SlideShare a Scribd company logo
Connections:
From the Eisenhower Interstate
System to the Internet
Damon J. Small
October 15, 2015
About @damonsmall
• Technical Project Manager at NCC Group
• Louisiana native
“Not from Texas but I got here as fast as I could!”
• In IT since 1995; infosec since 2001
• Studied music at LSU; grad school in 2005 for Information Assurance
Contact
Email
damon.small@nccgroup.trust
chef@securitykitchen.website
@damonsmall
blog.securitykitchen.website
“Why didn’t they think of that?”
Road Trip
• 80 military vehicles, 1919
• Washington, D.C. to San Francisco
• 3,000 miles / 2 months
German Autobahn
Eisenhower Interstate System
Car Culture
• Michelin Guide - France
c. 1900
• Historic Route 66 - USA
• Cities thrived due to their
proximity to highways
Where is the middle of Route 66?
The Point?
What started as an infrastructure built for a very specific use-case ended up having a
profound economic and sociological effect once turned over to the private sector.
Internet ARPANET
• First message on ARPANET
• October 29, 1969 - 2230hrs
lol
Then it crashed.
The First Four Nodes of ARPA
• University of California, Los Angeles,
(UCLA)
• Stanford Research Institute (SRI) in
Menlo Park, CA
• U.C. Santa Barbara (UCSB)
• University of Utah
http://www.scientificamerican.com/gallery/early-sketch-of-arpanets-first-four-nodes/
The First Four Nodes of ARPA
• University of California, Los Angeles,
(UCLA)
• Stanford Research Institute (SRI) in
Menlo Park, CA
• U.C. Santa Barbara (UCSB)
• University of Utah
http://www.scientificamerican.com/gallery/early-sketch-of-arpanets-first-four-nodes/
The Internet was invented…
• …by ______________________________
• …in _______________________
humans
the 20th century
…for very specific purposes. Design requirements did not fully account for:
• Unauthorized Users
• Non-private networks
Then e-Commerce Happened
• UUNET - non-profit Internet access
c.1988; for-profit c.1990
• The World - Offered Internet Access
c.1989; full access to non ARPA-
approved users by 1992
• Commercial applications prohibited
until 1995
Security Concept
• Initial design requirements of an infrastructure are not necessarily
what it becomes
• ARPA was formed to explore computational time-sharing across
great distance; engaged academia
• Eisenhower’s Interstate System fueled America’s love for road trips
and travel far beyond the initial goal of moving military vehicles
• Similarly, we have far exceeded ARPA’s intention from 50 years ago
Predictions
• Started as a hard, flat surface
• Adaptive construction materials
• Toll Roads
• Sophisticated Lighting
• Dynamic Lanes
• Self-driving cars
Predictions
• Started as an internetworking infrastructure featuring packet switching
• Math-based encryption will include elements of quantum computing
• Broadband will become more broad and ubiquitous
• Physical possession will continue to lose value; access to information is the
21st century currency
• Infosec challenges have moved up the OSI model from Layer 3 network-
based attacks to Layer 7 application attacks.
• Will continue to move to Layer 8.
As security professionals,
our charge be to not only understand how the
technology works,
but also how people interact with it.
Thanks for listening!

More Related Content

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Connections: From the Eisenhower Interstate System to the Internet

