red-dragonrising.com©. red-dragonrising.com© red-dragonrising.com©
TRANSCRIPT
Red-DragonRising.com©
Red-DragonRising.com©
Red-DragonRising.com©
Red-DragonRising.com©
中国人民共和国信息戰
LTCOL (RET) William Hagestad II MSc Security Technologies
MSc Management of Technologywww.red-dragonrising.com
中華人民共和國網絡代碼衝突...
What Country Poses The Most Existential Cyber Threat to the World?
Red-DragonRising.com©
Red-DragonRising.com©
“21st Century Chinese Cyber Warfare”
“二十一世紀中國網絡戰”
ISBN: 9781849283342
取締中華人民共和國
Red-DragonRising.com©
ISBN: 978-1482577105
取締中華人民共和國
Red-DragonRising.com©
ISBN: 978-1493771974
取締中華人民共和國
Red-DragonRising.com©
Is China Really the Enemy?
Red-DragonRising.com©
Red-DragonRising.com©
“Thanks to the increased attack traffic seen from Indonesia, ports 80 and 443 were the
most commonly targeted ports, accounting for 41 percent of observed attacks combined.”
Indonesia Overtakes China…
http://www.techinasia.com/report-indonesia-overtakes-china-worlds-biggest-source-online-attacks/
Red-DragonRising.com©
Cyber Adversary Taxonomy
Cyber Threat Motive Targets of Opportunity Methodologies Capabilities
Nation States ~ Peace Time
Economic, Military,National Secrets, Political
Commercial Enterprises, Intelligence, National Defense, Governments, National Infrastructure
Military & Intel specific cyber doctrine, hacktivists
Asymmetric use of the cyber domain short of kinetic
Nation States ~ War Time
Economic, Military, Political
Commercial Enterprises, Intelligence, National Defense, Governments, National Infrastructure
Military & Intel specific cyber doctrine, hacktivists
Asymmetric use of the cyber domain including kinetic
Cyber Terrorists & Insurgents Political Infrastructure, Extortion and Political
ProcessesCombination of advanced persistent threats (APT)
Developing – will be a concern in 2012
Cyber Criminals – Grey & Black Markets Financial
Intellectual Property Theft, Fraud, Theft, Scams, Hijacked Network & Computer Resources, Cyber Crime for Hire
Exploits, Malware Botnets, Worms & Trojans
Cell-based structure as an APT
Criminal Organizations – RBS Financial Use of above with distinct
planningHighly professional, dangerous
Rogue Organizations – Anonymous, LulzSec
FinancialMilitary, National Secrets, Political
Intellectual Property Theft, Direct & Indirect pressure on OGA Resources
Organic hacking capabilities unsurpassed
Organized yet de-centralized
Red-DragonRising.com©
Label Timeframe Purpose Target Nation StateResponsible
Nation State Affected
Stuxnet 2004 - 2007 Cyber / Physical Destruction
Iranian Nuclear Facility @ Natanz US & Israel Islamic Republic of
Iran
Duqu 2007 – 2011 Cyber Counter Intelligence
Industrial Control Systems
US & Israel…Taiwan – Republic
of ChinaMultiple…
Flame 2009 - 2012
Cyber reconnaissance/
cyber data exfiltration…
Cyber espionage
Middle Eastern computer systems US & Israel
Iran, Lebanon, Syria, Sudan, Occupied
Territories of Israel
Gauss 2011 - 2012 Cyber surveillance / Banking Trojan
Middle Eastern Banks Unknown Lebanon, CitiBank &
PayPal
Batch Wiper 2012 Cyber Destruction Iranian Oil
Infrastructure US & Israel Islamic Republic of Iran
Weaponized Malware
Cyber Weapons Impacting Civilian Infrastructure
Red-DragonRising.com©
http://arstechnica.com/security/2012/08/nation-sponsored-malware-has-mystery-warhead/
Cyber Weapons Geo-Infections
Red-DragonRising.com©
謝謝您謝謝您的時間今天有沒有問題?
Red-DragonRising.com©
跟隨紅龍Red-DragonRising #RedDragon1949
http://www.linkedin.com/in/billhagestad
Red-dragonrising.com