SlideShare a Scribd company logo
Cloaking Devices,Cloaking Devices,
CyberPersonas, andCyberPersonas, and
Neutral ZonesNeutral Zones
Everyone a TargetEveryone a Target
Protect the Border?Protect the Border?
Law EnforcementLaw Enforcement
BeatingBeating
CyberCrime?CyberCrime?
Email ProtocolEmail Protocol
To: From:To: From:
Subject:Subject:
IP sender and Client Operating System:IP sender and Client Operating System:
Web HTTPWeb HTTP
Authentication Token and Session CookieAuthentication Token and Session Cookie
Client Browser and Client Operating SystemClient Browser and Client Operating System
All Behavior isAll Behavior is
ANALYZEDANALYZED
Believing in aBelieving in a
Permissive (Yet Dangerous) SocietyPermissive (Yet Dangerous) Society
We RationalizeWe Rationalize
OverwatchOverwatch
• I have nothing to hide!
• My life will bore you.
• I don’t break the law.
• The Government Keeps
Us Safe
•
Secure the Blessings of LibertySecure the Blessings of Liberty
We the people of the United States, in order to form a more perfect union, ..., and secure the blessings of
liberty to ourselves and our posterity, do ordain and establish this Constitution for the United States of
America.
Liberty is Core to ourLiberty is Core to our
Constitutional RepublicConstitutional Republic
What is Liberty /What is Liberty /
Freedom?Freedom?
λευθερίαν (eleutherian)ἐ
What is Liberty /What is Liberty /
Freedom?Freedom?
λευθερίαν (eleutherian)ἐ
Privacy is LibertyPrivacy is Liberty’’s Guardians Guardian
Privacy protects againstPrivacy protects against
man-made interestman-made interest
conflictsconflicts
Moral Judgement and CondemnationMoral Judgement and Condemnation
Unfair Competition and DiscriminationUnfair Competition and Discrimination
Clashing man-made Federal, State, and LocalClashing man-made Federal, State, and Local
LawsLaws
Conflict of InterestConflict of Interest
ExampleExample
Even if you love your weed,Even if you love your weed,
Bong Hits and Firearms donBong Hits and Firearms don’’t mix...t mix...
Conflict of RegulationConflict of Regulation
ExampleExample
What qualifies asWhat qualifies as mentallymentally
defectivedefective??
Seeing a psychologist at aSeeing a psychologist at a
hospital?hospital?
Points of RebellionPoints of Rebellion
(1969)(1969)
•
“Big Brother in the form of an increasingly powerful
government and in an increasingly powerful private
sector will pile the records high with reasons why
privacy should give way to national security, to law
and order, to efficiency of operation, to scientific
advancement and the like."
• William O. Douglas (1898-1980)
• U. S. Supreme Court Justice
Privacy Under Siege OnlinePrivacy Under Siege Online
The right of the people to be secure in their persons,
houses, papers, and effects
With everyone watching,With everyone watching,
Cyber Free Trade ZoneCyber Free Trade Zone
Anonymous
Untraceable and Trusted
Decentralize
Peer to Peer Edge Cloud Interactions
safely share
Your Intent, Dreams, Passion, Goals
and products or services
karux Trade Crossmatch
Decentralized, Private Digital Interactions and Transactions
Cloaking Devices,Cloaking Devices,
CyberPersonas, andCyberPersonas, and
Neutral ZonesNeutral Zones

More Related Content

Viewers also liked

Eight Miles High: Build Cloud-native and Cloud-aware Systems
Eight Miles High: Build Cloud-native and Cloud-aware SystemsEight Miles High: Build Cloud-native and Cloud-aware Systems
Eight Miles High: Build Cloud-native and Cloud-aware Systems
Chris Haddad
 
High Productivity Platform
High Productivity PlatformHigh Productivity Platform
High Productivity Platform
Chris Haddad
 
Lightweight ESB Alternatives
Lightweight ESB AlternativesLightweight ESB Alternatives
Lightweight ESB Alternatives
Chris Haddad
 
Steampunk App Servers in
Steampunk App Servers in Steampunk App Servers in
Steampunk App Servers in
Chris Haddad
 
