SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Shawn Carpenter and the inside story of Titan Rain ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Agenda China and the RMA Shawn Carpenter Repercussions Past is prologue
China  Revolution in Military Affairs
Sun Szu on spies “ Only a brilliant ruler or a  wise general who can use the  highly intelligent for espionage  is sure of great success.”
Allen Dulles on Sun Tzu “ It is no wonder  that Sun Tzu's Book is a favorite of Mao  Tse-Tung and is required reading  For Chinese Communist tacticians” -A.W. Dulles, The Craft of Intelligence
A Chinese Communist Tactician “ Sun Tzu is a grand strategist without parallel in history” - Chai Yuqui, Nanjing Army Command Academy, Speaking at 6 th  annual international conference on  Sun Tzu and the Art of War, 2004, Beijing
Chinese Thinking Wang Qingsong, Modern Military-Use High Technology, 1993 Zhu Youwen, Feng Yi,and Xu Dechi, Information War Under High Tech Conditions1994 Li Qingshan, New Military Revolution and High Tech War, 1995 Wang Pufeng, InformationWarfare and the Revolution in Military Affairs, Beijing: 1995; Zhu Xiaoli and Zhao Xiaozhuo, The United States and Russia in the New Military Revolution,1996; Li Qingshan, New Military Revolution and High Tech War, 1995 Dai Shenglong and Shen Fuzhen, Information Warfare and Information Security Strategy, 1996 Shen Weiguang, On New War 1997
Decoding The Virtual Dragon “ Network confrontation technology — intercepting, utilizing, corrupting, and  damaging the enemy’s information and  using false information, viruses, and  other means to sabotage normal  information system functions through  computer networks.”  -General Xu Xiaoyan, the former head of the  Communications Department of the  Chinese General Staff. 2004
Thomas Makes a Point “ If Xu’s suggestions were accepted, then one  might expect to see more active reconnaissance  and intelligence activities on the part  of the PLA(as seems to be occurring!)”  That exclamation point is Thomas’s. It refers to Shawn Carpenter and Titan Rain
Shawn Carpenter  Cyber Warrior
Introducing Shawn Carpenter
Introducing Shawn Carpenter
Introducing Shawn Carpenter
One Good Thing About IPv4 A source IP address from an attack on Lockheed Martin is noticed.  “ I had accessed a Chinese server that  was involved in the compromises. And during that  access I discovered a file on that server entitled  1.txt. That file contained an internal port scan or  an internal scan of Fort Dix military installation.” -Shawn Carpenter Deposition
Backhacking . "I backhacked into a computer system and found evidence that perhaps hundreds of defense contractors had been compromised," Carpenter testified. He determined that breaches occurred at Fort Dix, the Redstone Arsenal, the Defense Contract Management Agency and the World Bank, and that the hacking was coming from South Korea. -Albuquerque Journal
Sandia's Response "We don't care about any of this. We only care  about Sandia computers. Stop what you're doing.  Stop whatever you are doing."  Shawn's immediate supervisor
Shawn works with Military Counter Intelligence The summer of 2004 Shawn works with CI to uncover sources of attack
Shawn becomes a confidential informant for FBI Initial meeting with FBI October, 2004 Trade craft:  Meeting in the stacks of the University  Be careful when working with geeks!
All's Well That Ends Well. NOT
Chinese Cyber Espionage Continues Northrup Grumman United States-China Economic and Security Review Commission report. 11-1-09
Aftermath  Past is Prologue
Ghost Net, Google, Oil and Gas ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere Àhnliche Inhalte

Was ist angesagt?

402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTeresa Long
 
Us9af 000453dp
Us9af 000453dpUs9af 000453dp
Us9af 000453dpBaddddBoyyyy
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsPublicLeaker
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
Covert action
Covert actionCovert action
Covert actionkelsports
 
Embargo in journalism
Embargo in journalismEmbargo in journalism
Embargo in journalismharinath kumar
 
Evolving chinese military cyber doctrine äž­ć›œçœ‘ç»œæˆ˜éƒšé˜Ÿ
Evolving chinese military cyber doctrine äž­ć›œçœ‘ç»œæˆ˜éƒšé˜ŸEvolving chinese military cyber doctrine äž­ć›œçœ‘ç»œæˆ˜éƒšé˜Ÿ
Evolving chinese military cyber doctrine äž­ć›œçœ‘ç»œæˆ˜éƒšé˜ŸBill Hagestad II
 
