SlideShare a Scribd company logo
1 of 28
Cyberwar update. 2010 ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Threat hierarchy  ,[object Object],[object Object],[object Object],[object Object],[object Object],Increasing Threat
Threat hierarchy is a time line!  ,[object Object],[object Object],[object Object],[object Object],[object Object],1998 1998 1998 1998 1999 2000 2004 2008
Sun Tzu on Spies “ Only a brilliant ruler or a  wise general who can use the  highly intelligent for espionage  is sure of great success.”
Allen Dulles on Sun Tzu  “ It is no wonder that Sun Tzu's Book is a favorite of Mao  Tse-Tung and is required reading  For Chinese Communist tacticians” -A.W. Dulles, The Craft of Intelligence
A Chinese Communist Tactician  “ Sun Tzu is a grand strategist without parallel in history” - Chai Yuqui, Nanjing Army Command Academy, Speaking at 6 th  annual international conference on  Sun Tzu and the Art of War, 2004, Beijing
Chinese Thinking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From Decoding the Virtual Dragon -Timothy Thomas “ Network confrontation technology — intercepting, utilizing, corrupting, and  damaging the enemy’s information and  using false information, viruses, and  other means to sabotage normal  information system functions through  computer networks.”  -General Xu Xiaoyan, the former head of the  Communications Department of the  Chinese General Staff. 2004
A prediction “ If Xu’s suggestions were accepted, then one  might expect to see more active reconnaissance  and intelligence activities on the part  of the PLA(as seems to be occurring!)”  That exclamation point is Thomas’s.
Shawn Carpenter  uncovers Titan Rain ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ghost Net Report – March 2009 ,[object Object],[object Object],[object Object],[object Object]
Joint Strike Fighter
Dec. 17, 2009 - Drone transmissions in the clear Predator  Beast of Kandahar
What is DDoS?  ,[object Object],[object Object],[object Object],[object Object]
Crowd sourcing applied to DDoS The Orange Revolution
Putin reacts Nashi summer camp ‘07
Estonia April 27th, 2009
Cyber Defcon 1 Georgia:  August 8, 2008
Three related attacks, April 2008 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Twitter as tool of riot creation ,[object Object]
Twitter escalation  Phase 1.  Hacking instructions sites.  Phase 2.  Links to pagereload.com Phase 3.  Links to a specially crafted site that opens 15 frames on pagereload.com
The good and the bad of social networks as attack vector Good:  Hard to sustain Bad:  Way too easy
Summer 2009  ,[object Object],[object Object],[object Object],[object Object],banking.nonghyup.com blog.naver.com ebank.keb.co.kr ezbank.shinhan.com finance.yahoo.com mail.daum.net mail.naver.com mail.paran.com travel.state.gov www.ahnlab.com www.altools.co.kr www.amazon.com www.assembly.go.kr www.auction.co.kr www.chosun.com www.defenselink.mil www.dhs.gov www.dot.gov www.egov.go.kr www.faa.gov www.ftc.gov www.hanabank.com www.hannara.or.kr www.ibk.co.kr www.kbstar.com www.marketwatch.com www.mnd.go.kr www.mofat.go.kr www.nasdaq.com www.ncsc.go.kr www.nsa.gov www.nyse.com www.president.go.kr www.site-by-site.com www.state.gov www.usauctionslive.com www.usbank.com www.usfk.mil www.usps.gov www.ustreas.gov www.voa.gov www.voanews.com www.washingtonpost.com www.whitehouse.gov www.wooribank.com www.yahoo.com
CYXYMU falls afoul of pro-Russian  activists. August 2009 ,[object Object],[object Object],[object Object],[object Object]
Aurora: China vs Google ,[object Object],[object Object],[object Object],[object Object],[object Object]
Parting thought:  ,[object Object],[object Object]
Blog:  www.threatchaos.com email:  [email_address] Twitter:  twitter.com/cyberwar

More Related Content

What's hot

China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)MarioEliseo3
 
Ed Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracyEd Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracyPOLIS LSE
 
