SlideShare a Scribd company logo
1 of 20
www.Alt3.co.uk
1
CYBER THREAT:
2015 and beyond – the age of stealth terror
and crime.
www.alt3.co.uk
james@alt3.co.uk
Alt3
understanding future
risks and opportunities
www.Alt3.co.uk
2
2014: I gave a speech outlining the scale and scope of cyber threat – and how much
this will impact the world as we know it ... and the world as we don’t know it.
Predicted that 2015 and following will be an age of increasing cyber warfare and the
rise of true cyber terrorism.
I already knew my emails were routinely viewed by outside agencies. But then all my
counter-terrorism material vanished from my laptop.
I knew I had someone’s attention.
TIMELINE:
www.Alt3.co.uk
3
Increasing online activity and the increasing sophistication of intrusion techniques
mean that 2015 will be a year of:
• increased intrusion by rogue states and states with an aggressive foreign policy
specifically to cause widespread economic and physical damage to other states
• the hacking of commercial organisations to steal sensitive data
• the increased use of social media for terrorist propaganda
• the hacking of individuals by minor criminals to gain access to bank accounts
• the increased use of the “dark web” by insidious criminals such as drug dealers and
paedophiles
COUNTRIES NEED TO BE BETTER AT EXPLAINING THE NEED FOR SURVEILLANCE
ORGANISATIONS NEED TO BE BETTER AT PROTECTING THEIR DATA
www.Alt3.co.uk
4
CYBER WARFARE
This is the 21st century.
You don’t have to defeat an army on the battlefield to win the war.
2013: cyber warfare considered a greater threat to US interests than AQ
2014: increasing intrusion at a national security level. “Hackers” threaten to
close down nuclear power plants in South Korea. Following investigations, this
became widely viewed as an act of cyber warfare with a political purpose by a
nearby state.
www.Alt3.co.uk
5
Making sure everyone has the same understanding:
Definition of war (20th century):
“shock and awe” – large armies, zooming planes, lots of munitions, long distance PR
based on front line news comments from the boots on the ground. High risk. High
cost. Lots of death. Anti-war demonstrations. Election issue. War-weariness.
Definition of war (21st century):
Silence. You don’t know it’s happening. People continue on their daily lives while
beneath the surface the war rages … with cyber vulnerabilities exposed and people
believing they are safe. Ignorance is bliss.
www.Alt3.co.uk
6
Making sure everyone has the same understanding:
CYBER WARFARE:
Instead of the high risk / high cost / high opposition dismantling an entire country
through traditional warfare, cyber warfare can essentially close down that country at
the press of a button …
… or at least inflict serious economic damage.
But … the trouble is … anyone with a grudge can potentially do this. And the world is
full of very intelligent people.
www.Alt3.co.uk
7
Hidden Reality:
Welcome to the turbulent 21st century. The war is already raging … and many people are
blissfully unaware.
• Hacking became known in the 1960’s
• It became prevalent in the 1980’s
• It became industrialised in the 2000’s
• It broke the surface into public knowledge in 2010 with Stuxnet
• 2010,US Pentagon sets up U.S. Cyber Command
• 2013 – 2014 the rise of internet comms as a means of stealth command and control /
propaganda, increasing the pressure for surveillance and overall control
Estimated cost to produce and distribute Stuxnet: $380K
Cost of a Tomahawk Cruise missile (2011): $1.41M
Traditional 20th century armies, cost: $billions
www.Alt3.co.uk
8
Hidden Reality. IF you had to fight a war what would you do?
If you don't understand the risks, how can you prepare?
Can you afford to let the issues be blurred?
Stealth Vs “shock and awe” – what would you go for?
Low cost efficiency Vs high cost / high risk – what would you go for?
This is the 21st century. “You don’t have to defeat an army on the battlefield to win the
war”
For the past 5 years cyber warfare has been raging. Most people don’t even know it.
www.Alt3.co.uk
9
Hidden Reality:
Cyber Warfare is:
• a “game” of cat and mouse
• something all the major powers are engaged in
• initially around IP theft and defensive security
• now major multinational vulnerability and threat assessment
• and when found out … becomes a “blame game”
• includes the balance between the freedom of the net and control of information in the
face of social media mass movements and / or terrorist propaganda
The world is changing. The pace of change is increasing. The more we live our lives
on line, the greater the automation, the greater the “footprints in the sand” – and the
greater the vulnerability.
www.Alt3.co.uk
10
Cyber Warfare Vulnerabilities:
