Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

of

Cyber Espionage: how to sell a country in 17 days! Slide 1 Cyber Espionage: how to sell a country in 17 days! Slide 2 Cyber Espionage: how to sell a country in 17 days! Slide 3 Cyber Espionage: how to sell a country in 17 days! Slide 4 Cyber Espionage: how to sell a country in 17 days! Slide 5 Cyber Espionage: how to sell a country in 17 days! Slide 6 Cyber Espionage: how to sell a country in 17 days! Slide 7 Cyber Espionage: how to sell a country in 17 days! Slide 8 Cyber Espionage: how to sell a country in 17 days! Slide 9 Cyber Espionage: how to sell a country in 17 days! Slide 10 Cyber Espionage: how to sell a country in 17 days! Slide 11 Cyber Espionage: how to sell a country in 17 days! Slide 12
Upcoming SlideShare
What to Upload to SlideShare
Next
Download to read offline and view in fullscreen.

0 Likes

Share

Download to read offline

Cyber Espionage: how to sell a country in 17 days!

Download to read offline

There is a perception that some countries - China in particular - is not playing fair game, invading privacy, trespassing security measures and disrespecting international intellectual property law. But are these fears well founded? Presented at the premier Hacking Conference Rootcon 6 held in Cebu, and following a recent four years stint in China from 2008-2012, speaker Morris Fedeli examines some of the facts and showcases Cyber Espionage: how to sell a country in 17 days!

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to like this

Cyber Espionage: how to sell a country in 17 days!

  1. 1. Presented by: Morris D Fedeli www.fedeli.nu Parklane Hotel, Cebu City, September 7th 2012
  2. 2. “It’s the great irony of our Information Age — the very technologies that empower us to create and to build also empower those who would disrupt and destroy.” The President Barack Obama On Securing Our Nation's Cyber Infrastructure 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 2
  3. 3. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 3
  4. 4. The EEA (ECONOMIC ESPIONAGE ACT) 1996 broadly defines “trade secret” to include all “forms and types of financial, business, scientific, technical, economic or engineering information . . . .” In order for the information to be considered a trade secret, its owner must “take reasonable measures to keep such information secret.” Therefore in the context of industrial espionage, misappropriation is simply “the deliberate taking of information one knows to belong to someone else, whether or not the misappropriator proceeds to use or disclose it.” 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 4
  5. 5. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 5
  6. 6. German KGB recruit on USA Google in China Russian attack on Estonia Opel vs Volkswagon GhostNet Canada vs China Stealth Fighter WikiLeaks Cybersitter 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 8
  7. 7. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 9
  8. 8. The TRIPS Agreement sets a minimum standards of intellectual property protection in all member nations. Its purpose, as set out in the preamble, is “to reduce distortions and impediments to international trade . . . to promote effective and adequate protection of intellectual property rights, and to ensure that measures and procedures to enforce intellectual property rights do not themselves become barriers to legitimate trade.” 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 10
  9. 9. Enable collaboration and co-evolution of man on an unprecedented scale and is leveling the playing field offering new, low cost and low risk opportunities for espionage. The art of Cyber Espionage practiced by a few is becoming a major tool in the modern world to gain advantage over corporate competitors and even between countries. 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 11
  10. 10. Cuckoo's Egg: http://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg _%28book%29 Cyber-Espionage: A Growing Threat to the American Economy : http://commlaw.cua.edu/res/docs/articles/v19/19- 1/11-v19-1-O-Hara-Final.pdf Chinese Hackers and Cyber Realpolitik: http://blog.damballa.com/?tag=cyber-espionage TRIPS: http://en.wikipedia.org/wiki/Agreement_on_Trade- Related_Aspects_of_Intellectual_Property_Rights China: Effects of Intellectual Property Infringement and Indigenous Innovation Policies on the U.S. Economy: http://www.usitc.gov/publications/332/pub4226.p df Safeguarding Australia Summit: http://www.safeguardingaustraliasummit.org.au/up loader/files/Cyber_Research_Paper_James_Farwell -2.pdf Wikipedia Espionage: http://en.wikipedia.org/wiki/Industrial_espionage Patent Infringement Update: http://www.infringementupdates.com/china/ Wikileaks and cyber espionage: http://xmaro.blogspot.com/2011/12/wikileaks- tracking-cyber-espionage.html Dr. James Canton, CEO Institute for Global Futures: http://www.globalfuturist.com/images/docs/The% 20Top%20Ten%20Cloud%20Computing%20and%20 Big%20Data%20Trends.pdf China: Effects of Intellectual Property Infringement and Indigenous Innovation Policies on the U.S. Economy : http://www.usitc.gov/publications/332/pub4226.p df President Obama on Security: http://www.whitehouse.gov/the-press- office/remarks-president-securing-our-nations- cyber-infrastructure CyberSitter:http://www.pcworld.com/article/18591 7/cybersitter_files_lawsuit_against_china_over_gre en_dam.html 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 12
  11. 11. Preventing cyber attacks requires much more than just a technical solution but also business, legal and diplomatic diligence 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 13
  12. 12. Presented by: Morris D Fedeli www.fedeli.nu BEWARE, we are all a target! The Means and Opportunity are here and now within the reach of many, lest we find those with Motive to do so! 9/3/2012 by Morris D Fedeli for ROOTCON 6, September 7th 2012 14

There is a perception that some countries - China in particular - is not playing fair game, invading privacy, trespassing security measures and disrespecting international intellectual property law. But are these fears well founded? Presented at the premier Hacking Conference Rootcon 6 held in Cebu, and following a recent four years stint in China from 2008-2012, speaker Morris Fedeli examines some of the facts and showcases Cyber Espionage: how to sell a country in 17 days!

Views

Total views

70

On Slideshare

0

From embeds

0

Number of embeds

2

Actions

Downloads

1

Shares

0

Comments

0

Likes

0

×