Lets look at some of the more notable battles in this theater
1982 Russian pipeline control system virus attack that caused a major natural gas explosion Picture = trojan horse inserted into the control system, supervisory control and data acquisition systems of the pipeline
Carefully controlled and hit all these military installations across the US
Telephone switching computers Financial institutions Media and press Web sites
Israeli jets were undetected by Syrian radar and were able to enter and nearly level this installation
Highly controlled Highly targeted at 30 particular domains Long-lasting effort over several days shows coordination and purposeful Highly deniable and hard to assign source yet Korean language source was easily discoverable
Had a data breach and had to disconnect from the Internet Clean each PC one at a time manully
China allows Google to operate and redirect to google.hk Facebook, Twitter and You Tube are still blocked by China Mobile phones use competitive searches that are self-censored
China has finally surpassed the US in terms of the sheer number of Internet users in the past few years.
High ‘Net dependency Critical infrastructure is all online (power, pipelines, railroads, airlines) Most of these systems are controlled by private industry and unregulated R&D labs are all wide open to attack Most PCs have paper-thin defenses And then there is our forces…
US military is more wired but also more dependent now on private contractors for its support, and this can be vulnerable to attackers
Lets take a look at some of these vulnerabilities
Most of us think that the China firewall to keep Chinese under control, but it also can stop malware and attackers from entry too! N. Korean July 4 th exercise was not to harm us, but to better protect themselves Quick disconnect in case of attack
Lieberman has a bill to create an “Internet Kill Switch” in the hopes that we ca quickly disconnect in case of an attack.
Level 3 link map – how hard would it be to turn this off? Again, because we have so many connections, hard to just use a single kill switch
In China, their power grid is still mostly under manual control, an advantage during a cyber war
Modern Ford-class carriers that are being built for the Navy – how many microprocessors are on this vessel, and how many different IP addressable devices?
Is there anyone who knew about two years ago when this first surfaced? These are machines that are returned from lease, with hard drives full of confidential documents
When the Obama transition team users complained about having locked-down Mac laptops when they tried to access public Wifi networks, Clarke “tried to quietly point out that if you are a senior member of the informal national security transition team, you probably should not be planning the takeover of the White House from a Starbucks.”
At least the VPN can encrypt traffic to and from remote users
Use whole disk encryption software and endpoint security tools so that if stolen or compromised, they will remain safe and contents not available
Why has encrypted email taken so long to implement? Mostly because we are lazy.