Constantinos Macropoulos. The Militarisation of Cyberspace: Cause, Effect & Correction Author: Constantinos Macropoulos Supervisor: Keith Martin

Embed Size (px)

Citation preview

  • Slide 1

Constantinos Macropoulos Slide 2 The Militarisation of Cyberspace: Cause, Effect & Correction Author: Constantinos Macropoulos Supervisor: Keith Martin Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 South Korea to develop Stuxnet-like cyberweapons BBC, 21 Feb 2014 Slide 9 In the future, it will be vital that we also dominate cyberspace. Michael W. Wynne 2007 Then U.S. Secretary of the Air Force Slide 10 Slide 11 from our perspective, what we are looking at is a global cyber arms race. It is not proceeding at a leisurely or even linear fashion but is in fact accelerating. I wouldn't claim that it is following Moore's Law, but the curve looks kind of similar. Samuel J. Cox 2012 Then Director of Intelligence (J2) U.S. Cyber Command Slide 12 Slide 13 Slide 14 Slide 15 To name but a few . Slide 16 GCHQ data snooping has destroyed trust in British tech Tom Brewster, PC Pro, 08 Nov 2013 Slide 17 Slide 18 We are living in a world after the end of money, where trust is all that sustains economic value. Bars of gold have been replaced by bit streams signed by trusted parties. Eben Moglen 2013 Professor of Law and Legal History Columbia University Slide 19 Slide 20 Saab wins Brazil jet deal after NSA spying sours Boeing bid Alonso Soto & Brian Winter, Reuters, 18 Dec 2013 Slide 21 Slide 22 Slide 23 Belgacom Attack: Britain's GCHQ Hacked Belgian Telecoms Firm Der Spiegel, 01 Sep 2013 NSA targeted Chinese telecoms giant Huawei report Martin Pengelly, The Guardian, 22 Mar 2014 Slide 24 Slide 25 Slide 26 Slide 27 Slide 28 The U.S. Government Wants 6,000 New 'Cyberwarriors' by 2016 Dune Lawrence, Businessweek, 15 Apr 2014 Slide 29 Pentagon Five-Year Cybersecurity Plan Seeks $23 Billion Tony Capaccio, Bloomberg, 10 Jun 2013 Slide 30 Slide 31 Slide 32 BAE cashes in on state cyber war Jim Armitage, The Independent, 01 Oct 2013 Raytheon Gets $9.8 Million Under DARPA's 'Plan X' Cyberwarfare Program Mike Lennon, SecurityWeek, 07 Feb 2014 Slide 33 We wouldnt share this with Google for even $1 million, We dont want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers. Chaouki Bekrar, Vupen Andy Greenberg, Forbes, 21 Mar 2012 Slide 34 Legal goons threaten researcher for reporting security bug Dan Goodin,The Register, 29 Apr 2011 US cybercrime laws being used to target security researchers Tom Brewster, The Guardian, 29 May 2014 Slide 35 Hackers reverse-engineer NSA spy kit using off-the-shelf parts Iain Thomson, The Register, 19 Jun 2014 Slide 36 How much did NSA pay to put a backdoor in RSA crypto? Try $10m report Neil McAllister, The Register, 21 Dec 2013 Tech giants KNEW about PRISM, web snooping, claims top NSA lawyer Iain Thomson, The Register, 20 Mar 2014 NIST denies it weakened its encryption standard to please the NSA Iain Thomson, The Register, 11 Sep 2013 Slide 37 Slide 38 When military leaders are given objectives, they achieve them at whatever collateral cost they are not prohibited from incurring. That is their job. Eben Moglen 2013 Professor of Law and Legal History Columbia University Slide 39 P.F. Chang's Confirms Payment Card Breach: Reverts to Imprinting Devices Mike Lennon, SecurityWeek, 13 Jun 2014 Slide 40 Thank You Slide 41 Slide 42