Download presentation
Presentation is loading. Please wait.
Published byReginald Blair Modified over 9 years ago
1
Constantinos Macropoulos
2
The Militarisation of Cyberspace: Cause, Effect & Correction Author: Constantinos Macropoulos Supervisor: Keith Martin
8
South Korea to develop Stuxnet-like cyberweapons BBC, 21 Feb 2014
9
“In the future, it will be vital that we also dominate cyberspace.” Michael W. Wynne – 2007 Then U.S. Secretary of the Air Force
11
“from our perspective, what we are looking at is a global cyber arms race. It is not proceeding at a leisurely or even linear fashion but is in fact accelerating. I wouldn't claim that it is following Moore's Law, but the curve looks kind of similar.” Samuel J. Cox – 2012 Then Director of Intelligence (J2) U.S. Cyber Command
15
To name but a few …….
16
GCHQ data snooping has “destroyed trust in British tech” Tom Brewster, PC Pro, 08 Nov 2013
18
We are “living in a world after the end of money, where trust is all that sustains economic value. Bars of gold have been replaced by bit streams signed by trusted parties.” Eben Moglen – 2013 Professor of Law and Legal History Columbia University
20
Saab wins Brazil jet deal after NSA spying sours Boeing bid Alonso Soto & Brian Winter, Reuters, 18 Dec 2013
23
Belgacom Attack: Britain's GCHQ Hacked Belgian Telecoms Firm Der Spiegel, 01 Sep 2013 NSA targeted Chinese telecoms giant Huawei – report Martin Pengelly, The Guardian, 22 Mar 2014
28
The U.S. Government Wants 6,000 New 'Cyberwarriors' by 2016 Dune Lawrence, Businessweek, 15 Apr 2014
29
Pentagon Five-Year Cybersecurity Plan Seeks $23 Billion Tony Capaccio, Bloomberg, 10 Jun 2013
32
BAE cashes in on state ‘cyber war’ Jim Armitage, The Independent, 01 Oct 2013 Raytheon Gets $9.8 Million Under DARPA's 'Plan X' Cyberwarfare Program Mike Lennon, SecurityWeek, 07 Feb 2014
33
“We wouldn’t share this with Google for even $1 million,” “We don’t want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers.” Chaouki Bekrar, Vupen Andy Greenberg, Forbes, 21 Mar 2012
34
Legal goons threaten researcher for reporting security bug Dan Goodin,The Register, 29 Apr 2011 US cybercrime laws being used to target security researchers Tom Brewster, The Guardian, 29 May 2014
35
Hackers reverse-engineer NSA spy kit using off-the-shelf parts Iain Thomson, The Register, 19 Jun 2014
36
How much did NSA pay to put a backdoor in RSA crypto? Try $10m – report Neil McAllister, The Register, 21 Dec 2013 Tech giants KNEW about PRISM, web snooping, claims top NSA lawyer Iain Thomson, The Register, 20 Mar 2014 NIST denies it weakened its encryption standard to please the NSA Iain Thomson, The Register, 11 Sep 2013
38
“When military leaders are given objectives, they achieve them at whatever collateral cost they are not prohibited from incurring. That is their job.” Eben Moglen – 2013 Professor of Law and Legal History Columbia University
39
P.F. Chang's Confirms Payment Card Breach: Reverts to Imprinting Devices Mike Lennon, SecurityWeek, 13 Jun 2014
40
Thank You
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.