NOT FOR UNAUTHORISED DISTRIBUTION 1 CYBER THREAT: 2015 and beyond – the age of stealth terror and crime.

Slides:



Advertisements
Similar presentations
Outbreak communication Preben Aavitsland. Your role National, regional or local public health office Responsible for outbreak response.
Advertisements

Your Online Footprint. What is Facebook? Facebook is an online social networking site in which young adults can have discussions, connect with friends,
NOT FOR UNAUTHORISED DISTRIBUTION 1 CYBER THEFT: 2014 – and beyond. The wholesale organised theft and use of credit card details
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
Communication during outbreaks Preben Aavitsland.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Cyber-Warfare: The Future is Now!
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
The Philosophy of Exotischism Ignorance Is No Excuse 1 Most of us have heard the old expression "ignorance is no excuse for breaking the law". If courts.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
Multilateral and bilateral development financing mechanisms that integrate climate change and key issues in making these programmes more effective Phil.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
Cyber crime & Security Prepared by : Rughani Zarana.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
© Copyright 2011 (ISC)², Inc. All Rights Reserved. 1.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Deliberative Working Document - Predecisional FOUO Supporting the Secretary’s Top Priorities Eric Coulter, Deputy Director OSD Program Analysis and Evaluation.
ICTs Tackling Climate Changes Dr. Amr Badawi Executive President NTRA.
The role of private security in the protection of critical infrastructures Veerle Pashley Free University of Brussels Department of Criminology.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Information Warfare Playgrounds to Battlegrounds.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Miriam’s Vision: A Response to the 2005 London Bombings Citizenship Different Needs, Common Ground Human Rights & Surveillance.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
INTELLIGENCE SERVICES. The Stratfor Advantage As the world’s leading private intelligence company, Stratfor is able to analyze and deliver timely, accurate.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Assessing Global Political Risks. Types of Political risk Companies have to evaluate all the possible risks that could happen in the potential foreign.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
New World, New World Bank Group Presentation to Fiduciary Forum On Post Crisis Direction and Reforms March 01, 2010.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Hurdles in implementation of cyber security in India.
Week 4. Tonight’s seminar National Security Strategy National Security Strategy Local Response Local Response United Kingdom’s plan United Kingdom’s plan.
Information Warfare Playgrounds to Battlegrounds.
Group 1 FBI, CIA, and Homeland Security. Intoduction Original meaning of Encryption is “secrete writing” The purpose: To secure electronic commerce and.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
3-MINUTE READ THE PREVENT DUTY. What is it and what does it mean for me? This 3-Minute Read summarises the DfE’s document: ‘The Prevent duty: Departmental.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
The Cyber Wars BRIAN ABDO. Geopolitical Agendas  Upswing in hacking with governmental agendas.  Their purpose is to discover information from the targeted.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
BAE systems Research results October 2016
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Information Security Footprint.
Digital Citizenship & Social Media.
Presentation transcript:

NOT FOR UNAUTHORISED DISTRIBUTION 1 CYBER THREAT: 2015 and beyond – the age of stealth terror and crime. Alt3 understanding future risks and opportunities

NOT FOR UNAUTHORISED DISTRIBUTION : I gave a speech outlining the scale and scope of cyber threat – and how much this will impact the world as we know it... and the world as we don’t know it. Predicted that 2015 and following will be an age of increasing cyber warfare and the rise of true cyber terrorism. I already knew my s were routinely viewed by outside agencies. But then all my counter-terrorism material vanished from my laptop. I knew I had someone’s attention. TIMELINE:

NOT FOR UNAUTHORISED DISTRIBUTION 3 Increasing online activity and the increasing sophistication of intrusion techniques mean that 2015 will be a year of: increased intrusion by rogue states and states with an aggressive foreign policy specifically to cause widespread economic and physical damage to other states the hacking of commercial organisations to steal sensitive data the increased use of social media for terrorist propaganda the hacking of individuals by minor criminals to gain access to bank accounts the increased use of the “dark web” by insidious criminals such as drug dealers and paedophiles COUNTRIES NEED TO BE BETTER AT EXPLAINING THE NEED FOR SURVEILLANCE ORGANISATIONS NEED TO BE BETTER AT PROTECTING THEIR DATA

NOT FOR UNAUTHORISED DISTRIBUTION 4 CYBER WARFARE This is the 21 st century. You don’t have to defeat an army on the battlefield to win the war. 2013: cyber warfare considered a greater threat to US interests than AQ 2014: increasing intrusion at a national security level. “Hackers” threaten to close down nuclear power plants in South Korea. Following investigations, this became widely viewed as an act of cyber warfare with a political purpose by a nearby state.

NOT FOR UNAUTHORISED DISTRIBUTION 5 Making sure everyone has the same understanding: Definition of war (20 th century): “shock and awe” – large armies, zooming planes, lots of munitions, long distance PR based on front line news comments from the boots on the ground. High risk. High cost. Lots of death. Anti-war demonstrations. Election issue. War-weariness. Definition of war (21 st century): Silence. You don’t know it’s happening. People continue on their daily lives while beneath the surface the war rages … with cyber vulnerabilities exposed and people believing they are safe. Ignorance is bliss.

NOT FOR UNAUTHORISED DISTRIBUTION 6 Making sure everyone has the same understanding: CYBER WARFARE: Instead of the high risk / high cost / high opposition dismantling an entire country through traditional warfare, cyber warfare can essentially close down that country at the press of a button … … or at least inflict serious economic damage. But … the trouble is … anyone with a grudge can potentially do this. And the world is full of very intelligent people.

