Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Titan Rain


Published on

In 2004 a security admin at Sandia Labs uncovered wide spread foreign agent spying within the US research labs and agencies. This is his story.

  • Be the first to comment

  • Be the first to like this

Titan Rain

  1. 1. Shawn Carpenter and the inside story of Titan Rain <ul><li>Richard Stiennon </li></ul><ul><li>Chief Research Analyst </li></ul><ul><li>IT-Harvest </li></ul><ul><li>Blog: </li></ul><ul><li> </li></ul>
  2. 2. <ul><li>Blog: </li></ul><ul><li> </li></ul>
  3. 3. Agenda China and the RMA Shawn Carpenter Repercussions Past is prologue
  4. 4. China Revolution in Military Affairs
  5. 5. Sun Szu on spies “ Only a brilliant ruler or a wise general who can use the highly intelligent for espionage is sure of great success.”
  6. 6. Allen Dulles on Sun Tzu “ It is no wonder that Sun Tzu's Book is a favorite of Mao Tse-Tung and is required reading For Chinese Communist tacticians” -A.W. Dulles, The Craft of Intelligence
  7. 7. A Chinese Communist Tactician “ Sun Tzu is a grand strategist without parallel in history” - Chai Yuqui, Nanjing Army Command Academy, Speaking at 6 th annual international conference on Sun Tzu and the Art of War, 2004, Beijing
  8. 8. Chinese Thinking Wang Qingsong, Modern Military-Use High Technology, 1993 Zhu Youwen, Feng Yi,and Xu Dechi, Information War Under High Tech Conditions1994 Li Qingshan, New Military Revolution and High Tech War, 1995 Wang Pufeng, InformationWarfare and the Revolution in Military Affairs, Beijing: 1995; Zhu Xiaoli and Zhao Xiaozhuo, The United States and Russia in the New Military Revolution,1996; Li Qingshan, New Military Revolution and High Tech War, 1995 Dai Shenglong and Shen Fuzhen, Information Warfare and Information Security Strategy, 1996 Shen Weiguang, On New War 1997
  9. 9. Decoding The Virtual Dragon “ Network confrontation technology — intercepting, utilizing, corrupting, and damaging the enemy’s information and using false information, viruses, and other means to sabotage normal information system functions through computer networks.” -General Xu Xiaoyan, the former head of the Communications Department of the Chinese General Staff. 2004
  10. 10. Thomas Makes a Point “ If Xu’s suggestions were accepted, then one might expect to see more active reconnaissance and intelligence activities on the part of the PLA(as seems to be occurring!)” That exclamation point is Thomas’s. It refers to Shawn Carpenter and Titan Rain
  11. 11. Shawn Carpenter Cyber Warrior
  12. 12. Introducing Shawn Carpenter
  13. 13. Introducing Shawn Carpenter
  14. 14. Introducing Shawn Carpenter
  15. 15. One Good Thing About IPv4 A source IP address from an attack on Lockheed Martin is noticed. “ I had accessed a Chinese server that was involved in the compromises. And during that access I discovered a file on that server entitled 1.txt. That file contained an internal port scan or an internal scan of Fort Dix military installation.” -Shawn Carpenter Deposition
  16. 16. Backhacking . &quot;I backhacked into a computer system and found evidence that perhaps hundreds of defense contractors had been compromised,&quot; Carpenter testified. He determined that breaches occurred at Fort Dix, the Redstone Arsenal, the Defense Contract Management Agency and the World Bank, and that the hacking was coming from South Korea. -Albuquerque Journal
  17. 17. Sandia's Response &quot;We don't care about any of this. We only care about Sandia computers. Stop what you're doing. Stop whatever you are doing.&quot; Shawn's immediate supervisor
  18. 18. Shawn works with Military Counter Intelligence The summer of 2004 Shawn works with CI to uncover sources of attack
  19. 19. Shawn becomes a confidential informant for FBI Initial meeting with FBI October, 2004 Trade craft: Meeting in the stacks of the University Be careful when working with geeks!
  20. 20. All's Well That Ends Well. NOT
  21. 21. Chinese Cyber Espionage Continues Northrup Grumman United States-China Economic and Security Review Commission report. 11-1-09
  22. 22. Aftermath Past is Prologue
  23. 23. Ghost Net, Google, Oil and Gas <ul><li>Pentagon email compromise, 2007 </li></ul><ul><li>Ghostnet report published by SecDev March 2009 </li></ul><ul><li>Google Hacked December 2009 </li></ul><ul><li>Oil and gas commercial attacks 2009-10 </li></ul><ul><li>US Secretary of States goes on record </li></ul><ul><li>China denies </li></ul>