SlideShare a Scribd company logo
1 of 220
Download to read offline
blank




                this page intentionally left blank




        @alecmuffett                    www.greenlanesecurity.com
how to think clearly
           about (cyber) security
                    @alecmuffett
                 www.alecmuffett.com

                 green lane security
               www.greenlanesecurity.com

@alecmuffett                       www.greenlanesecurity.com
how to think clearly about
                        security




@alecmuffett                       www.greenlanesecurity.com
how to think clearly about
                     cybersecurity




@alecmuffett                      www.greenlanesecurity.com
why cybersecurity is rubbish




@alecmuffett                        www.greenlanesecurity.com
...a bit too polemical?




@alecmuffett                     www.greenlanesecurity.com
thesis:




@alecmuffett             www.greenlanesecurity.com
1
           there is a word cybersecurity




@alecmuffett                    www.greenlanesecurity.com
2
           this word is both a metaphor
          and a model for thinking about
           the challenges of information
               and network security


@alecmuffett                   www.greenlanesecurity.com
3
 this model, with perhaps one exception,
 is unsuited to describe the challenges of
     information and network security



@alecmuffett                www.greenlanesecurity.com
4
       this model has been adopted by
       state actors as key to discussion
        and/or strategic consideration
     of information and network security


@alecmuffett                 www.greenlanesecurity.com
5
       strategy based upon this model
    tends to be misconceived, expensive,
          and of an illiberal nature



@alecmuffett                www.greenlanesecurity.com
6
   unless diluted with other perspectives,
        this model provides a lever for
          greater state control over
      information and network security
  that will harm the evolution of the field

@alecmuffett                 www.greenlanesecurity.com
end thesis




@alecmuffett                www.greenlanesecurity.com
thesis defence




@alecmuffett                www.greenlanesecurity.com
1
       cybersecurity: what does it mean?




@alecmuffett                  www.greenlanesecurity.com
@alecmuffett   www.greenlanesecurity.com
@alecmuffett   www.greenlanesecurity.com
a long time ago in a novel far far away...




@alecmuffett                 www.greenlanesecurity.com
http://en.wikipedia.org/wiki/File:Neuromancer_(Book).jpg




@alecmuffett
www.greenlanesecurity.com
cyberspace




@alecmuffett                www.greenlanesecurity.com
not cybernetic




@alecmuffett                www.greenlanesecurity.com
http://en.wikipedia.org/wiki/File:Sixmilliondollar1.jpg




@alecmuffett
www.greenlanesecurity.com
virtual reality,
               a real virtuality




@alecmuffett                   www.greenlanesecurity.com
hackers movie




                @alecmuffett   www.greenlanesecurity.com
http://en.wikipedia.org/wiki/File:Tron_poster.jpg




@alecmuffett
www.greenlanesecurity.com
spinoff words




@alecmuffett                   www.greenlanesecurity.com
http://en.wikipedia.org/wiki/Internet-related_prefixes




@alecmuffett
                                                    cyber-prefix




www.greenlanesecurity.com
cyberpunk




@alecmuffett               www.greenlanesecurity.com
http://en.wikipedia.org/wiki/File:Wargames.jpg




@alecmuffett
www.greenlanesecurity.com
http://en.wikipedia.org/wiki/File:Hackersposter.jpg




@alecmuffett
www.greenlanesecurity.com
http://en.wikipedia.org/wiki/File:The_Matrix_Poster.jpg




@alecmuffett
www.greenlanesecurity.com
cypher-punk ?

                   PGP!




@alecmuffett                   www.greenlanesecurity.com
cyber-everything!




@alecmuffett                  www.greenlanesecurity.com
cybercrime




@alecmuffett                www.greenlanesecurity.com
cybercriminals




@alecmuffett                www.greenlanesecurity.com
cybersex




@alecmuffett              www.greenlanesecurity.com
cyberchildren
               “digital natives”




@alecmuffett                  www.greenlanesecurity.com
cyberbullying




@alecmuffett                   www.greenlanesecurity.com
cyberterrorists




@alecmuffett                 www.greenlanesecurity.com
cyberattacks




@alecmuffett                  www.greenlanesecurity.com
cyberwarfare




@alecmuffett                  www.greenlanesecurity.com
cyberweapons




@alecmuffett                  www.greenlanesecurity.com
cyberespionage




@alecmuffett                www.greenlanesecurity.com
...and so forth




@alecmuffett                 www.greenlanesecurity.com
AN OBSERVATION




@alecmuffett                www.greenlanesecurity.com
word prefixes ...




@alecmuffett                  www.greenlanesecurity.com
digital, virtual = interesting, virtuous




@alecmuffett                  www.greenlanesecurity.com
virtual reality




@alecmuffett                     www.greenlanesecurity.com
e-something = dull




@alecmuffett                  www.greenlanesecurity.com
e-mail




@alecmuffett            www.greenlanesecurity.com
iSomething




@alecmuffett                www.greenlanesecurity.com
iPrefer this logo




@alecmuffett                  www.greenlanesecurity.com
cyber = bad/profane?




@alecmuffett                   www.greenlanesecurity.com
are we meant or predisposed
                to dislike ‘cyber’ ?




@alecmuffett                   www.greenlanesecurity.com
“information superhighway”
                    was always boring




@alecmuffett                      www.greenlanesecurity.com
pop(@stack);




@alecmuffett              www.greenlanesecurity.com
2
          what model does it represent?




@alecmuffett                   www.greenlanesecurity.com
not cyber-space




@alecmuffett                 www.greenlanesecurity.com
but cyber-space




@alecmuffett                 www.greenlanesecurity.com
a near-tangible virtual world




@alecmuffett                        www.greenlanesecurity.com
described as a space




@alecmuffett                   www.greenlanesecurity.com
people meet in a space




@alecmuffett                    www.greenlanesecurity.com
battles are fought in a space




@alecmuffett                    www.greenlanesecurity.com
wars are waged in a space




@alecmuffett                      www.greenlanesecurity.com
humans understand space




@alecmuffett                    www.greenlanesecurity.com
underlying assumption is that
  cyberspace is sufficiently like realspace
    and much the same rules can apply




@alecmuffett                 www.greenlanesecurity.com
but, alas...




@alecmuffett                  www.greenlanesecurity.com
3
  the model is a mostly-bad fit to reality?




