SlideShare une entreprise Scribd logo
1  sur  31
The Cyber Warfare Initiative the Good, the Bad, and the Ugly LiveSquare Security www.LiveSquare.com
Overview ,[object Object]
Cyber what?
A recent example
The Players
Why Now? ,[object Object]
The Bad
The Ugly
What next?
Resources
Cyber Warfare - Hype? ,[object Object]
” Titan Rain” - started 2003  Titan Rain hackers gained access to many U.S. computer networks, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA.  China.
Estonia – March 2007, Ukrain – November 2007
Lithuania – June 2008, Georgia – November 2008, Kyrgistan 2008
” GhostNet” – 2008 to present – China, KyLin OS (BSD or ???)
DOD, White House, Congress, Lockheed Martin (F35 fighter)
Dali Lama, Germany, France, India, Australia
Iran
The battle is fought every day.  ,[object Object]
Cyber What? ,[object Object]
” Everyone is attacking everyone.”
Country vs. Country, Entity vs. Country, Entity vs. Entitiy, Entity vs. Individual ,[object Object],[object Object]
Political / Military –  strategic asset identification.  Intelligence, Target optimization.  Economic pressure and articulation.  Revenge.  Combined kinetic and info attack to paralyze enemy, disinform, weaken, force them to expend resources.
Social –  why are you targeted?  Why did/does Isreal socially map US phone calls?  If you own a business, are in IT, or especially if you operate a security consulting practice why does your web site get visited daily by folks in China?  Why is Identity Theft so huge?  Do you facilitate money laundering?
Cyber war: What to do ,[object Object]
Disrupt and mix up commercial / financial transactions ,[object Object],[object Object]
Cause enemy to expend resources and time on futile tasks
Create crisis of confidence in enemy's currency, leadership,  perceived stability, etc
Modify / Destroy information sources, infrastructure, systems – change reality / history
A Recent Example: Iran ,[object Object]
Twitter – stopped regular maintenance to aid coordination of dissent in Iran.  Aided by State Dept. and a few others.

Contenu connexe

Tendances

C17 - Ethics & Other Informal Controls
C17 - Ethics & Other Informal ControlsC17 - Ethics & Other Informal Controls
C17 - Ethics & Other Informal ControlsFatin Nazihah Aziz
 
Journalism & Globalization
Journalism & GlobalizationJournalism & Globalization
Journalism & GlobalizationGlobaliz Now
 
A Survey on Media Violence Desensitization of Ages 5-10 Children to Real Life...
A Survey on Media Violence Desensitization of Ages 5-10 Children to Real Life...A Survey on Media Violence Desensitization of Ages 5-10 Children to Real Life...
A Survey on Media Violence Desensitization of Ages 5-10 Children to Real Life...Nica Vanissa Bitang
 
Differential Association Theory- Takina Morris
Differential Association Theory- Takina MorrisDifferential Association Theory- Takina Morris
Differential Association Theory- Takina Morristakina25
 
Manufacturing consent ppt
Manufacturing consent pptManufacturing consent ppt
Manufacturing consent pptAhmad Gilani
 

Tendances (6)

C17 - Ethics & Other Informal Controls
C17 - Ethics & Other Informal ControlsC17 - Ethics & Other Informal Controls
C17 - Ethics & Other Informal Controls
 
Journalism & Globalization
Journalism & GlobalizationJournalism & Globalization
Journalism & Globalization
 
Agenda setting theory slides
Agenda setting theory slidesAgenda setting theory slides
Agenda setting theory slides
 
A Survey on Media Violence Desensitization of Ages 5-10 Children to Real Life...
A Survey on Media Violence Desensitization of Ages 5-10 Children to Real Life...A Survey on Media Violence Desensitization of Ages 5-10 Children to Real Life...
A Survey on Media Violence Desensitization of Ages 5-10 Children to Real Life...
 
Differential Association Theory- Takina Morris
Differential Association Theory- Takina MorrisDifferential Association Theory- Takina Morris
Differential Association Theory- Takina Morris
 
Manufacturing consent ppt
Manufacturing consent pptManufacturing consent ppt
Manufacturing consent ppt
 

Similaire à CWFI Presentation Version 1

Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaStefano Maccaglia
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceBrian Arellanes
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI CenturyJyrki Kasvi
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacynetapprad
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fiskJulesroa
 

Similaire à CWFI Presentation Version 1 (20)

Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
114-116
114-116114-116
114-116
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - Maccaglia
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSource
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fisk
 

Dernier

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Dernier (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

