SlideShare a Scribd company logo
Presented by: Morris D Fedeli www.fedeli.nu
Parklane Hotel, Cebu City, September 7th 2012
“It’s the great irony of our Information
Age — the very technologies that
empower us to create and to build also
empower those who would disrupt and
destroy.”
The President Barack Obama
On Securing Our Nation's
Cyber Infrastructure
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
2
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
3
The EEA (ECONOMIC ESPIONAGE ACT) 1996
broadly defines “trade secret” to include all
“forms and types of financial, business, scientific,
technical, economic or engineering information . .
. .” In order for the information to be considered
a trade secret, its owner must “take reasonable
measures to keep such information secret.”
Therefore in the context of industrial espionage,
misappropriation is simply “the deliberate taking
of information one knows to belong to someone
else, whether or not the misappropriator
proceeds to use or disclose it.”
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
4
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
5
German KGB
recruit on USA
Google in China
Russian attack on
Estonia
Opel vs
Volkswagon
GhostNet Canada
vs China
Stealth Fighter
WikiLeaks
Cybersitter
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
8
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
9
The TRIPS Agreement sets a minimum standards of
intellectual property protection in all member
nations. Its purpose, as set out in the preamble, is
“to reduce distortions and impediments to
international trade . . . to promote effective and
adequate protection of intellectual property rights,
and to ensure that measures and procedures to
enforce intellectual property rights do not
themselves become barriers to legitimate trade.”
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
10
Enable collaboration and co-evolution of
man on an unprecedented scale and is
leveling the playing field offering new, low
cost and low risk opportunities for
espionage.
The art of Cyber Espionage practiced by a
few is becoming a major tool in the modern
world to gain advantage over corporate
competitors and even between countries.
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
11
Cuckoo's Egg:
http://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg
_%28book%29
Cyber-Espionage: A Growing Threat to the
American Economy :
http://commlaw.cua.edu/res/docs/articles/v19/19-
1/11-v19-1-O-Hara-Final.pdf
Chinese Hackers and Cyber Realpolitik:
http://blog.damballa.com/?tag=cyber-espionage
TRIPS:
http://en.wikipedia.org/wiki/Agreement_on_Trade-
Related_Aspects_of_Intellectual_Property_Rights
China: Effects of Intellectual Property Infringement
and Indigenous Innovation Policies on the U.S.
Economy:
http://www.usitc.gov/publications/332/pub4226.p
df
Safeguarding Australia Summit:
http://www.safeguardingaustraliasummit.org.au/up
loader/files/Cyber_Research_Paper_James_Farwell
-2.pdf
Wikipedia Espionage:
http://en.wikipedia.org/wiki/Industrial_espionage
Patent Infringement Update:
http://www.infringementupdates.com/china/
Wikileaks and cyber espionage:
http://xmaro.blogspot.com/2011/12/wikileaks-
tracking-cyber-espionage.html
Dr. James Canton, CEO Institute for Global Futures:
http://www.globalfuturist.com/images/docs/The%
20Top%20Ten%20Cloud%20Computing%20and%20
Big%20Data%20Trends.pdf
China: Effects of Intellectual Property Infringement
and Indigenous Innovation Policies on the U.S.
Economy :
http://www.usitc.gov/publications/332/pub4226.p
df
President Obama on Security:
http://www.whitehouse.gov/the-press-
office/remarks-president-securing-our-nations-
cyber-infrastructure
CyberSitter:http://www.pcworld.com/article/18591
7/cybersitter_files_lawsuit_against_china_over_gre
en_dam.html
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
12
Preventing cyber attacks
requires much more than
just a technical solution but
also business, legal and
diplomatic diligence
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
13
Presented by: Morris D Fedeli www.fedeli.nu
BEWARE, we are all a target!
The Means and Opportunity are here and now within the
reach of many, lest we find those with Motive to do so!
9/3/2012
by Morris D Fedeli for ROOTCON 6,
September 7th 2012
14

More Related Content

Similar to Cyber Espionage: how to sell a country in 17 days!