@alecmuffett                 www.greenlanesecurity.com
cyberspace is not like realspace




@alecmuffett                    www.greenlanesecurity.com
example 1: theft




@alecmuffett                 www.greenlanesecurity.com
cyberspace theft is not commutative




@alecmuffett                www.greenlanesecurity.com
theft in realspace
               • if I steal your phone
                • you no longer have it
                 • it is gone




@alecmuffett                              www.greenlanesecurity.com
theft in cyberspace
               • if I steal your data
                • you still have it
                  • unless I also destroy your copies
                   • assuming you haven’t backed-up your data
                • you no longer have secrecy
                  • not the same as “loss”




@alecmuffett                                     www.greenlanesecurity.com
later debate:
           is intellectual property theft
            actually theft (ie: crime) ...




@alecmuffett                      www.greenlanesecurity.com
... or is it like copyright infringement
          and/or patent infringement
               (ie: typically a tort)?




@alecmuffett                   www.greenlanesecurity.com
(ask a lawyer. pay him.)




@alecmuffett                      www.greenlanesecurity.com
example 2: cybersize




@alecmuffett                   www.greenlanesecurity.com
social media as a medium: Twitter




@alecmuffett                 www.greenlanesecurity.com
@AlecMuffett
               ~ 1300 followers




@alecmuffett                 www.greenlanesecurity.com
@MailOnline
               ~29,000 followers




@alecmuffett                  www.greenlanesecurity.com
@GuardianNews
               ~223,000 followers




@alecmuffett                  www.greenlanesecurity.com
Can a case for newspaper regulation
   to be applied to newspaper twitterers?




@alecmuffett                www.greenlanesecurity.com
@StephenFry
               ~3,120,000 followers




@alecmuffett                   www.greenlanesecurity.com
Why regulate newspapers & journalists
               on Twitter,
      yet not regulate Stephen Fry?




@alecmuffett               www.greenlanesecurity.com
On Twitter
               everyone is the same size
                 0 = no twitter account
                   1 = twitter account




@alecmuffett                        www.greenlanesecurity.com
On Twitter
           everyone has equal capability
     tweet, or not-tweet, that is the question




@alecmuffett                     www.greenlanesecurity.com
On Twitter
          some have much greater reach
          which is not the same thing as size




@alecmuffett                       www.greenlanesecurity.com
a maths/compsci analogy:




@alecmuffett                     www.greenlanesecurity.com
graph theory →
               euclidean geometry →
                      twitter




@alecmuffett                   www.greenlanesecurity.com
wp:directed_graph




                    @alecmuffett   www.greenlanesecurity.com
a node/vertex/twitterer is a point
         and is of zero dimension;
   hence all twitterers are the same size




@alecmuffett                 www.greenlanesecurity.com
a line/edge/follow is that
        which joins two nodes/twitterers




@alecmuffett                  www.greenlanesecurity.com
the degree of a twitterer
          is the number of followers,
       the number of people with whom
               you communicate



@alecmuffett                www.greenlanesecurity.com
the only metrics on twitter
               • volume
                • number of tweets
               • indegree
                • number of followers
               • outdegree
                • number of people you follow


@alecmuffett                            www.greenlanesecurity.com
so which of these three metrics
          should trigger state regulation
              of your twitterfeed -
         regulation of what you may say?



@alecmuffett                   www.greenlanesecurity.com
if none, perhaps regulation should
     pertain to the author & his message
           rather than the medium




@alecmuffett                 www.greenlanesecurity.com
if the medium is irrelevant and open,
   why discuss regulation of the medium
          rather than of its users?




@alecmuffett                www.greenlanesecurity.com
example 3: sovereignty




@alecmuffett                    www.greenlanesecurity.com
“Where are the boundaries of
  British (or American, etc) Cyberspace?”




@alecmuffett                www.greenlanesecurity.com
(we will return to this)




@alecmuffett                      www.greenlanesecurity.com
precis
       society is still adjusting to the net




@alecmuffett                     www.greenlanesecurity.com
4
      what model has the state adopted?




@alecmuffett                 www.greenlanesecurity.com
2011 - 1984 = 27




@alecmuffett                  www.greenlanesecurity.com
@alecmuffett   www.greenlanesecurity.com
@alecmuffett   www.greenlanesecurity.com
if it is a place, it can be policed




@alecmuffett                     www.greenlanesecurity.com
if it is a theatre, war can be prosecuted




@alecmuffett                www.greenlanesecurity.com
EXPERIMENT




@alecmuffett                www.greenlanesecurity.com
Cyberspace lies at the heart of modern society; it impacts our personal
http://www.cpni.gov.uk/threats/cyber-threats/



                                                  lives, our businesses and our essential services. Cyber security embraces
                                                  both the public and the private sector and spans a broad range of issues
                                                  related to national security, whether through terrorism, crime or industrial
                                                  espionage.

                                                  E-crime, or cyber-crime, whether relating to theft, hacking or denial of
                                                  service to vital systems, has become a fact of life. The risk of industrial
                                                  cyber espionage, in which one company makes active attacks on
                                                  another, through cyberspace, to acquire high value information is also
                                                  very real.

                                                  Cyber terrorism presents challenges for the future. We have to be
                                                  prepared for terrorists seeking to take advantage of our increasing
                                                  internet dependency to attack or disable key systems.

                                                  CPNI works with the Cabinet Office and lead Government departments and
                                                  agencies to drive forward the UK's cyber security programme to counter
                                                  these threats.

                                                @alecmuffett                                        www.greenlanesecurity.com
posit:
               internet → communications




@alecmuffett                     www.greenlanesecurity.com
so replace:
          cyberspace → telephoneworld
                 cyber → phone




@alecmuffett                 www.greenlanesecurity.com
Telephoneworld lies at the heart of modern society; it impacts our
http://dropsafe.crypticide.com/article/4933



                                                personal lives, our businesses and our essential services. Phone security
                                                embraces both the public and the private sector and spans a broad range
                                                of issues related to national security, whether through terrorism, crime or
                                                industrial espionage.

                                                E-crime, or phone-crime, whether relating to theft, hacking or denial of
                                                service to vital systems, has become a fact of life. The risk of industrial
                                                phone espionage, in which one company makes active attacks on
                                                another, through Telephoneworld, to acquire high value information is
                                                also very real.

                                                Phone terrorism presents challenges for the future. We have to be
                                                prepared for terrorists seeking to take advantage of our increasing
                                                communications dependency to attack or disable key systems.

                                                CPNI works with the Cabinet Office and lead Government departments and
                                                agencies to drive forward the UK's phone security programme to counter
                                                these threats.

                                              @alecmuffett                                        www.greenlanesecurity.com
The UK should dominate Telephoneworld
              Cyberspace!




@alecmuffett              www.greenlanesecurity.com
If cyberspace is communication...