  • 1. Connections: From the Eisenhower Interstate System to the Internet Damon J. Small October 15, 2015
  • 2. About @damonsmall • Technical Project Manager at NCC Group • Louisiana native “Not from Texas but I got here as fast as I could!” • In IT since 1995; infosec since 2001 • Studied music at LSU; grad school in 2005 for Information Assurance
  • 4.
  • 5.
  • 6. “Why didn’t they think of that?”
  • 7. Road Trip • 80 military vehicles, 1919 • Washington, D.C. to San Francisco • 3,000 miles / 2 months
  • 10. Car Culture • Michelin Guide - France c. 1900 • Historic Route 66 - USA • Cities thrived due to their proximity to highways
  • 11. Where is the middle of Route 66?
  • 12. The Point? What started as an infrastructure built for a very specific use-case ended up having a profound economic and sociological effect once turned over to the private sector.
  • 13. Internet ARPANET • First message on ARPANET • October 29, 1969 - 2230hrs lol Then it crashed.
  • 14. The First Four Nodes of ARPA • University of California, Los Angeles, (UCLA) • Stanford Research Institute (SRI) in Menlo Park, CA • U.C. Santa Barbara (UCSB) • University of Utah http://www.scientificamerican.com/gallery/early-sketch-of-arpanets-first-four-nodes/
  • 15. The First Four Nodes of ARPA • University of California, Los Angeles, (UCLA) • Stanford Research Institute (SRI) in Menlo Park, CA • U.C. Santa Barbara (UCSB) • University of Utah http://www.scientificamerican.com/gallery/early-sketch-of-arpanets-first-four-nodes/
  • 16. The Internet was invented… • …by ______________________________ • …in _______________________ humans the 20th century …for very specific purposes. Design requirements did not fully account for: • Unauthorized Users • Non-private networks
  • 17. Then e-Commerce Happened • UUNET - non-profit Internet access c.1988; for-profit c.1990 • The World - Offered Internet Access c.1989; full access to non ARPA- approved users by 1992 • Commercial applications prohibited until 1995
  • 18. Security Concept • Initial design requirements of an infrastructure are not necessarily what it becomes • ARPA was formed to explore computational time-sharing across great distance; engaged academia • Eisenhower’s Interstate System fueled America’s love for road trips and travel far beyond the initial goal of moving military vehicles • Similarly, we have far exceeded ARPA’s intention from 50 years ago
  • 19. Predictions • Started as a hard, flat surface • Adaptive construction materials • Toll Roads • Sophisticated Lighting • Dynamic Lanes • Self-driving cars
  • 20. Predictions • Started as an internetworking infrastructure featuring packet switching • Math-based encryption will include elements of quantum computing • Broadband will become more broad and ubiquitous • Physical possession will continue to lose value; access to information is the 21st century currency • Infosec challenges have moved up the OSI model from Layer 3 network- based attacks to Layer 7 application attacks. • Will continue to move to Layer 8.
  • 21. As security professionals, our charge be to not only understand how the technology works, but also how people interact with it. Thanks for listening!