CWFI Presentation Version 1

  • 1. The Cyber Warfare Initiative the Good, the Bad, and the Ugly LiveSquare Security www.LiveSquare.com
  • 2.
  • 6.
  • 11.
  • 12. ” Titan Rain” - started 2003 Titan Rain hackers gained access to many U.S. computer networks, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA. China.
  • 13. Estonia – March 2007, Ukrain – November 2007
  • 14. Lithuania – June 2008, Georgia – November 2008, Kyrgistan 2008
  • 15. ” GhostNet” – 2008 to present – China, KyLin OS (BSD or ???)
  • 16. DOD, White House, Congress, Lockheed Martin (F35 fighter)
  • 17. Dali Lama, Germany, France, India, Australia
  • 18. Iran
  • 19.
  • 20.
  • 21. ” Everyone is attacking everyone.”
  • 22.
  • 23. Political / Military – strategic asset identification. Intelligence, Target optimization. Economic pressure and articulation. Revenge. Combined kinetic and info attack to paralyze enemy, disinform, weaken, force them to expend resources.
  • 24. Social – why are you targeted? Why did/does Isreal socially map US phone calls? If you own a business, are in IT, or especially if you operate a security consulting practice why does your web site get visited daily by folks in China? Why is Identity Theft so huge? Do you facilitate money laundering?
  • 25.
  • 26.
  • 27. Cause enemy to expend resources and time on futile tasks
  • 28. Create crisis of confidence in enemy's currency, leadership, perceived stability, etc
  • 29. Modify / Destroy information sources, infrastructure, systems – change reality / history
  • 30.
  • 31. Twitter – stopped regular maintenance to aid coordination of dissent in Iran. Aided by State Dept. and a few others.
  • 32.
  • 33. The monitoring capability was provided, at least in part, by a joint venture of Siemens AG, the German conglomerate, and Nokia Corp., the Finnish cellphone company, in the second half of 2008, Ben Roome, a spokesman for the joint venture, confirmed. Source WSJ
  • 34. Iran uses kinetic attack to stop university students from communicating to the outside world. Students killed.
  • 35. Iran plays whack-a-mole with phones, sat phones, ”rogue” Internet connections
  • 36. Bans all foreign media, blocks farsi news sites outside Iran, etc.
  • 37. Iran declares an ”official end” to freedom of expression, people reject this...
  • 38. Using a phone, if you mention the wrong keyword, your line goes dead
  • 39. Pro-iran regime “hacktivists” breach the U of Oregon and leave a message...
  • 40.
  • 41. ” Turning off the Internet” does as much damage as good
  • 42.
  • 43.
  • 44. China – National network configuration enhancing cyber defense, KyLin, ”green dam”, email trojans – known to have penetrated 103 countries, especially email systems. - military value
  • 45. RBN – email malware, identity theft, BOTnets
  • 46. The Brits, Israel (info and kinetic e.g. Gaza), Palestinians, Islamic Jihad, Al Qaeda, Russia to Uzbekistan relating to American Base.
  • 47. Anyone who wants to play
  • 48.
  • 49. The Cyber Warfare Forum Initiative – US and allies
  • 50.
  • 51. Formal and excellent training in hacking / cracking systems
  • 52. Financial funding and rewards for success to anyone
  • 53. Russian Business Network and other organized crime
  • 54. The East has a plan is is doing well
  • 55.
  • 56.
  • 57.
  • 58. Building secure microprocessors with a secure operating system that runs on those chips
  • 59. National connectivity is designed to move through ”gateways”
  • 60.
  • 61.
  • 62. National communications infrastructure a disadvantage – nearly 100% privately owned
  • 63. Capabilities largely from large US security firms that will not cooperate well
  • 64. Successes: Trojan hardware, communications intercept
  • 65.
  • 66. The security industry in general sees an opportunity to resolve long standing issues.
  • 67. Members of the security industry got together to form a ”community” driven effort to cross contaminate and share information to induce improvements and knowledge sharing.
  • 68.
  • 69. Debate rages on who should be the top dog: person, agency, budget authority: lots of dialogue and posturing
  • 70. Security vendors see wash of funds and line up with their suits on
  • 71. The security community suddenly sees the need to help people to understand where we are and what is going on.
  • 72.
  • 73. we may have ”the capabilities” we need, but can we mobilize and utilize them? In time?
  • 74. it should be ”self-evident” that we both need and want to improve our footings
  • 75. The US faces a more difficult task in cyber defense than others due to network design, laws, and other issues.
  • 76.
  • 78.
  • 79. Can we define the problems?
  • 80.
  • 81.
  • 82. When can the military ”shut down” domestic ISPs?
  • 83. Does the Constitution allow for the government to ”take control” of the cyber security issue for everyone or just itself?
  • 84.
  • 85.
  • 86. When will I be safe?
  • 87.
  • 88.
  • 89. OWASP - Open Web Application Security Project
  • 92. OpenDNS for small business and consumers
  • 93. Numerous web sites with links to resources... the pieces of the puzzle are out there
  • 94. We are the most innovative people on the planet...
  • 95.
  • 96.
  • 97. China's new wall has limited ex-filtration from the country and therefore, sources of attacks cannot easily be determined as they are aliased. Infiltration is shut down by shutting down the gateways. A comprehensive strategy exists in China. The US, not so much.