@alecmuffett                  www.greenlanesecurity.com
to control communication:
               • you must define it
               • ...and/or...
               • you must inhibit it




@alecmuffett                           www.greenlanesecurity.com
to define communication
               • propaganda
                • a bad word in government lingo
                • also marketing & public relations




@alecmuffett                              www.greenlanesecurity.com
to inhibit communication
               • censorship
                • likewise a bad word




@alecmuffett                            www.greenlanesecurity.com
it’s safer for government to pretend
           that cyberspace is a space
             filled with bad people




@alecmuffett                  www.greenlanesecurity.com
metaphor drives perception




@alecmuffett                      www.greenlanesecurity.com
land → army




@alecmuffett                 www.greenlanesecurity.com
sea → navy




@alecmuffett                www.greenlanesecurity.com
sky → air force




@alecmuffett                 www.greenlanesecurity.com
cyberspace → up for grabs




@alecmuffett                      www.greenlanesecurity.com
to achieve dominance
   the internet must be widely perceived
      as a space which can be policed,
       as a battleground in which war
            may be prosecuted...



@alecmuffett                www.greenlanesecurity.com
...but what are its boundaries?




@alecmuffett                    www.greenlanesecurity.com
“Where are the boundaries of
            British (etc) Cyberspace?”




@alecmuffett                   www.greenlanesecurity.com
depends on what you mean by:
               “Boundary”
                “British”




@alecmuffett                www.greenlanesecurity.com
is British Cyberspace the union of
   every Briton’s ability to communicate?




@alecmuffett                 www.greenlanesecurity.com
...then Stephen Fry is very large indeed.




@alecmuffett                www.greenlanesecurity.com
is cyberspace the boundary of storage
        of every and all Britons’ data?




@alecmuffett                www.greenlanesecurity.com
...then British Cyberspace extends into
  GMail and Facebook servers in the USA.




@alecmuffett                www.greenlanesecurity.com
is British Cyberspace the sum over
     digital/cyberactivities of all Britons?




@alecmuffett                    www.greenlanesecurity.com
...then the State seeks to constrain
        legal (or, non-criminal) activities
         and amend/remove civil rights.




@alecmuffett                   www.greenlanesecurity.com
Government is curiously unwilling
            to clarify this matter.




@alecmuffett                  www.greenlanesecurity.com
5
  “expensive, misconceived and illiberal”




@alecmuffett                www.greenlanesecurity.com
key, critical, strategic quotes:




@alecmuffett                     www.greenlanesecurity.com
http://goo.gl/MXCsG - computerworld




                                         The cost of cybercrime to the global
                                         economy is estimated at $1 trillion
                                       [US General Keith] Alexander stated and
                                       malware is being introduced at a rate of
                                               55,000 pieces per day,
                                                  or one per second.


                                      @alecmuffett               www.greenlanesecurity.com
http://goo.gl/nGPvW - computerworld




                                        The annual cost of cybercrime is about
                                       $388 billion, including money and time
                                         lost, said Brian Tillett, chief security
                                      strategist at Symantec. That’s about $100
                                      billion more than the global black market
                                       trade in heroin, cocaine and marijuana
                                                   combined, he said.


                                      @alecmuffett                www.greenlanesecurity.com
http://goo.gl/A14px - symantec




                                                   Symantec Sums
                                                • $388bn =
                                                 • $114bn “cost” +
                                                 • $274bn “lost time”




                                 @alecmuffett                           www.greenlanesecurity.com
http://goo.gl/qrmDn - detica




                                In our most-likely scenario, we estimate
                                 the cost of cyber crime to the UK to be
                                            £27bn per annum.




                               @alecmuffett                www.greenlanesecurity.com
http://goo.gl/eQcVS - itpro




                              Cyber criminals will cost the UK economy
                                 an estimated £1.9 billion in 2011,
                                  according to a Symantec report.




                              @alecmuffett              www.greenlanesecurity.com
$1000bn vs: $388bn vs: $114bn?

               £27bn vs: £1.9bn ?




@alecmuffett                   www.greenlanesecurity.com
wtf?




@alecmuffett          www.greenlanesecurity.com
http://goo.gl/AJMMX - cabinet office




                                       @alecmuffett   www.greenlanesecurity.com
“the £27bn report”




@alecmuffett                  www.greenlanesecurity.com
http://goo.gl/vKk3S - detica




                                 The theft of Intellectual Property (IP) from business,
                                which has the greatest economic impact of any type of
                                cyber crime is estimated to be £9.2bn per annum. p18




                               @alecmuffett                          www.greenlanesecurity.com
This gave an overall figure for fiscal fraud by
              cyber criminals of £2.2bn. p19




@alecmuffett                            www.greenlanesecurity.com
Our total estimate for industrial espionage
                        is £7.6bn p20




@alecmuffett                            www.greenlanesecurity.com
Overall, we estimate the most likely impact
   [of online theft is] £1.3bn per annum, with the best
           and worst case estimates £1.0bn and
                 £2.7bn respectively. p21




@alecmuffett                          www.greenlanesecurity.com
Cyber crime      Economic impact


               Identity theft       £1.7bn


               Online fraud         £1.4bn


         Scareware & fake AV         £30m

                                                 p18
@alecmuffett                          www.greenlanesecurity.com
@alecmuffett   www.greenlanesecurity.com
but...




@alecmuffett            www.greenlanesecurity.com
“The proportion of IP actually stolen
 cannot at present be measured with any
          degree of confidence”




@alecmuffett               www.greenlanesecurity.com
“It is very hard to determine
 what proportion of industrial espionage
          is due to cybercrime”




@alecmuffett               www.greenlanesecurity.com
“Our assessments are necessarily based
on assumptions and informed judgements
    rather than specific examples of
 cybercrime, or from data of a classified
    or commercially sensitive origin”



@alecmuffett               www.greenlanesecurity.com
also, do you remember...




@alecmuffett                     www.greenlanesecurity.com
“malware is being introduced
     at a rate of 55,000 pieces per day”




@alecmuffett                 www.greenlanesecurity.com
Compare...




@alecmuffett                www.greenlanesecurity.com
http://goo.gl/YwjT0




                        You just have to look at some of the figures, in
                       fact over 50%, just about 51% of the malicious
                      software threats that have been ever identified,
                                   were identified in 2009.