Overcome DevOps Adoption Barriers to Accelerate Software Delivery
Overcome DevOps Adoption Barriers to Accelerate Software DeliveryOvercome DevOps Adoption Barriers to Accelerate Software Delivery
Overcome DevOps Adoption Barriers to Accelerate Software Delivery
Chris Haddad
 
Who is Accessing My API?
Who is Accessing My API?Who is Accessing My API?
Who is Accessing My API?
Chris Haddad
 
Bring N-Tier Apps to containers 2015 ContainerCon
Bring N-Tier Apps to containers  2015 ContainerConBring N-Tier Apps to containers  2015 ContainerCon
Bring N-Tier Apps to containers 2015 ContainerCon
Chris Haddad
 
Merging microservices architecture with SOA practices
Merging microservices architecture with SOA practicesMerging microservices architecture with SOA practices
Merging microservices architecture with SOA practices
Chris Haddad
 
Deploy at scale with CoreOS Kubernetes and Apache Stratos
Deploy at scale with CoreOS Kubernetes and Apache StratosDeploy at scale with CoreOS Kubernetes and Apache Stratos
Deploy at scale with CoreOS Kubernetes and Apache Stratos
Chris Haddad
 
Enabling cloud-native, complex enterprise development and deployment in the C...
Enabling cloud-native, complex enterprise development and deployment in the C...Enabling cloud-native, complex enterprise development and deployment in the C...
Enabling cloud-native, complex enterprise development and deployment in the C...
Chris Haddad
 
Container World 2017!
Container World 2017!Container World 2017!
Container World 2017!
kgraham32
 
Surviving Huge Growth by Driving Huge Change
Surviving Huge Growth by Driving Huge ChangeSurviving Huge Growth by Driving Huge Change
Surviving Huge Growth by Driving Huge Change
Service Strategies
 
Guest University Lecture - My Experience As a Pro-Blogger & Online Freelance ...
Guest University Lecture - My Experience As a Pro-Blogger & Online Freelance ...Guest University Lecture - My Experience As a Pro-Blogger & Online Freelance ...
Guest University Lecture - My Experience As a Pro-Blogger & Online Freelance ...
Neerav Bhatt
 
Responsive IT and Connected Business
Responsive IT and Connected BusinessResponsive IT and Connected Business
Responsive IT and Connected BusinessChris Haddad
 
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Chris Haddad
 
Nba2 K9完全菜单翻译指南
Nba2 K9完全菜单翻译指南Nba2 K9完全菜单翻译指南
Nba2 K9完全菜单翻译指南guestff917b6
 
2009 AIA Wisconsin Design Awards Entries
2009 AIA Wisconsin Design Awards Entries2009 AIA Wisconsin Design Awards Entries
2009 AIA Wisconsin Design Awards Entries
Brenda Taylor
 
Hire Power
Hire PowerHire Power
Hire Power
guestb8e9ce
 
Pegasus PR, Lisa Faulkner, actress, 2008
Pegasus PR, Lisa Faulkner, actress, 2008Pegasus PR, Lisa Faulkner, actress, 2008
Pegasus PR, Lisa Faulkner, actress, 2008
Jon Bradley
 

Viewers also liked (20)

Eight Miles High: Build Cloud-native and Cloud-aware Systems
Eight Miles High: Build Cloud-native and Cloud-aware SystemsEight Miles High: Build Cloud-native and Cloud-aware Systems
Eight Miles High: Build Cloud-native and Cloud-aware Systems
 
High Productivity Platform
High Productivity PlatformHigh Productivity Platform
High Productivity Platform
 
Lightweight ESB Alternatives
Lightweight ESB AlternativesLightweight ESB Alternatives
Lightweight ESB Alternatives
 
Steampunk App Servers in
Steampunk App Servers in Steampunk App Servers in
Steampunk App Servers in
 
Overcome DevOps Adoption Barriers to Accelerate Software Delivery
Overcome DevOps Adoption Barriers to Accelerate Software DeliveryOvercome DevOps Adoption Barriers to Accelerate Software Delivery
Overcome DevOps Adoption Barriers to Accelerate Software Delivery
 
Who is Accessing My API?
Who is Accessing My API?Who is Accessing My API?
Who is Accessing My API?
 
