SlideShare uma empresa Scribd logo
1 de 54
Baixar para ler offline
INFOCALYPSE
Now?
DISCLAIMER
What I dont know, im not responsible for
And thats a lot!

And ill deny knowledge of anything if you hold me accountable!

tVideo-online-print-poet-tech-journalist+certified tinfoil hat
cant code :-(
low mathskills
low/
medium tech
High Word Output - acces to
mediaplatforms
“…certain frequencies are in fact greatly
amplified. These amplified frequencies coincide
with radio bands reserved for government use
according to the Federal Communication
Commission (FCC). Statistical evidence
suggests the use of helmets may in fact enhance
the government's invasive abilities. We
speculate that the government may in fact have
started the helmet craze for this reason’

http://web.archive.org/web/20100708230258/http://people.csail.mit.edu/rahimi/helmet/
Ali Rahimi1,
Ben Recht 2,
Jason Taylor
2, Noah
Vawter 2
17 Feb 2005
BUT ITS WORSE: TRUMAN SHOW DELUSION

COINED 2008 by brothers Joel and Ian Gold
'There are eyes everywhere. 

No blind spot left. What
shall we dream of when everything becomes visible? We'll
dream of being blind …” - Paul Virilio
DYSTOPIAN?
Dystopia (greek: dys+topos, BAD og WRONG PLACE)
PRIVACY?
pri•va•cy (prīˈvə-sē)▶
n.
The quality or condition of being
secluded from the presence or view of
others.
aka: Not being filmed, registrated or
being followed

The state of being free from
unsanctioned intrusion: a person's
right to privacy.

aka: Drawing the Curtains
n.
The state of being concealed;
secrecy.

ANONYMOUS?
LETS TALK ABOUT SEX!
HIDE AND SEEK?








Some people here THOUGHT they were
anonymous….
….and discovered what privacy is….

You do that, when you LOSE it!
…and SECRETS are part of human nature…sorry…
figures from Ashley
madison hack
Attackers: “The Impact Team"

Datadump: +25 gigabytes of company data, including user
details.

Only 12.000 of ca. 5 mill. FEMALE user accounts were real

Unfortunately 5.9 mill MALE user accounts were real…

1200 saudi men were in the database=in saudi adultery is a
death sentence offence…

One company started offering a "search engine" where people
could type email addresses of colleagues or their spouse into the
website, and if the email address was on the database leak, then
the company would send them letters threatening that their
details were to be exposed unless they paid money to the
company.

And theres more…
SUICIDES….
On 24 August 2015, Toronto police announced that two
unconfirmed suicides had been linked to the data breach, in
addition to "reports of hate crimes connected to the hack.”
Unconfirmed reports say a man in the U.S. died by suicide.

On 24 August 2015, a pastor and professor at the New
Orleans Baptist Theological Seminary committed suicide
citing the leak that had occurred six days before.
Users whose details were leaked are filing a $567 million
class-action lawsuit against Avid Dating Life and Avid Media,
the owners of Ashley Madison, through Canadian law firms
Charney Lawyers and Sutts, Strosberg LLP.
HOW THE HELL COULD IT HAPPEN?
SECURE DELETE: PROMISES WERENT KEPT!

AM made megadatabase - bad encryption…..
WHO ARE YOU?
Latanya Sweeney, data privacy lap, in 2000, she showed that
87 percent of all Americans could be uniquely identified using
only three bits of information: ZIP code, birthdate, and sex.


‘For almost every person on earth, there is at least one fact
about them stored in a computer database that an
adversary could use to blackmail, discriminate against,
harass, or steal the identity of him or her. I mean more than
mere embarrassment or inconvenience; I mean legally
cognizable harm’

Law professor Paul Ohm

When AOL researchers released a massive dataset of search
queries, they first "anonymized" the data by scrubbing user IDs
and IP addresses. When Netflix made a huge database of
movie recommendations available for study, it spent time doing
the same thing. Despite scrubbing the obviously identifiable
information from the data, computer scientists were able to
identify individual users in both datasets. (The Netflix team then
moved on to Twitter users.)