Editor's Notes

  1. The idea for this narrative began after a conversation I had years ago when a non-security person asked, “Why didn’t they think of that when designing the Internet?” It’s a simple, honest question, and the answer lies with how the Internet came to be. It’s an important question because, as information security professionals, we have to understand why the technology is the way it is, how people will use it, and how malicious users will leverage design weaknesses to steal information.
  2. The idea for a National Interstate system began in 1919 (source) with a trip from Washington, D.C. to San Francisco involving 80 military vehicles. It took 2 months and covered 3,000 miles (source). Then-Lieutenant Colonel Eisenhower (source) realized that the ability to mobile forces was key to protecting the Country.
  3. In Europe during the 1930s, the autobahn reinforced the idea that roads were critical to a nation’s security and economy (source). As President, Eisenhower supported a nationwide infrastructure that would not only facilitate military objectives but also create jobs and boost the economy. The initial requirement was to facilitate moving military vehicles across vast distances, but the result was that private industry created a culture around this new infrastructure.
  4. Because of his experiences, President Eisenhower fought hard to get Congress to pass the Federal-Aid Highway Act of 1956. For that reason, he is called "The Father of the Interstate System." To honor him for that "personal and absolute decision," Congress passed a bill in 1990 that changed the legal name of the Interstate System. It is now called The Dwight D. Eisenhower National System of Interstate and Defense Highways. President George H. W. Bush signed the bill into law on October 15, 1990. http://www.fhwa.dot.gov/interstate/brainiacs/eisenhowerinterstate.cfm
  5. Americans began traveling cross-country, and cities sprung up near these new roads. Entire towns existed to support the Interstate (source). Route 66*, which ran from Chicago to Santa Monica, CA (2,448 miles), provided jobs for everyone that lived nearby. *Not actually a part of the National Highway System, but it illustrates the point.
  6. The initial requirement was to facilitate moving military vehicles across vast distances, but the result was that private industry created a culture around this new infrastructure.
  7. Key concepts, although largely attributed to American computer scientists, also included European researchers (source). Packet switching, long-distance links, and protocols that supported routing around disrupted connections led to the first nodes of ARPANET coming online in [year] (source). It crashed after three keystrokes (source). The first message on the ARPANET was sent by UCLA student programmer Charley Kline, at 10:30 pm on 29 October 1969, from Boelter Hall 3420.[20] Kline transmitted from the university's SDS Sigma 7 Host computer to the Stanford Research Institute's SDS 940 Host computer. The message text was the word login; the l and the o letters were transmitted, but the system then crashed. Hence, the literal first message over the ARPANET was lo. About an hour later, having recovered from the crash, the SDS Sigma 7 computer effected a full login. The first permanent ARPANET link was established on 21 November 1969, between the IMP at UCLA and the IMP at the Stanford Research Institute. By 5 December 1969, the entire four-node network was established.
  8. ARPANET In 1957, the U.S. government formed the Advanced Research Projects Agency (ARPA), a segment of the Department of Defense charged with ensuring U.S. leadership in science and technology with military applications. In 1969, ARPA established ARPANET, the forerunner of the Internet. Research and education ARPANET was a network that connected major computers at the University of California at Los Angeles, the University of California at Santa Barbara, Stanford Research Institute, and the University of Utah. Within a couple of years, several other educational and research institutions joined the network. In response to the threat of nuclear attack, ARPANET was designed to allow continued communication if one or more sites were destroyed. http://historynewsnetwork.org/article/142824
  9. ARPANET In 1957, the U.S. government formed the Advanced Research Projects Agency (ARPA), a segment of the Department of Defense charged with ensuring U.S. leadership in science and technology with military applications. In 1969, ARPA established ARPANET, the forerunner of the Internet. Research and education ARPANET was a network that connected major computers at the University of California at Los Angeles, the University of California at Santa Barbara, Stanford Research Institute, and the University of Utah. Within a couple of years, several other educational and research institutions joined the network. In response to the threat of nuclear attack, ARPANET was designed to allow continued communication if one or more sites were destroyed. http://historynewsnetwork.org/article/142824
  10. The concept for the Internet, although debated (source), involved creating a system that would allow for geographically dispersed computers to share information with one another. In the event of a catastrophic attack against the United States, data, no longer stored in any single location, could continue to be shared with those that needed it to defend its citizens.
  11. SECURITY CONCEPT - why are we burdened with the security problems we are today? Why didn’t “they” think of these issues while developing the technology? The answer is that the concept of regular people using such a network were specifically left out of the design requirements. In fact, commercial applications of the Internet were prohibited until 1995 (source). Until then, Internet users had to be affiliated with the Military or academia. The first commercial ISP, “The World,” came online in 1989 (http://en.wikipedia.org/wiki/Internet_service_provider). Amazon came online in 1995.
  12. SECURITY CONCEPT - The initial design requirements of an infrastructure are not necessarily representative of what that infrastructure eventually becomes. ARPA was started to explore this concept. ARPA had no facilities of its own, so it engaged academia to help develop the technology. (details, sources for above) Eisenhower’s roads fueled America’s love for automobiles and exploring remote cities. The Internet allowed people to exchange information across vast distances and matured from the first application of simple email (source) to ecommerce, delivery of streaming media, and remote control of a variety of devices (reference “The Internet of Things”). Researchers did not ignore the problems that would eventually face us today; they were not a part of the initial design. There was no concept of an “unauthorized user” or any application beyond the simple exchange of text. Once commercial uses of the Internet were allowed, things quickly escalated. I won’t go through a history of what has happened since, as I think we all appreciate those concepts.. The Internet was never intended, initially, to support e-commerce and the vast array of applications we use it for today. Therefore, we have had to “bolt on” features to allow these things to continue. Encryption and authentication have become application-layer issues while the underlying protocols remain similar to what they were decades ago.
  13. PREDICTIONS Safety features have become commonplace on Interstates. What started as a hard and flat surface has evolved into a network that includes lighting, reflective markers, electronic signage, and sophisticated building materials. Cryptography, which is based on the concept that factoring prime numbers is hard, will begin using more sophisticated materials as well.
  14. We use particles to transfer information - electrons and photons that represent two states. Quantum particles will allow multiple states, and we will take advantage of the Heisenberg Uncertainty Principle, which states that you cannot observe something without changing it. (source, details) Quantum encryption will replace current math-based crypto. Lanes will continue to become “wider.” Existing broadband will become “more broad.” Technological advances will connect more people to the Internet. This will allow richer content and increase the value of online data. This will also increase malicious activity as the information assets become more attractive. Example - I used to have an impressive library of CDs. Today, my CD collection is zero. I have none. They exist in the iTunes cloud. Further, I use subscription services to gain access to huge libraries of music from Pandora and Rhapsody. Possession of physical items is no longer the value proposition; rather, access to information is the 21st century currency. New lanes of traffic will be unrecognizable compared to the next generation. (Compare Route 66 to part of I-10, and compare the Internet to the Internet2 [sources]). As private industry continues to push the envelope of technical capability, we in infosec will have to remain vigilant because attack vectors will also increase in sophistication. Crypto is often defeated not by breaking the algorithm, but by attacking a poor implementation. Even with something like quantum encryption, humans will make mistakes and hackers will take advantage of them. As security professionals, our charge will continue to be to understand not only how the technology works, BUT HOW PEOPLE USE IT. Just as Interstates do not require that you be in a military vehicle, the Internet has long ceased being a tool used exclusively by computer scientists. Regular people will continue using the Internet more and more. While they may become more security savvy over time, their focus will be on utility and entertainment. Time-to-market for new applications continues to shrink, web applications continue adoption in business, and The Cloud is pushing more data online. As a result, security pros will busy for the foreseeable future, but our jobs will become more focused on “Layer 8” issues and how people interact with technology and no longer a “simple” issue of understanding ports and protocols.