Bring N-Tier Apps to containers 2015 ContainerCon
Bring N-Tier Apps to containers  2015 ContainerConBring N-Tier Apps to containers  2015 ContainerCon
Bring N-Tier Apps to containers 2015 ContainerCon
 
Merging microservices architecture with SOA practices
Merging microservices architecture with SOA practicesMerging microservices architecture with SOA practices
Merging microservices architecture with SOA practices
 
Deploy at scale with CoreOS Kubernetes and Apache Stratos
Deploy at scale with CoreOS Kubernetes and Apache StratosDeploy at scale with CoreOS Kubernetes and Apache Stratos
Deploy at scale with CoreOS Kubernetes and Apache Stratos
 
Enabling cloud-native, complex enterprise development and deployment in the C...
Enabling cloud-native, complex enterprise development and deployment in the C...Enabling cloud-native, complex enterprise development and deployment in the C...
Enabling cloud-native, complex enterprise development and deployment in the C...
 
Container World 2017!
Container World 2017!Container World 2017!
Container World 2017!
 
Dance Image Review
Dance Image ReviewDance Image Review
Dance Image Review
 
Surviving Huge Growth by Driving Huge Change
Surviving Huge Growth by Driving Huge ChangeSurviving Huge Growth by Driving Huge Change
Surviving Huge Growth by Driving Huge Change
 
Guest University Lecture - My Experience As a Pro-Blogger & Online Freelance ...
Guest University Lecture - My Experience As a Pro-Blogger & Online Freelance ...Guest University Lecture - My Experience As a Pro-Blogger & Online Freelance ...
Guest University Lecture - My Experience As a Pro-Blogger & Online Freelance ...
 
Responsive IT and Connected Business
Responsive IT and Connected BusinessResponsive IT and Connected Business
Responsive IT and Connected Business
 
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
Achieve business agility with Cloud APIs, Cloud-aware Apps, and Cloud DevOps ...
 
Nba2 K9完全菜单翻译指南
Nba2 K9完全菜单翻译指南Nba2 K9完全菜单翻译指南
Nba2 K9完全菜单翻译指南
 
2009 AIA Wisconsin Design Awards Entries
2009 AIA Wisconsin Design Awards Entries2009 AIA Wisconsin Design Awards Entries
2009 AIA Wisconsin Design Awards Entries
 
Hire Power
Hire PowerHire Power
Hire Power
 
Pegasus PR, Lisa Faulkner, actress, 2008
Pegasus PR, Lisa Faulkner, actress, 2008Pegasus PR, Lisa Faulkner, actress, 2008
Pegasus PR, Lisa Faulkner, actress, 2008
 

Similar to Cloaking Devices, CyberPersonas, and Neutral Zones

Whistle blowing----Jin Xu
Whistle blowing----Jin XuWhistle blowing----Jin Xu
Whistle blowing----Jin XuTruking
 
Apa Article Review Template Database
Apa Article Review Template DatabaseApa Article Review Template Database
Apa Article Review Template Database
Anita Strong
 
Importance of Pushing Boundaries & Resilience in the Face of Adversity | Bran...
Importance of Pushing Boundaries & Resilience in the Face of Adversity | Bran...Importance of Pushing Boundaries & Resilience in the Face of Adversity | Bran...
Importance of Pushing Boundaries & Resilience in the Face of Adversity | Bran...
Jessica Tams
 
Civil Liberties
Civil LibertiesCivil Liberties
Civil Liberties
Chris Thomas
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
orrenprunckun
 
Technology and the End Times
Technology and the End TimesTechnology and the End Times
Technology and the End Times
Cybermissions
 
015 Closing Sentences For Essays Essay Example Thatsnotus
015 Closing Sentences For Essays Essay Example  Thatsnotus015 Closing Sentences For Essays Essay Example  Thatsnotus
015 Closing Sentences For Essays Essay Example Thatsnotus
Andrea Arias
 
An Overview of Law EnforcementVictimization is more likely.docx
An Overview of Law EnforcementVictimization is more likely.docxAn Overview of Law EnforcementVictimization is more likely.docx
An Overview of Law EnforcementVictimization is more likely.docx
daniahendric
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
Ryland Sherman
 
