Geopolitics of cyberspace

Abstract

Abstract: This educational event will offer an in-depth presentation and discussion about the growing geopolitical competition over cyberspace and its implications for global security. Drawing form research of the Citizen Lab, and in particular the Information Warfare Monitor's Ghostnet and Shadows in the Cloud, Ron Deibert will share prominent trends contributing to cyberspace contestation and will put forward unique perspectives on the broader implications for world politics and security.The Geopolitics of Cyberspace Ron Deibert Director, the Citizen Lab, University of Toronto [email protected] JR02-2009 Information Warfare Monitor Tracking GhostNet: http://www.infowar-monitor.net/ghostnet Investigating a Cyber Espionage Network March 29, 2009 JOINT REPORT: Information Warfare Monitor Shadowserver Foundation April 6, 2010 SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0 INFOWAR MONITOR JR03-2010 WEB VERSION. Also found here: http://shadows-in-the-cloud.net ASEAN Associated Press Deloitte and Touche United Nations Embassy of India, US Taiwan Stock Exchange Ministry of Foreign Affairs, Iran Dept of Foreign Affairs, Indonesia Embassy of Indonesia, China High Commission of India, UK NATO (Germany) Prime Minister’s Office, Laos ........ Selected Infections From: "[email protected]" Date: 25 July 2008 Subject: Translation of Freedom Movement ID Book for Tibetans in Exile Translation of Freedom Movement ID Book for Tibetans in Exile. Front Cover Emblem of the Tibetan government in Exile Script: Voluntary Contribution into common fund for Tibetan Freedom Movement Inside Cover Resolution was passed in the preliminary general body meeting of the Tibetan Freedom Movement held on July 30, 1972 that the Tibetan refugees in exile would promise for each individual’s share of the voluntary contribution into the Tibetan Freedom Movement Receipt book. This resolution was later reaffirmed by the 11th Tibetan People’s Deputies and passed into the law on April 01, 1992 (Tibetan King Year 2119) Until the last page of this book is used, the book stands valid until August 15, 2012 Date: August 16, 2008 Emblem of the Tibetan Government in Exile Official Signature Attachment: Translation of Freedom Movement ID Book for Tibetans in Exile.doc National Security Council Secretariat Indian Armed Forces Indian Defense Contractors Embassy of India, Kabul, Embassy of India, Moscow Embassy of India, US Consulate General of India, Dubai, High Commission of India in Abuja, Nigeria Indian Diplomatic and National Security Establishment “Secret” “Classified” “Restricted” Fusion Methodology Technical Interrogation accomplished through network probes, reconnaissance, and software-based tests Field Research undertaken by local experts in situ; interviews and tests Multi- Disciplinary Analysis Advanced data fusion, visualization & analysis Global Partnerships Transformation of Signals Intelligence • Cold War Sigint platforms: billions of dollars • Cyber-collection platform: Cost of deployment is near zero • Entered the age of DIY Sigint The Age of Auto-Surveillance By NART VILLENEUVE with a Foreword by Ron Deibert and Rafal Rohozinski November 12, 2010 KOOBFACE: Inside a Crimeware Network JR04-2010 WEB VERSION. Also found here: http://www.infowar-monitor.net/koobface INFOWAR MONITOR First Phase (1990s): Cyber Commons Liberal “hands off” state regulations; telecom development policies; dot-com boom; citizen mobilization Second Phase (2000s): Cyber Borders The unintended and perceived negative consequences of an unfettered Net lead to greater state and corporate intervention Present Phase (10s): Cyber Arms Race Cyberspace has become an object of intense geopolitical contestation among states and non-state actors alike Legal and Normative Measures Broad use of slander, libel and other laws to restrict information; create climate of self censorship Informal Requests And other pressures applied to ISPs and OSPs to “take down” or remove offensive posts or information that threatens “national security” Outsourcing/ Downloading Includes decisions taken by private companies to comply with spirit of local laws or to turn over information on users Just-in-Time Blocking Disabling or attacking critical cyberspace assets at key moments in time (e.g., elections, public demonstrations) Computer Network Attacks As a component of military action or low intensity conflict (e.g., Estonia, Russia-Georgia Patriotic Hacking Government security services informally encourage or tacitly approve actions of citizen groups -- China 50 cent party; Russian Targeted Surveillance/ hackers Social Malware attacks Infiltration of adversarial networks though targeted “social malware” and drive-by web exploits Militarization of Cyberspace Cyber Arms Race Cyber Arms Race Physical Sphere Code sphere Regulatory Idea Sphere Sphere The Perfect Storm The whole human memory can be, and probably in a short time will be, made accessible to every individual... It need not be concentrated in any one single place. It need not be vulnerable as a human head or a human heart is vulnerable. It can be reproduced exactly and fully, in Peru, China, Iceland, Central Africa, or wherever else seems to afford an insurance against danger and interruption. It can have at once, the concentration of a craniate animal and the diffused vitality of an amoeba. H.G. Wells “World Brain” 1937 For more info: opennet.net infowar-monitor.net citizenlab.or

    Similar works