Cyber Security 4.0 conference 30 November 2016

54
INFOCALYPSE Now?

Transcript of Cyber Security 4.0 conference 30 November 2016

Page 1: Cyber Security 4.0 conference 30 November 2016

INFOCALYPSE

Now?

Page 2: Cyber Security 4.0 conference 30 November 2016

DISCLAIMERWhat I dont know, im not responsible for

And thats a lot!And ill deny knowledge of anything if you hold me accountable!

Page 3: Cyber Security 4.0 conference 30 November 2016

tVideo-online-print-poet-tech-journalist+certified tinfoil hat

cant code :-(

low mathskills

low/medium tech

High Word Output - acces to mediaplatforms

Page 4: Cyber Security 4.0 conference 30 November 2016

“…certain frequencies are in fact greatly amplified. These amplified frequencies coincide with radio bands reserved for government use

according to the Federal Communication Commission (FCC). Statistical evidence

suggests the use of helmets may in fact enhance the government's invasive abilities. We

speculate that the government may in fact have started the helmet craze for this reason’http://web.archive.org/web/20100708230258/http://people.csail.mit.edu/rahimi/helmet/

Ali Rahimi1, Ben Recht 2, Jason Taylor

2, Noah Vawter 2

17 Feb 2005

Page 5: Cyber Security 4.0 conference 30 November 2016

BUT ITS WORSE: TRUMAN SHOW DELUSION COINED 2008 by brothers Joel and Ian Gold

'There are eyes everywhere. No blind spot left. What

shall we dream of when everything becomes visible? We'll dream of being blind …” - Paul Virilio

Page 6: Cyber Security 4.0 conference 30 November 2016

DYSTOPIAN?Dystopia (greek: dys+topos, BAD og WRONG PLACE)

PRIVACY?

Page 7: Cyber Security 4.0 conference 30 November 2016

pri•va•cy (prīˈvə-sē)▶

n. The quality or condition of being

secluded from the presence or view of others.

aka: Not being filmed, registrated or being followed

The state of being free from unsanctioned intrusion: a person's

right to privacy. aka: Drawing the Curtains

n. The state of being concealed;

secrecy.ANONYMOUS?

Page 8: Cyber Security 4.0 conference 30 November 2016

LETS TALK ABOUT SEX!

Page 9: Cyber Security 4.0 conference 30 November 2016

HIDE AND SEEK?

Page 10: Cyber Security 4.0 conference 30 November 2016

Some people here THOUGHT they were anonymous….

….and discovered what privacy is….You do that, when you LOSE it!

…and SECRETS are part of human nature…sorry…

Page 11: Cyber Security 4.0 conference 30 November 2016

figures from Ashley madison hack

Attackers: “The Impact Team"Datadump: +25 gigabytes of company data, including user

details.Only 12.000 of ca. 5 mill. FEMALE user accounts were real

Unfortunately 5.9 mill MALE user accounts were real…1200 saudi men were in the database=in saudi adultery is a

death sentence offence… One company started offering a "search engine" where people

could type email addresses of colleagues or their spouse into the website, and if the email address was on the database leak, then

the company would send them letters threatening that their details were to be exposed unless they paid money to the

company. And theres more…

Page 12: Cyber Security 4.0 conference 30 November 2016

SUICIDES….On 24 August 2015, Toronto police announced that two

unconfirmed suicides had been linked to the data breach, in addition to "reports of hate crimes connected to the hack.” Unconfirmed reports say a man in the U.S. died by suicide.

On 24 August 2015, a pastor and professor at the New Orleans Baptist Theological Seminary committed suicide

citing the leak that had occurred six days before.

Users whose details were leaked are filing a $567 million class-action lawsuit against Avid Dating Life and Avid Media, the owners of Ashley Madison, through Canadian law firms

Charney Lawyers and Sutts, Strosberg LLP.

Page 13: Cyber Security 4.0 conference 30 November 2016

HOW THE HELL COULD IT HAPPEN? SECURE DELETE: PROMISES WERENT KEPT!AM made megadatabase - bad encryption…..

Page 14: Cyber Security 4.0 conference 30 November 2016

WHO ARE YOU?Latanya Sweeney, data privacy lap, in 2000, she showed that 87 percent of all Americans could be uniquely identified using only three bits of information: ZIP code, birthdate, and sex.

‘For almost every person on earth, there is at least one fact

about them stored in a computer database that an adversary could use to blackmail, discriminate against,

harass, or steal the identity of him or her. I mean more than mere embarrassment or inconvenience; I mean legally

cognizable harm’Law professor Paul Ohm

When AOL researchers released a massive dataset of search queries, they first "anonymized" the data by scrubbing user IDs

and IP addresses. When Netflix made a huge database of movie recommendations available for study, it spent time doing

the same thing. Despite scrubbing the obviously identifiable information from the data, computer scientists were able to

identify individual users in both datasets. (The Netflix team then moved on to Twitter users.)

Page 15: Cyber Security 4.0 conference 30 November 2016

Who would do such a thing, really?

Page 16: Cyber Security 4.0 conference 30 November 2016

or somebody else? like north korea?

Page 17: Cyber Security 4.0 conference 30 November 2016

…or these guys?….

Page 18: Cyber Security 4.0 conference 30 November 2016

Cybercommand CYBERWEAPONS

"USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when

directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.”

6000 employes133 teams!

Page 19: Cyber Security 4.0 conference 30 November 2016

CYBER-NATO

Page 20: Cyber Security 4.0 conference 30 November 2016

http://map.norsecorp.com/#/

Honey-pot-game?