Mobile Phones ShouldnT Be Allowed In School Essay
Mobile Phones ShouldnT Be Allowed In School EssayMobile Phones ShouldnT Be Allowed In School Essay
Mobile Phones ShouldnT Be Allowed In School Essay
Megan Bryant
 
Admission College Essay Help Xavier University Xavi
Admission College Essay Help Xavier University XaviAdmission College Essay Help Xavier University Xavi
Admission College Essay Help Xavier University Xavi
Karen Harkavy
 
015 Essay Example Cite An Step Version How To We
015 Essay Example Cite An Step Version How To We015 Essay Example Cite An Step Version How To We
015 Essay Example Cite An Step Version How To We
Lisa Graves
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
Hinne Hettema
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussionguest62b6b81
 
Chap5
Chap5Chap5
Chap5
shoetzlein
 
Examples Of Catchy Essay Titles
Examples Of Catchy Essay TitlesExamples Of Catchy Essay Titles
Examples Of Catchy Essay Titles
Lisa Wera
 
Instructions To Write A Thematic Essay Total Assignment Help
Instructions To Write A Thematic Essay Total Assignment HelpInstructions To Write A Thematic Essay Total Assignment Help
Instructions To Write A Thematic Essay Total Assignment Help
Mellisa Hedeen
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
Brian Rowe
 
250 Words Essay Help With Your Paper.
250 Words Essay Help With Your Paper.250 Words Essay Help With Your Paper.
250 Words Essay Help With Your Paper.
Jenny Richardson
 

Similar to Cloaking Devices, CyberPersonas, and Neutral Zones (20)

Whistle blowing----Jin Xu
Whistle blowing----Jin XuWhistle blowing----Jin Xu
Whistle blowing----Jin Xu
 
Apa Article Review Template Database
Apa Article Review Template DatabaseApa Article Review Template Database
Apa Article Review Template Database
 
Importance of Pushing Boundaries & Resilience in the Face of Adversity | Bran...
Importance of Pushing Boundaries & Resilience in the Face of Adversity | Bran...Importance of Pushing Boundaries & Resilience in the Face of Adversity | Bran...
Importance of Pushing Boundaries & Resilience in the Face of Adversity | Bran...
 
Civil Liberties
Civil LibertiesCivil Liberties
Civil Liberties
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
 
Technology and the End Times
Technology and the End TimesTechnology and the End Times
Technology and the End Times
 
015 Closing Sentences For Essays Essay Example Thatsnotus
015 Closing Sentences For Essays Essay Example  Thatsnotus015 Closing Sentences For Essays Essay Example  Thatsnotus
015 Closing Sentences For Essays Essay Example Thatsnotus
 
An Overview of Law EnforcementVictimization is more likely.docx
An Overview of Law EnforcementVictimization is more likely.docxAn Overview of Law EnforcementVictimization is more likely.docx
An Overview of Law EnforcementVictimization is more likely.docx
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Mobile Phones ShouldnT Be Allowed In School Essay
Mobile Phones ShouldnT Be Allowed In School EssayMobile Phones ShouldnT Be Allowed In School Essay
Mobile Phones ShouldnT Be Allowed In School Essay
 
Admission College Essay Help Xavier University Xavi
Admission College Essay Help Xavier University XaviAdmission College Essay Help Xavier University Xavi
Admission College Essay Help Xavier University Xavi
 
015 Essay Example Cite An Step Version How To We
015 Essay Example Cite An Step Version How To We015 Essay Example Cite An Step Version How To We
015 Essay Example Cite An Step Version How To We
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
661 lead discussion
661   lead discussion661   lead discussion
661 lead discussion
 
Chap5
Chap5Chap5
Chap5
 
Examples Of Catchy Essay Titles
Examples Of Catchy Essay TitlesExamples Of Catchy Essay Titles
Examples Of Catchy Essay Titles
 
Instructions To Write A Thematic Essay Total Assignment Help
Instructions To Write A Thematic Essay Total Assignment HelpInstructions To Write A Thematic Essay Total Assignment Help
Instructions To Write A Thematic Essay Total Assignment Help
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
INFLICTED TI LEGAL ABUSE 101
INFLICTED TI LEGAL ABUSE 101INFLICTED TI LEGAL ABUSE 101
INFLICTED TI LEGAL ABUSE 101
 
250 Words Essay Help With Your Paper.
250 Words Essay Help With Your Paper.250 Words Essay Help With Your Paper.
250 Words Essay Help With Your Paper.
 