News letter aug 13
News letter aug 13News letter aug 13
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Dr. Lydia Kostopoulos
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
IJNSA Journal
 
Security in the Era of Big M2M Data
Security in the Era of Big M2M DataSecurity in the Era of Big M2M Data
Security in the Era of Big M2M Data
Glen Koskela
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
LaVerne Kemp
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
LaVerne Kemp
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
Signals Defense, LLC
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
Conference Papers
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
IJNSA Journal
 
Gibson final
Gibson  finalGibson  final
Gibson final
JennaHajhassan
 
ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and Security
EMC
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
Marco Morana
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
Steve Mitchinson
 
Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?
Robert Bromwich
 
Computer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageComputer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate Espionage
IRJET Journal
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 acta
Eddan Katz
 

Similar to Cyber Espionage: how to sell a country in 17 days! (20)

News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Security in the Era of Big M2M Data
Security in the Era of Big M2M DataSecurity in the Era of Big M2M Data
Security in the Era of Big M2M Data
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Gibson final
Gibson  finalGibson  final
Gibson final
 
ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism Analysis
 
Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and Security
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?Government Access Cards: A key to fraud and identity theft reduction?
Government Access Cards: A key to fraud and identity theft reduction?
 
Computer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageComputer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate Espionage
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 acta
 

More from Morris Fedeli MBA | Sustainable Business Solutions

Thrive SPS Brochure v2.2
Thrive SPS Brochure v2.2Thrive SPS Brochure v2.2
Thrive sps brochure v2.2
Thrive sps brochure v2.2Thrive sps brochure v2.2
Thrive SPS brochure
Thrive SPS brochureThrive SPS brochure
Unicorn company distribution worldwide
Unicorn company distribution worldwideUnicorn company distribution worldwide
Unicorn company distribution worldwide
Morris Fedeli MBA | Sustainable Business Solutions
 
Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...
Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...
Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...
Morris Fedeli MBA | Sustainable Business Solutions
 
The challenges of transitions towards a more sustainable business v1.3
The challenges of transitions towards a more sustainable business v1.3The challenges of transitions towards a more sustainable business v1.3
The challenges of transitions towards a more sustainable business v1.3
Morris Fedeli MBA | Sustainable Business Solutions
 
Third conference on NBM - Sofia, Bulgaria 2018
Third conference on NBM - Sofia, Bulgaria 2018Third conference on NBM - Sofia, Bulgaria 2018
Third conference on NBM - Sofia, Bulgaria 2018
Morris Fedeli MBA | Sustainable Business Solutions
 

More from Morris Fedeli MBA | Sustainable Business Solutions (7)

Thrive SPS Brochure v2.2
Thrive SPS Brochure v2.2Thrive SPS Brochure v2.2
Thrive SPS Brochure v2.2
 
Thrive sps brochure v2.2
Thrive sps brochure v2.2Thrive sps brochure v2.2
Thrive sps brochure v2.2
 
Thrive SPS brochure
Thrive SPS brochureThrive SPS brochure
Thrive SPS brochure
 
Unicorn company distribution worldwide
Unicorn company distribution worldwideUnicorn company distribution worldwide
Unicorn company distribution worldwide
 
Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...
Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...
Fedeli the challenges_of_transitions_towards_a_more_sustainable_business-busi...
 
The challenges of transitions towards a more sustainable business v1.3
The challenges of transitions towards a more sustainable business v1.3The challenges of transitions towards a more sustainable business v1.3
The challenges of transitions towards a more sustainable business v1.3
 
Third conference on NBM - Sofia, Bulgaria 2018
Third conference on NBM - Sofia, Bulgaria 2018Third conference on NBM - Sofia, Bulgaria 2018
Third conference on NBM - Sofia, Bulgaria 2018
 

Recently uploaded

Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...
APNIC
 
IPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security ConsiderationsIPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security Considerations
Bangladesh Network Operators Group
 
Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...
Edward Blurock
 
Software Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical ImplementationsSoftware Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical Implementations
Bangladesh Network Operators Group
 
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
QingjieDu1
 
Open Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using GraylogOpen Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using Graylog
Bangladesh Network Operators Group
 
Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18
Bangladesh Network Operators Group
 
Rent remote desktop server mangohost .net
Rent remote desktop server mangohost .netRent remote desktop server mangohost .net
Rent remote desktop server mangohost .net
pdfsubmission50
 