Who would do such a thing, really?
or somebody else? like north
korea?
…or these guys?….
Cybercommand

CYBERWEAPONS
"USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the
operations and defense of specified Department of Defense information networks and; prepare to, and when
directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains,
ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.”
6000 employes

133 teams!
CYBER-NATO
http://
map.norsecorp.com/#/
Honey-pot-game?
Something else: 

PROBLEMS WITH 

THE BLUESHIRTS - an invasive spieces

Introduction
Digital single market
BIG DATA - Health, trade, Law Enforcement(europol), education



MEGADATABASE



SINGLE POINT OF FAILURE
BLUESHIRTS
Know how to: 

Use iPhones

Use Facebook and Google

Use Spreadsheets/powerpoint
Knows NOTHING about: 

Computers

Information Security

Privacy

Blueshirts
Can be very dangerous because they: 

Are Executives or Politicians

Wants fast results/money
Believes what other blueshirts tell them

and hates/are bored by really skilled persons - especially in computers
and they love…..SMART!
S.M.A.R.T
Surveallance Marketed As Revolutionary Technology

(Evgene Morozov)
BIG DATA
In 2013 - end of tinfoil hat…
IT WAS ALL TRUE
…and still is - only WORSE
We all freaked out - we have to do something!
So we talked a lot…meanwhile..
We knew it all but NOTHING
happened except…
And some blueshirts
got hacked again..
Our IOT stuff takes us hostage!
and it isn't really funny…
and the money?
and the trains?
more?
And POLITICS?

Cyber-Junta? oh well….
So where are we now?

Kneedeep in 

IOT-BigData-Surveallance-Economy shit…
SOME=manipulation-machines
Why arent anybody acting? Have we alle become
panopticanian narcissists?
So - WTF is going on?
Its the INFOCALYPSE!
INFOCAPOLYPSE IS: 

Breakdown of informationsociety

No trust

Broken/manipulated data(and all digital CAN and will
be manipulated!)

Broken infrastructure



Leading to: 

Information/CYBER-warfare

Leading to:
But…it can (actually)get a lot worse!
CHAMP - or ‘lights out’

Counter-electronics High-powered
Microwave Advanced Missile
Project (2012….)
and we are much more
vulnerable than we believe…
1859….2020?
TWO FUTURE
SCENARIOS
1: Everything is fine. We all get rich. And happy.

All systems are GO!
SCENARIO 2:
All data in privat and public databases are destroyed/copied/maniupulated. 

Outside competition rips off all our data, uses it to bankrupt us


Terrorists steals all data - destroys it - destroys us



We fuck up systems and destroy data ourselves


No analog backup - infrastructure starts to collaps.


Moneysystem hacked, trust destroyed - since noone has cash anymore -
panic arises.


Citizens lose all trust in the state.


Revolt, kaos…etc…

Three main points: 

Everything digital can be
manipulated
Everything worth hacking, will be hacked, sometime.
THERE IS NO SUCH THING AS ABSOLUTE
DATASECURITY, AND THERE NEVER WILL.



DIGITAL AND SECURE ARE 

CONTRADICTIONARY TERMS
WHAT TO DO?Up to you, actually - You can code!
New businessmodel on the net where things cost, what their value
is=no more swapping free for surveillance!
Rebuilding of critical infrastructure keeping some analog systems
- either as a backup - or as the solution.
KILL bad IOT, get control over SCADA.
KEEP CASH!
Stop Big Data - seperate databases.

REAL COST-BENEFIT ANALYSIS OF DIGITALIZATION NOW!


ASK CITIZENS BEFORE YOU STORE DATA ABOUT THEM

STORE AS LITTLE DATA AS POSSIBLE.



GET STATES AND GOVERMENT OUT OF FACEBOOK and SOME
IN GENERAL - they will be manipulated! 

