Virtual colloquia for ITEC, TLMN, CSEC, and INFA students
Abstract
Abstract: This educational event will offer an in-depth presentation and discussion about the growing geopolitical competition over cyberspace and its implications for global security. Drawing form research of the Citizen Lab, and in particular the Information Warfare Monitor's Ghostnet and Shadows in the Cloud, Ron Deibert will share prominent trends contributing to cyberspace contestation and will put forward unique perspectives on the broader implications for world politics and security.The Geopolitics of
Cyberspace
Ron Deibert
Director, the Citizen Lab,
University of Toronto
[email protected]
JR02-2009
Information Warfare Monitor
Tracking GhostNet:
http://www.infowar-monitor.net/ghostnet
Investigating a Cyber Espionage Network
March 29, 2009
JOINT REPORT:
Information Warfare Monitor
Shadowserver Foundation
April 6, 2010
SHADOWS IN THE CLOUD:
Investigating Cyber Espionage 2.0
INFOWAR
MONITOR
JR03-2010
WEB VERSION. Also found here:
http://shadows-in-the-cloud.net
ASEAN
Associated Press
Deloitte and Touche
United Nations
Embassy of India, US
Taiwan Stock Exchange
Ministry of Foreign Affairs, Iran
Dept of Foreign Affairs, Indonesia
Embassy of Indonesia, China
High Commission of India, UK
NATO (Germany)
Prime Minister’s Office, Laos
........
Selected Infections
From: "[email protected]"
Date: 25 July 2008
Subject: Translation of Freedom Movement ID Book for Tibetans in Exile
Translation of Freedom Movement ID Book for Tibetans in Exile.
Front Cover
Emblem of the Tibetan government in Exile
Script: Voluntary Contribution into common fund for Tibetan Freedom Movement
Inside Cover
Resolution was passed in the preliminary general body meeting of the
Tibetan Freedom Movement held on July 30, 1972 that the Tibetan
refugees in exile would promise for each individual’s share of the
voluntary contribution into the Tibetan Freedom Movement Receipt book.
This resolution was later reaffirmed by the 11th Tibetan People’s
Deputies and passed into the law on April 01, 1992 (Tibetan King Year
2119)
Until the last page of this book is used, the book stands valid until
August 15, 2012
Date: August 16, 2008
Emblem of the Tibetan Government in Exile
Official Signature
Attachment: Translation of Freedom Movement ID Book for Tibetans in Exile.doc
National Security Council Secretariat
Indian Armed Forces
Indian Defense Contractors
Embassy of India, Kabul,
Embassy of India, Moscow
Embassy of India, US
Consulate General of India, Dubai,
High Commission of India in Abuja, Nigeria
Indian Diplomatic and National Security
Establishment
“Secret” “Classified” “Restricted”
Fusion Methodology
Technical
Interrogation
accomplished through
network probes,
reconnaissance, and
software-based tests
Field Research
undertaken by local
experts in situ;
interviews and tests
Multi-
Disciplinary
Analysis
Advanced data fusion,
visualization & analysis
Global Partnerships
Transformation of Signals
Intelligence
• Cold War Sigint platforms: billions of dollars
• Cyber-collection platform: Cost of
deployment is near zero
• Entered the age of DIY Sigint
The Age of Auto-Surveillance
By NART VILLENEUVE
with a Foreword by
Ron Deibert and Rafal Rohozinski
November 12, 2010
KOOBFACE:
Inside a Crimeware Network
JR04-2010
WEB VERSION. Also found here:
http://www.infowar-monitor.net/koobface
INFOWAR
MONITOR
First Phase (1990s):
Cyber Commons
Liberal “hands off” state regulations; telecom development
policies; dot-com boom; citizen mobilization
Second Phase (2000s):
Cyber Borders
The unintended and perceived negative consequences of an
unfettered Net lead to greater state and corporate intervention
Present Phase (10s):
Cyber Arms Race
Cyberspace has become an object of intense geopolitical
contestation among states and non-state actors alike
Legal and Normative
Measures
Broad use of slander, libel and other
laws to restrict information; create
climate of self censorship
Informal Requests
And other pressures applied to
ISPs and OSPs to “take down” or
remove offensive posts or
information that threatens
“national security”
Outsourcing/
Downloading
Includes decisions taken by private
companies to comply with spirit of
local laws or to turn over
information on users
Just-in-Time Blocking
Disabling or attacking critical
cyberspace assets at key moments in
time (e.g., elections, public
demonstrations)
Computer Network
Attacks
As a component of military action
or low intensity conflict (e.g.,
Estonia, Russia-Georgia
Patriotic Hacking
Government security services
informally encourage or tacitly
approve actions of citizen groups --
China 50 cent party; Russian
Targeted Surveillance/ hackers
Social Malware attacks
Infiltration of adversarial networks
though targeted “social malware”
and drive-by web exploits
Militarization of Cyberspace
Cyber Arms
Race
Cyber Arms Race
Physical Sphere Code sphere Regulatory Idea Sphere
Sphere
The Perfect Storm
The whole human memory can be, and probably in a
short time will be, made accessible to every individual...
It need not be concentrated in any one single place. It
need not be vulnerable as a human head or a human
heart is vulnerable. It can be reproduced exactly and
fully, in Peru, China, Iceland, Central Africa, or wherever
else seems to afford an insurance against danger and
interruption. It can have at once, the concentration of a
craniate animal and the diffused vitality of an amoeba.
H.G. Wells “World Brain” 1937
For more info:
opennet.net
infowar-monitor.net
citizenlab.or