Critical Infrastructure – any core system an advanced country requires to maintain its
daily operations:
• transport
• health
• financial
• energy
• water
• government
- not a move away from high tech IP theft or financial crime but an evolution into
national security.
www.Alt3.co.uk
11
In todays fragile economic climate … what if …
… one of these critical service sectors was to be suddenly unavailable? There would be:
• chaos
• a momentum of chaos
• an attempted sudden imposition of “control” from the centre
• devaluation
• potential social disintegration
Welcome to the turbulent 21st century. You don’t have to defeat an army on the battlefield
to win the war.
www.Alt3.co.uk
12
In todays fragile economic climate … in the next 2-3 years …
Cyber Warfare will become the number ONE priority for national security.
(closely followed by terrorism and then rogue, extremist states – all of which are linked)
And within this timeframe there will be at least one major global / regional
intrusion episode with a severe damage probability.
Do not make the mistake of thinking bad things just happen to other people.
www.Alt3.co.uk
13
So, who’s doing this?
• Major global / international powers
o aggressive foreign policy
o stealth warfare
o seeking to steal IP and gain commercial benefit
o even as a means of defence
• Extremist states
• Other countries
• Extremist and anarchist groups including terrorists
• Industrial espionage hackers
• Mischief makers
• … and we are
The war is raging. It is gathering pace.
www.Alt3.co.uk
14
Evidence? Full Scale and Massive Intrusion. The open secret:
• large scale IP theft that can not take place without national knowledge –
originally to steal commercial secrets, now mainly to steal the technology
secrets that are at the core of modern defence systems
• the constant probing of defences by potentially hostile powers – most
developed countries now have a budget for cyber defence and often for cyber
offence
Dates for some major national level cyber attacks:
• Baltic States – 2007
• Georgia – 2008
• Ukraine – 2014
• South Korea - 2014
www.Alt3.co.uk
15
The point is …
• it exists
• it is a fact of life
• it is more prevalent than most people realise
• it is set to become even more prevalent
• no one is immune to the potential consequences of cyber war
In a highly competitive world when there is conflict or the risk of conflict
(therefore the need to defend) countries want that low cost / low risk option.
www.Alt3.co.uk
16
The targets of Cyber war – FACTS:
1. The world is becoming more “automated” – faster, more global, more communicative.
2. every time you make a phone call, every time you engage in a transaction, every time
you visit a web page, every comment you make on line … you leave a footprint. This is
“high availability” data.
3. every time an organisation electronically touches the outside world for any reason …
they create their own footprint. Crucially, they do so through gateways.
4. If not guarded properly these on line gateways are in fact open doors.
5. Cyber warfare and a large proportion of cyber crime focuses on finding a route through
these open doors or poorly guarded gateways.
6. This is “vulnerability”.
www.Alt3.co.uk
17
What do we need to do? Understand the nature of vulnerability:
• what are the national vulnerabilities?
• do bad things really just happen to someone else?
• what are the common international vulnerabilities?
• from where are the common threats?
• what is the common ground? Build alliances.
• it’s not “us against the world”. There IS a shared threat and a common ground.
The world is changing. The pace of change is increasing. Reach out. You will be
surprised at who our friends are with whom we share a common goal.
www.Alt3.co.uk
18
The Greatest Threat?
Nationalism?
The belief it’s us against the world and no one else can be trusted.
FACT:
• there are many of us who share the same threat
• there are many of us who share the same vulnerabilities
• shared defence creates greater security
• this means mutual respect, benefits AND privacy
• no one member is greater than any of the others
This is our only viable future.
www.Alt3.co.uk
19
2015 onward:
Countries need to work together to form a common shield against:
• rogue and aggressive states currently engaged in cyber warfare
• the use of social media as a terrorist propaganda tool
Police organisations need to work closely together to prevent:
• organised crime / cyber criminals
• paedophiles
Business organisations need to be more aware of:
• the changing nature of the threat against them
• their vulnerability
www.Alt3.co.uk
20
Thank you.
If you don't understand the risks, how can you prepare? Can you afford to let the issues be blurred?
james@alt3.co.uk