University of California, Riverside diploma
University of California, Riverside diplomaUniversity of California, Riverside diploma
University of California, Riverside diploma
eufdev
 
Study of international anticancer research trends.pdf
Study of international anticancer research trends.pdfStudy of international anticancer research trends.pdf
Study of international anticancer research trends.pdf
Preston University
 
Portugal Dreamin 24 - How to easily use an API with Flows
Portugal Dreamin 24  - How to easily use an API with FlowsPortugal Dreamin 24  - How to easily use an API with Flows
Portugal Dreamin 24 - How to easily use an API with Flows
Thierry TROUIN ☁
 
How God led me to DTS? Through many different signs and connections that I c...
How God led me to DTS? Through many different signs and connections that  I c...How God led me to DTS? Through many different signs and connections that  I c...
How God led me to DTS? Through many different signs and connections that I c...
AshishMohan57
 
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdfTop 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
Krishna L
 
New York Institute of Technology degree Cert diploma offer
New York Institute of Technology degree Cert diploma offerNew York Institute of Technology degree Cert diploma offer
New York Institute of Technology degree Cert diploma offer
ubovu
 
Network Security version1.0 - Module 3.pptx
Network Security version1.0 - Module 3.pptxNetwork Security version1.0 - Module 3.pptx
Network Security version1.0 - Module 3.pptx
Infotainmentforall
 
Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)
Bangladesh Network Operators Group
 
Trump fist pump t shirts Trump fist pump t shirts
Trump fist pump t shirts Trump fist pump t shirtsTrump fist pump t shirts Trump fist pump t shirts
Trump fist pump t shirts Trump fist pump t shirts
exgf28
 
Trump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination ShirtTrump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination Shirt
exgf28
 
Understanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat IntelligenceUnderstanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat Intelligence
Lumiverse Solutions Pvt Ltd
 
Do it again anti Republican shirt Do it again anti Republican shirt
Do it again anti Republican shirt Do it again anti Republican shirtDo it again anti Republican shirt Do it again anti Republican shirt
Do it again anti Republican shirt Do it again anti Republican shirt
exgf28
 

Recently uploaded (20)

Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...
 
IPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security ConsiderationsIPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security Considerations
 
Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...Ontology for the semantic enhancement, database definition and management and...
Ontology for the semantic enhancement, database definition and management and...
 
Software Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical ImplementationsSoftware Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical Implementations
 
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
 
Open Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using GraylogOpen Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using Graylog
 
Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18
 
Rent remote desktop server mangohost .net
Rent remote desktop server mangohost .netRent remote desktop server mangohost .net
Rent remote desktop server mangohost .net
 
University of California, Riverside diploma
University of California, Riverside diplomaUniversity of California, Riverside diploma
University of California, Riverside diploma
 
Study of international anticancer research trends.pdf
Study of international anticancer research trends.pdfStudy of international anticancer research trends.pdf
Study of international anticancer research trends.pdf
 
Portugal Dreamin 24 - How to easily use an API with Flows
Portugal Dreamin 24  - How to easily use an API with FlowsPortugal Dreamin 24  - How to easily use an API with Flows
Portugal Dreamin 24 - How to easily use an API with Flows
 
How God led me to DTS? Through many different signs and connections that I c...
How God led me to DTS? Through many different signs and connections that  I c...How God led me to DTS? Through many different signs and connections that  I c...
How God led me to DTS? Through many different signs and connections that I c...
 
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdfTop 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
 
New York Institute of Technology degree Cert diploma offer
New York Institute of Technology degree Cert diploma offerNew York Institute of Technology degree Cert diploma offer
New York Institute of Technology degree Cert diploma offer
 
Network Security version1.0 - Module 3.pptx
Network Security version1.0 - Module 3.pptxNetwork Security version1.0 - Module 3.pptx
Network Security version1.0 - Module 3.pptx
 
Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)
 
Trump fist pump t shirts Trump fist pump t shirts
Trump fist pump t shirts Trump fist pump t shirtsTrump fist pump t shirts Trump fist pump t shirts
Trump fist pump t shirts Trump fist pump t shirts
 
Trump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination ShirtTrump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination Shirt
 
Understanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat IntelligenceUnderstanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat Intelligence
 
Do it again anti Republican shirt Do it again anti Republican shirt
Do it again anti Republican shirt Do it again anti Republican shirtDo it again anti Republican shirt Do it again anti Republican shirt
Do it again anti Republican shirt Do it again anti Republican shirt
 

Cyber Espionage: how to sell a country in 17 days!