Poker speech
Poker speechPoker speech
Poker speechCOMM 2213
 
Nsa on nyt warrantless wiretapping story
Nsa on nyt warrantless wiretapping storyNsa on nyt warrantless wiretapping story
Nsa on nyt warrantless wiretapping storyRepentSinner
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information WarfareJeffrey Malone
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014Bill Hagestad II
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentDoing What I Do
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber Warpjoyal
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
àč‚àž„àžŁàž‡àž‡àžČàž™àžàžČàžŁàžžàž±àž’àž™àžČàč€àž§àč‡àžšàč„àž‹àž•àčŒàč€àžŁàž·àčˆàž­àž‡ Hacking àžŠàž„àž˜àžŽàžŠàžČ.àž­àžŁàž§àž”àž”.àž­àžŁàž­àžžàžĄàžČ1
àč‚àž„àžŁàž‡àž‡àžČàž™àžàžČàžŁàžžàž±àž’àž™àžČàč€àž§àč‡àžšàč„àž‹àž•àčŒàč€àžŁàž·àčˆàž­àž‡ Hacking àžŠàž„àž˜àžŽàžŠàžČ.àž­àžŁàž§àž”àž”.àž­àžŁàž­àžžàžĄàžČ1àč‚àž„àžŁàž‡àž‡àžČàž™àžàžČàžŁàžžàž±àž’àž™àžČàč€àž§àč‡àžšàč„àž‹àž•àčŒàč€àžŁàž·àčˆàž­àž‡ Hacking àžŠàž„àž˜àžŽàžŠàžČ.àž­àžŁàž§àž”àž”.àž­àžŁàž­àžžàžĄàžČ1
àč‚àž„àžŁàž‡àž‡àžČàž™àžàžČàžŁàžžàž±àž’àž™àžČàč€àž§àč‡àžšàč„àž‹àž•àčŒàč€àžŁàž·àčˆàž­àž‡ Hacking àžŠàž„àž˜àžŽàžŠàžČ.àž­àžŁàž§àž”àž”.àž­àžŁàž­àžžàžĄàžČ1Onwadee18
 

Was ist angesagt? (18)

402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the Sky
 
Us9af 000453dp
Us9af 000453dpUs9af 000453dp
Us9af 000453dp
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targets
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Covert action
Covert actionCovert action
Covert action
 
Embargo in journalism
Embargo in journalismEmbargo in journalism
Embargo in journalism
 
Evolving chinese military cyber doctrine äž­ć›œçœ‘ç»œæˆ˜éƒšé˜Ÿ
Evolving chinese military cyber doctrine äž­ć›œçœ‘ç»œæˆ˜éƒšé˜ŸEvolving chinese military cyber doctrine äž­ć›œçœ‘ç»œæˆ˜éƒšé˜Ÿ
Evolving chinese military cyber doctrine äž­ć›œçœ‘ç»œæˆ˜éƒšé˜Ÿ
 
Poker speech
Poker speechPoker speech
Poker speech
 
Nsa on nyt warrantless wiretapping story
Nsa on nyt warrantless wiretapping storyNsa on nyt warrantless wiretapping story
Nsa on nyt warrantless wiretapping story
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information Warfare
 
Nsa
NsaNsa
Nsa
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber War
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Baptism by-fire
Baptism by-fireBaptism by-fire
Baptism by-fire
 
àč‚àž„àžŁàž‡àž‡àžČàž™àžàžČàžŁàžžàž±àž’àž™àžČàč€àž§àč‡àžšàč„àž‹àž•àčŒàč€àžŁàž·àčˆàž­àž‡ Hacking àžŠàž„àž˜àžŽàžŠàžČ.àž­àžŁàž§àž”àž”.àž­àžŁàž­àžžàžĄàžČ1
àč‚àž„àžŁàž‡àž‡àžČàž™àžàžČàžŁàžžàž±àž’àž™àžČàč€àž§àč‡àžšàč„àž‹àž•àčŒàč€àžŁàž·àčˆàž­àž‡ Hacking àžŠàž„àž˜àžŽàžŠàžČ.àž­àžŁàž§àž”àž”.àž­àžŁàž­àžžàžĄàžČ1àč‚àž„àžŁàž‡àž‡àžČàž™àžàžČàžŁàžžàž±àž’àž™àžČàč€àž§àč‡àžšàč„àž‹àž•àčŒàč€àžŁàž·àčˆàž­àž‡ Hacking àžŠàž„àž˜àžŽàžŠàžČ.àž­àžŁàž§àž”àž”.àž­àžŁàž­àžžàžĄàžČ1
àč‚àž„àžŁàž‡àž‡àžČàž™àžàžČàžŁàžžàž±àž’àž™àžČàč€àž§àč‡àžšàč„àž‹àž•àčŒàč€àžŁàž·àčˆàž­àž‡ Hacking àžŠàž„àž˜àžŽàžŠàžČ.àž­àžŁàž§àž”àž”.àž­àžŁàž­àžžàžĄàžČ1
 