  • 98. US law and constitutional issues should prevent the ”solution” from being a government owned and operated entity. However, all seem to be looking to the government for ”the solution”.
  • 99. If the business community / private sector is the solution...
  • 100.
  • 101. The big security companies actively suppress the smaller companies via a multitude of means. This harms innovation. They are also not buying innovation from the smaller companies so they are simply shutting the other guys out.
  • 102. Not Invented Here (NIH) - Anybody else's products are crap.
  • 103. Turtle Complex - all issues within an organization must be concealed to prevent embarrassment or worse... questions.
  • 104. Hollywood Simplex I - if you are a security vendor at a client, you are the only one doing anything of value. The others are there to try to steal your spotlight.
  • 105. The Kids Clubhouse - if you are not a part of the *con speakers and/or attendees club then obviously you know nothing about security. Only people that attend or speak at conferences know anything worth while.
  • 106. Power User Macho - even if you really have little understanding about what is going on: be aggressive. Ignorance is best concealed behind a good offense.
  • 107. Megalomania - with this security product / concept / method - I shall rule the world. All others shall bow to me. Ah ha ha ha ha ha.
  • 108.
  • 109. Little collaboration combined with the stiffling of innovation = bad day for US.
  • 110.
  • 111. If people find out our problems I might lose my job... "So we are fine."
  • 112. We don't do anything with jet fighters, therefore our problems are much smaller and very different.
  • 113. We can't solve every problem, so we will focus on responding to the stuff that hits us. We will react to issues as they come up.
  • 114. We don't want to work with other companies. We want attackers to leave us alone and attack them. Our strategy is displacement.
  • 115. Alphabet-soup - even though the letters and credentials have no track record of success. It is still mandatory. Letters are cool.
  • 116. Job-dutious-abandoness - the more security stuff I/we do, the more likely it is to catch someone's eye and embarrass me/us. Wait for something bad, jump in and be a hero. Leaders are often shot in the back.
  • 117.
  • 118. Most programmers do not know how to secure code.
  • 119. Most companies don't allocate resources to security testing
  • 120. Most ”outsourced and off-shored” projects are never reviewed for security. That ends up biting us in the... e.g. FBI, RNC
  • 121. Controversial Assertion by me: ”Trusted Computing” is a fallacy
  • 122. Public Key / Private Key: PKI failed and has multiple defeats (SHA1)
  • 123.
  • 124. Our enemies are more patient than we are
  • 125.
  • 126. Our business' can see only one year at a time. This limits real or focused results.
  • 127. Cloud computing companies offer outstanding local attack centers.
  • 128. No such thing as an objective measurement or standard.
  • 129. Folks in government ”have to spend to much time and money” to test any new technology. Slows adoption or even sensible change.
  • 130. Breaches are so frequent, coupled with the very real problem of lingering infections from prior breaches, that quantifying and eradication of threats is nearly impossible.
  • 131. The sophistication of the attackers vs. our ability to defend is definitely a knife to a gunfight scenario.
  • 132.
  • 134. More of the same
  • 135. US becomes a distant third, 4th?
  • 136.
  • 137. Better co-operation in the security industry
  • 138. Large coalitions of collaborators (geocentric?)
  • 139. A ”caustic cauldron” for security testing (community based)
  • 140.
  • 141.
  • 142. Needs to be able to order ISP shutdowns, blocking of aggressors, and real time intelligent identification of aggressors in times of emergency / crisis
  • 143. May regulate by sector
  • 144.
  • 145.
  • 146. Small players – collaborate, continue your innovation, evangelize
  • 147. Big players – innovate or buy, stop the stifle, sub-contract
  • 148. Government – national testing labs (caustic cauldron) , don't go to the dark side, open up the gene pool
  • 149.
  • 150. White House Cyberspace Policy Review - http://www.cwfi.us/index.php?option=com_docman&task=doc_download&gid=2&Itemid=92
  • 151. Cyber Attacks Against Georgia: Legal Lessons Identified - http://www.carlisle.army.mil/DIME/documents/Georgia%201%200.pdf
  • 152. OWASP - http://www.owasp.org
  • 153. Dark Reading - http://www.darkreading.com
  • 154. Packet Storm - http://packetstormsecurity.org/
  • 155. Security Lists - http://www.seclists.org
  • 156. Sickurity - http://www.sickurity.com/
  • 157. SANS TOP 25 Most Dangerous Programming Errors - http://www.sans.org/top25errors/
  • 158.
  • 159. 2001 – Report to Congress on Cyber warfare - http://www.fas.org/irp/crs/RL30735.pdf
  • 160. Estonia Cyber Defense Center of Excellence - http://www.ccdcoe.org
  • 161. Searchable NIST Common Vulnerability Enumeration Database - http://www.livesquare.com/portal/cve.asp - FREE
  • 162. Common Attack Pattern Enumeration and Classification - http://capec.mitre.org - FREE
  • 163. LiveSquare's Daily Security Bulletin - http://www.livesquare.com/portal/dsb.asp – FREE to you!
  • 164.
  • 165. Thank you Arizona Security Practitioners Forum
  • 166. Thank you for coming!
  • 167. I thank those of you who have decided to participate moving forward and look forward to your contributions.