Cyber Security 4.0 conference 30 November 2016
-
Upload
infinit-innovationsnetvaerket-for-it -
Category
Technology
-
view
252 -
download
0
Transcript of Cyber Security 4.0 conference 30 November 2016
INFOCALYPSE
Now?
DISCLAIMERWhat I dont know, im not responsible for
And thats a lot!And ill deny knowledge of anything if you hold me accountable!
tVideo-online-print-poet-tech-journalist+certified tinfoil hat
cant code :-(
low mathskills
low/medium tech
High Word Output - acces to mediaplatforms
“…certain frequencies are in fact greatly amplified. These amplified frequencies coincide with radio bands reserved for government use
according to the Federal Communication Commission (FCC). Statistical evidence
suggests the use of helmets may in fact enhance the government's invasive abilities. We
speculate that the government may in fact have started the helmet craze for this reason’http://web.archive.org/web/20100708230258/http://people.csail.mit.edu/rahimi/helmet/
Ali Rahimi1, Ben Recht 2, Jason Taylor
2, Noah Vawter 2
17 Feb 2005
BUT ITS WORSE: TRUMAN SHOW DELUSION COINED 2008 by brothers Joel and Ian Gold
'There are eyes everywhere. No blind spot left. What
shall we dream of when everything becomes visible? We'll dream of being blind …” - Paul Virilio
DYSTOPIAN?Dystopia (greek: dys+topos, BAD og WRONG PLACE)
PRIVACY?
pri•va•cy (prīˈvə-sē)▶
n. The quality or condition of being
secluded from the presence or view of others.
aka: Not being filmed, registrated or being followed
The state of being free from unsanctioned intrusion: a person's
right to privacy. aka: Drawing the Curtains
n. The state of being concealed;
secrecy.ANONYMOUS?
LETS TALK ABOUT SEX!
HIDE AND SEEK?
Some people here THOUGHT they were anonymous….
….and discovered what privacy is….You do that, when you LOSE it!
…and SECRETS are part of human nature…sorry…
figures from Ashley madison hack
Attackers: “The Impact Team"Datadump: +25 gigabytes of company data, including user
details.Only 12.000 of ca. 5 mill. FEMALE user accounts were real
Unfortunately 5.9 mill MALE user accounts were real…1200 saudi men were in the database=in saudi adultery is a
death sentence offence… One company started offering a "search engine" where people
could type email addresses of colleagues or their spouse into the website, and if the email address was on the database leak, then
the company would send them letters threatening that their details were to be exposed unless they paid money to the
company. And theres more…
SUICIDES….On 24 August 2015, Toronto police announced that two
unconfirmed suicides had been linked to the data breach, in addition to "reports of hate crimes connected to the hack.” Unconfirmed reports say a man in the U.S. died by suicide.
On 24 August 2015, a pastor and professor at the New Orleans Baptist Theological Seminary committed suicide
citing the leak that had occurred six days before.
Users whose details were leaked are filing a $567 million class-action lawsuit against Avid Dating Life and Avid Media, the owners of Ashley Madison, through Canadian law firms
Charney Lawyers and Sutts, Strosberg LLP.
HOW THE HELL COULD IT HAPPEN? SECURE DELETE: PROMISES WERENT KEPT!AM made megadatabase - bad encryption…..
WHO ARE YOU?Latanya Sweeney, data privacy lap, in 2000, she showed that 87 percent of all Americans could be uniquely identified using only three bits of information: ZIP code, birthdate, and sex.
‘For almost every person on earth, there is at least one fact
about them stored in a computer database that an adversary could use to blackmail, discriminate against,
harass, or steal the identity of him or her. I mean more than mere embarrassment or inconvenience; I mean legally
cognizable harm’Law professor Paul Ohm
When AOL researchers released a massive dataset of search queries, they first "anonymized" the data by scrubbing user IDs
and IP addresses. When Netflix made a huge database of movie recommendations available for study, it spent time doing
the same thing. Despite scrubbing the obviously identifiable information from the data, computer scientists were able to
identify individual users in both datasets. (The Netflix team then moved on to Twitter users.)