AND
QUIT PHONE- AND BIGDATA/COMPUTER-FETISHISM 

its enough, now, right?


THINK ABOUT HOW TO GET PEOPLE TO LEAVE THIER
SCREENS

NOT HOW TO MAKE THEM STAY PUT 

IN FRONT OF THEM
LETS BREAK THE TRUMAN SHOW DELUSION
We can DO IT!

Together!



Questions? 

Suggestions?

Mais conteúdo relacionado

Mais procurados

2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
The Internet of Me
The Internet of MeThe Internet of Me
The Internet of MeSherry Jones
 
2600 v06 n4 (winter 1989)
2600 v06 n4 (winter 1989)2600 v06 n4 (winter 1989)
2600 v06 n4 (winter 1989)Felipe Prado
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorshiplilianedwards
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyopeyemiatilola1992
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)Felipe Prado
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)Felipe Prado
 
Pleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers OnlinePleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers OnlineAllen Matkins
 
2013 april boston marathon fraud advisory wp 2 x
2013 april boston marathon fraud advisory wp  2 x2013 april boston marathon fraud advisory wp  2 x
2013 april boston marathon fraud advisory wp 2 xLiberteks
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policyChris Marsden
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kcCatherine Cowperthwaite
 

Mais procurados (20)

2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
The Internet of Me
The Internet of MeThe Internet of Me
The Internet of Me
 
Darkside
DarksideDarkside
Darkside
 
2600 v06 n4 (winter 1989)
2600 v06 n4 (winter 1989)2600 v06 n4 (winter 1989)
2600 v06 n4 (winter 1989)
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
Privacy
PrivacyPrivacy
Privacy
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
 
Pleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers OnlinePleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers Online
 
2013 april boston marathon fraud advisory wp 2 x
2013 april boston marathon fraud advisory wp  2 x2013 april boston marathon fraud advisory wp  2 x
2013 april boston marathon fraud advisory wp 2 x
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kc
 
willweeverhaveprivacyonline
willweeverhaveprivacyonlinewillweeverhaveprivacyonline
willweeverhaveprivacyonline
 

Destaque

Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Chief Optimist
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSACipherCloud
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Kai Salminen - Industry 4.0 – Open your mind to ”Robot Revolution” and relate...
Kai Salminen - Industry 4.0 – Open your mind to ”Robot Revolution” and relate...Kai Salminen - Industry 4.0 – Open your mind to ”Robot Revolution” and relate...
Kai Salminen - Industry 4.0 – Open your mind to ”Robot Revolution” and relate...Mindtrek
 
INDUSTRY 4.0 The new industrial revolution - Think Act 2014
INDUSTRY 4.0 The new industrial revolution - Think Act 2014INDUSTRY 4.0 The new industrial revolution - Think Act 2014
INDUSTRY 4.0 The new industrial revolution - Think Act 2014polenumerique33
 

Destaque (13)

Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Kai Salminen - Industry 4.0 – Open your mind to ”Robot Revolution” and relate...
Kai Salminen - Industry 4.0 – Open your mind to ”Robot Revolution” and relate...Kai Salminen - Industry 4.0 – Open your mind to ”Robot Revolution” and relate...
Kai Salminen - Industry 4.0 – Open your mind to ”Robot Revolution” and relate...
 
