SlideShare uma empresa Scribd logo
1 de 11
The South Asian Cyber Security Landscape PostSnowden
Introduction – Yours truly…
• Independent Cyber Security Analyst
• Specialization: the cyber security landscapes of the wider Middle
East, Central Asia, and Indian Subcontinent
• Former staff member at iDefense, Inc., now independent
• Longtime professional linguist of Arabic, Turkish, Farsi, Dari, Tajik,
Hindi, Urdu, and German
• Interest in hacking and computers since childhood…
• Research: chronicle evolution of cyber security landscape in
Middle East, Subcontinent, and Central Asia, as objectively
and neutrally as possible
• Better understanding through comparative analysis –
especially geopolitical and socio-economic contexts driving
these cyber security landscapes!
The South Asian Cyber Security Landscape PostSnowden
The Edward Snowden revelations of massive scale espionage
activities conducted by the US’ NSA and other intelligence agencies
continues to have profound effects on the collective cyber security
landscape of the entire world.
This includes of course the South Asian cyber security
landscape…
The South Asian Cyber Security Landscape PostSnowden
The Snowden revelations seem to be working
like a giant catalyst stimulating wider global
cyber security arms race…

“National internets” in which countries can better
enforce their respective laws, controls, and
sovereignty in general…
Discussion of fully domestic internet infrastructure
that ensure transmitted data does not leave
respective national borders!
Examples:
“Internetz”
The Iranian “halal internet”…
Etc. etc. …
The South Asian Cyber Security Landscape PostSnowden
A number of countries working on their own internet surveillance
programs, much like PRISM…
• India working on National Cyber Coordination Centre
• Said to target metadata more than actual content, with only
metadata of concern or interest flagged for later content
analysis
• Controversial in India itself; calls for oversight, better privacy
laws, etc. likely to intensify
Pakistan itself taking similar action -- talk of beefing up PKCERT, put
in place cyber security strategy for Pakistan, setting up an interservices cyber command, etc. etc. – the trend continues…
Talk of possible treaties between India and Pakistan preventing
targeting of nuclear installations, etc. - likely wishful thinking…
The South Asian Cyber Security Landscape PostSnowden
More “state actor” hacker groups likely to proliferate in South Asia,
along the lines of what we already see in the Middle East…

Syrian Electronic Army, led by Ali Farha (above) – targeting Viber, Twitter,
Tango, Washington Post, Al-Jazeera, any news outlets it perceives as
against Bashar Al-Asad…
The South Asian Cyber Security Landscape PostSnowden

Syria’s closest regional political ally is Iran, with wide-ranging military
security cooperation ongoing between both countries…

Gen. Ghassem Soleimani’s Quds Brigade (left) currently training Al-Asad
military; in 2012, Deutsche Welle publishes claim of Iran Information
Ministry cyber security assistance to Syria.
The Cyber Security Landscapes of the Middle East and
the Indian Subcontinent: A Brief Comparative Analysis
Base ingredients for this to happen are already present…
The South Asian Cyber Security Landscape PostSnowden
Brazil, Russia, India, China, and South Africa (BRICS countries)
recently had a meeting in which they expressed their desire to
decrease reliance across the board on US sourced internet
technology…
• Drive for greater technological independence in India long-time part
of Indian political discourse!
• Huawei!
• Snowden revelations likely to accelerate these efforts, though
results of these efforts likely not forthcoming overnight…
Snowden revelations have indicated that US is targeting China's
Tsinghua university, one of China's leading research and
development universities…
• Snowden revelations confirm not altogether unknown fact:
essentially, everybody spying against everybody!
The South Asian Cyber Security Landscape PostSnowden
Especially post-StuxNet, SCADA attacks have been high on the agenda as goals among
Middle Easter hacker Groups! Snowden revelations will definitely accelerate this
trend…

… but translations of the Hebrew
captions revealed nonsense words,
strongly suggesting a forgery.