More Related Content

What's hot

ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Charles Mok
 
Demodernization by design: War, Geopolitics and the Architecture of Infrastru...
Demodernization by design: War, Geopolitics and the Architecture of Infrastru...Demodernization by design: War, Geopolitics and the Architecture of Infrastru...
Demodernization by design: War, Geopolitics and the Architecture of Infrastru...Stephen Graham
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
Bjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaBjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaRai University
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarElyssa Durant
 
News has not been globalized but Americanized
News has not been globalized but AmericanizedNews has not been globalized but Americanized
News has not been globalized but AmericanizedYusuf Kurniawan
 

What's hot (9)

Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 
Demodernization by design: War, Geopolitics and the Architecture of Infrastru...
Demodernization by design: War, Geopolitics and the Architecture of Infrastru...Demodernization by design: War, Geopolitics and the Architecture of Infrastru...
Demodernization by design: War, Geopolitics and the Architecture of Infrastru...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
Bjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaBjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of media
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels Cyberwar
 
National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks
 
News has not been globalized but Americanized
News has not been globalized but AmericanizedNews has not been globalized but Americanized
News has not been globalized but Americanized
 

Viewers also liked

Audiência de Massas e Novas perspetivas- Teoria da Comunicação
Audiência de Massas e Novas perspetivas- Teoria da ComunicaçãoAudiência de Massas e Novas perspetivas- Teoria da Comunicação
Audiência de Massas e Novas perspetivas- Teoria da Comunicaçãonanasimao
 
On The Right Mind Overview and Services
On The Right Mind Overview and ServicesOn The Right Mind Overview and Services
On The Right Mind Overview and ServicesClaudia Lopez
 
Os Movimentos Sociais como Indutores da Mudança
Os Movimentos Sociais como Indutores da MudançaOs Movimentos Sociais como Indutores da Mudança
Os Movimentos Sociais como Indutores da Mudançananasimao
 
D. João de Portugal-Frei Luis de Sousa
D. João de Portugal-Frei Luis de SousaD. João de Portugal-Frei Luis de Sousa
D. João de Portugal-Frei Luis de Sousananasimao
 
Social Engineering, Insider and Cyber Threat
Social Engineering, Insider and Cyber Threat Social Engineering, Insider and Cyber Threat
Social Engineering, Insider and Cyber Threat Advent IM Ltd
 
Countering the Cyber Threat
Countering the Cyber ThreatCountering the Cyber Threat
Countering the Cyber ThreatOllie Whitehouse
 
A Educação nos Maias
A Educação nos MaiasA Educação nos Maias
A Educação nos Maiasnanasimao
 
Caracteristicas trágicas e romanticas da obra-Frei Luis de Sousa
Caracteristicas trágicas e romanticas da obra-Frei Luis de SousaCaracteristicas trágicas e romanticas da obra-Frei Luis de Sousa
Caracteristicas trágicas e romanticas da obra-Frei Luis de Sousananasimao
 
Cyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatCyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatIBM Government
 
Présentation Microsoft Advanced Threat Analytics | Deep-Dive - MSCloud Summi...
Présentation Microsoft Advanced Threat Analytics  | Deep-Dive - MSCloud Summi...Présentation Microsoft Advanced Threat Analytics  | Deep-Dive - MSCloud Summi...
Présentation Microsoft Advanced Threat Analytics | Deep-Dive - MSCloud Summi...☁️Seyfallah Tagrerout☁ [MVP]
 
Rapid Threat Modeling : case study
Rapid Threat Modeling : case studyRapid Threat Modeling : case study
Rapid Threat Modeling : case studyAntonio Fontes
 
Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Antonio Fontes
 
Graduation Certificate & Transcript
Graduation Certificate & TranscriptGraduation Certificate & Transcript
Graduation Certificate & TranscriptAbdul-Hameed Shukri
 
