SlideShare une entreprise Scribd logo
1  sur  43
Jorge Sebastiao
Nashville TN, USA
Middle East Cyber-wars V1.3
Agenda
New World order
It’s different
Asymetrical
Resourceful
Tribal
Physical
Q&A
2
New World world order
Middle East+++
New World world order
Offensive
Evolving Maturities…
Maturity and Capabilities
• Brazil
• Canada
• Italy
• Sweden
• Netherlands
• Finland
• Japan
• Australia
• Pakistan
• Saudi
Arabia
• UAE
• South Africa
• India
• South
Korea
• North Korea
• Germany
• Turkey
• Taiwan
• Estonia
• Iran
• France
• UK
• Israel
• USA
• China
• Russia
National CISRT
 Oman (also OIC CERT)
 Malaysia (Impact)
 Iran
 UAE
 Qatar
 Saudi Arabia
 Bahrain
 Kuwait
 Turkey
 Egypt
 Pakistan
 India
 Cyprus 7
1980s 1990s 2000s 2010s1960s-70s
Hardware
Software
Networking
Cyber
Evolution
Timeline
Mainframe
Private/limited
Limited
Internet
PCs Mobile DevicesDistributed Computing
Everything networked
Timesharing Productivity
Everything as a Service
Cloud
Simple
Viruses & Worms
Social Engineering
APT
Widespread
Viruses & Worms
Local Area Networks
Social Networksemail
eCommerce
BotnetsTrojan Horses
It just got more complicated…
Internet of Things
State Sponsored
Market places
Glass house of Critical
Infrastructures
They always get through
Firewalls IDS
IPS
Anti-Virus
Content
Hackers
Cybercrime
Cyber terrorism
Now What?Cyber espionage
Cyber war
DLP
It’s different
• Support Jihad
• Hack for Money funding
• Disrupt Critical Infrastructure
• Cyber weapons Development
• Experience, Training, Recruiting
• Online alliances
Powerful cyber attack:
propaganda
• Old fashioned
• Media
• Some faked in English papers
• Abu Ghraib photos
• On-going Videos
• Real political damage
Blurred Lines
Connecting the …
War and Cyber war
• Olympic Games
• Stuxnet
• Duqu/Flame/Gauss
• Shamoon
• “Stuxnet a mistake…
Stuxnet 3 years without a
trace…
• Target
• Type Nuclear Plant
• Victim Iran
• Motivation Destroy Centrifuges
• Compromise
• Social Engineering – Memory Stick
• Vector SCADA Systems
• Vulnerability Windows/Siemens
• Response
• Disclosure Jun 2010
• Iran Replaces 1000 Centrifuges
• Win/Siemens Patches
16
Flame May 2012 - 2+
Years
Flame
• ME Espionage
• Sabotage
• Size/Modularity
• Gaming Language
• Obfuscation???
• Repurposed
Duqu/Flame/Gauss
Scope
Shamoon Aug 12
• Holiday gift
• Targets
– Saudi Aramco, 32K machines
– Ragas, 2 weeks downtime
• Major Disruption
• Could have been a lot worse
• After effects of response
persist
Warfare
• Attack
– Israeli stock exchange
– El airlines
– several banks
– posting of stolen Israeli credit cards
• Retaliation
– posting personal information 100 of
• Saudis
• Egyptians
• Syrians
Mahdi Attack Jul 12
• Data-stealing Trojan
• social engineering
• Records
– Keystrokes
– Screen shots
– Audio
– Steal text &
image files
Drone Loss
• key logger virus infected American Predator & Reaper
• Sep 2013- Iranian officials completed decoding the
surveillance data & software extracted from CIA Drone
“… the CIA's "lost" stealth drone to an intact landing
inside hostile territory by exploiting a navigational
weakness long-known to the US military, …”
Iran Hijacked US Drone, Says Iranian Engineer: [HSEC-1.10; Date: 15-Dec-2011; Source:
http://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer DHS Open Source Enterprise Daily Cyber Report, 16-Dec-
2011, Unclassified.
US Banks under DDOS attack
Iran Attack by team Jul 2013
Iran Attack by team Jul 2013
Iran 4th Largest Cyber Army
• Thecnological envelope, protect
critical infrastructure
• Stop and foil attacks
• Separate communications network
• Attack capability
• Cyber Commander short Dead
Syrian Electronic Army
• Turkey May 2013 –coordinated with
Anonymous, attacked Prime
Minister’s official website, access to
staff email, passwords, & phone
numbers.
• Marjor attack against USA
organizations
• Head 19 years old
Syriam Electronic Army
• Headed by 19 years old
• Names disclused
• Shutdown of VICE
Syria & Palestine & Israel
• Israel subject to major attack
• Under the radar
• Israel Carmel Tunnel Security
Camera CCTV System, 8 hours
shudown of road
• Haifa water infrastructure
Somalia
Indonesia source of attacks
India
Pakistan
Egypt
Saudi Arabia
UAE
Kuwait
Qatar
Bahrain
60m
12m
6m
4.7m
1.7m
0.8m
0.3m
0.2m
Critical Infrastructure
cable cuts
Mutual on-going attacks
• DDOS
• Defacements
• Privacy Disclusre
• Financial Sector Attacks
Defending 60-100Gbps DDOS
Arms Race
• US
• Israel
• Turkey
• Iran
• Saudi Arabia
• UAE
• Pakistan
• India
18 Critical Infrastructure
Sectors
Think outside the box
38
Creative Weapons
39
All about Risk
Failure on P>D+R
41
What all about how fast you
run?
Questions