The SEA itself soon denied having
done the attack in a Twitter release…

Headlines ensued in June 2013 that the Syrian
Electronic Army had succeeded in breaching a
SCADA system at a water and electricity utility
station in Haifa, Israel…
The South Asian Cyber Security Landscape PostSnowden
Conclusions…
• Snowden revelations to accelerate global cyber arms race
dramatically!
• New national cyber espionage programs of various kinds will
proliferate all over the world, surprises likely forthcoming…
• Commercial companies specializing in cyber espionage likely to
proliferate
• Some headquartered in countries with lax or nonexistent cyber
laws, to safeguard offensive cyber espionage from legal
pursuit…
• “National” or “indigenous” internets will get fairly significant impetus,
especially for ensuring route of data not to cross systems in US or
other outside country
• Of ancillary importance here: TLDs able to be made using nonEnglish characters
• To some limited degree, Balkanization of internet? Debatable,
uncertain…
• Essentially, cyber IN-security is the new normal.
The South Asian Cyber Security Landscape PostSnowden

…

Mais conteúdo relacionado

Mais procurados

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
bl26ehre
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
ClubHack
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 

Mais procurados (20)

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Destaque

Shaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applicationsShaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applications
Moeez Shem
 

Destaque (13)

PwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao PãuloPwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao Pãulo
 
Graphene
GrapheneGraphene
Graphene
 
Graphene presentation
Graphene presentationGraphene presentation
Graphene presentation
 
Graphene : Properties and uses
Graphene : Properties and usesGraphene : Properties and uses
Graphene : Properties and uses
 
Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility
 
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structureIB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
 
What Is Graphene?
What Is Graphene?What Is Graphene?
What Is Graphene?
 
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic BondingIB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
 
Application of Graphene in electronics
Application of Graphene in electronicsApplication of Graphene in electronics
Application of Graphene in electronics
 
Synthesis of graphene
Synthesis of grapheneSynthesis of graphene
Synthesis of graphene
 
Shaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applicationsShaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applications
 
Graphene
GrapheneGraphene
Graphene
 
Graphene and its future applications
Graphene and its future applicationsGraphene and its future applications
Graphene and its future applications
 

Semelhante a ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan

The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
Nicholas Poole
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
Paul Joyal
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 
FINANCIAL JIHAD PRESENTATION
FINANCIAL JIHAD  PRESENTATIONFINANCIAL JIHAD  PRESENTATION
FINANCIAL JIHAD PRESENTATION
Kelli Waxman
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
Benjamin Ang
 

Semelhante a ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan (20)

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
114-116
114-116114-116
114-116
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - Maccaglia
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Cyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptxCyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptx
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
Media Pitch
Media PitchMedia Pitch
Media Pitch
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
FINANCIAL JIHAD PRESENTATION
FINANCIAL JIHAD  PRESENTATIONFINANCIAL JIHAD  PRESENTATION
FINANCIAL JIHAD PRESENTATION
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Snarky Security. Monthly Digest. 2024-04.pdf
Snarky Security. Monthly Digest. 2024-04.pdfSnarky Security. Monthly Digest. 2024-04.pdf
Snarky Security. Monthly Digest. 2024-04.pdf
 