More from Chris Haddad

Connected Architecture Fabric Creating a Connected World
Connected Architecture Fabric Creating a Connected WorldConnected Architecture Fabric Creating a Connected World
Connected Architecture Fabric Creating a Connected World
Chris Haddad
 
Establishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise ArchitectureEstablishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise Architecture
Chris Haddad
 
Java PaaS Apache Stratos
Java PaaS   Apache StratosJava PaaS   Apache Stratos
Java PaaS Apache Stratos
Chris Haddad
 
Spreadsheets To API
Spreadsheets To APISpreadsheets To API
Spreadsheets To APIChris Haddad
 
Six Steps To Build A Successful API
Six Steps To Build A Successful APISix Steps To Build A Successful API
Six Steps To Build A Successful API
Chris Haddad
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and RewardChris Haddad
 
Gaining Startup Speed with DevOps PaaS
Gaining Startup Speed with DevOps PaaSGaining Startup Speed with DevOps PaaS
Gaining Startup Speed with DevOps PaaS
Chris Haddad
 
Business driven IT design
Business driven IT designBusiness driven IT design
Business driven IT designChris Haddad
 
SOA and API Convergence Strategy and Tactics
SOA and API Convergence Strategy and TacticsSOA and API Convergence Strategy and Tactics
SOA and API Convergence Strategy and Tactics
Chris Haddad
 
Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...
Chris Haddad
 
Why Reshape Reference Architecture
Why Reshape Reference ArchitectureWhy Reshape Reference Architecture
Why Reshape Reference Architecture
Chris Haddad
 
What reference architecture models to adopt
What reference architecture models to adoptWhat reference architecture models to adopt
What reference architecture models to adopt
Chris Haddad
 
How to reshape reference architecture
How to reshape reference architectureHow to reshape reference architecture
How to reshape reference architecture
Chris Haddad
 
Promote Your API Brand and Extend Your API Reach
Promote Your API Brand and Extend Your API ReachPromote Your API Brand and Extend Your API Reach
Promote Your API Brand and Extend Your API Reach
Chris Haddad
 
Stratos AppFactory in the Cloud tampa meetup-2013-09
Stratos AppFactory in the Cloud tampa meetup-2013-09Stratos AppFactory in the Cloud tampa meetup-2013-09
Stratos AppFactory in the Cloud tampa meetup-2013-09Chris Haddad
 
Driving Enterprise Architecture Redesign: Cloud-Native Platforms, APIs, and D...
Driving Enterprise Architecture Redesign: Cloud-Native Platforms, APIs, and D...Driving Enterprise Architecture Redesign: Cloud-Native Platforms, APIs, and D...
Driving Enterprise Architecture Redesign: Cloud-Native Platforms, APIs, and D...
Chris Haddad
 
Bridging IaaS With PaaS To Deliver The Service-Oriented Data Center
Bridging IaaS With PaaS To Deliver The Service-Oriented Data CenterBridging IaaS With PaaS To Deliver The Service-Oriented Data Center
Bridging IaaS With PaaS To Deliver The Service-Oriented Data Center
Chris Haddad
 
New IT Plan
New IT PlanNew IT Plan
New IT Plan
Chris Haddad
 

More from Chris Haddad (18)

Connected Architecture Fabric Creating a Connected World
Connected Architecture Fabric Creating a Connected WorldConnected Architecture Fabric Creating a Connected World
Connected Architecture Fabric Creating a Connected World
 
Establishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise ArchitectureEstablishing SOA Focused Enterprise Architecture
Establishing SOA Focused Enterprise Architecture
 
Java PaaS Apache Stratos
Java PaaS   Apache StratosJava PaaS   Apache Stratos
Java PaaS Apache Stratos
 
Spreadsheets To API
Spreadsheets To APISpreadsheets To API
Spreadsheets To API
 
Six Steps To Build A Successful API
Six Steps To Build A Successful APISix Steps To Build A Successful API
Six Steps To Build A Successful API
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
Gaining Startup Speed with DevOps PaaS
Gaining Startup Speed with DevOps PaaSGaining Startup Speed with DevOps PaaS
Gaining Startup Speed with DevOps PaaS
 
Business driven IT design
Business driven IT designBusiness driven IT design
Business driven IT design
 
SOA and API Convergence Strategy and Tactics
SOA and API Convergence Strategy and TacticsSOA and API Convergence Strategy and Tactics
SOA and API Convergence Strategy and Tactics
 
Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...
 
