SlideShare a Scribd company logo
1 of 23
Shawn Carpenter and the inside story of Titan Rain ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Agenda China and the RMA Shawn Carpenter Repercussions Past is prologue
China  Revolution in Military Affairs
Sun Szu on spies “ Only a brilliant ruler or a  wise general who can use the  highly intelligent for espionage  is sure of great success.”
Allen Dulles on Sun Tzu “ It is no wonder  that Sun Tzu's Book is a favorite of Mao  Tse-Tung and is required reading  For Chinese Communist tacticians” -A.W. Dulles, The Craft of Intelligence
A Chinese Communist Tactician “ Sun Tzu is a grand strategist without parallel in history” - Chai Yuqui, Nanjing Army Command Academy, Speaking at 6 th  annual international conference on  Sun Tzu and the Art of War, 2004, Beijing
Chinese Thinking Wang Qingsong, Modern Military-Use High Technology, 1993 Zhu Youwen, Feng Yi,and Xu Dechi, Information War Under High Tech Conditions1994 Li Qingshan, New Military Revolution and High Tech War, 1995 Wang Pufeng, InformationWarfare and the Revolution in Military Affairs, Beijing: 1995; Zhu Xiaoli and Zhao Xiaozhuo, The United States and Russia in the New Military Revolution,1996; Li Qingshan, New Military Revolution and High Tech War, 1995 Dai Shenglong and Shen Fuzhen, Information Warfare and Information Security Strategy, 1996 Shen Weiguang, On New War 1997
Decoding The Virtual Dragon “ Network confrontation technology — intercepting, utilizing, corrupting, and  damaging the enemy’s information and  using false information, viruses, and  other means to sabotage normal  information system functions through  computer networks.”  -General Xu Xiaoyan, the former head of the  Communications Department of the  Chinese General Staff. 2004
Thomas Makes a Point “ If Xu’s suggestions were accepted, then one  might expect to see more active reconnaissance  and intelligence activities on the part  of the PLA(as seems to be occurring!)”  That exclamation point is Thomas’s. It refers to Shawn Carpenter and Titan Rain
Shawn Carpenter  Cyber Warrior
Introducing Shawn Carpenter
Introducing Shawn Carpenter
Introducing Shawn Carpenter
One Good Thing About IPv4 A source IP address from an attack on Lockheed Martin is noticed.  “ I had accessed a Chinese server that  was involved in the compromises. And during that  access I discovered a file on that server entitled  1.txt. That file contained an internal port scan or  an internal scan of Fort Dix military installation.” -Shawn Carpenter Deposition
Backhacking . "I backhacked into a computer system and found evidence that perhaps hundreds of defense contractors had been compromised," Carpenter testified. He determined that breaches occurred at Fort Dix, the Redstone Arsenal, the Defense Contract Management Agency and the World Bank, and that the hacking was coming from South Korea. -Albuquerque Journal
Sandia's Response "We don't care about any of this. We only care  about Sandia computers. Stop what you're doing.  Stop whatever you are doing."  Shawn's immediate supervisor
Shawn works with Military Counter Intelligence The summer of 2004 Shawn works with CI to uncover sources of attack
Shawn becomes a confidential informant for FBI Initial meeting with FBI October, 2004 Trade craft:  Meeting in the stacks of the University  Be careful when working with geeks!
All's Well That Ends Well. NOT
Chinese Cyber Espionage Continues Northrup Grumman United States-China Economic and Security Review Commission report. 11-1-09
Aftermath  Past is Prologue
Ghost Net, Google, Oil and Gas ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTeresa Long
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsPublicLeaker
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
Covert action
Covert actionCovert action
Covert actionkelsports
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Bill Hagestad II
 
Poker speech
Poker speechPoker speech
Poker speechCOMM 2213
 
Nsa on nyt warrantless wiretapping story
Nsa on nyt warrantless wiretapping storyNsa on nyt warrantless wiretapping story
Nsa on nyt warrantless wiretapping storyRepentSinner
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information WarfareJeffrey Malone
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014Bill Hagestad II
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentDoing What I Do
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber Warpjoyal
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1Onwadee18
 

What's hot (18)

402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the Sky
 
Us9af 000453dp
Us9af 000453dpUs9af 000453dp
Us9af 000453dp
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targets
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
Covert action
Covert actionCovert action
Covert action
 