Mais de Priyanka Aash

Mais de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan

  • 1. The South Asian Cyber Security Landscape PostSnowden Introduction – Yours truly… • Independent Cyber Security Analyst • Specialization: the cyber security landscapes of the wider Middle East, Central Asia, and Indian Subcontinent • Former staff member at iDefense, Inc., now independent • Longtime professional linguist of Arabic, Turkish, Farsi, Dari, Tajik, Hindi, Urdu, and German • Interest in hacking and computers since childhood… • Research: chronicle evolution of cyber security landscape in Middle East, Subcontinent, and Central Asia, as objectively and neutrally as possible • Better understanding through comparative analysis – especially geopolitical and socio-economic contexts driving these cyber security landscapes!
  • 2. The South Asian Cyber Security Landscape PostSnowden The Edward Snowden revelations of massive scale espionage activities conducted by the US’ NSA and other intelligence agencies continues to have profound effects on the collective cyber security landscape of the entire world. This includes of course the South Asian cyber security landscape…
  • 3. The South Asian Cyber Security Landscape PostSnowden The Snowden revelations seem to be working like a giant catalyst stimulating wider global cyber security arms race… “National internets” in which countries can better enforce their respective laws, controls, and sovereignty in general… Discussion of fully domestic internet infrastructure that ensure transmitted data does not leave respective national borders! Examples: “Internetz” The Iranian “halal internet”… Etc. etc. …
  • 4. The South Asian Cyber Security Landscape PostSnowden A number of countries working on their own internet surveillance programs, much like PRISM… • India working on National Cyber Coordination Centre • Said to target metadata more than actual content, with only metadata of concern or interest flagged for later content analysis • Controversial in India itself; calls for oversight, better privacy laws, etc. likely to intensify Pakistan itself taking similar action -- talk of beefing up PKCERT, put in place cyber security strategy for Pakistan, setting up an interservices cyber command, etc. etc. – the trend continues… Talk of possible treaties between India and Pakistan preventing targeting of nuclear installations, etc. - likely wishful thinking…
  • 5. The South Asian Cyber Security Landscape PostSnowden More “state actor” hacker groups likely to proliferate in South Asia, along the lines of what we already see in the Middle East… Syrian Electronic Army, led by Ali Farha (above) – targeting Viber, Twitter, Tango, Washington Post, Al-Jazeera, any news outlets it perceives as against Bashar Al-Asad…
  • 6. The South Asian Cyber Security Landscape PostSnowden Syria’s closest regional political ally is Iran, with wide-ranging military security cooperation ongoing between both countries… Gen. Ghassem Soleimani’s Quds Brigade (left) currently training Al-Asad military; in 2012, Deutsche Welle publishes claim of Iran Information Ministry cyber security assistance to Syria.
  • 7. The Cyber Security Landscapes of the Middle East and the Indian Subcontinent: A Brief Comparative Analysis Base ingredients for this to happen are already present…
  • 8. The South Asian Cyber Security Landscape PostSnowden Brazil, Russia, India, China, and South Africa (BRICS countries) recently had a meeting in which they expressed their desire to decrease reliance across the board on US sourced internet technology… • Drive for greater technological independence in India long-time part of Indian political discourse! • Huawei! • Snowden revelations likely to accelerate these efforts, though results of these efforts likely not forthcoming overnight… Snowden revelations have indicated that US is targeting China's Tsinghua university, one of China's leading research and development universities… • Snowden revelations confirm not altogether unknown fact: essentially, everybody spying against everybody!
  • 9. The South Asian Cyber Security Landscape PostSnowden Especially post-StuxNet, SCADA attacks have been high on the agenda as goals among Middle Easter hacker Groups! Snowden revelations will definitely accelerate this trend… … but translations of the Hebrew captions revealed nonsense words, strongly suggesting a forgery. The SEA itself soon denied having done the attack in a Twitter release… Headlines ensued in June 2013 that the Syrian Electronic Army had succeeded in breaching a SCADA system at a water and electricity utility station in Haifa, Israel…
  • 10. The South Asian Cyber Security Landscape PostSnowden Conclusions… • Snowden revelations to accelerate global cyber arms race dramatically! • New national cyber espionage programs of various kinds will proliferate all over the world, surprises likely forthcoming… • Commercial companies specializing in cyber espionage likely to proliferate • Some headquartered in countries with lax or nonexistent cyber laws, to safeguard offensive cyber espionage from legal pursuit… • “National” or “indigenous” internets will get fairly significant impetus, especially for ensuring route of data not to cross systems in US or other outside country • Of ancillary importance here: TLDs able to be made using nonEnglish characters • To some limited degree, Balkanization of internet? Debatable, uncertain… • Essentially, cyber IN-security is the new normal.
  • 11. The South Asian Cyber Security Landscape PostSnowden …

Notas do Editor

  1. http://www.dev-point.com/vb/t286148.html