Why Reshape Reference Architecture
Why Reshape Reference ArchitectureWhy Reshape Reference Architecture
Why Reshape Reference Architecture
 
What reference architecture models to adopt
What reference architecture models to adoptWhat reference architecture models to adopt
What reference architecture models to adopt
 
How to reshape reference architecture
How to reshape reference architectureHow to reshape reference architecture
How to reshape reference architecture
 
Promote Your API Brand and Extend Your API Reach
Promote Your API Brand and Extend Your API ReachPromote Your API Brand and Extend Your API Reach
Promote Your API Brand and Extend Your API Reach
 
Stratos AppFactory in the Cloud tampa meetup-2013-09
Stratos AppFactory in the Cloud tampa meetup-2013-09Stratos AppFactory in the Cloud tampa meetup-2013-09
Stratos AppFactory in the Cloud tampa meetup-2013-09
 
Driving Enterprise Architecture Redesign: Cloud-Native Platforms, APIs, and D...
Driving Enterprise Architecture Redesign: Cloud-Native Platforms, APIs, and D...Driving Enterprise Architecture Redesign: Cloud-Native Platforms, APIs, and D...
Driving Enterprise Architecture Redesign: Cloud-Native Platforms, APIs, and D...
 
Bridging IaaS With PaaS To Deliver The Service-Oriented Data Center
Bridging IaaS With PaaS To Deliver The Service-Oriented Data CenterBridging IaaS With PaaS To Deliver The Service-Oriented Data Center
Bridging IaaS With PaaS To Deliver The Service-Oriented Data Center
 
New IT Plan
New IT PlanNew IT Plan
New IT Plan
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 

