Shawn Carpenter and the inside story of Titan Rain <ul><li>Richard Stiennon </li></ul><ul><li>Chief Research Analyst </li>...
<ul><li>Blog:  www.ThreatChaos.com </li></ul><ul><li>twitter.com/cyberwar </li></ul>
Agenda China and the RMA Shawn Carpenter Repercussions Past is prologue
China  Revolution in Military Affairs
Sun Szu on spies “ Only a brilliant ruler or a  wise general who can use the  highly intelligent for espionage  is sure of...
Allen Dulles on Sun Tzu “ It is no wonder  that Sun Tzu's Book is a favorite of Mao  Tse-Tung and is required reading  For...
A Chinese Communist Tactician “ Sun Tzu is a grand strategist without parallel in history” - Chai Yuqui, Nanjing Army Comm...
Chinese Thinking Wang Qingsong, Modern Military-Use High Technology, 1993 Zhu Youwen, Feng Yi,and Xu Dechi, Information Wa...
Decoding The Virtual Dragon “ Network confrontation technology — intercepting, utilizing, corrupting, and  damaging the en...
Thomas Makes a Point “ If Xu’s suggestions were accepted, then one  might expect to see more active reconnaissance  and in...
Shawn Carpenter  Cyber Warrior
Introducing Shawn Carpenter
Introducing Shawn Carpenter
Introducing Shawn Carpenter
One Good Thing About IPv4 A source IP address from an attack on Lockheed Martin is noticed.  “ I had accessed a Chinese se...
Backhacking . &quot;I backhacked into a computer system and found evidence that perhaps hundreds of defense contractors ha...
Sandia's Response &quot;We don't care about any of this. We only care  about Sandia computers. Stop what you're doing.  St...
Shawn works with Military Counter Intelligence The summer of 2004 Shawn works with CI to uncover sources of attack
Shawn becomes a confidential informant for FBI Initial meeting with FBI October, 2004 Trade craft:  Meeting in the stacks ...
All's Well That Ends Well. NOT
Chinese Cyber Espionage Continues Northrup Grumman United States-China Economic and Security Review Commission report. 11-...
Aftermath  Past is Prologue
Ghost Net, Google, Oil and Gas <ul><li>Pentagon email compromise, 2007 </li></ul><ul><li>Ghostnet report published by SecD...
Upcoming SlideShare
Loading in...5
×

Titan Rain

3,604

Published on

In 2004 a security admin at Sandia Labs uncovered wide spread foreign agent spying within the US research labs and agencies. This is his story.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
3,604
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
65
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Titan Rain"

  1. 1. Shawn Carpenter and the inside story of Titan Rain <ul><li>Richard Stiennon </li></ul><ul><li>Chief Research Analyst </li></ul><ul><li>IT-Harvest </li></ul><ul><li>Blog: ThreatChaos.com </li></ul><ul><li>twitter.com/stiennon </li></ul>
  2. 2. <ul><li>Blog: www.ThreatChaos.com </li></ul><ul><li>twitter.com/cyberwar </li></ul>
  3. 3. Agenda China and the RMA Shawn Carpenter Repercussions Past is prologue
  4. 4. China Revolution in Military Affairs
  5. 5. Sun Szu on spies “ Only a brilliant ruler or a wise general who can use the highly intelligent for espionage is sure of great success.”
  6. 6. Allen Dulles on Sun Tzu “ It is no wonder that Sun Tzu's Book is a favorite of Mao Tse-Tung and is required reading For Chinese Communist tacticians” -A.W. Dulles, The Craft of Intelligence
  7. 7. A Chinese Communist Tactician “ Sun Tzu is a grand strategist without parallel in history” - Chai Yuqui, Nanjing Army Command Academy, Speaking at 6 th annual international conference on Sun Tzu and the Art of War, 2004, Beijing
  8. 8. Chinese Thinking Wang Qingsong, Modern Military-Use High Technology, 1993 Zhu Youwen, Feng Yi,and Xu Dechi, Information War Under High Tech Conditions1994 Li Qingshan, New Military Revolution and High Tech War, 1995 Wang Pufeng, InformationWarfare and the Revolution in Military Affairs, Beijing: 1995; Zhu Xiaoli and Zhao Xiaozhuo, The United States and Russia in the New Military Revolution,1996; Li Qingshan, New Military Revolution and High Tech War, 1995 Dai Shenglong and Shen Fuzhen, Information Warfare and Information Security Strategy, 1996 Shen Weiguang, On New War 1997
  9. 9. Decoding The Virtual Dragon “ Network confrontation technology — intercepting, utilizing, corrupting, and damaging the enemy’s information and using false information, viruses, and other means to sabotage normal information system functions through computer networks.” -General Xu Xiaoyan, the former head of the Communications Department of the Chinese General Staff. 2004
  10. 10. Thomas Makes a Point “ If Xu’s suggestions were accepted, then one might expect to see more active reconnaissance and intelligence activities on the part of the PLA(as seems to be occurring!)” That exclamation point is Thomas’s. It refers to Shawn Carpenter and Titan Rain
  11. 11. Shawn Carpenter Cyber Warrior
  12. 12. Introducing Shawn Carpenter
  13. 13. Introducing Shawn Carpenter
  14. 14. Introducing Shawn Carpenter
  15. 15. One Good Thing About IPv4 A source IP address from an attack on Lockheed Martin is noticed. “ I had accessed a Chinese server that was involved in the compromises. And during that access I discovered a file on that server entitled 1.txt. That file contained an internal port scan or an internal scan of Fort Dix military installation.” -Shawn Carpenter Deposition
  16. 16. Backhacking . &quot;I backhacked into a computer system and found evidence that perhaps hundreds of defense contractors had been compromised,&quot; Carpenter testified. He determined that breaches occurred at Fort Dix, the Redstone Arsenal, the Defense Contract Management Agency and the World Bank, and that the hacking was coming from South Korea. -Albuquerque Journal
  17. 17. Sandia's Response &quot;We don't care about any of this. We only care about Sandia computers. Stop what you're doing. Stop whatever you are doing.&quot; Shawn's immediate supervisor
  18. 18. Shawn works with Military Counter Intelligence The summer of 2004 Shawn works with CI to uncover sources of attack
  19. 19. Shawn becomes a confidential informant for FBI Initial meeting with FBI October, 2004 Trade craft: Meeting in the stacks of the University Be careful when working with geeks!
  20. 20. All's Well That Ends Well. NOT
  21. 21. Chinese Cyber Espionage Continues Northrup Grumman United States-China Economic and Security Review Commission report. 11-1-09
  22. 22. Aftermath Past is Prologue
  23. 23. Ghost Net, Google, Oil and Gas <ul><li>Pentagon email compromise, 2007 </li></ul><ul><li>Ghostnet report published by SecDev March 2009 </li></ul><ul><li>Google Hacked December 2009 </li></ul><ul><li>Oil and gas commercial attacks 2009-10 </li></ul><ul><li>US Secretary of States goes on record </li></ul><ul><li>China denies </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×