                                     Theresa May, Today Programme, Oct 2010




                      @alecmuffett                                 www.greenlanesecurity.com
http://goo.gl/vK331




                                            Symantec
                                        “Global Internet
                                     Security Threat Report
                                       - Trends for 2009”



                      @alecmuffett                    www.greenlanesecurity.com
In 2009, Symantec created 2,895,802 new malicious code
   signatures (figure 10). This is a 71 percent increase over
 2008, when 1,691,323 new malicious code signatures were
added. Although the percentage increase in signatures added
is less than the 139 percent increase from 2007 to 2008, the
 overall number of malicious code signatures by the end of
      2009 grew to 5,724,106. This means that of all the
     malicious code signatures created by Symantec, 51
 percent of that total was created in 2009. This is slightly
     less than 2008, when approximately 60 percent of all
             signatures at the time were created.



@alecmuffett                            www.greenlanesecurity.com
“code signatures” up 51%
          therefore “malware” up 51% ?




@alecmuffett                  www.greenlanesecurity.com
it doesn’t work like that.




@alecmuffett                       www.greenlanesecurity.com
(“polymorphic” malware)




@alecmuffett                    www.greenlanesecurity.com
So: 55,000/day ?




@alecmuffett                 www.greenlanesecurity.com
http://goo.gl/M09Ik




                                     McAfee Threat Report:
                                      Fourth Quarter 2010




                      @alecmuffett                    www.greenlanesecurity.com
Malware Reaches Record Numbers

Malicious code, in its seemingly infinite forms and ever expanding targets, is the largest
 threat that McAfee Labs combats daily. We have seen its functionality increase every
year. We have seen its sophistication increase every year. We have seen the platforms
  it targets evolve every year with increasingly clever ways of stealing data. In 2010
          McAfee Labs identified more than 20 million new pieces of malware.

                             Stop. We’ll repeat that figure.

  More than 20 million new pieces of malware appearing last year means that we
identify nearly 55,000 malware threats every day. That figure is up from 2009. That
  figure is up from 2008. That figure is way up from 2007. Of the almost 55 million
             pieces of malware McAfee Labs has identified and protected
                     against, 36 percent of it was written in 2010!




@alecmuffett                                                www.greenlanesecurity.com
politicians & generals are using
            glossy marketing reports
                to bolster strategy




@alecmuffett                    www.greenlanesecurity.com
government response ?




@alecmuffett                    www.greenlanesecurity.com
“£640m over 4 years”




@alecmuffett                   www.greenlanesecurity.com
OCSIA
                     Office of
                 Cyber Security and
               Information Assurance



@alecmuffett                    www.greenlanesecurity.com
£640m
               • cyberinvestment breakdown
                • operational capabilities 65%
                • critical infrastructure 20%
                • cybercrime 9%
                • reserve and baseline 5%




@alecmuffett                              www.greenlanesecurity.com
“...but the US is spending
                $9bn* on cybersecurity;
               are we spending enough?”
                         - Audience Member,
                           BCS Meeting Cyber Challenges of 2012

                         * Actually closer to $11bn



@alecmuffett                              www.greenlanesecurity.com
Of the £640m

           9% (£58m) goes to cybercrime

                65% (£416m) goes to
               operational capabilities


@alecmuffett                       www.greenlanesecurity.com
maybe the proportions reflect
         the actually perceived threats?




@alecmuffett                   www.greenlanesecurity.com
6
 harmful to evolution of network security




@alecmuffett                www.greenlanesecurity.com
there is clearly some reality
                     to cybersecurity




@alecmuffett                        www.greenlanesecurity.com
CNI: Critical National Infrastructure




@alecmuffett                  www.greenlanesecurity.com
CNI Events




@alecmuffett                www.greenlanesecurity.com
1941: Battle of the Atlantic




@alecmuffett                        www.greenlanesecurity.com
1943: Dambusters




@alecmuffett                 www.greenlanesecurity.com
Gulf Wars: Iraq Power Stations




@alecmuffett                    www.greenlanesecurity.com
...pursuant to an invasion, or
             with a kinetic component




@alecmuffett                     www.greenlanesecurity.com
The [Enemy] will crash our systems
              and then bomb us.




@alecmuffett                 www.greenlanesecurity.com
@alecmuffett   www.greenlanesecurity.com
Maybe-CNI Events
               • 2007: Estonia
                • no banks, services, food
               • 2009: Russia/Ukraine Gas
                • people freezing




@alecmuffett                                 www.greenlanesecurity.com
Non-CNI Events
               • 2011: Aurora/GMail
                • espionage
                 • who died?




@alecmuffett                          www.greenlanesecurity.com
Nonetheless there is clearly
           some risk of being blindsided




@alecmuffett                    www.greenlanesecurity.com
there is land-war




@alecmuffett                  www.greenlanesecurity.com
there is sea-war




@alecmuffett                  www.greenlanesecurity.com
there is air-war




@alecmuffett                  www.greenlanesecurity.com
so there is cyber-war,
   but it should not dominate all strategy




@alecmuffett                 www.greenlanesecurity.com
compare: air supremacy




@alecmuffett                    www.greenlanesecurity.com
You might ask:
              where’s the harm
     in cyber/space/security philosophy?




@alecmuffett                 www.greenlanesecurity.com
If not to the exclusion of all others?




@alecmuffett                   www.greenlanesecurity.com
1) expansion of the state




@alecmuffett                      www.greenlanesecurity.com
What’s a politician more likely
       to tell the public?

             1) “you’re on your own”
         2) “we’re sorting it out for you”



@alecmuffett                    www.greenlanesecurity.com
Who is better to be responsible
 for a family’s cybersecurity?

               1) the family members
                2) state cyber-police



@alecmuffett                    www.greenlanesecurity.com
2) interference in evolution/education




@alecmuffett                 www.greenlanesecurity.com
karmic cycle
               • technologies change
                • people complain
               • problems arise
                • people complain
               • problems get fixed
                • people complain


@alecmuffett                           www.greenlanesecurity.com
people always complain,
                but they use and learn.




@alecmuffett                     www.greenlanesecurity.com
3) tunnel vision




@alecmuffett                  www.greenlanesecurity.com
let me present
          an alternative spending model




@alecmuffett                   www.greenlanesecurity.com
...it’s actually a terrible idea -
       but bear with me for a moment...




@alecmuffett                   www.greenlanesecurity.com
if we’re worried about viruses...




@alecmuffett                   www.greenlanesecurity.com
why not make anti-virus/anti-malware
          available on the NHS?




@alecmuffett              www.greenlanesecurity.com
free at the point of use




@alecmuffett                      www.greenlanesecurity.com
distributed to all citizens




@alecmuffett                        www.greenlanesecurity.com
pick what is suitable for your needs




@alecmuffett                   www.greenlanesecurity.com
run “flu jab”-like information campaigns




@alecmuffett                www.greenlanesecurity.com
no huge centralised IT project




@alecmuffett                    www.greenlanesecurity.com
a great idea,
             to the extent limited by
          bureaucracy, goals and targets




@alecmuffett                   www.greenlanesecurity.com
ie: this specific idea would be doomed...