CRS R42701 Drones in Domestic Surveillance Operations Fourth Amendment Impli...
CRS R42701 Drones in Domestic Surveillance Operations  Fourth Amendment Impli...CRS R42701 Drones in Domestic Surveillance Operations  Fourth Amendment Impli...
CRS R42701 Drones in Domestic Surveillance Operations Fourth Amendment Impli...Tom "Blad" Lindblad
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Charles Mok
 
Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013Mikko Hypponen
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsPublicLeaker
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR TraitorApijay Kumar
 
Information and Technology Literacy in the Time of the Fancy Bear
Information and Technology Literacy in the Time of the Fancy Bear Information and Technology Literacy in the Time of the Fancy Bear
Information and Technology Literacy in the Time of the Fancy Bear center4edupunx
 
President-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of TwitterPresident-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of TwitterSMED Tests
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping ScandalArun Prasaath
 
With a license to kill with drones
With a license to kill with dronesWith a license to kill with drones
With a license to kill with dronesKnut Harald Nylænde
 
Malaysian Airlines MH370: A Dirty Secret And Conspiracy Facts
Malaysian Airlines MH370: A Dirty Secret And Conspiracy FactsMalaysian Airlines MH370: A Dirty Secret And Conspiracy Facts
Malaysian Airlines MH370: A Dirty Secret And Conspiracy FactsHafiz Al-Din
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlinJavierski
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
Is trump attempting to chain down the eagle
Is trump attempting to chain down the eagleIs trump attempting to chain down the eagle
Is trump attempting to chain down the eaglemollyallen19
 

What's hot (20)

China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)
 
Famous hackers
Famous hackersFamous hackers
Famous hackers
 
Ed Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracyEd Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracy
 
Jour3552 reading2
Jour3552 reading2Jour3552 reading2
Jour3552 reading2
 
CRS R42701 Drones in Domestic Surveillance Operations Fourth Amendment Impli...
CRS R42701 Drones in Domestic Surveillance Operations  Fourth Amendment Impli...CRS R42701 Drones in Domestic Surveillance Operations  Fourth Amendment Impli...
CRS R42701 Drones in Domestic Surveillance Operations Fourth Amendment Impli...
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 
Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targets
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR Traitor
 
Information and Technology Literacy in the Time of the Fancy Bear
Information and Technology Literacy in the Time of the Fancy Bear Information and Technology Literacy in the Time of the Fancy Bear
Information and Technology Literacy in the Time of the Fancy Bear
 
President-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of TwitterPresident-Elect Trump and the Power of Twitter
President-Elect Trump and the Power of Twitter
 
Watchdog Jeopardy
Watchdog JeopardyWatchdog Jeopardy
Watchdog Jeopardy
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping Scandal
 
With a license to kill with drones
With a license to kill with dronesWith a license to kill with drones
With a license to kill with drones
 
Malaysian Airlines MH370: A Dirty Secret And Conspiracy Facts
Malaysian Airlines MH370: A Dirty Secret And Conspiracy FactsMalaysian Airlines MH370: A Dirty Secret And Conspiracy Facts
Malaysian Airlines MH370: A Dirty Secret And Conspiracy Facts
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlin
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Fuck GFW
Fuck GFWFuck GFW
Fuck GFW
 
Is trump attempting to chain down the eagle
Is trump attempting to chain down the eagleIs trump attempting to chain down the eagle
Is trump attempting to chain down the eagle
 

Viewers also liked (7)

Imanol eta Borja
Imanol eta BorjaImanol eta Borja
Imanol eta Borja
 
Izaro eta Judith
Izaro eta JudithIzaro eta Judith
Izaro eta Judith
 
Marta eta Garazi
Marta eta GaraziMarta eta Garazi
Marta eta Garazi
 
June eta Naiara
June eta NaiaraJune eta Naiara
June eta Naiara
 
Naroa eta Dounia
Naroa eta DouniaNaroa eta Dounia
Naroa eta Dounia
 
Xabi eta Endika
Xabi eta EndikaXabi eta Endika
Xabi eta Endika
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 

Similar to Cyberwar Update2010

Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarRichard Stiennon
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09Richard Stiennon
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” ChiesaHackito Ergo Sum
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 