  • 1. Presented by: Morris D Fedeli www.fedeli.nu Parklane Hotel, Cebu City, September 7th 2012
  • 2. “It’s the great irony of our Information Age — the very technologies that empower us to create and to build also empower those who would disrupt and destroy.” The President Barack Obama On Securing Our Nation's Cyber Infrastructure 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 2
  • 3. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 3
  • 4. The EEA (ECONOMIC ESPIONAGE ACT) 1996 broadly defines “trade secret” to include all “forms and types of financial, business, scientific, technical, economic or engineering information . . . .” In order for the information to be considered a trade secret, its owner must “take reasonable measures to keep such information secret.” Therefore in the context of industrial espionage, misappropriation is simply “the deliberate taking of information one knows to belong to someone else, whether or not the misappropriator proceeds to use or disclose it.” 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 4
  • 5. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 5
  • 6. German KGB recruit on USA Google in China Russian attack on Estonia Opel vs Volkswagon GhostNet Canada vs China Stealth Fighter WikiLeaks Cybersitter 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 8
  • 7. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 9
  • 8. The TRIPS Agreement sets a minimum standards of intellectual property protection in all member nations. Its purpose, as set out in the preamble, is “to reduce distortions and impediments to international trade . . . to promote effective and adequate protection of intellectual property rights, and to ensure that measures and procedures to enforce intellectual property rights do not themselves become barriers to legitimate trade.” 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 10
  • 9. Enable collaboration and co-evolution of man on an unprecedented scale and is leveling the playing field offering new, low cost and low risk opportunities for espionage. The art of Cyber Espionage practiced by a few is becoming a major tool in the modern world to gain advantage over corporate competitors and even between countries. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 11
  • 10. Cuckoo's Egg: http://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg _%28book%29 Cyber-Espionage: A Growing Threat to the American Economy : http://commlaw.cua.edu/res/docs/articles/v19/19- 1/11-v19-1-O-Hara-Final.pdf Chinese Hackers and Cyber Realpolitik: http://blog.damballa.com/?tag=cyber-espionage TRIPS: http://en.wikipedia.org/wiki/Agreement_on_Trade- Related_Aspects_of_Intellectual_Property_Rights China: Effects of Intellectual Property Infringement and Indigenous Innovation Policies on the U.S. Economy: http://www.usitc.gov/publications/332/pub4226.p df Safeguarding Australia Summit: http://www.safeguardingaustraliasummit.org.au/up loader/files/Cyber_Research_Paper_James_Farwell -2.pdf Wikipedia Espionage: http://en.wikipedia.org/wiki/Industrial_espionage Patent Infringement Update: http://www.infringementupdates.com/china/ Wikileaks and cyber espionage: http://xmaro.blogspot.com/2011/12/wikileaks- tracking-cyber-espionage.html Dr. James Canton, CEO Institute for Global Futures: http://www.globalfuturist.com/images/docs/The% 20Top%20Ten%20Cloud%20Computing%20and%20 Big%20Data%20Trends.pdf China: Effects of Intellectual Property Infringement and Indigenous Innovation Policies on the U.S. Economy : http://www.usitc.gov/publications/332/pub4226.p df President Obama on Security: http://www.whitehouse.gov/the-press- office/remarks-president-securing-our-nations- cyber-infrastructure CyberSitter:http://www.pcworld.com/article/18591 7/cybersitter_files_lawsuit_against_china_over_gre en_dam.html 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 12
  • 11. Preventing cyber attacks requires much more than just a technical solution but also business, legal and diplomatic diligence 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 13
  • 12. Presented by: Morris D Fedeli www.fedeli.nu BEWARE, we are all a target! The Means and Opportunity are here and now within the reach of many, lest we find those with Motive to do so! 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 14