red-dragonrising.com©. red-dragonrising.com© red-dragonrising.com©

15
Red-DragonRising.com©

Upload: ralf-rich

Post on 16-Jan-2016

226 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

Page 2: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

Page 3: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

Page 4: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

中国人民共和国信息戰

LTCOL (RET) William Hagestad II MSc Security Technologies

MSc Management of Technologywww.red-dragonrising.com

[email protected]

中華人民共和國網絡代碼衝突...

What Country Poses The Most Existential Cyber Threat to the World?

Page 5: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

Page 6: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

“21st Century Chinese Cyber Warfare”

“二十一世紀中國網絡戰”

ISBN: 9781849283342

取締中華人民共和國

Page 7: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

ISBN:  978-1482577105

取締中華人民共和國

Page 8: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

ISBN:  978-1493771974

取締中華人民共和國

Page 9: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

Is China Really the Enemy?

Red-DragonRising.com©

Page 10: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

“Thanks to the increased attack traffic seen from Indonesia, ports 80 and 443 were the

most commonly targeted ports, accounting for 41 percent of observed attacks combined.”

Indonesia Overtakes China…

http://www.techinasia.com/report-indonesia-overtakes-china-worlds-biggest-source-online-attacks/

Page 11: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

Cyber Adversary Taxonomy

Cyber Threat Motive Targets of Opportunity Methodologies Capabilities

Nation States ~ Peace Time

Economic, Military,National Secrets, Political

Commercial Enterprises, Intelligence, National Defense, Governments, National Infrastructure

Military & Intel specific cyber doctrine, hacktivists

Asymmetric use of the cyber domain short of kinetic

Nation States ~ War Time

Economic, Military, Political

Commercial Enterprises, Intelligence, National Defense, Governments, National Infrastructure

Military & Intel specific cyber doctrine, hacktivists

Asymmetric use of the cyber domain including kinetic

Cyber Terrorists & Insurgents Political Infrastructure, Extortion and Political 

ProcessesCombination of advanced persistent threats (APT)

Developing – will be a concern in 2012

Cyber Criminals – Grey & Black Markets Financial

Intellectual Property Theft, Fraud, Theft, Scams, Hijacked Network & Computer Resources, Cyber Crime for Hire

Exploits, Malware Botnets, Worms & Trojans

Cell-based structure as an APT

Criminal Organizations – RBS Financial Use of above with distinct 

planningHighly professional, dangerous

Rogue Organizations – Anonymous, LulzSec

FinancialMilitary, National Secrets, Political

Intellectual Property Theft,  Direct & Indirect pressure on OGA Resources

Organic hacking capabilities unsurpassed

Organized yet de-centralized

Page 12: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

Label Timeframe Purpose Target Nation StateResponsible

Nation State Affected

Stuxnet 2004 - 2007 Cyber / Physical Destruction

Iranian Nuclear Facility @ Natanz US & Israel Islamic Republic of

Iran

Duqu 2007 – 2011 Cyber Counter Intelligence

Industrial Control Systems

US & Israel…Taiwan – Republic

of ChinaMultiple…

Flame 2009 - 2012

Cyber reconnaissance/

cyber data exfiltration…

Cyber espionage

Middle Eastern computer systems US & Israel

Iran, Lebanon, Syria, Sudan, Occupied

Territories of Israel

Gauss 2011 - 2012 Cyber surveillance / Banking Trojan

Middle Eastern Banks Unknown Lebanon, CitiBank &

PayPal

Batch Wiper 2012 Cyber Destruction Iranian Oil

Infrastructure US & Israel Islamic Republic of Iran

Weaponized Malware

Cyber Weapons Impacting Civilian Infrastructure

Page 13: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

http://arstechnica.com/security/2012/08/nation-sponsored-malware-has-mystery-warhead/

Cyber Weapons Geo-Infections

Page 14: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

謝謝您謝謝您的時間今天有沒有問題?

Page 15: Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Red-DragonRising.com©

跟隨紅龍Red-DragonRising #RedDragon1949

http://www.linkedin.com/in/billhagestad

Red-dragonrising.com