@alecmuffett                www.greenlanesecurity.com
...and any Government project
      to lead security would be likewise?




@alecmuffett                  www.greenlanesecurity.com
But if you could address security in a
            distributed manner...




@alecmuffett                  www.greenlanesecurity.com
then why instead spend
       all that taxpayer money centrally?




@alecmuffett                   www.greenlanesecurity.com
Perhaps cybersecurity isn’t actually
        about protecting the public?




@alecmuffett                  www.greenlanesecurity.com
But that would mean it’s rubbish.




@alecmuffett                  www.greenlanesecurity.com
fin
               @alecmuffett




@alecmuffett                  www.greenlanesecurity.com

More Related Content

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

How To Think Clearly About Cybersecurity v1

  • 1. blank this page intentionally left blank @alecmuffett www.greenlanesecurity.com
  • 2. how to think clearly about (cyber) security @alecmuffett www.alecmuffett.com green lane security www.greenlanesecurity.com @alecmuffett www.greenlanesecurity.com
  • 3. how to think clearly about security @alecmuffett www.greenlanesecurity.com
  • 4. how to think clearly about cybersecurity @alecmuffett www.greenlanesecurity.com
  • 5. why cybersecurity is rubbish @alecmuffett www.greenlanesecurity.com
  • 6. ...a bit too polemical? @alecmuffett www.greenlanesecurity.com
  • 7. thesis: @alecmuffett www.greenlanesecurity.com
  • 8. 1 there is a word cybersecurity @alecmuffett www.greenlanesecurity.com
  • 9. 2 this word is both a metaphor and a model for thinking about the challenges of information and network security @alecmuffett www.greenlanesecurity.com
  • 10. 3 this model, with perhaps one exception, is unsuited to describe the challenges of information and network security @alecmuffett www.greenlanesecurity.com
  • 11. 4 this model has been adopted by state actors as key to discussion and/or strategic consideration of information and network security @alecmuffett www.greenlanesecurity.com
  • 12. 5 strategy based upon this model tends to be misconceived, expensive, and of an illiberal nature @alecmuffett www.greenlanesecurity.com
  • 13. 6 unless diluted with other perspectives, this model provides a lever for greater state control over information and network security that will harm the evolution of the field @alecmuffett www.greenlanesecurity.com
  • 14. end thesis @alecmuffett www.greenlanesecurity.com
  • 15. thesis defence @alecmuffett www.greenlanesecurity.com
  • 16. 1 cybersecurity: what does it mean? @alecmuffett www.greenlanesecurity.com
  • 17. @alecmuffett www.greenlanesecurity.com
  • 18. @alecmuffett www.greenlanesecurity.com
  • 19. a long time ago in a novel far far away... @alecmuffett www.greenlanesecurity.com
  • 21. cyberspace @alecmuffett www.greenlanesecurity.com
  • 22. not cybernetic @alecmuffett www.greenlanesecurity.com
  • 24. virtual reality, a real virtuality @alecmuffett www.greenlanesecurity.com
  • 25. hackers movie @alecmuffett www.greenlanesecurity.com
  • 27. spinoff words @alecmuffett www.greenlanesecurity.com
  • 29. cyberpunk @alecmuffett www.greenlanesecurity.com
  • 33. cypher-punk ? PGP! @alecmuffett www.greenlanesecurity.com
  • 34. cyber-everything! @alecmuffett www.greenlanesecurity.com
  • 35. cybercrime @alecmuffett www.greenlanesecurity.com
  • 36. cybercriminals @alecmuffett www.greenlanesecurity.com
  • 37. cybersex @alecmuffett www.greenlanesecurity.com
  • 38. cyberchildren “digital natives” @alecmuffett www.greenlanesecurity.com
  • 39. cyberbullying @alecmuffett www.greenlanesecurity.com
  • 40. cyberterrorists @alecmuffett www.greenlanesecurity.com
  • 41. cyberattacks @alecmuffett www.greenlanesecurity.com
  • 42. cyberwarfare @alecmuffett www.greenlanesecurity.com
  • 43. cyberweapons @alecmuffett www.greenlanesecurity.com
  • 44. cyberespionage @alecmuffett www.greenlanesecurity.com
  • 45. ...and so forth @alecmuffett www.greenlanesecurity.com
  • 46. AN OBSERVATION @alecmuffett www.greenlanesecurity.com
  • 47. word prefixes ... @alecmuffett www.greenlanesecurity.com
  • 48. digital, virtual = interesting, virtuous @alecmuffett www.greenlanesecurity.com
  • 49. virtual reality @alecmuffett www.greenlanesecurity.com
  • 50. e-something = dull @alecmuffett www.greenlanesecurity.com
  • 51. e-mail @alecmuffett www.greenlanesecurity.com
  • 52. iSomething @alecmuffett www.greenlanesecurity.com
  • 53. iPrefer this logo @alecmuffett www.greenlanesecurity.com
  • 54. cyber = bad/profane? @alecmuffett www.greenlanesecurity.com
  • 55. are we meant or predisposed to dislike ‘cyber’ ? @alecmuffett www.greenlanesecurity.com
  • 56. “information superhighway” was always boring @alecmuffett www.greenlanesecurity.com
  • 57. pop(@stack); @alecmuffett www.greenlanesecurity.com
  • 58. 2 what model does it represent? @alecmuffett www.greenlanesecurity.com
  • 59. not cyber-space @alecmuffett www.greenlanesecurity.com
  • 60. but cyber-space @alecmuffett www.greenlanesecurity.com
  • 61. a near-tangible virtual world @alecmuffett www.greenlanesecurity.com
  • 62. described as a space @alecmuffett www.greenlanesecurity.com
  • 63. people meet in a space @alecmuffett www.greenlanesecurity.com
  • 64. battles are fought in a space @alecmuffett www.greenlanesecurity.com
  • 65. wars are waged in a space @alecmuffett www.greenlanesecurity.com
  • 66. humans understand space @alecmuffett www.greenlanesecurity.com
  • 67. underlying assumption is that cyberspace is sufficiently like realspace and much the same rules can apply @alecmuffett www.greenlanesecurity.com
  • 68. but, alas... @alecmuffett www.greenlanesecurity.com
  • 69. 3 the model is a mostly-bad fit to reality? @alecmuffett www.greenlanesecurity.com
  • 70. cyberspace is not like realspace @alecmuffett www.greenlanesecurity.com
  • 71. example 1: theft @alecmuffett www.greenlanesecurity.com
  • 72. cyberspace theft is not commutative @alecmuffett www.greenlanesecurity.com
  • 73. theft in realspace • if I steal your phone • you no longer have it • it is gone @alecmuffett www.greenlanesecurity.com
  • 74. theft in cyberspace • if I steal your data • you still have it • unless I also destroy your copies • assuming you haven’t backed-up your data • you no longer have secrecy • not the same as “loss” @alecmuffett www.greenlanesecurity.com