Who would do such a thing, really?
or somebody else? like north korea?
…or these guys?….
Cybercommand CYBERWEAPONS
"USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when
directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.”
6000 employes133 teams!
CYBER-NATO
Something else: PROBLEMS WITH
THE BLUESHIRTS - an invasive spieces Introduction
Digital single marketBIG DATA - Health, trade, Law Enforcement(europol), education
MEGADATABASE
SINGLE POINT OF FAILURE
BLUESHIRTS
Know how to: Use iPhones
Use Facebook and GoogleUse Spreadsheets/powerpoint
Knows NOTHING about: Computers
Information SecurityPrivacy
BlueshirtsCan be very dangerous because they:
Are Executives or Politicians Wants fast results/money
Believes what other blueshirts tell them and hates/are bored by really skilled persons - especially in computers
and they love…..SMART!
S.M.A.R.T
Surveallance Marketed As Revolutionary Technology (Evgene Morozov)
BIG DATA
In 2013 - end of tinfoil hat…
IT WAS ALL TRUE
…and still is - only WORSE
We all freaked out - we have to do something!
So we talked a lot…meanwhile..
We knew it all but NOTHING happened except…
And some blueshirts got hacked again..
Our IOT stuff takes us hostage!
and it isn't really funny…
and the money?
and the trains?
more?
And POLITICS?Cyber-Junta? oh well….
So where are we now?Kneedeep in
IOT-BigData-Surveallance-Economy shit…
SOME=manipulation-machines
Why arent anybody acting? Have we alle become panopticanian narcissists?
So - WTF is going on?
Its the INFOCALYPSE!
INFOCAPOLYPSE IS: Breakdown of informationsociety
No trustBroken/manipulated data(and all digital CAN and will
be manipulated!)Broken infrastructure
Leading to:
Information/CYBER-warfareLeading to:
But…it can (actually)get a lot worse!
CHAMP - or ‘lights out’Counter-electronics High-powered
Microwave Advanced Missile Project (2012….)
and we are much more vulnerable than we believe…
1859….2020?
TWO FUTURE SCENARIOS
1: Everything is fine. We all get rich. And happy. All systems are GO!
SCENARIO 2: All data in privat and public databases are destroyed/copied/maniupulated.
Outside competition rips off all our data, uses it to bankrupt us
Terrorists steals all data - destroys it - destroys us
We fuck up systems and destroy data ourselves
No analog backup - infrastructure starts to collaps.
Moneysystem hacked, trust destroyed - since noone has cash anymore - panic arises.
Citizens lose all trust in the state.
Revolt, kaos…etc…
Three main points: Everything digital can be
manipulatedEverything worth hacking, will be hacked, sometime.
THERE IS NO SUCH THING AS ABSOLUTE DATASECURITY, AND THERE NEVER WILL.
DIGITAL AND SECURE ARE
CONTRADICTIONARY TERMS
WHAT TO DO?Up to you, actually - You can code!
New businessmodel on the net where things cost, what their value is=no more swapping free for surveillance!
Rebuilding of critical infrastructure keeping some analog systems - either as a backup - or as the solution. KILL bad IOT, get control over SCADA.
KEEP CASH! Stop Big Data - seperate databases.
REAL COST-BENEFIT ANALYSIS OF DIGITALIZATION NOW!
ASK CITIZENS BEFORE YOU STORE DATA ABOUT THEMSTORE AS LITTLE DATA AS POSSIBLE.
GET STATES AND GOVERMENT OUT OF FACEBOOK and SOME
IN GENERAL - they will be manipulated!
ANDQUIT PHONE- AND BIGDATA/COMPUTER-FETISHISM
its enough, now, right?
THINK ABOUT HOW TO GET PEOPLE TO LEAVE THIER SCREENS
NOT HOW TO MAKE THEM STAY PUT IN FRONT OF THEM
LETS BREAK THE TRUMAN SHOW DELUSION
We can DO IT!Together!
Questions? Suggestions?