Maria Eduarda-Os Maias
Maria Eduarda-Os MaiasMaria Eduarda-Os Maias
Maria Eduarda-Os Maiasnanasimao
 
Tigres asiáticos
Tigres asiáticosTigres asiáticos
Tigres asiáticosnanasimao
 

Viewers also liked (20)

Audiência de Massas e Novas perspetivas- Teoria da Comunicação
Audiência de Massas e Novas perspetivas- Teoria da ComunicaçãoAudiência de Massas e Novas perspetivas- Teoria da Comunicação
Audiência de Massas e Novas perspetivas- Teoria da Comunicação
 
On The Right Mind Overview and Services
On The Right Mind Overview and ServicesOn The Right Mind Overview and Services
On The Right Mind Overview and Services
 
Os Movimentos Sociais como Indutores da Mudança
Os Movimentos Sociais como Indutores da MudançaOs Movimentos Sociais como Indutores da Mudança
Os Movimentos Sociais como Indutores da Mudança
 
D. João de Portugal-Frei Luis de Sousa
D. João de Portugal-Frei Luis de SousaD. João de Portugal-Frei Luis de Sousa
D. João de Portugal-Frei Luis de Sousa
 
Social Engineering, Insider and Cyber Threat
Social Engineering, Insider and Cyber Threat Social Engineering, Insider and Cyber Threat
Social Engineering, Insider and Cyber Threat
 
The Cyber Threat Landscape
The Cyber Threat LandscapeThe Cyber Threat Landscape
The Cyber Threat Landscape
 
Cyber Threat Detection and Interpretation
Cyber Threat Detection and InterpretationCyber Threat Detection and Interpretation
Cyber Threat Detection and Interpretation
 
Countering the Cyber Threat
Countering the Cyber ThreatCountering the Cyber Threat
Countering the Cyber Threat
 
A Educação nos Maias
A Educação nos MaiasA Educação nos Maias
A Educação nos Maias
 
Caracteristicas trágicas e romanticas da obra-Frei Luis de Sousa
Caracteristicas trágicas e romanticas da obra-Frei Luis de SousaCaracteristicas trágicas e romanticas da obra-Frei Luis de Sousa
Caracteristicas trágicas e romanticas da obra-Frei Luis de Sousa
 
Cyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatCyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the Threat
 
Présentation Microsoft Advanced Threat Analytics | Deep-Dive - MSCloud Summi...
Présentation Microsoft Advanced Threat Analytics  | Deep-Dive - MSCloud Summi...Présentation Microsoft Advanced Threat Analytics  | Deep-Dive - MSCloud Summi...
Présentation Microsoft Advanced Threat Analytics | Deep-Dive - MSCloud Summi...
 
Rapid Threat Modeling : case study
Rapid Threat Modeling : case studyRapid Threat Modeling : case study
Rapid Threat Modeling : case study
 
Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)
 
Graduation Certificate & Transcript
Graduation Certificate & TranscriptGraduation Certificate & Transcript
Graduation Certificate & Transcript
 
Maria Eduarda-Os Maias
Maria Eduarda-Os MaiasMaria Eduarda-Os Maias
Maria Eduarda-Os Maias
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Tigres asiáticos
Tigres asiáticosTigres asiáticos
Tigres asiáticos
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 

Similar to Cyber Threat

Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fiskJulesroa
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Govarii827
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)Felipe Prado
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
Cybercrime and Warfare: All that matters
Cybercrime and Warfare: All that mattersCybercrime and Warfare: All that matters
Cybercrime and Warfare: All that matters- Mark - Fullbright
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Double Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdfDouble Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdfCharlie
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)Felipe Prado
 

Similar to Cyber Threat (20)

Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fisk
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Gov
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Cybercrime and Warfare: All that matters
Cybercrime and Warfare: All that mattersCybercrime and Warfare: All that matters
Cybercrime and Warfare: All that matters
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Double Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdfDouble Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdf
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 

