Advertisement

Google versus china the first cyber war

freelance IT writer and speaker, editorial and business consultant at David Strom Inc.
Jul. 28, 2010
Advertisement

More Related Content

Advertisement

Recently uploaded(20)

Google versus china the first cyber war

  1. Google v. China: Our first cyber war David Strom [email_address] (310) 857 6867 (c) David Strom http://strominator.com
  2. (c) David Strom http://strominator.com
  3. (c) David Strom http://strominator.com
  4. Hopkins APL 2009 (c) David Strom http://strominator.com
  5. (c) David Strom http://strominator.com
  6. Internet users (c) David Strom http://strominator.com
  7. (c) David Strom http://strominator.com
  8. What $26 gets you (c) David Strom http://strominator.com
  9. (c) David Strom http://strominator.com
  10. (c) David Strom http://strominator.com
  11. (c) David Strom http://strominator.com
  12. (c) David Strom http://strominator.com
  13. WHAT DO THESE ROOMS HAVE IN COMMON? (c) David Strom http://strominator.com
  14. (c) David Strom http://strominator.com
  15. (c) David Strom http://strominator.com
  16. Our new war tech (c) David Strom http://strominator.com
  17. (c) David Strom http://strominator.com
  18. Lockdown your laptops (c) David Strom http://strominator.com
  19. (c) David Strom http://strominator.com Encryption needs to be rule, not the exception
  20. (c) David Strom http://strominator.com

Editor's Notes

  1. Lets look at some of the more notable battles in this theater
  2. 1982 Russian pipeline control system virus attack that caused a major natural gas explosion Picture = trojan horse inserted into the control system, supervisory control and data acquisition systems of the pipeline
  3. Carefully controlled and hit all these military installations across the US
  4. Telephone switching computers Financial institutions Media and press Web sites
  5. Israeli jets were undetected by Syrian radar and were able to enter and nearly level this installation
  6. Highly controlled Highly targeted at 30 particular domains Long-lasting effort over several days shows coordination and purposeful Highly deniable and hard to assign source yet Korean language source was easily discoverable
  7. Had a data breach and had to disconnect from the Internet Clean each PC one at a time manully
  8. China allows Google to operate and redirect to google.hk Facebook, Twitter and You Tube are still blocked by China Mobile phones use competitive searches that are self-censored
  9. China has finally surpassed the US in terms of the sheer number of Internet users in the past few years.
  10. High ‘Net dependency Critical infrastructure is all online (power, pipelines, railroads, airlines) Most of these systems are controlled by private industry and unregulated R&D labs are all wide open to attack Most PCs have paper-thin defenses And then there is our forces…
  11. US military is more wired but also more dependent now on private contractors for its support, and this can be vulnerable to attackers
  12. Lets take a look at some of these vulnerabilities
  13. Most of us think that the China firewall to keep Chinese under control, but it also can stop malware and attackers from entry too! N. Korean July 4 th exercise was not to harm us, but to better protect themselves Quick disconnect in case of attack
  14. Lieberman has a bill to create an “Internet Kill Switch” in the hopes that we ca quickly disconnect in case of an attack.
  15. Level 3 link map – how hard would it be to turn this off? Again, because we have so many connections, hard to just use a single kill switch
  16. In China, their power grid is still mostly under manual control, an advantage during a cyber war
  17. Modern Ford-class carriers that are being built for the Navy – how many microprocessors are on this vessel, and how many different IP addressable devices?
  18. Is there anyone who knew about two years ago when this first surfaced? These are machines that are returned from lease, with hard drives full of confidential documents
  19. When the Obama transition team users complained about having locked-down Mac laptops when they tried to access public Wifi networks, Clarke “tried to quietly point out that if you are a senior member of the informal national security transition team, you probably should not be planning the takeover of the White House from a Starbucks.”
  20. At least the VPN can encrypt traffic to and from remote users
  21. Use whole disk encryption software and endpoint security tools so that if stolen or compromised, they will remain safe and contents not available
  22. Why has encrypted email taken so long to implement? Mostly because we are lazy.
  23. Passwords not on Post-its!
Advertisement