Similar to Cyberwar Update2010 (20)

Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09
 
There WIll Be Cyberwar
There WIll Be Cyberwar There WIll Be Cyberwar
There WIll Be Cyberwar
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber war
Cyber warCyber war
Cyber war
 
Ht f42
Ht f42Ht f42
Ht f42
 
Exp r35
Exp r35Exp r35
Exp r35
 
China Cyber
China CyberChina Cyber
China Cyber
 
ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism Analysis
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
Is the us engaged in a cyber war
Is the us engaged in a cyber warIs the us engaged in a cyber war
Is the us engaged in a cyber war
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
[HES2013] Information Warfare: mistakes from the MoDs by Raoul “Nobody” Chiesa
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 

More from Richard Stiennon

Cyber security industry trends
Cyber security industry trendsCyber security industry trends
Cyber security industry trendsRichard Stiennon
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsRichard Stiennon
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is ImpossibleRichard Stiennon
 
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoStiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoRichard Stiennon
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverRichard Stiennon
 
Cybercrime and Business Process Hacking
Cybercrime and Business Process HackingCybercrime and Business Process Hacking
Cybercrime and Business Process HackingRichard Stiennon
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
What makes the IT industry tick?
What makes the IT industry tick? What makes the IT industry tick?
What makes the IT industry tick? Richard Stiennon
 

More from Richard Stiennon (11)

Why Risk Management Fails
Why Risk Management FailsWhy Risk Management Fails
Why Risk Management Fails
 
Cyber security industry trends
Cyber security industry trendsCyber security industry trends
Cyber security industry trends
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwars
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is Impossible
 
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoStiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security Forever
 
Cybercrime and Business Process Hacking
Cybercrime and Business Process HackingCybercrime and Business Process Hacking
Cybercrime and Business Process Hacking
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
What makes the IT industry tick?
What makes the IT industry tick? What makes the IT industry tick?
What makes the IT industry tick?
 
New definition for APT
New definition for APTNew definition for APT
New definition for APT
 
Surviving Cyber War
Surviving Cyber WarSurviving Cyber War
Surviving Cyber War
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Cyberwar Update2010

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Sun Tzu on Spies “ Only a brilliant ruler or a wise general who can use the highly intelligent for espionage is sure of great success.”
  • 6. Allen Dulles on Sun Tzu “ It is no wonder that Sun Tzu's Book is a favorite of Mao Tse-Tung and is required reading For Chinese Communist tacticians” -A.W. Dulles, The Craft of Intelligence
  • 7. A Chinese Communist Tactician “ Sun Tzu is a grand strategist without parallel in history” - Chai Yuqui, Nanjing Army Command Academy, Speaking at 6 th annual international conference on Sun Tzu and the Art of War, 2004, Beijing
  • 8.
  • 9. From Decoding the Virtual Dragon -Timothy Thomas “ Network confrontation technology — intercepting, utilizing, corrupting, and damaging the enemy’s information and using false information, viruses, and other means to sabotage normal information system functions through computer networks.” -General Xu Xiaoyan, the former head of the Communications Department of the Chinese General Staff. 2004
  • 10. A prediction “ If Xu’s suggestions were accepted, then one might expect to see more active reconnaissance and intelligence activities on the part of the PLA(as seems to be occurring!)” That exclamation point is Thomas’s.
  • 11.
  • 12.
  • 14. Dec. 17, 2009 - Drone transmissions in the clear Predator Beast of Kandahar
  • 15.
  • 16. Crowd sourcing applied to DDoS The Orange Revolution
  • 17. Putin reacts Nashi summer camp ‘07
  • 19. Cyber Defcon 1 Georgia: August 8, 2008
  • 20.
  • 21.
  • 22. Twitter escalation Phase 1. Hacking instructions sites. Phase 2. Links to pagereload.com Phase 3. Links to a specially crafted site that opens 15 frames on pagereload.com
  • 23. The good and the bad of social networks as attack vector Good: Hard to sustain Bad: Way too easy
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Blog: www.threatchaos.com email: [email_address] Twitter: twitter.com/cyberwar