NOT FOR UNAUTHORISED DISTRIBUTION 7 Hidden Reality: Welcome to the turbulent 21 st century. The war is already raging … and many people are blissfully unaware. Hacking became known in the 1960’s It became prevalent in the 1980’s It became industrialised in the 2000’s It broke the surface into public knowledge in 2010 with Stuxnet 2010,US Pentagon sets up U.S. Cyber Command 2013 – 2014 the rise of internet comms as a means of stealth command and control / propaganda, increasing the pressure for surveillance and overall control Estimated cost to produce and distribute Stuxnet: $380K Cost of a Tomahawk Cruise missile (2011): $1.41M Traditional 20 th century armies, cost: $billions

NOT FOR UNAUTHORISED DISTRIBUTION 8 Hidden Reality. IF you had to fight a war what would you do? If you don't understand the risks, how can you prepare? Can you afford to let the issues be blurred? Stealth Vs “shock and awe” – what would you go for? Low cost efficiency Vs high cost / high risk – what would you go for? This is the 21 st century. “You don’t have to defeat an army on the battlefield to win the war” For the past 5 years cyber warfare has been raging. Most people don’t even know it.

NOT FOR UNAUTHORISED DISTRIBUTION 9 Hidden Reality: Cyber Warfare is: a “game” of cat and mouse something all the major powers are engaged in initially around IP theft and defensive security now major multinational vulnerability and threat assessment and when found out … becomes a “blame game” includes the balance between the freedom of the net and control of information in the face of social media mass movements and / or terrorist propaganda The world is changing. The pace of change is increasing. The more we live our lives on line, the greater the automation, the greater the “footprints in the sand” – and the greater the vulnerability.

NOT FOR UNAUTHORISED DISTRIBUTION 10 Cyber Warfare Vulnerabilities: Critical Infrastructure – any core system an advanced country requires to maintain its daily operations: transport health financial energy water government - not a move away from high tech IP theft or financial crime but an evolution into national security.

NOT FOR UNAUTHORISED DISTRIBUTION 11 In todays fragile economic climate … what if … … one of these critical service sectors was to be suddenly unavailable? There would be: chaos a momentum of chaos an attempted sudden imposition of “control” from the centre devaluation potential social disintegration Welcome to the turbulent 21 st century. You don’t have to defeat an army on the battlefield to win the war.

NOT FOR UNAUTHORISED DISTRIBUTION 12 In todays fragile economic climate … in the next 2-3 years … Cyber Warfare will become the number ONE priority for national security. (closely followed by terrorism and then rogue, extremist states – all of which are linked) And within this timeframe there will be at least one major global / regional intrusion episode with a severe damage probability. Do not make the mistake of thinking bad things just happen to other people.

NOT FOR UNAUTHORISED DISTRIBUTION 13 So, who’s doing this? Major global / international powers o aggressive foreign policy o stealth warfare o seeking to steal IP and gain commercial benefit o even as a means of defence Extremist states Other countries Extremist and anarchist groups including terrorists Industrial espionage hackers Mischief makers … and we are The war is raging. It is gathering pace.

NOT FOR UNAUTHORISED DISTRIBUTION 14 Evidence? Full Scale and Massive Intrusion. The open secret: large scale IP theft that can not take place without national knowledge – originally to steal commercial secrets, now mainly to steal the technology secrets that are at the core of modern defence systems the constant probing of defences by potentially hostile powers – most developed countries now have a budget for cyber defence and often for cyber offence Dates for some major national level cyber attacks: Baltic States – 2007 Georgia – 2008 Ukraine – 2014 South Korea

NOT FOR UNAUTHORISED DISTRIBUTION 15 The point is … it exists it is a fact of life it is more prevalent than most people realise it is set to become even more prevalent no one is immune to the potential consequences of cyber war In a highly competitive world when there is conflict or the risk of conflict (therefore the need to defend) countries want that low cost / low risk option.

NOT FOR UNAUTHORISED DISTRIBUTION 16 The targets of Cyber war – FACTS: 1. The world is becoming more “automated” – faster, more global, more communicative. 2. every time you make a phone call, every time you engage in a transaction, every time you visit a web page, every comment you make on line … you leave a footprint. This is “high availability” data. 3. every time an organisation electronically touches the outside world for any reason … they create their own footprint. Crucially, they do so through gateways. 4. If not guarded properly these on line gateways are in fact open doors. 5. Cyber warfare and a large proportion of cyber crime focuses on finding a route through these open doors or poorly guarded gateways. 6. This is “vulnerability”.

NOT FOR UNAUTHORISED DISTRIBUTION 17 What do we need to do? Understand the nature of vulnerability: what are the national vulnerabilities? do bad things really just happen to someone else? what are the common international vulnerabilities? from where are the common threats? what is the common ground? Build alliances. it’s not “us against the world”. There IS a shared threat and a common ground. The world is changing. The pace of change is increasing. Reach out. You will be surprised at who our friends are with whom we share a common goal.

NOT FOR UNAUTHORISED DISTRIBUTION 18 The Greatest Threat? Nationalism? The belief it’s us against the world and no one else can be trusted. FACT: there are many of us who share the same threat there are many of us who share the same vulnerabilities shared defence creates greater security this means mutual respect, benefits AND privacy no one member is greater than any of the others This is our only viable future.

NOT FOR UNAUTHORISED DISTRIBUTION onward: Countries need to work together to form a common shield against: rogue and aggressive states currently engaged in cyber warfare the use of social media as a terrorist propaganda tool Police organisations need to work closely together to prevent: organised crime / cyber criminals paedophiles Business organisations need to be more aware of: the changing nature of the threat against them their vulnerability

NOT FOR UNAUTHORISED DISTRIBUTION 20 Thank you. If you don't understand the risks, how can you prepare? Can you afford to let the issues be blurred?