  • 75. later debate: is intellectual property theft actually theft (ie: crime) ... @alecmuffett www.greenlanesecurity.com
  • 76. ... or is it like copyright infringement and/or patent infringement (ie: typically a tort)? @alecmuffett www.greenlanesecurity.com
  • 77. (ask a lawyer. pay him.) @alecmuffett www.greenlanesecurity.com
  • 78. example 2: cybersize @alecmuffett www.greenlanesecurity.com
  • 79. social media as a medium: Twitter @alecmuffett www.greenlanesecurity.com
  • 80. @AlecMuffett ~ 1300 followers @alecmuffett www.greenlanesecurity.com
  • 81. @MailOnline ~29,000 followers @alecmuffett www.greenlanesecurity.com
  • 82. @GuardianNews ~223,000 followers @alecmuffett www.greenlanesecurity.com
  • 83. Can a case for newspaper regulation to be applied to newspaper twitterers? @alecmuffett www.greenlanesecurity.com
  • 84. @StephenFry ~3,120,000 followers @alecmuffett www.greenlanesecurity.com
  • 85. Why regulate newspapers & journalists on Twitter, yet not regulate Stephen Fry? @alecmuffett www.greenlanesecurity.com
  • 86. On Twitter everyone is the same size 0 = no twitter account 1 = twitter account @alecmuffett www.greenlanesecurity.com
  • 87. On Twitter everyone has equal capability tweet, or not-tweet, that is the question @alecmuffett www.greenlanesecurity.com
  • 88. On Twitter some have much greater reach which is not the same thing as size @alecmuffett www.greenlanesecurity.com
  • 89. a maths/compsci analogy: @alecmuffett www.greenlanesecurity.com
  • 90. graph theory → euclidean geometry → twitter @alecmuffett www.greenlanesecurity.com
  • 91. wp:directed_graph @alecmuffett www.greenlanesecurity.com
  • 92. a node/vertex/twitterer is a point and is of zero dimension; hence all twitterers are the same size @alecmuffett www.greenlanesecurity.com
  • 93. a line/edge/follow is that which joins two nodes/twitterers @alecmuffett www.greenlanesecurity.com
  • 94. the degree of a twitterer is the number of followers, the number of people with whom you communicate @alecmuffett www.greenlanesecurity.com
  • 95. the only metrics on twitter • volume • number of tweets • indegree • number of followers • outdegree • number of people you follow @alecmuffett www.greenlanesecurity.com
  • 96. so which of these three metrics should trigger state regulation of your twitterfeed - regulation of what you may say? @alecmuffett www.greenlanesecurity.com
  • 97. if none, perhaps regulation should pertain to the author & his message rather than the medium @alecmuffett www.greenlanesecurity.com
  • 98. if the medium is irrelevant and open, why discuss regulation of the medium rather than of its users? @alecmuffett www.greenlanesecurity.com
  • 99. example 3: sovereignty @alecmuffett www.greenlanesecurity.com
  • 100. “Where are the boundaries of British (or American, etc) Cyberspace?” @alecmuffett www.greenlanesecurity.com
  • 101. (we will return to this) @alecmuffett www.greenlanesecurity.com
  • 102. precis society is still adjusting to the net @alecmuffett www.greenlanesecurity.com
  • 103. 4 what model has the state adopted? @alecmuffett www.greenlanesecurity.com
  • 104. 2011 - 1984 = 27 @alecmuffett www.greenlanesecurity.com
  • 105. @alecmuffett www.greenlanesecurity.com
  • 106. @alecmuffett www.greenlanesecurity.com
  • 107. if it is a place, it can be policed @alecmuffett www.greenlanesecurity.com
  • 108. if it is a theatre, war can be prosecuted @alecmuffett www.greenlanesecurity.com
  • 109. EXPERIMENT @alecmuffett www.greenlanesecurity.com
  • 110. Cyberspace lies at the heart of modern society; it impacts our personal http://www.cpni.gov.uk/threats/cyber-threats/ lives, our businesses and our essential services. Cyber security embraces both the public and the private sector and spans a broad range of issues related to national security, whether through terrorism, crime or industrial espionage. E-crime, or cyber-crime, whether relating to theft, hacking or denial of service to vital systems, has become a fact of life. The risk of industrial cyber espionage, in which one company makes active attacks on another, through cyberspace, to acquire high value information is also very real. Cyber terrorism presents challenges for the future. We have to be prepared for terrorists seeking to take advantage of our increasing internet dependency to attack or disable key systems. CPNI works with the Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter these threats. @alecmuffett www.greenlanesecurity.com
  • 111. posit: internet → communications @alecmuffett www.greenlanesecurity.com
  • 112. so replace: cyberspace → telephoneworld cyber → phone @alecmuffett www.greenlanesecurity.com
  • 113. Telephoneworld lies at the heart of modern society; it impacts our http://dropsafe.crypticide.com/article/4933 personal lives, our businesses and our essential services. Phone security embraces both the public and the private sector and spans a broad range of issues related to national security, whether through terrorism, crime or industrial espionage. E-crime, or phone-crime, whether relating to theft, hacking or denial of service to vital systems, has become a fact of life. The risk of industrial phone espionage, in which one company makes active attacks on another, through Telephoneworld, to acquire high value information is also very real. Phone terrorism presents challenges for the future. We have to be prepared for terrorists seeking to take advantage of our increasing communications dependency to attack or disable key systems. CPNI works with the Cabinet Office and lead Government departments and agencies to drive forward the UK's phone security programme to counter these threats. @alecmuffett www.greenlanesecurity.com
  • 114. The UK should dominate Telephoneworld Cyberspace! @alecmuffett www.greenlanesecurity.com
  • 115. If cyberspace is communication... @alecmuffett www.greenlanesecurity.com
  • 116. to control communication: • you must define it • ...and/or... • you must inhibit it @alecmuffett www.greenlanesecurity.com
  • 117. to define communication • propaganda • a bad word in government lingo • also marketing & public relations @alecmuffett www.greenlanesecurity.com