Cloaking Devices, CyberPersonas, and Neutral Zones

Editor's Notes

  1. When every endpoint is under constant attack, and all traffic is being parsed and analyzed, how can we safeguard confidential information, freely interact, and express our digital persona without concern? Chris will describe why privacy must not be breached; why anonymity can engender hostility, and what mindset is leading us into cyberwar zones instead of cybertrade neutral zones. About Chris Haddad Chris is a digital transformation expert who bridges business, technology, and security policy perspectives. He guides Fortune 1000 organizations towards crafting innovative strategies, roadmaps, and plans that reshape IT delivery and build secure customer experiences. Besides advising government agencies on information hub and ICAM initiatives using disruptive technologies, Chris is building a personal Cloud platform enabling secure, private, and anonymous interactions.
  2. Every Endpoint Under Attack; Mobile, Things, Desktop, Servers, Cloud APIs, SaaS With increasing frequency...
  3. The attacks do not discriminate between Government, Corporate, or Civilian Condo Rack --> 300 FT from Patrick Airforce Base.
  4. http://www.ic3.gov/complaint/default.aspx https://complaint.ic3.gov/default.aspx?
  5. Process fail2ban log file with geoip-bin sudo apt-get install fail2ban sudo apt-get install geoip-bin geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 209.144.228.132geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 202.101.233.19geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 43.229.53.43geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 218.65.30.73geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 115.194.53.161geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 45.114.11.31geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 125.91.212.148geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 61.151.252.29geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 122.225.243.194geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 132.248.173.10geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 218.87.111.110geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 173.201.180.62geoiplookup -f /usr/share/GeoIP/GeoLiteCity.dat 218.65.30.23 US, MO, Missouri, ChesterfieldCN, 03, Jiangxi, Nanchang CN, 02, Zhejiang, HangzhouCN, 30, Guangdong, GuangzhouCN, 23, Shanghai, ShanghaiMX, 26, Sonora, CoyoacanUS, AZ, Arizona, ScottsdaleCZ, 86, Pardubicky kraj, ChrudimIN, 23, Punjab, BanurIN, 07, Delhi, New DelhIT, 09, Lombardia, ViadanaBR, 21, Rio de Janeiro, São GonçaloRU, 53, Novosibirsk, NovosibirsPE, 15, Lima, LimaRU, 48, Moscow City, Moscow
  6. 2014 Internet Crime Reporthttp://www.ic3.gov/media/annualreport/2014_IC3Report.pdf TOTAL 164,491 $492,190,582 Social Media* 9,833 $60,418,243 Virtual Currency* 392 $1,972,312
  7. Google, Facebook, Law Enforcement, Intelligence Services
  8. https://www.opm.gov/cybersecurity/cybersecurity-incidents/ In June 2015, OPM discovered that the background investigation records of current, former, and prospective Federal employees and contractors had been stolen. OPM and the interagency incident response team have concluded with high confidence that sensitive information, including the Social Security Numbers (SSNs) of 21.5 million individuals, was stolen from the background investigation databases. This includes 19.7 million individuals that applied for a background investigation, and 1.8 million non-applicants, primarily spouses or co-habitants of applicants. Some records also include findings from interviews conducted by background investigators and approximately 5.6 million include fingerprints. Usernames and passwords that background investigation applicants used to fill out their background investigation forms were also stolen. Notifications for this incident started on September 30, 2015. We estimate notifications will continue for approximately 12 weeks. While background investigation records do contain some information regarding mental health and financial history provided by applicants and people contacted during the background investigation, there is no evidence that health, financial, payroll and retirement records of Federal personnel or those who have applied for a Federal job were impacted by this incident (for example, annuity rolls, retirement records, USA JOBS, Employee Express). Earlier in 2015, OPM discovered that the personnel data of 4.2 million current and former Federal government employees had been stolen. This means information such as full name, birth date, home address and Social Security Numbers were affected. You should have already received a notification if you were impacted by this incident. OPM and an interagency team from the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have been investigating these incidents, and are working to put in place changes that will prevent similar thefts in the future. Based on the analysis and forensics to date, the interagency incident response team assesses that the adversary is no longer active on OPM's network.
  9. https://theintercept.com/2015/05/08/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list/ https://fveydocs.org/document/skynet-analytics/ http://www.durkheimproject.org/news/durkheim-project-will-analyze-opt-in-data/ “The Durkheim Project” Will Analyze Opt-In Data From Veterans’ Social Media And Mobile Content — Seeking Real-Time Predictive Analytics for Suicide Risk.
  10. Believing in a permissive (yet dangerous) society, we rationalize overwatch. I have nothing to hide! My life will bore you. I don’t break the law. The Government Keeps Us Safe
  11. “If no one knows what I do, when I do it, and with whom I do it, no one can possibly interfere” http://fee.org/freeman/liberty-and-privacy-connections/
  12. “If no one knows what I do, when I do it, and with whom I do it, no one can possibly interfere” http://fee.org/freeman/liberty-and-privacy-connections/
  13. Deck of cards bet... show your friend. he friend, tell me his number?
  14. after all, it is legal in many states.
  15. “If no one knows what I do, when I do it, and with whom I do it, no one can possibly interfere” http://fee.org/freeman/liberty-and-privacy-connections/
  16. The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. - See more at: http://constitution.findlaw.com/amendment4.html#sthash.NXMK5WFY.dpuf
  17. Let’s say I wanted to sell cannibis online?
  18. When every endpoint is under constant attack, and all traffic is being parsed and analyzed, how can we safeguard confidential information, freely interact, and express our digital persona without concern? Chris will describe why privacy must not be breached; why anonymity can engender hostility, and what mindset is leading us into cyberwar zones instead of cybertrade neutral zones. About Chris Haddad Chris is a digital transformation expert who bridges business, technology, and security policy perspectives. He guides Fortune 1000 organizations towards crafting innovative strategies, roadmaps, and plans that reshape IT delivery and build secure customer experiences. Besides advising government agencies on information hub and ICAM initiatives using disruptive technologies, Chris is building a personal Cloud platform enabling secure, private, and anonymous interactions.