Google Analytics: Ausschluss interner Mitarbeiter versus Datenschutz
Google versus china the first cyber war
-
Upload
david-strom -
Category
Technology
-
view
1.281 -
download
0
description
Transcript of Google versus china the first cyber war
Google v. China:Our first cyber war
David [email protected]
(310) 857 6867
1(c) David Strom http://strominator.com
(c) David Strom http://strominator.com 2
2003: Titan Rain DoD attack
• 10:23 pm Army Fort Huachuca Engineering Cmd.
• 1:19 am DISA, Virginia• 3:25 am Naval OSC, San Diego• 4:46 am Army Space Cmd, Huntsville Ala.All within a few hours in November 2003!
(c) David Strom http://strominator.com 3
Estonia’s ‘Bronze Night’
• 4/07: DDOS attack perhaps by Russian government-sponsored hackers on hundreds of targets
4(c) David Strom http://strominator.com
More recently
• 9/07: Israel scrambled Syrian radar and attacked and leveled a nuclear installation
5(c) David Strom http://strominator.com
Fourth of July 2009
• N. Korean DDOS on US federal government Web sites , stock exchanges, and S. Korean sites by a huge botnet of more than 20k nodes
• Three different attacks over five days• More like “cyber terrorism” than outright war
6(c) David Strom http://strominator.com
(c) David Strom http://strominator.com 7
Hopkins APL 2009
(c) David Strom http://strominator.com 8
Google and China, 2010
• Google’s internal email accounts compromised
• Moved its servers to Hong Kong• Gave up its business on the mainland
9(c) David Strom http://strominator.com
(c) David Strom http://strominator.com 10
Internet users
11(c) David Strom http://strominator.com
What is cyber warfare?
• No delay between launch and effects of an attack
• Can quickly become global• Origin is hard to identify • Civilians as well as military targets• It is happening every day somewhere
12(c) David Strom http://strominator.com
(c) David Strom http://strominator.com 13
What $26 gets you
(c) David Strom http://strominator.com 14
Today’s irony
• The less online a country is, the better it can defend its Internet borders!
• The more connected, the more vulnerable!
15(c) David Strom http://strominator.com
(c) David Strom http://strominator.com 16
(c) David Strom http://strominator.com 17
(c) David Strom http://strominator.com 18
19(c) David Strom http://strominator.com
WHAT DO THESE ROOMS HAVE IN COMMON?
(c) David Strom http://strominator.com 20
21(c) David Strom http://strominator.com
22(c) David Strom http://strominator.com
Cold war spying
• Needed physical access to assets, people, or plans
• Spies would remove something• Easy to identify,
despite tradecraft• Containable
23(c) David Strom http://strominator.com
Our new war tech
(c) David Strom http://strominator.com 24
The other side’s war tech
• They can be anywhere• Even sitting at home in
their PJs!• They don’t even have
to remove anything – just copy it somewhere else
25(c) David Strom http://strominator.com
(c) David Strom http://strominator.com 26
Our biggest threat
• Or McDonalds or anywhere there is free Wifi!
27(c) David Strom http://strominator.com
Recommendations
• VPNs for everyone
(c) David Strom http://strominator.com 28
Lockdown your laptops
(c) David Strom http://strominator.com 29
(c) David Strom http://strominator.com 30
Encryption needs to be rule, not the Encryption needs to be rule, not the exceptionexception
(c) David Strom http://strominator.com 31
Thanks and questions?
• Copies of this presentation and others can be found here:
http://slideshare.net/davidstromMy website:http://strominator.com
32(c) David Strom http://strominator.com