  • 118. to inhibit communication • censorship • likewise a bad word @alecmuffett www.greenlanesecurity.com
  • 119. it’s safer for government to pretend that cyberspace is a space filled with bad people @alecmuffett www.greenlanesecurity.com
  • 120. metaphor drives perception @alecmuffett www.greenlanesecurity.com
  • 121. land → army @alecmuffett www.greenlanesecurity.com
  • 122. sea → navy @alecmuffett www.greenlanesecurity.com
  • 123. sky → air force @alecmuffett www.greenlanesecurity.com
  • 124. cyberspace → up for grabs @alecmuffett www.greenlanesecurity.com
  • 125. to achieve dominance the internet must be widely perceived as a space which can be policed, as a battleground in which war may be prosecuted... @alecmuffett www.greenlanesecurity.com
  • 126. ...but what are its boundaries? @alecmuffett www.greenlanesecurity.com
  • 127. “Where are the boundaries of British (etc) Cyberspace?” @alecmuffett www.greenlanesecurity.com
  • 128. depends on what you mean by: “Boundary” “British” @alecmuffett www.greenlanesecurity.com
  • 129. is British Cyberspace the union of every Briton’s ability to communicate? @alecmuffett www.greenlanesecurity.com
  • 130. ...then Stephen Fry is very large indeed. @alecmuffett www.greenlanesecurity.com
  • 131. is cyberspace the boundary of storage of every and all Britons’ data? @alecmuffett www.greenlanesecurity.com
  • 132. ...then British Cyberspace extends into GMail and Facebook servers in the USA. @alecmuffett www.greenlanesecurity.com
  • 133. is British Cyberspace the sum over digital/cyberactivities of all Britons? @alecmuffett www.greenlanesecurity.com
  • 134. ...then the State seeks to constrain legal (or, non-criminal) activities and amend/remove civil rights. @alecmuffett www.greenlanesecurity.com
  • 135. Government is curiously unwilling to clarify this matter. @alecmuffett www.greenlanesecurity.com
  • 136. 5 “expensive, misconceived and illiberal” @alecmuffett www.greenlanesecurity.com
  • 137. key, critical, strategic quotes: @alecmuffett www.greenlanesecurity.com
  • 138. http://goo.gl/MXCsG - computerworld The cost of cybercrime to the global economy is estimated at $1 trillion [US General Keith] Alexander stated and malware is being introduced at a rate of 55,000 pieces per day, or one per second. @alecmuffett www.greenlanesecurity.com
  • 139. http://goo.gl/nGPvW - computerworld The annual cost of cybercrime is about $388 billion, including money and time lost, said Brian Tillett, chief security strategist at Symantec. That’s about $100 billion more than the global black market trade in heroin, cocaine and marijuana combined, he said. @alecmuffett www.greenlanesecurity.com
  • 140. http://goo.gl/A14px - symantec Symantec Sums • $388bn = • $114bn “cost” + • $274bn “lost time” @alecmuffett www.greenlanesecurity.com
  • 141. http://goo.gl/qrmDn - detica In our most-likely scenario, we estimate the cost of cyber crime to the UK to be £27bn per annum. @alecmuffett www.greenlanesecurity.com
  • 142. http://goo.gl/eQcVS - itpro Cyber criminals will cost the UK economy an estimated £1.9 billion in 2011, according to a Symantec report. @alecmuffett www.greenlanesecurity.com
  • 143. $1000bn vs: $388bn vs: $114bn? £27bn vs: £1.9bn ? @alecmuffett www.greenlanesecurity.com
  • 144. wtf? @alecmuffett www.greenlanesecurity.com
  • 145. http://goo.gl/AJMMX - cabinet office @alecmuffett www.greenlanesecurity.com
  • 146. “the £27bn report” @alecmuffett www.greenlanesecurity.com
  • 147. http://goo.gl/vKk3S - detica The theft of Intellectual Property (IP) from business, which has the greatest economic impact of any type of cyber crime is estimated to be £9.2bn per annum. p18 @alecmuffett www.greenlanesecurity.com
  • 148. This gave an overall figure for fiscal fraud by cyber criminals of £2.2bn. p19 @alecmuffett www.greenlanesecurity.com
  • 149. Our total estimate for industrial espionage is £7.6bn p20 @alecmuffett www.greenlanesecurity.com
  • 150. Overall, we estimate the most likely impact [of online theft is] £1.3bn per annum, with the best and worst case estimates £1.0bn and £2.7bn respectively. p21 @alecmuffett www.greenlanesecurity.com
  • 151. Cyber crime Economic impact Identity theft £1.7bn Online fraud £1.4bn Scareware & fake AV £30m p18 @alecmuffett www.greenlanesecurity.com
  • 152. @alecmuffett www.greenlanesecurity.com
  • 153. but... @alecmuffett www.greenlanesecurity.com
  • 154. “The proportion of IP actually stolen cannot at present be measured with any degree of confidence” @alecmuffett www.greenlanesecurity.com
  • 155. “It is very hard to determine what proportion of industrial espionage is due to cybercrime” @alecmuffett www.greenlanesecurity.com
  • 156. “Our assessments are necessarily based on assumptions and informed judgements rather than specific examples of cybercrime, or from data of a classified or commercially sensitive origin” @alecmuffett www.greenlanesecurity.com
  • 157. also, do you remember... @alecmuffett www.greenlanesecurity.com
  • 158. “malware is being introduced at a rate of 55,000 pieces per day” @alecmuffett www.greenlanesecurity.com
  • 159. Compare... @alecmuffett www.greenlanesecurity.com
  • 160. http://goo.gl/YwjT0 You just have to look at some of the figures, in fact over 50%, just about 51% of the malicious software threats that have been ever identified, were identified in 2009. Theresa May, Today Programme, Oct 2010 @alecmuffett www.greenlanesecurity.com
  • 161. http://goo.gl/vK331 Symantec “Global Internet Security Threat Report - Trends for 2009” @alecmuffett www.greenlanesecurity.com
  • 162. In 2009, Symantec created 2,895,802 new malicious code signatures (figure 10). This is a 71 percent increase over 2008, when 1,691,323 new malicious code signatures were added. Although the percentage increase in signatures added is less than the 139 percent increase from 2007 to 2008, the overall number of malicious code signatures by the end of 2009 grew to 5,724,106. This means that of all the malicious code signatures created by Symantec, 51 percent of that total was created in 2009. This is slightly less than 2008, when approximately 60 percent of all signatures at the time were created. @alecmuffett www.greenlanesecurity.com
  • 163. “code signatures” up 51% therefore “malware” up 51% ? @alecmuffett www.greenlanesecurity.com