Oplæg v Focus Advokater: Ny EU persondataforordning
Oplæg v Focus Advokater: Ny EU persondataforordningOplæg v Focus Advokater: Ny EU persondataforordning
Oplæg v Focus Advokater: Ny EU persondataforordning
 
INDUSTRY 4.0 The new industrial revolution - Think Act 2014
INDUSTRY 4.0 The new industrial revolution - Think Act 2014INDUSTRY 4.0 The new industrial revolution - Think Act 2014
INDUSTRY 4.0 The new industrial revolution - Think Act 2014
 

Semelhante a Cyber Security 4.0 conference 30 November 2016

2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)Felipe Prado
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictionscentralohioissa
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkE Hacking
 
2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)Felipe Prado
 
2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)Felipe Prado
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacynetapprad
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Role of law enforcement, si as & others
Role of law enforcement, si as & othersRole of law enforcement, si as & others
Role of law enforcement, si as & othersrcorrigan
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxronak56
 
2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)Felipe Prado
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fiskJulesroa
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020Jayna Mistry
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with InternetMathias Klang
 
Big Data Analytics - The New Cold War
Big Data Analytics - The New Cold WarBig Data Analytics - The New Cold War
Big Data Analytics - The New Cold WarKunal Dutta
 

Semelhante a Cyber Security 4.0 conference 30 November 2016 (20)

2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon Talk
 
2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)
 
2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)2600 v23 n2 (summer 2006)
2600 v23 n2 (summer 2006)
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Role of law enforcement, si as & others
Role of law enforcement, si as & othersRole of law enforcement, si as & others
Role of law enforcement, si as & others
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
 
2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fisk
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 
Big Data Analytics - The New Cold War
Big Data Analytics - The New Cold WarBig Data Analytics - The New Cold War
Big Data Analytics - The New Cold War
 

Mais de InfinIT - Innovationsnetværket for it

Mais de InfinIT - Innovationsnetværket for it (20)

Erfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermarkErfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermark
 
Object orientering, test driven development og c
Object orientering, test driven development og cObject orientering, test driven development og c
Object orientering, test driven development og c
 
Embedded softwaredevelopment hcs
Embedded softwaredevelopment hcsEmbedded softwaredevelopment hcs
Embedded softwaredevelopment hcs
 
C og c++-jens lund jensen
C og c++-jens lund jensenC og c++-jens lund jensen
C og c++-jens lund jensen
 
201811xx foredrag c_cpp
201811xx foredrag c_cpp201811xx foredrag c_cpp
201811xx foredrag c_cpp
 
C som-programmeringssprog-bt
C som-programmeringssprog-btC som-programmeringssprog-bt
C som-programmeringssprog-bt
 
Infinit seminar 060918
Infinit seminar 060918Infinit seminar 060918
Infinit seminar 060918
 
DCR solutions
DCR solutionsDCR solutions
DCR solutions
 
Not your grandfathers BPM
Not your grandfathers BPMNot your grandfathers BPM
Not your grandfathers BPM
 
Kmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolutionKmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolution
 
EcoKnow - oplæg
EcoKnow - oplægEcoKnow - oplæg
EcoKnow - oplæg
 
Martin Wickins Chatbots i fronten
Martin Wickins Chatbots i frontenMartin Wickins Chatbots i fronten
Martin Wickins Chatbots i fronten
 
Marie Fenger ai kundeservice
Marie Fenger ai kundeserviceMarie Fenger ai kundeservice
Marie Fenger ai kundeservice
 
Mads Kaysen SupWiz
Mads Kaysen SupWizMads Kaysen SupWiz
Mads Kaysen SupWiz
 
Leif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support CenterLeif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support Center
 
Jan Neerbek NLP og Chatbots
Jan Neerbek NLP og ChatbotsJan Neerbek NLP og Chatbots
Jan Neerbek NLP og Chatbots
 
Anders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer SupportAnders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer Support
 
Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018
 
Innovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekterInnovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekter
 
Rokoko infin it presentation
Rokoko infin it presentation Rokoko infin it presentation
Rokoko infin it presentation
 

Último

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Cyber Security 4.0 conference 30 November 2016

  • 2. DISCLAIMER What I dont know, im not responsible for And thats a lot!
 And ill deny knowledge of anything if you hold me accountable!

