Google versus china the first cyber war

Post on 01-Nov-2014

1.282 views 0 download

Tags:

description

Speech given to the Cyberlog conference July 2010 Collinsville, Il.

Transcript of Google versus china the first cyber war

Google v. China:Our first cyber war

David Stromdavid@strom.com

(310) 857 6867

1(c) David Strom http://strominator.com

(c) David Strom http://strominator.com 2

2003: Titan Rain DoD attack

• 10:23 pm Army Fort Huachuca Engineering Cmd.

• 1:19 am DISA, Virginia• 3:25 am Naval OSC, San Diego• 4:46 am Army Space Cmd, Huntsville Ala.All within a few hours in November 2003!

(c) David Strom http://strominator.com 3

Estonia’s ‘Bronze Night’

• 4/07: DDOS attack perhaps by Russian government-sponsored hackers on hundreds of targets

4(c) David Strom http://strominator.com

More recently

• 9/07: Israel scrambled Syrian radar and attacked and leveled a nuclear installation

5(c) David Strom http://strominator.com

Fourth of July 2009

• N. Korean DDOS on US federal government Web sites , stock exchanges, and S. Korean sites by a huge botnet of more than 20k nodes

• Three different attacks over five days• More like “cyber terrorism” than outright war

6(c) David Strom http://strominator.com

(c) David Strom http://strominator.com 7

Hopkins APL 2009

(c) David Strom http://strominator.com 8

Google and China, 2010

• Google’s internal email accounts compromised

• Moved its servers to Hong Kong• Gave up its business on the mainland

9(c) David Strom http://strominator.com

(c) David Strom http://strominator.com 10

Internet users

11(c) David Strom http://strominator.com

What is cyber warfare?

• No delay between launch and effects of an attack

• Can quickly become global• Origin is hard to identify • Civilians as well as military targets• It is happening every day somewhere

12(c) David Strom http://strominator.com

(c) David Strom http://strominator.com 13

What $26 gets you

(c) David Strom http://strominator.com 14

Today’s irony

• The less online a country is, the better it can defend its Internet borders!

• The more connected, the more vulnerable!

15(c) David Strom http://strominator.com

(c) David Strom http://strominator.com 16

(c) David Strom http://strominator.com 17

(c) David Strom http://strominator.com 18

19(c) David Strom http://strominator.com

WHAT DO THESE ROOMS HAVE IN COMMON?

(c) David Strom http://strominator.com 20

21(c) David Strom http://strominator.com

22(c) David Strom http://strominator.com

Cold war spying

• Needed physical access to assets, people, or plans

• Spies would remove something• Easy to identify,

despite tradecraft• Containable

23(c) David Strom http://strominator.com

Our new war tech

(c) David Strom http://strominator.com 24

The other side’s war tech

• They can be anywhere• Even sitting at home in

their PJs!• They don’t even have

to remove anything – just copy it somewhere else

25(c) David Strom http://strominator.com

(c) David Strom http://strominator.com 26

Our biggest threat

• Or McDonalds or anywhere there is free Wifi!

27(c) David Strom http://strominator.com

Recommendations

• VPNs for everyone

(c) David Strom http://strominator.com 28

Lockdown your laptops

(c) David Strom http://strominator.com 29

(c) David Strom http://strominator.com 30

Encryption needs to be rule, not the Encryption needs to be rule, not the exceptionexception

(c) David Strom http://strominator.com 31

Thanks and questions?

• Copies of this presentation and others can be found here:

http://slideshare.net/davidstromMy website:http://strominator.com

32(c) David Strom http://strominator.com