Embargo in journalism
Embargo in journalismEmbargo in journalism
Embargo in journalism
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队
 
Poker speech
Poker speechPoker speech
Poker speech
 
Nsa on nyt warrantless wiretapping story
Nsa on nyt warrantless wiretapping storyNsa on nyt warrantless wiretapping story
Nsa on nyt warrantless wiretapping story
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information Warfare
 
Nsa
NsaNsa
Nsa
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber War
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Baptism by-fire
Baptism by-fireBaptism by-fire
Baptism by-fire
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
 

Viewers also liked

Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Crouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden TrojanCrouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden Trojanguest17b7c7
 
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...Martin Ebner
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismblogzilla
 
Understanding APT1 malware techniques using malware analysis and reverse engi...
Understanding APT1 malware techniques using malware analysis and reverse engi...Understanding APT1 malware techniques using malware analysis and reverse engi...
Understanding APT1 malware techniques using malware analysis and reverse engi...Cysinfo Cyber Security Community
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

Viewers also liked (9)

Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
New definition for APT
New definition for APTNew definition for APT
New definition for APT
 
Concept of Shadow Network
Concept of Shadow NetworkConcept of Shadow Network
Concept of Shadow Network
 
Crouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden TrojanCrouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden Trojan
 
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...
Do You Mind NSA Affair? Does the Global Surveillance Disclosure Impact Our St...
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Understanding APT1 malware techniques using malware analysis and reverse engi...
Understanding APT1 malware techniques using malware analysis and reverse engi...Understanding APT1 malware techniques using malware analysis and reverse engi...
Understanding APT1 malware techniques using malware analysis and reverse engi...
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Titan Rain

44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
44CON 2013 - Security Lessons from Dictators - Jerry Gamblin44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
44CON 2013 - Security Lessons from Dictators - Jerry Gamblin44CON
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Dr. Tim Dosemagen
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarRichard Stiennon
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09Richard Stiennon
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsRichard Stiennon
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlinJavierski
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacksClifford Stone
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementBill Bode
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaMurray Security Services
 
'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss'Cyberwar will not take place' Discuss
'Cyberwar will not take place' DiscussGus Rankin
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)MarioEliseo3
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber WarfareBill Hagestad II
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINALNicholas Poole
 
Silent weapons for quiet wars
Silent weapons for quiet warsSilent weapons for quiet wars
Silent weapons for quiet warsSergey Oboroc
 

Similar to Titan Rain (20)

44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
44CON 2013 - Security Lessons from Dictators - Jerry Gamblin44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
 
Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015Great Chinese Hack of the United States Government's Personnel Office in 2015
Great Chinese Hack of the United States Government's Personnel Office in 2015
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
 
Dawn of a New Age
 Dawn of a New Age Dawn of a New Age
Dawn of a New Age
 
There WIll Be Cyberwar
There WIll Be Cyberwar There WIll Be Cyberwar
There WIll Be Cyberwar
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwars
 
A farewell to arms john carlin
A farewell to arms john carlinA farewell to arms john carlin
A farewell to arms john carlin
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 
Ht f42
Ht f42Ht f42
Ht f42
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss
 
China's hacker army foreign policy (1)
China's hacker army   foreign policy (1)China's hacker army   foreign policy (1)
China's hacker army foreign policy (1)
 
CSCSS Defence Intelligence Group Commentary China Hacking
CSCSS Defence Intelligence Group Commentary China HackingCSCSS Defence Intelligence Group Commentary China Hacking
CSCSS Defence Intelligence Group Commentary China Hacking
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Silent weapons for quiet wars
Silent weapons for quiet warsSilent weapons for quiet wars
Silent weapons for quiet wars
 

More from Richard Stiennon

Cyber security industry trends
Cyber security industry trendsCyber security industry trends
Cyber security industry trendsRichard Stiennon
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is ImpossibleRichard Stiennon
 
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoStiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoRichard Stiennon
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverRichard Stiennon
 
Cybercrime and Business Process Hacking
Cybercrime and Business Process HackingCybercrime and Business Process Hacking
Cybercrime and Business Process HackingRichard Stiennon
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
What makes the IT industry tick?
What makes the IT industry tick? What makes the IT industry tick?
What makes the IT industry tick? Richard Stiennon
 