  • 3. tVideo-online-print-poet-tech-journalist+certified tinfoil hat cant code :-( low mathskills low/ medium tech High Word Output - acces to mediaplatforms
  • 4. “…certain frequencies are in fact greatly amplified. These amplified frequencies coincide with radio bands reserved for government use according to the Federal Communication Commission (FCC). Statistical evidence suggests the use of helmets may in fact enhance the government's invasive abilities. We speculate that the government may in fact have started the helmet craze for this reason’
 http://web.archive.org/web/20100708230258/http://people.csail.mit.edu/rahimi/helmet/ Ali Rahimi1, Ben Recht 2, Jason Taylor 2, Noah Vawter 2 17 Feb 2005
  • 5. BUT ITS WORSE: TRUMAN SHOW DELUSION
 COINED 2008 by brothers Joel and Ian Gold 'There are eyes everywhere. 
 No blind spot left. What shall we dream of when everything becomes visible? We'll dream of being blind …” - Paul Virilio
  • 6. DYSTOPIAN? Dystopia (greek: dys+topos, BAD og WRONG PLACE) PRIVACY?
  • 7. pri•va•cy (prīˈvə-sē)▶ n. The quality or condition of being secluded from the presence or view of others. aka: Not being filmed, registrated or being followed
 The state of being free from unsanctioned intrusion: a person's right to privacy.
 aka: Drawing the Curtains n. The state of being concealed; secrecy.
 ANONYMOUS?
  • 10. 
 
 
 
 Some people here THOUGHT they were anonymous…. ….and discovered what privacy is….
 You do that, when you LOSE it! …and SECRETS are part of human nature…sorry…
  • 11. figures from Ashley madison hack Attackers: “The Impact Team"
 Datadump: +25 gigabytes of company data, including user details.
 Only 12.000 of ca. 5 mill. FEMALE user accounts were real
 Unfortunately 5.9 mill MALE user accounts were real…
 1200 saudi men were in the database=in saudi adultery is a death sentence offence…
 One company started offering a "search engine" where people could type email addresses of colleagues or their spouse into the website, and if the email address was on the database leak, then the company would send them letters threatening that their details were to be exposed unless they paid money to the company.
 And theres more…
  • 12. SUICIDES…. On 24 August 2015, Toronto police announced that two unconfirmed suicides had been linked to the data breach, in addition to "reports of hate crimes connected to the hack.” Unconfirmed reports say a man in the U.S. died by suicide.
 On 24 August 2015, a pastor and professor at the New Orleans Baptist Theological Seminary committed suicide citing the leak that had occurred six days before. Users whose details were leaked are filing a $567 million class-action lawsuit against Avid Dating Life and Avid Media, the owners of Ashley Madison, through Canadian law firms Charney Lawyers and Sutts, Strosberg LLP.
  • 13. HOW THE HELL COULD IT HAPPEN? SECURE DELETE: PROMISES WERENT KEPT!
 AM made megadatabase - bad encryption…..
  • 14. WHO ARE YOU? Latanya Sweeney, data privacy lap, in 2000, she showed that 87 percent of all Americans could be uniquely identified using only three bits of information: ZIP code, birthdate, and sex. 
 ‘For almost every person on earth, there is at least one fact about them stored in a computer database that an adversary could use to blackmail, discriminate against, harass, or steal the identity of him or her. I mean more than mere embarrassment or inconvenience; I mean legally cognizable harm’
 Law professor Paul Ohm
 When AOL researchers released a massive dataset of search queries, they first "anonymized" the data by scrubbing user IDs and IP addresses. When Netflix made a huge database of movie recommendations available for study, it spent time doing the same thing. Despite scrubbing the obviously identifiable information from the data, computer scientists were able to identify individual users in both datasets. (The Netflix team then moved on to Twitter users.)