Cyber Threat

  • 1. www.Alt3.co.uk 1 CYBER THREAT: 2015 and beyond – the age of stealth terror and crime. www.alt3.co.uk james@alt3.co.uk Alt3 understanding future risks and opportunities
  • 2. www.Alt3.co.uk 2 2014: I gave a speech outlining the scale and scope of cyber threat – and how much this will impact the world as we know it ... and the world as we don’t know it. Predicted that 2015 and following will be an age of increasing cyber warfare and the rise of true cyber terrorism. I already knew my emails were routinely viewed by outside agencies. But then all my counter-terrorism material vanished from my laptop. I knew I had someone’s attention. TIMELINE:
  • 3. www.Alt3.co.uk 3 Increasing online activity and the increasing sophistication of intrusion techniques mean that 2015 will be a year of: • increased intrusion by rogue states and states with an aggressive foreign policy specifically to cause widespread economic and physical damage to other states • the hacking of commercial organisations to steal sensitive data • the increased use of social media for terrorist propaganda • the hacking of individuals by minor criminals to gain access to bank accounts • the increased use of the “dark web” by insidious criminals such as drug dealers and paedophiles COUNTRIES NEED TO BE BETTER AT EXPLAINING THE NEED FOR SURVEILLANCE ORGANISATIONS NEED TO BE BETTER AT PROTECTING THEIR DATA
  • 4. www.Alt3.co.uk 4 CYBER WARFARE This is the 21st century. You don’t have to defeat an army on the battlefield to win the war. 2013: cyber warfare considered a greater threat to US interests than AQ 2014: increasing intrusion at a national security level. “Hackers” threaten to close down nuclear power plants in South Korea. Following investigations, this became widely viewed as an act of cyber warfare with a political purpose by a nearby state.
  • 5. www.Alt3.co.uk 5 Making sure everyone has the same understanding: Definition of war (20th century): “shock and awe” – large armies, zooming planes, lots of munitions, long distance PR based on front line news comments from the boots on the ground. High risk. High cost. Lots of death. Anti-war demonstrations. Election issue. War-weariness. Definition of war (21st century): Silence. You don’t know it’s happening. People continue on their daily lives while beneath the surface the war rages … with cyber vulnerabilities exposed and people believing they are safe. Ignorance is bliss.
  • 6. www.Alt3.co.uk 6 Making sure everyone has the same understanding: CYBER WARFARE: Instead of the high risk / high cost / high opposition dismantling an entire country through traditional warfare, cyber warfare can essentially close down that country at the press of a button … … or at least inflict serious economic damage. But … the trouble is … anyone with a grudge can potentially do this. And the world is full of very intelligent people.
  • 7. www.Alt3.co.uk 7 Hidden Reality: Welcome to the turbulent 21st century. The war is already raging … and many people are blissfully unaware. • Hacking became known in the 1960’s • It became prevalent in the 1980’s • It became industrialised in the 2000’s • It broke the surface into public knowledge in 2010 with Stuxnet • 2010,US Pentagon sets up U.S. Cyber Command • 2013 – 2014 the rise of internet comms as a means of stealth command and control / propaganda, increasing the pressure for surveillance and overall control Estimated cost to produce and distribute Stuxnet: $380K Cost of a Tomahawk Cruise missile (2011): $1.41M Traditional 20th century armies, cost: $billions
  • 8. www.Alt3.co.uk 8 Hidden Reality. IF you had to fight a war what would you do? If you don't understand the risks, how can you prepare? Can you afford to let the issues be blurred? Stealth Vs “shock and awe” – what would you go for? Low cost efficiency Vs high cost / high risk – what would you go for? This is the 21st century. “You don’t have to defeat an army on the battlefield to win the war” For the past 5 years cyber warfare has been raging. Most people don’t even know it.
  • 9. www.Alt3.co.uk 9 Hidden Reality: Cyber Warfare is: • a “game” of cat and mouse • something all the major powers are engaged in • initially around IP theft and defensive security • now major multinational vulnerability and threat assessment • and when found out … becomes a “blame game” • includes the balance between the freedom of the net and control of information in the face of social media mass movements and / or terrorist propaganda The world is changing. The pace of change is increasing. The more we live our lives on line, the greater the automation, the greater the “footprints in the sand” – and the greater the vulnerability.