Andere mochten auch

Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
New definition for APT
New definition for APTNew definition for APT
New definition for APTRichard Stiennon
 
Concept of Shadow Network
Concept of Shadow NetworkConcept of Shadow Network
Concept of Shadow NetworkDr. Mazlan Abbas
 
Crouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden TrojanCrouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden Trojanguest17b7c7
 
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...Martin Ebner
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismblogzilla
 
Understanding APT1 malware techniques using malware analysis and reverse engi...
Understanding APT1 malware techniques using malware analysis and reverse engi...Understanding APT1 malware techniques using malware analysis and reverse engi...
Understanding APT1 malware techniques using malware analysis and reverse engi...Cysinfo Cyber Security Community
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

Andere mochten auch (9)

Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
New definition for APT
New definition for APTNew definition for APT
New definition for APT
 
Concept of Shadow Network
Concept of Shadow NetworkConcept of Shadow Network
Concept of Shadow Network
 
Crouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden TrojanCrouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden Trojan
 
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Understanding APT1 malware techniques using malware analysis and reverse engi...
Understanding APT1 malware techniques using malware analysis and reverse engi...Understanding APT1 malware techniques using malware analysis and reverse engi...
Understanding APT1 malware techniques using malware analysis and reverse engi...
 
Cyber security
Cyber securityCyber security
Cyber security
 

Ähnlich wie Titan Rain

44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
44CON 2013 - Security Lessons from Dictators - Jerry Gamblin44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
44CON 2013 - Security Lessons from Dictators - Jerry Gamblin44CON
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Dr. Tim Dosemagen
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarRichard Stiennon
 
Dawn of a New Age
 Dawn of a New Age Dawn of a New Age
Dawn of a New AgeSergey Oboroc
 
There WIll Be Cyberwar
There WIll Be Cyberwar There WIll Be Cyberwar
There WIll Be Cyberwar Richard Stiennon
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09Richard Stiennon
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsRichard Stiennon
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlinJavierski
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacksClifford Stone
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementBill Bode
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaMurray Security Services
 
'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss'Cyberwar will not take place' Discuss
'Cyberwar will not take place' DiscussGus Rankin
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)MarioEliseo3
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber WarfareBill Hagestad II
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINALNicholas Poole
 
Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ballMarioEliseo3
 
Silent weapons for quiet wars
Silent weapons for quiet warsSilent weapons for quiet wars
Silent weapons for quiet warsSergey Oboroc
 

Ähnlich wie Titan Rain (20)

44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
44CON 2013 - Security Lessons from Dictators - Jerry Gamblin44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
 
Dawn of a New Age
 Dawn of a New Age Dawn of a New Age
Dawn of a New Age
 
There WIll Be Cyberwar
There WIll Be Cyberwar There WIll Be Cyberwar
There WIll Be Cyberwar
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwars
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlin
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 
Ht f42
Ht f42Ht f42
Ht f42
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)
 
CSCSS Defence Intelligence Group Commentary China Hacking
CSCSS Defence Intelligence Group Commentary China HackingCSCSS Defence Intelligence Group Commentary China Hacking
CSCSS Defence Intelligence Group Commentary China Hacking
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Silent weapons for quiet wars
Silent weapons for quiet warsSilent weapons for quiet wars
Silent weapons for quiet wars
 

Mehr von Richard Stiennon

Why Risk Management Fails
Why Risk Management FailsWhy Risk Management Fails
Why Risk Management FailsRichard Stiennon
 
Cyber security industry trends
Cyber security industry trendsCyber security industry trends
Cyber security industry trendsRichard Stiennon
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is ImpossibleRichard Stiennon
 
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoStiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoRichard Stiennon
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverRichard Stiennon
 