More from Richard Stiennon (9)

Why Risk Management Fails
Why Risk Management FailsWhy Risk Management Fails
Why Risk Management Fails
 
Cyber security industry trends
Cyber security industry trendsCyber security industry trends
Cyber security industry trends
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is Impossible
 
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, OrlandoStiennon Keynote at Trusted Computing Conference 2013, Orlando
Stiennon Keynote at Trusted Computing Conference 2013, Orlando
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security Forever
 
Cybercrime and Business Process Hacking
Cybercrime and Business Process HackingCybercrime and Business Process Hacking
Cybercrime and Business Process Hacking
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
What makes the IT industry tick?
What makes the IT industry tick? What makes the IT industry tick?
What makes the IT industry tick?
 
Surviving Cyber War
Surviving Cyber WarSurviving Cyber War
Surviving Cyber War
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Titan Rain

  • 1.
  • 2.
  • 3. Agenda China and the RMA Shawn Carpenter Repercussions Past is prologue
  • 4. China Revolution in Military Affairs
  • 5. Sun Szu on spies “ Only a brilliant ruler or a wise general who can use the highly intelligent for espionage is sure of great success.”
  • 6. Allen Dulles on Sun Tzu “ It is no wonder that Sun Tzu's Book is a favorite of Mao Tse-Tung and is required reading For Chinese Communist tacticians” -A.W. Dulles, The Craft of Intelligence
  • 7. A Chinese Communist Tactician “ Sun Tzu is a grand strategist without parallel in history” - Chai Yuqui, Nanjing Army Command Academy, Speaking at 6 th annual international conference on Sun Tzu and the Art of War, 2004, Beijing
  • 8. Chinese Thinking Wang Qingsong, Modern Military-Use High Technology, 1993 Zhu Youwen, Feng Yi,and Xu Dechi, Information War Under High Tech Conditions1994 Li Qingshan, New Military Revolution and High Tech War, 1995 Wang Pufeng, InformationWarfare and the Revolution in Military Affairs, Beijing: 1995; Zhu Xiaoli and Zhao Xiaozhuo, The United States and Russia in the New Military Revolution,1996; Li Qingshan, New Military Revolution and High Tech War, 1995 Dai Shenglong and Shen Fuzhen, Information Warfare and Information Security Strategy, 1996 Shen Weiguang, On New War 1997
  • 9. Decoding The Virtual Dragon “ Network confrontation technology — intercepting, utilizing, corrupting, and damaging the enemy’s information and using false information, viruses, and other means to sabotage normal information system functions through computer networks.” -General Xu Xiaoyan, the former head of the Communications Department of the Chinese General Staff. 2004
  • 10. Thomas Makes a Point “ If Xu’s suggestions were accepted, then one might expect to see more active reconnaissance and intelligence activities on the part of the PLA(as seems to be occurring!)” That exclamation point is Thomas’s. It refers to Shawn Carpenter and Titan Rain
  • 11. Shawn Carpenter Cyber Warrior
  • 15. One Good Thing About IPv4 A source IP address from an attack on Lockheed Martin is noticed. “ I had accessed a Chinese server that was involved in the compromises. And during that access I discovered a file on that server entitled 1.txt. That file contained an internal port scan or an internal scan of Fort Dix military installation.” -Shawn Carpenter Deposition
  • 16. Backhacking . "I backhacked into a computer system and found evidence that perhaps hundreds of defense contractors had been compromised," Carpenter testified. He determined that breaches occurred at Fort Dix, the Redstone Arsenal, the Defense Contract Management Agency and the World Bank, and that the hacking was coming from South Korea. -Albuquerque Journal
  • 17. Sandia's Response "We don't care about any of this. We only care about Sandia computers. Stop what you're doing. Stop whatever you are doing." Shawn's immediate supervisor
  • 18. Shawn works with Military Counter Intelligence The summer of 2004 Shawn works with CI to uncover sources of attack
  • 19. Shawn becomes a confidential informant for FBI Initial meeting with FBI October, 2004 Trade craft: Meeting in the stacks of the University Be careful when working with geeks!
  • 20. All's Well That Ends Well. NOT
  • 21. Chinese Cyber Espionage Continues Northrup Grumman United States-China Economic and Security Review Commission report. 11-1-09
  • 22. Aftermath Past is Prologue
  • 23.