  • 164. it doesn’t work like that. @alecmuffett www.greenlanesecurity.com
  • 165. (“polymorphic” malware) @alecmuffett www.greenlanesecurity.com
  • 166. So: 55,000/day ? @alecmuffett www.greenlanesecurity.com
  • 167. http://goo.gl/M09Ik McAfee Threat Report: Fourth Quarter 2010 @alecmuffett www.greenlanesecurity.com
  • 168. Malware Reaches Record Numbers Malicious code, in its seemingly infinite forms and ever expanding targets, is the largest threat that McAfee Labs combats daily. We have seen its functionality increase every year. We have seen its sophistication increase every year. We have seen the platforms it targets evolve every year with increasingly clever ways of stealing data. In 2010 McAfee Labs identified more than 20 million new pieces of malware. Stop. We’ll repeat that figure. More than 20 million new pieces of malware appearing last year means that we identify nearly 55,000 malware threats every day. That figure is up from 2009. That figure is up from 2008. That figure is way up from 2007. Of the almost 55 million pieces of malware McAfee Labs has identified and protected against, 36 percent of it was written in 2010! @alecmuffett www.greenlanesecurity.com
  • 169. politicians & generals are using glossy marketing reports to bolster strategy @alecmuffett www.greenlanesecurity.com
  • 170. government response ? @alecmuffett www.greenlanesecurity.com
  • 171. “£640m over 4 years” @alecmuffett www.greenlanesecurity.com
  • 172. OCSIA Office of Cyber Security and Information Assurance @alecmuffett www.greenlanesecurity.com
  • 173. £640m • cyberinvestment breakdown • operational capabilities 65% • critical infrastructure 20% • cybercrime 9% • reserve and baseline 5% @alecmuffett www.greenlanesecurity.com
  • 174. “...but the US is spending $9bn* on cybersecurity; are we spending enough?” - Audience Member, BCS Meeting Cyber Challenges of 2012 * Actually closer to $11bn @alecmuffett www.greenlanesecurity.com
  • 175. Of the £640m 9% (£58m) goes to cybercrime 65% (£416m) goes to operational capabilities @alecmuffett www.greenlanesecurity.com
  • 176. maybe the proportions reflect the actually perceived threats? @alecmuffett www.greenlanesecurity.com
  • 177. 6 harmful to evolution of network security @alecmuffett www.greenlanesecurity.com
  • 178. there is clearly some reality to cybersecurity @alecmuffett www.greenlanesecurity.com
  • 179. CNI: Critical National Infrastructure @alecmuffett www.greenlanesecurity.com
  • 180. CNI Events @alecmuffett www.greenlanesecurity.com
  • 181. 1941: Battle of the Atlantic @alecmuffett www.greenlanesecurity.com
  • 182. 1943: Dambusters @alecmuffett www.greenlanesecurity.com
  • 183. Gulf Wars: Iraq Power Stations @alecmuffett www.greenlanesecurity.com
  • 184. ...pursuant to an invasion, or with a kinetic component @alecmuffett www.greenlanesecurity.com
  • 185. The [Enemy] will crash our systems and then bomb us. @alecmuffett www.greenlanesecurity.com
  • 186. @alecmuffett www.greenlanesecurity.com
  • 187. Maybe-CNI Events • 2007: Estonia • no banks, services, food • 2009: Russia/Ukraine Gas • people freezing @alecmuffett www.greenlanesecurity.com
  • 188. Non-CNI Events • 2011: Aurora/GMail • espionage • who died? @alecmuffett www.greenlanesecurity.com
  • 189. Nonetheless there is clearly some risk of being blindsided @alecmuffett www.greenlanesecurity.com
  • 190. there is land-war @alecmuffett www.greenlanesecurity.com
  • 191. there is sea-war @alecmuffett www.greenlanesecurity.com
  • 192. there is air-war @alecmuffett www.greenlanesecurity.com
  • 193. so there is cyber-war, but it should not dominate all strategy @alecmuffett www.greenlanesecurity.com
  • 194. compare: air supremacy @alecmuffett www.greenlanesecurity.com
  • 195. You might ask: where’s the harm in cyber/space/security philosophy? @alecmuffett www.greenlanesecurity.com
  • 196. If not to the exclusion of all others? @alecmuffett www.greenlanesecurity.com
  • 197. 1) expansion of the state @alecmuffett www.greenlanesecurity.com
  • 198. What’s a politician more likely to tell the public? 1) “you’re on your own” 2) “we’re sorting it out for you” @alecmuffett www.greenlanesecurity.com
  • 199. Who is better to be responsible for a family’s cybersecurity? 1) the family members 2) state cyber-police @alecmuffett www.greenlanesecurity.com
  • 200. 2) interference in evolution/education @alecmuffett www.greenlanesecurity.com
  • 201. karmic cycle • technologies change • people complain • problems arise • people complain • problems get fixed • people complain @alecmuffett www.greenlanesecurity.com
  • 202. people always complain, but they use and learn. @alecmuffett www.greenlanesecurity.com
  • 203. 3) tunnel vision @alecmuffett www.greenlanesecurity.com
  • 204. let me present an alternative spending model @alecmuffett www.greenlanesecurity.com
  • 205. ...it’s actually a terrible idea - but bear with me for a moment... @alecmuffett www.greenlanesecurity.com
  • 206. if we’re worried about viruses... @alecmuffett www.greenlanesecurity.com
  • 207. why not make anti-virus/anti-malware available on the NHS? @alecmuffett www.greenlanesecurity.com
  • 208. free at the point of use @alecmuffett www.greenlanesecurity.com
  • 209. distributed to all citizens @alecmuffett www.greenlanesecurity.com
  • 210. pick what is suitable for your needs @alecmuffett www.greenlanesecurity.com
  • 211. run “flu jab”-like information campaigns @alecmuffett www.greenlanesecurity.com
  • 212. no huge centralised IT project @alecmuffett www.greenlanesecurity.com
  • 213. a great idea, to the extent limited by bureaucracy, goals and targets @alecmuffett www.greenlanesecurity.com
  • 214. ie: this specific idea would be doomed... @alecmuffett www.greenlanesecurity.com
  • 215. ...and any Government project to lead security would be likewise? @alecmuffett www.greenlanesecurity.com
  • 216. But if you could address security in a distributed manner... @alecmuffett www.greenlanesecurity.com
  • 217. then why instead spend all that taxpayer money centrally? @alecmuffett www.greenlanesecurity.com
  • 218. Perhaps cybersecurity isn’t actually about protecting the public? @alecmuffett www.greenlanesecurity.com
  • 219. But that would mean it’s rubbish. @alecmuffett www.greenlanesecurity.com
  • 220. fin @alecmuffett @alecmuffett www.greenlanesecurity.com