Contenu connexe

Tendances

Cyber Attack Phase Progression
Cyber Attack Phase ProgressionCyber Attack Phase Progression
Cyber Attack Phase ProgressionWilliam Kiss
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
introduction of Cyber securit
introduction of Cyber securitintroduction of Cyber securit
introduction of Cyber securitMohammed Kassem
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security BasitShah18
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generationTony Lauro
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
ANDROID SECURITY - THE LEADING ISSUE BY PRATIK RATHOD
ANDROID SECURITY - THE LEADING ISSUE BY PRATIK RATHODANDROID SECURITY - THE LEADING ISSUE BY PRATIK RATHOD
ANDROID SECURITY - THE LEADING ISSUE BY PRATIK RATHODpratikrathodnetsquare1
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 

Tendances (20)

Cyber Attack Phase Progression
Cyber Attack Phase ProgressionCyber Attack Phase Progression
Cyber Attack Phase Progression
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
introduction of Cyber securit
introduction of Cyber securitintroduction of Cyber securit
introduction of Cyber securit
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
News Bytes June 2012
News Bytes June 2012News Bytes June 2012
News Bytes June 2012
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
Security Bytes - null Trivandrum Meet-august 2013
Security Bytes - null Trivandrum Meet-august 2013Security Bytes - null Trivandrum Meet-august 2013
Security Bytes - null Trivandrum Meet-august 2013
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
ANDROID SECURITY - THE LEADING ISSUE BY PRATIK RATHOD
ANDROID SECURITY - THE LEADING ISSUE BY PRATIK RATHODANDROID SECURITY - THE LEADING ISSUE BY PRATIK RATHOD
ANDROID SECURITY - THE LEADING ISSUE BY PRATIK RATHOD
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 

En vedette

Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack
Infosecurity Europe 2014 Case Study:  Shamoon, a two stage targeted attackInfosecurity Europe 2014 Case Study:  Shamoon, a two stage targeted attack
Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attackSeculert
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins ResumePaul Mullins
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015AFCEA International
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Jorge Sebastiao
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)Valeriu Margescu
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502Bill Hagestad II
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsMikko Jakonen
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...AFCEA International
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Ulrich Janßen
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)TBSS Group
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015AFCEA International
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015AFCEA International
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving TheatreRadware
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 

En vedette (20)

ISIS and Cyber Terrorism
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber Terrorism
 
Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack
Infosecurity Europe 2014 Case Study:  Shamoon, a two stage targeted attackInfosecurity Europe 2014 Case Study:  Shamoon, a two stage targeted attack
Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
 
HA10 – Task 1
HA10 – Task 1HA10 – Task 1
HA10 – Task 1
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 

Similaire à Infowarcon 2014 ME Cyber wars v13

2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat ReviewESET
 
Craig wilson
Craig wilsonCraig wilson
Craig wilsonIPPAI
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityEric Kavanagh
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 
Cyber security and user privacy
Cyber security and user privacyCyber security and user privacy
Cyber security and user privacyJay Tripathy
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial SectorLIFARS
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is ImpossibleRichard Stiennon
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...IT Arena
 
Internet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security ConcernsInternet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security ConcernsAkshay Jain
 

Similaire à Infowarcon 2014 ME Cyber wars v13 (20)

2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Craig wilson
Craig wilsonCraig wilson
Craig wilson
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
Cyber security and user privacy
Cyber security and user privacyCyber security and user privacy
Cyber security and user privacy
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015
 
Security Bytes - July 2013
Security Bytes -  July 2013Security Bytes -  July 2013
Security Bytes - July 2013
 
Why Risk Management Fails
Why Risk Management FailsWhy Risk Management Fails
Why Risk Management Fails
 
Cyber war
Cyber warCyber war
Cyber war
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is Impossible
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...
 
