballa.com/?tag=cyber-espionage TRIPS: http://en.wikipedia.org/wiki/Agreement_on_Trade- Related_Aspects_of_Intellectual_Property_Rights China: Effects of Intellectual Property Infringement and Indigenous Innovation Policies on the U.S. Economy: http://www.usitc.gov/publications/332/pub4226.p df Safeguarding Australia Summit: http://www.safeguardingaustraliasummit.org.au/up loader/files/Cyber_Research_Paper_James_Farwell -2.pdf Wikipedia Espionage: http://en.wikipedia.org/wiki/Industrial_espionage Patent Infringement Update: http://www.infringementupdates.com/china/ Wikileaks and cyber espionage: http://xmaro.blogspot.com/2011/12/wikileaks- tracking-cyber-espionage.html Dr. James Canton, CEO Institute for Global Futures: http://www.globalfuturist.com/images/docs/The% 20Top%20Ten%20Cloud%20Computing%20and%20 Big%20Data%20Trends.pdf China: Effects of Intellectual Property Infringement and Indigenous Innovation Policies on the U.S. Economy : http://www.usitc.gov/publications/332/pub4226.p df President Obama on Security: http://www.whitehouse.gov/the-press- office/remarks-president-securing-our-nations- cyber-infrastructure CyberSitter:http://www.pcworld.com/article/18591 7/cybersitter_files_lawsuit_against_china_over_gre en_dam.html 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 12
  • 11. Preventing cyber attacks requires much more than just a technical solution but also business, legal and diplomatic diligence 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 13
  • 12. Presented by: Morris D Fedeli www.fedeli.nu BEWARE, we are all a target! The Means and Opportunity are here and now within the reach of many, lest we find those with Motive to do so! 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 14