  • 10. www.Alt3.co.uk 10 Cyber Warfare Vulnerabilities: Critical Infrastructure – any core system an advanced country requires to maintain its daily operations: • transport • health • financial • energy • water • government - not a move away from high tech IP theft or financial crime but an evolution into national security.
  • 11. www.Alt3.co.uk 11 In todays fragile economic climate … what if … … one of these critical service sectors was to be suddenly unavailable? There would be: • chaos • a momentum of chaos • an attempted sudden imposition of “control” from the centre • devaluation • potential social disintegration Welcome to the turbulent 21st century. You don’t have to defeat an army on the battlefield to win the war.
  • 12. www.Alt3.co.uk 12 In todays fragile economic climate … in the next 2-3 years … Cyber Warfare will become the number ONE priority for national security. (closely followed by terrorism and then rogue, extremist states – all of which are linked) And within this timeframe there will be at least one major global / regional intrusion episode with a severe damage probability. Do not make the mistake of thinking bad things just happen to other people.
  • 13. www.Alt3.co.uk 13 So, who’s doing this? • Major global / international powers o aggressive foreign policy o stealth warfare o seeking to steal IP and gain commercial benefit o even as a means of defence • Extremist states • Other countries • Extremist and anarchist groups including terrorists • Industrial espionage hackers • Mischief makers • … and we are The war is raging. It is gathering pace.
  • 14. www.Alt3.co.uk 14 Evidence? Full Scale and Massive Intrusion. The open secret: • large scale IP theft that can not take place without national knowledge – originally to steal commercial secrets, now mainly to steal the technology secrets that are at the core of modern defence systems • the constant probing of defences by potentially hostile powers – most developed countries now have a budget for cyber defence and often for cyber offence Dates for some major national level cyber attacks: • Baltic States – 2007 • Georgia – 2008 • Ukraine – 2014 • South Korea - 2014
  • 15. www.Alt3.co.uk 15 The point is … • it exists • it is a fact of life • it is more prevalent than most people realise • it is set to become even more prevalent • no one is immune to the potential consequences of cyber war In a highly competitive world when there is conflict or the risk of conflict (therefore the need to defend) countries want that low cost / low risk option.
  • 16. www.Alt3.co.uk 16 The targets of Cyber war – FACTS: 1. The world is becoming more “automated” – faster, more global, more communicative. 2. every time you make a phone call, every time you engage in a transaction, every time you visit a web page, every comment you make on line … you leave a footprint. This is “high availability” data. 3. every time an organisation electronically touches the outside world for any reason … they create their own footprint. Crucially, they do so through gateways. 4. If not guarded properly these on line gateways are in fact open doors. 5. Cyber warfare and a large proportion of cyber crime focuses on finding a route through these open doors or poorly guarded gateways. 6. This is “vulnerability”.
  • 17. www.Alt3.co.uk 17 What do we need to do? Understand the nature of vulnerability: • what are the national vulnerabilities? • do bad things really just happen to someone else? • what are the common international vulnerabilities? • from where are the common threats? • what is the common ground? Build alliances. • it’s not “us against the world”. There IS a shared threat and a common ground. The world is changing. The pace of change is increasing. Reach out. You will be surprised at who our friends are with whom we share a common goal.
  • 18. www.Alt3.co.uk 18 The Greatest Threat? Nationalism? The belief it’s us against the world and no one else can be trusted. FACT: • there are many of us who share the same threat • there are many of us who share the same vulnerabilities • shared defence creates greater security • this means mutual respect, benefits AND privacy • no one member is greater than any of the others This is our only viable future.
  • 19. www.Alt3.co.uk 19 2015 onward: Countries need to work together to form a common shield against: • rogue and aggressive states currently engaged in cyber warfare • the use of social media as a terrorist propaganda tool Police organisations need to work closely together to prevent: • organised crime / cyber criminals • paedophiles Business organisations need to be more aware of: • the changing nature of the threat against them • their vulnerability
  • 20. www.Alt3.co.uk 20 Thank you. If you don't understand the risks, how can you prepare? Can you afford to let the issues be blurred? james@alt3.co.uk