Page 21: Cyber Security 4.0 conference 30 November 2016

Something else: PROBLEMS WITH

THE BLUESHIRTS - an invasive spieces Introduction

Page 22: Cyber Security 4.0 conference 30 November 2016

Digital single marketBIG DATA - Health, trade, Law Enforcement(europol), education

MEGADATABASE

SINGLE POINT OF FAILURE

Page 23: Cyber Security 4.0 conference 30 November 2016

BLUESHIRTS

Know how to: Use iPhones

Use Facebook and GoogleUse Spreadsheets/powerpoint

Knows NOTHING about: Computers

Information SecurityPrivacy

Page 24: Cyber Security 4.0 conference 30 November 2016

BlueshirtsCan be very dangerous because they:

Are Executives or Politicians Wants fast results/money

Believes what other blueshirts tell them and hates/are bored by really skilled persons - especially in computers

and they love…..SMART!

Page 25: Cyber Security 4.0 conference 30 November 2016

S.M.A.R.T

Surveallance Marketed As Revolutionary Technology (Evgene Morozov)

Page 26: Cyber Security 4.0 conference 30 November 2016

BIG DATA

Page 27: Cyber Security 4.0 conference 30 November 2016

In 2013 - end of tinfoil hat…

Page 28: Cyber Security 4.0 conference 30 November 2016

IT WAS ALL TRUE

Page 29: Cyber Security 4.0 conference 30 November 2016

…and still is - only WORSE

Page 30: Cyber Security 4.0 conference 30 November 2016

We all freaked out - we have to do something!

Page 31: Cyber Security 4.0 conference 30 November 2016

So we talked a lot…meanwhile..

Page 32: Cyber Security 4.0 conference 30 November 2016

We knew it all but NOTHING happened except…

Page 33: Cyber Security 4.0 conference 30 November 2016

And some blueshirts got hacked again..

Page 34: Cyber Security 4.0 conference 30 November 2016

Our IOT stuff takes us hostage!

Page 35: Cyber Security 4.0 conference 30 November 2016

and it isn't really funny…

Page 36: Cyber Security 4.0 conference 30 November 2016

and the money?

Page 37: Cyber Security 4.0 conference 30 November 2016

and the trains?

Page 38: Cyber Security 4.0 conference 30 November 2016

more?

Page 39: Cyber Security 4.0 conference 30 November 2016

And POLITICS?Cyber-Junta? oh well….

Page 40: Cyber Security 4.0 conference 30 November 2016

So where are we now?Kneedeep in

IOT-BigData-Surveallance-Economy shit…

Page 41: Cyber Security 4.0 conference 30 November 2016

SOME=manipulation-machines

Page 42: Cyber Security 4.0 conference 30 November 2016

Why arent anybody acting? Have we alle become panopticanian narcissists?

Page 43: Cyber Security 4.0 conference 30 November 2016

So - WTF is going on?

Page 44: Cyber Security 4.0 conference 30 November 2016

Its the INFOCALYPSE!

Page 45: Cyber Security 4.0 conference 30 November 2016

INFOCAPOLYPSE IS: Breakdown of informationsociety

No trustBroken/manipulated data(and all digital CAN and will

be manipulated!)Broken infrastructure

Leading to:

Information/CYBER-warfareLeading to:

Page 46: Cyber Security 4.0 conference 30 November 2016

But…it can (actually)get a lot worse!

Page 47: Cyber Security 4.0 conference 30 November 2016

CHAMP - or ‘lights out’Counter-electronics High-powered

Microwave Advanced Missile Project (2012….)

Page 48: Cyber Security 4.0 conference 30 November 2016

and we are much more vulnerable than we believe…

1859….2020?

Page 49: Cyber Security 4.0 conference 30 November 2016

TWO FUTURE SCENARIOS

1: Everything is fine. We all get rich. And happy. All systems are GO!

Page 50: Cyber Security 4.0 conference 30 November 2016

SCENARIO 2: All data in privat and public databases are destroyed/copied/maniupulated.

Outside competition rips off all our data, uses it to bankrupt us

Terrorists steals all data - destroys it - destroys us

We fuck up systems and destroy data ourselves

No analog backup - infrastructure starts to collaps.

Moneysystem hacked, trust destroyed - since noone has cash anymore - panic arises.

Citizens lose all trust in the state.

Revolt, kaos…etc…

Page 51: Cyber Security 4.0 conference 30 November 2016

Three main points: Everything digital can be

manipulatedEverything worth hacking, will be hacked, sometime.

THERE IS NO SUCH THING AS ABSOLUTE DATASECURITY, AND THERE NEVER WILL.

DIGITAL AND SECURE ARE

CONTRADICTIONARY TERMS

Page 52: Cyber Security 4.0 conference 30 November 2016

WHAT TO DO?Up to you, actually - You can code!

New businessmodel on the net where things cost, what their value is=no more swapping free for surveillance!

Rebuilding of critical infrastructure keeping some analog systems - either as a backup - or as the solution. KILL bad IOT, get control over SCADA.

KEEP CASH! Stop Big Data - seperate databases.

REAL COST-BENEFIT ANALYSIS OF DIGITALIZATION NOW!

ASK CITIZENS BEFORE YOU STORE DATA ABOUT THEMSTORE AS LITTLE DATA AS POSSIBLE.

GET STATES AND GOVERMENT OUT OF FACEBOOK and SOME

IN GENERAL - they will be manipulated!

Page 53: Cyber Security 4.0 conference 30 November 2016

ANDQUIT PHONE- AND BIGDATA/COMPUTER-FETISHISM

its enough, now, right?

THINK ABOUT HOW TO GET PEOPLE TO LEAVE THIER SCREENS

NOT HOW TO MAKE THEM STAY PUT IN FRONT OF THEM

LETS BREAK THE TRUMAN SHOW DELUSION

We can DO IT!Together!

Page 54: Cyber Security 4.0 conference 30 November 2016

Questions? Suggestions?