Stiennon Keynote at Trusted Computing Conference 2013, Orlando

20
Trust: The Lynchpin of Society Thursday, September 12, 13

description

Trust has been broken. Technology will route around trust.

Transcript of Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Page 1: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Trust: The Lynchpin of Society

Thursday, September 12, 13

Page 2: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

June 6, 2013. It begins

2

Thursday, September 12, 13

Page 3: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Why SIGINT Matters

3

Thursday, September 12, 13

Page 4: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Scenarios

• Member of Congress contacts with stock brokers

• Volume of calls between acquirer and target

• CEO-CFO interactions

• Journalist-whistleblower interactions

• Petraeus-Broadwell

4

Guardian image

Thursday, September 12, 13

Page 5: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

If Only It Were Just Meta Data

5

...the Justice Department has secretly interpreted federal surveillance law to permit thousands of low-

ranking analysts to eavesdrop on phone calls.

Thursday, September 12, 13

Page 6: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

“Collect everything”

6

Thursday, September 12, 13

Page 7: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

PRISM’s Rogue Gallery

7

Thursday, September 12, 13

Page 8: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Fall out

8

Thursday, September 12, 13

Page 9: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Trust eroding

9

Thursday, September 12, 13

Page 10: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Industry Responding

10

Thursday, September 12, 13

Page 11: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Too Late

11

Thursday, September 12, 13

Page 12: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Summing Up The Reactions

12

Thursday, September 12, 13

Page 13: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

The Old Threat Hierarchy

• Information Warfare

• CyberCrime

• Hactivism

• Vandalism

• Experimentation13

Thursday, September 12, 13

Page 14: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

The New Threat Hierarchy

• Surveillance State

• Information Warfare

• CyberCrime

• Hactivism

• Vandalism

• Experimentation14

Thursday, September 12, 13

Page 15: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

GENIE is Out Of the Bottle

Additionally, under an extensive effort code-named GENIE, U.S. computer specialists break into foreign networks so that

they can be put under surreptitious U.S. control. Budget documents say the $652 million project has placed "covert implants," sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers

into the millions. -Washington Post

15

Thursday, September 12, 13

Page 16: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Implications for the IT Industry

• The state as threat actor

• Researching NSA malware

• Defending against NSA surveillance

16

Thursday, September 12, 13

Page 17: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

The Enterprise Is Compromised

• If every employee’s email and phone conversations are captured what are breach notification requirements?

• HIPPA?

• GLB?

• SOX?17

Thursday, September 12, 13

Page 18: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Good Times For Trusted Computing?

• A universal threat must be met with universal security

• Spending on encryption set to double within a year

• Protecting keys will lead to massive investment in security

18

Thursday, September 12, 13

Page 19: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

Look For a Ten Fold Increase in Spending

19

0

175

350

525

700

2003 2013 2023

cyber crime

cyber espionage

surveillance state$639 Billion

Thursday, September 12, 13

Page 20: Stiennon Keynote at Trusted Computing Conference 2013, Orlando

A Call To Arms

This new threat to Confidentiality, Integrity, Availability, Privacy, Commerce, Democracy, and Stability, greater than all others, is what Trusted Computing was built to counter. Let’s fix this, before it is too late.

20

Thursday, September 12, 13