Cybercrime and Business Process Hacking
Cybercrime and Business Process HackingCybercrime and Business Process Hacking
Cybercrime and Business Process HackingRichard Stiennon
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
What makes the IT industry tick?
What makes the IT industry tick? What makes the IT industry tick?
What makes the IT industry tick? Richard Stiennon
 

Mehr von Richard Stiennon (9)

Why Risk Management Fails
Why Risk Management FailsWhy Risk Management Fails
Why Risk Management Fails
 
Cyber security industry trends
Cyber security industry trendsCyber security industry trends
Cyber security industry trends
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is Impossible
 
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoStiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security Forever
 
Cybercrime and Business Process Hacking
Cybercrime and Business Process HackingCybercrime and Business Process Hacking
Cybercrime and Business Process Hacking
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
What makes the IT industry tick?
What makes the IT industry tick? What makes the IT industry tick?
What makes the IT industry tick?
 
Surviving Cyber War
Surviving Cyber WarSurviving Cyber War
Surviving Cyber War
 

KĂŒrzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

KĂŒrzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Titan Rain

  • 1.
  • 2.
  • 3. Agenda China and the RMA Shawn Carpenter Repercussions Past is prologue
  • 4. China Revolution in Military Affairs
  • 5. Sun Szu on spies “ Only a brilliant ruler or a wise general who can use the highly intelligent for espionage is sure of great success.”
  • 6. Allen Dulles on Sun Tzu “ It is no wonder that Sun Tzu's Book is a favorite of Mao Tse-Tung and is required reading For Chinese Communist tacticians” -A.W. Dulles, The Craft of Intelligence
  • 7. A Chinese Communist Tactician “ Sun Tzu is a grand strategist without parallel in history” - Chai Yuqui, Nanjing Army Command Academy, Speaking at 6 th annual international conference on Sun Tzu and the Art of War, 2004, Beijing
  • 8. Chinese Thinking Wang Qingsong, Modern Military-Use High Technology, 1993 Zhu Youwen, Feng Yi,and Xu Dechi, Information War Under High Tech Conditions1994 Li Qingshan, New Military Revolution and High Tech War, 1995 Wang Pufeng, InformationWarfare and the Revolution in Military Affairs, Beijing: 1995; Zhu Xiaoli and Zhao Xiaozhuo, The United States and Russia in the New Military Revolution,1996; Li Qingshan, New Military Revolution and High Tech War, 1995 Dai Shenglong and Shen Fuzhen, Information Warfare and Information Security Strategy, 1996 Shen Weiguang, On New War 1997
  • 9. Decoding The Virtual Dragon “ Network confrontation technology — intercepting, utilizing, corrupting, and damaging the enemy’s information and using false information, viruses, and other means to sabotage normal information system functions through computer networks.” -General Xu Xiaoyan, the former head of the Communications Department of the Chinese General Staff. 2004
  • 10. Thomas Makes a Point “ If Xu’s suggestions were accepted, then one might expect to see more active reconnaissance and intelligence activities on the part of the PLA(as seems to be occurring!)” That exclamation point is Thomas’s. It refers to Shawn Carpenter and Titan Rain
  • 11. Shawn Carpenter Cyber Warrior
  • 15. One Good Thing About IPv4 A source IP address from an attack on Lockheed Martin is noticed. “ I had accessed a Chinese server that was involved in the compromises. And during that access I discovered a file on that server entitled 1.txt. That file contained an internal port scan or an internal scan of Fort Dix military installation.” -Shawn Carpenter Deposition
  • 16. Backhacking . "I backhacked into a computer system and found evidence that perhaps hundreds of defense contractors had been compromised," Carpenter testified. He determined that breaches occurred at Fort Dix, the Redstone Arsenal, the Defense Contract Management Agency and the World Bank, and that the hacking was coming from South Korea. -Albuquerque Journal
  • 17. Sandia's Response "We don't care about any of this. We only care about Sandia computers. Stop what you're doing. Stop whatever you are doing." Shawn's immediate supervisor
  • 18. Shawn works with Military Counter Intelligence The summer of 2004 Shawn works with CI to uncover sources of attack
  • 19. Shawn becomes a confidential informant for FBI Initial meeting with FBI October, 2004 Trade craft: Meeting in the stacks of the University Be careful when working with geeks!
  • 20. All's Well That Ends Well. NOT
  • 21. Chinese Cyber Espionage Continues Northrup Grumman United States-China Economic and Security Review Commission report. 11-1-09
  • 22. Aftermath Past is Prologue
  • 23.