Internet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security ConcernsInternet and Global Connectivity – Security Concerns
Internet and Global Connectivity – Security Concerns
 

Plus de Jorge Sebastiao

Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchainJorge Sebastiao
 
Blockchain and covid19 v3
Blockchain and covid19 v3Blockchain and covid19 v3
Blockchain and covid19 v3Jorge Sebastiao
 
Top tech shapping startups
Top tech shapping startupsTop tech shapping startups
Top tech shapping startupsJorge Sebastiao
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3Jorge Sebastiao
 
The road to blockchain 5.0
The road to blockchain 5.0The road to blockchain 5.0
The road to blockchain 5.0Jorge Sebastiao
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH editionJorge Sebastiao
 
How AI is Disrupting Traffic Management in Smart City
How AI is DisruptingTraffic Management in Smart CityHow AI is DisruptingTraffic Management in Smart City
How AI is Disrupting Traffic Management in Smart CityJorge Sebastiao
 
Ai and traffic management application v1.0
Ai and traffic management application v1.0Ai and traffic management application v1.0
Ai and traffic management application v1.0Jorge Sebastiao
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsJorge Sebastiao
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Jorge Sebastiao
 
AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1Jorge Sebastiao
 
Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2Jorge Sebastiao
 
Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1Jorge Sebastiao
 
Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Jorge Sebastiao
 
Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Jorge Sebastiao
 
RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4Jorge Sebastiao
 
IGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumIGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumJorge Sebastiao
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasJorge Sebastiao
 
AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?Jorge Sebastiao
 
Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Jorge Sebastiao
 

Plus de Jorge Sebastiao (20)

Real estate tokenization and blockchain
Real estate tokenization and blockchainReal estate tokenization and blockchain
Real estate tokenization and blockchain
 
Blockchain and covid19 v3
Blockchain and covid19 v3Blockchain and covid19 v3
Blockchain and covid19 v3
 
Top tech shapping startups
Top tech shapping startupsTop tech shapping startups
Top tech shapping startups
 
Blockchain and security v3
Blockchain and security v3Blockchain and security v3
Blockchain and security v3
 
The road to blockchain 5.0
The road to blockchain 5.0The road to blockchain 5.0
The road to blockchain 5.0
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH edition
 
How AI is Disrupting Traffic Management in Smart City
How AI is DisruptingTraffic Management in Smart CityHow AI is DisruptingTraffic Management in Smart City
How AI is Disrupting Traffic Management in Smart City
 
Ai and traffic management application v1.0
Ai and traffic management application v1.0Ai and traffic management application v1.0
Ai and traffic management application v1.0
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threats
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3
 
AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1AI HR and Future Jobs Version 2.1
AI HR and Future Jobs Version 2.1
 
Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2Cyber fear obstacles to info sharing-Version 2
Cyber fear obstacles to info sharing-Version 2
 
Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1Blockchain & cyber security Algeria Version 1.1
Blockchain & cyber security Algeria Version 1.1
 
Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3Datamatix GCC HR future jobs Version 1.3
Datamatix GCC HR future jobs Version 1.3
 
Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2Cyber security crypto blockchain Version 3.2
Cyber security crypto blockchain Version 3.2
 
RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4RTA AI for traffic management version 1.4
RTA AI for traffic management version 1.4
 
IGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance ForumIGF2017 Data is new oil - UN Internet Governance Forum
IGF2017 Data is new oil - UN Internet Governance Forum
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and Gas
 
AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?AVSEC are you flying cybersafe?
AVSEC are you flying cybersafe?
 
Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7Are we ready for IoT? VU Version 7
Are we ready for IoT? VU Version 7
 

Dernier

Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 

Dernier (20)

Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 

Infowarcon 2014 ME Cyber wars v13

  • 1. Jorge Sebastiao Nashville TN, USA Middle East Cyber-wars V1.3
  • 2. Agenda New World order It’s different Asymetrical Resourceful Tribal Physical Q&A 2
  • 5. New World world order Offensive
  • 6. Evolving Maturities… Maturity and Capabilities • Brazil • Canada • Italy • Sweden • Netherlands • Finland • Japan • Australia • Pakistan • Saudi Arabia • UAE • South Africa • India • South Korea • North Korea • Germany • Turkey • Taiwan • Estonia • Iran • France • UK • Israel • USA • China • Russia
  • 7. National CISRT  Oman (also OIC CERT)  Malaysia (Impact)  Iran  UAE  Qatar  Saudi Arabia  Bahrain  Kuwait  Turkey  Egypt  Pakistan  India  Cyprus 7
  • 8. 1980s 1990s 2000s 2010s1960s-70s Hardware Software Networking Cyber Evolution Timeline Mainframe Private/limited Limited Internet PCs Mobile DevicesDistributed Computing Everything networked Timesharing Productivity Everything as a Service Cloud Simple Viruses & Worms Social Engineering APT Widespread Viruses & Worms Local Area Networks Social Networksemail eCommerce BotnetsTrojan Horses It just got more complicated… Internet of Things State Sponsored Market places
  • 9. Glass house of Critical Infrastructures
  • 10. They always get through Firewalls IDS IPS Anti-Virus Content Hackers Cybercrime Cyber terrorism Now What?Cyber espionage Cyber war DLP
  • 11. It’s different • Support Jihad • Hack for Money funding • Disrupt Critical Infrastructure • Cyber weapons Development • Experience, Training, Recruiting • Online alliances
  • 12. Powerful cyber attack: propaganda • Old fashioned • Media • Some faked in English papers • Abu Ghraib photos • On-going Videos • Real political damage
  • 15. War and Cyber war • Olympic Games • Stuxnet • Duqu/Flame/Gauss • Shamoon • “Stuxnet a mistake…
  • 16. Stuxnet 3 years without a trace… • Target • Type Nuclear Plant • Victim Iran • Motivation Destroy Centrifuges • Compromise • Social Engineering – Memory Stick • Vector SCADA Systems • Vulnerability Windows/Siemens • Response • Disclosure Jun 2010 • Iran Replaces 1000 Centrifuges • Win/Siemens Patches 16
  • 17. Flame May 2012 - 2+ Years
  • 18. Flame • ME Espionage • Sabotage • Size/Modularity • Gaming Language • Obfuscation??? • Repurposed
  • 20. Shamoon Aug 12 • Holiday gift • Targets – Saudi Aramco, 32K machines – Ragas, 2 weeks downtime • Major Disruption • Could have been a lot worse • After effects of response persist
  • 21. Warfare • Attack – Israeli stock exchange – El airlines – several banks – posting of stolen Israeli credit cards • Retaliation – posting personal information 100 of • Saudis • Egyptians • Syrians
  • 22. Mahdi Attack Jul 12 • Data-stealing Trojan • social engineering • Records – Keystrokes – Screen shots – Audio – Steal text & image files
  • 23. Drone Loss • key logger virus infected American Predator & Reaper • Sep 2013- Iranian officials completed decoding the surveillance data & software extracted from CIA Drone “… the CIA's "lost" stealth drone to an intact landing inside hostile territory by exploiting a navigational weakness long-known to the US military, …” Iran Hijacked US Drone, Says Iranian Engineer: [HSEC-1.10; Date: 15-Dec-2011; Source: http://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer DHS Open Source Enterprise Daily Cyber Report, 16-Dec- 2011, Unclassified.
  • 24. US Banks under DDOS attack
  • 25. Iran Attack by team Jul 2013
  • 26. Iran Attack by team Jul 2013
  • 27. Iran 4th Largest Cyber Army • Thecnological envelope, protect critical infrastructure • Stop and foil attacks • Separate communications network • Attack capability • Cyber Commander short Dead
  • 28. Syrian Electronic Army • Turkey May 2013 –coordinated with Anonymous, attacked Prime Minister’s official website, access to staff email, passwords, & phone numbers. • Marjor attack against USA organizations • Head 19 years old
  • 29. Syriam Electronic Army • Headed by 19 years old • Names disclused • Shutdown of VICE
  • 30. Syria & Palestine & Israel • Israel subject to major attack • Under the radar • Israel Carmel Tunnel Security Camera CCTV System, 8 hours shudown of road • Haifa water infrastructure
  • 34. Mutual on-going attacks • DDOS • Defacements • Privacy Disclusre • Financial Sector Attacks
  • 36. Arms Race • US • Israel • Turkey • Iran • Saudi Arabia • UAE • Pakistan • India
  • 42. What all about how fast you run?