  • 15. Who would do such a thing, really?
  • 16. or somebody else? like north korea?
  • 18. Cybercommand
 CYBERWEAPONS "USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.” 6000 employes
 133 teams!
  • 21. Something else: 
 PROBLEMS WITH 
 THE BLUESHIRTS - an invasive spieces
 Introduction
  • 22. Digital single market BIG DATA - Health, trade, Law Enforcement(europol), education
 
 MEGADATABASE
 
 SINGLE POINT OF FAILURE
  • 23. BLUESHIRTS Know how to: 
 Use iPhones
 Use Facebook and Google
 Use Spreadsheets/powerpoint Knows NOTHING about: 
 Computers
 Information Security
 Privacy

  • 24. Blueshirts Can be very dangerous because they: 
 Are Executives or Politicians
 Wants fast results/money Believes what other blueshirts tell them
 and hates/are bored by really skilled persons - especially in computers and they love…..SMART!
  • 25. S.M.A.R.T Surveallance Marketed As Revolutionary Technology
 (Evgene Morozov)
  • 27. In 2013 - end of tinfoil hat…
  • 28. IT WAS ALL TRUE
  • 29. …and still is - only WORSE
  • 30. We all freaked out - we have to do something!
  • 31. So we talked a lot…meanwhile..
  • 32. We knew it all but NOTHING happened except…
  • 33. And some blueshirts got hacked again..
  • 34. Our IOT stuff takes us hostage!
  • 35. and it isn't really funny…
  • 38. more?
  • 40. So where are we now?
 Kneedeep in 
 IOT-BigData-Surveallance-Economy shit…
  • 42. Why arent anybody acting? Have we alle become panopticanian narcissists?
  • 43. So - WTF is going on?
  • 45. INFOCAPOLYPSE IS: 
 Breakdown of informationsociety
 No trust
 Broken/manipulated data(and all digital CAN and will be manipulated!)
 Broken infrastructure
 
 Leading to: 
 Information/CYBER-warfare
 Leading to:
  • 47. CHAMP - or ‘lights out’
 Counter-electronics High-powered Microwave Advanced Missile Project (2012….)
  • 48. and we are much more vulnerable than we believe… 1859….2020?
  • 49. TWO FUTURE SCENARIOS 1: Everything is fine. We all get rich. And happy.
 All systems are GO!
  • 50. SCENARIO 2: All data in privat and public databases are destroyed/copied/maniupulated. 
 Outside competition rips off all our data, uses it to bankrupt us 
 Terrorists steals all data - destroys it - destroys us
 
 We fuck up systems and destroy data ourselves 
 No analog backup - infrastructure starts to collaps. 
 Moneysystem hacked, trust destroyed - since noone has cash anymore - panic arises. 
 Citizens lose all trust in the state. 
 Revolt, kaos…etc…

  • 51. Three main points: 
 Everything digital can be manipulated Everything worth hacking, will be hacked, sometime. THERE IS NO SUCH THING AS ABSOLUTE DATASECURITY, AND THERE NEVER WILL.
 
 DIGITAL AND SECURE ARE 
 CONTRADICTIONARY TERMS
  • 52. WHAT TO DO?Up to you, actually - You can code! New businessmodel on the net where things cost, what their value is=no more swapping free for surveillance! Rebuilding of critical infrastructure keeping some analog systems - either as a backup - or as the solution. KILL bad IOT, get control over SCADA. KEEP CASH! Stop Big Data - seperate databases.
 REAL COST-BENEFIT ANALYSIS OF DIGITALIZATION NOW! 
 ASK CITIZENS BEFORE YOU STORE DATA ABOUT THEM
 STORE AS LITTLE DATA AS POSSIBLE.
 
 GET STATES AND GOVERMENT OUT OF FACEBOOK and SOME IN GENERAL - they will be manipulated! 

  • 53. AND QUIT PHONE- AND BIGDATA/COMPUTER-FETISHISM 
 its enough, now, right? 
 THINK ABOUT HOW TO GET PEOPLE TO LEAVE THIER SCREENS
 NOT HOW TO MAKE THEM STAY PUT 
 IN FRONT OF THEM LETS BREAK THE TRUMAN SHOW DELUSION We can DO IT!
 Together!