PRESENTATION
T HE SLIDES OF MY PRESENTATION WITH NOTES SHOWING WHAT WAS SAID DURING EACH .
SLIDE 1
SLIDE 2
Documentation of Presentation
SLIDE 3
SLIDE 4
During research, I used over 90 sources, almost all of which were internet
based. Most of them were by British and American media articles, so had a
strong pro-western foreign policy bias which I needed to consider.
I wanted to find out to what extent it is taking place, whos doing it, how
they are doing it and why they are doing it.
Documentation of Presentation
SLIDE 5
SLIDE 6
Documentation of Presentation
SLIDE 7
SLIDE 8
Documentation of Presentation
attacks, one of which was where they hacked into three of the BBCs Twitter
accounts and posted to all their followers. They also managed to wipe $140
billion off the Dow Jones stock exchange index by posting this tweet [point
to top left image].
SLIDE 9
In the war between Georgia and Russia in 2008, cyber-attacks against both
sides took place. Many Georgian government websites were taken down
and this slide show comparing the Georgian president to Hitler were placed
on his website.
Intelligence gathering takes place not only against governments, but also
against industrial companies. Its done by governments and criminal
organisations to gather data that they use to their own advantage. Major
companies spend lots of money on defending and securing their computer
systems and data stores from outside attacks.
China is well-known for a lot of alleged hacking. The BBC reported that
their military had a unit dedicated to illegally stealing information from
foreign companies and governments. They suspected that it was based in
this building in Shanghai, but their camera crew were arrested when they
tried to film it.
Documentation of Presentation
SLIDE 10
SLIDE 11
Documentation of Presentation
SLIDE 12
SLIDE 13
The most sophisticated computer virus that has ever been discovered.
Contained over 20 zero-days. Created by America and Israel to attack Irans
Natanz nuclear enrichment facility. Political objective stop Iran from
developing nuclear weapons because its foreign policy is the destruction of
the state of Israel, so Israel sees it as a threat. Spread around the whole
world including Europe and China. Specific target of the controllers of
machines inside Natanz, through engineers laptop. It attacked the uranium
enrichment centrifuges by changing the speed of rotors in these black rotor
tubes to physically crack and break them. It also contained a reality blocker
engineers tricked into think okay, stopped digital safety systems like
valves working. Stuxnet delayed the Iranian nuclear programme by several
months.
Stuxnet was found to have had the ability to do things like turn off oil
pipelines, overload electric grids and blow up nuclear power stations. It
targets SCADA systems which are controllers used to remotely operate
electric substations, water systems and power stations. SCADA systems
which are in some way connected to the internet are to some extent,
vulnerable to sophisticated attacks. This picture shows a test in Idaho
where an electrical generator suffers a simulated cyber-attack. As well as
these, transport systems like railway point controls, air traffic control and
digital road signs have the ability to be hijacked by computer worms. One
of the most exposed things to cyber-attacks are financial systems, including
stock exchanges, bank clearing systems and payrolls which are connected
directly to the internet. An attack on these could cause massive economic
damage.
Extended Project 2014 | Maurice Yap 6946
Documentation of Presentation
SLIDE 14
SLIDE 15
Documentation of Presentation
SLIDE 16
SLIDE 17
Documentation of Presentation
SLIDE 18
SLIDE 19
SLIDE 20
10
Documentation of Presentation
IMAGE SOURCES
11
Slide 2:
Anonymous logo KEPHIR. 2012. Anonymous emblem. [Online]. [Accessed 23 September 2014]. Available from: http://commons.wikimedia.org/wiki/File:Anonymous_emblem.svg
United States Capitol with company logos graphic CIVIL LIBERTIES DEFENSE CENTER, 2008. Fighting Corporate Control. [Online]. Available at: http://cldc.org/dissentdemocracy/patriot-act-government-repression/fighting-corporate-control [Accessed 23 September 2014].
Unrolled cannabis joint WINTOUR, P., 2011. Liberal Democrats want inquiry into decriminalising drug possession. [Online]. Available at:
http://www.theguardian.com/politics/2011/aug/04/liberal-democrats-decriminalising-drug-possession [Accessed 23 September 2014].
Orchestra photograph CLASSIC FM, 2012. Survey shows under-25s want to explore classical music. [Online]. Available at: http://www.classicfm.com/music-news/latest-news/survey-under-25classical-music [Accessed 23 September 2014].
Slide 4:
Confront and Conceal book cover photo RANDOM HOUSE, 2013. Confront and Conceal. [Online]. Available at: http://www.randomhouse.com/book/202541/confront-and-conceal-by-davide-sanger [Accessed 23 September 2014].
BBC News logo LOGOPEDIA, 2013. BBC News (channel). [Online]. Available at: http://logos.wikia.com/wiki/BBC_News_(Channel) [Accessed 23 September 2014].
Washington Post Edward Snowden front page NGUYEN, V., 2013. The Washington Post Sold: Top Front Pages of the Last Decade. [Online]. Available at:
http://parade.condenast.com/61347/viannguyen/the-washington-post-sold-top-front-pages-of-the-last-decade [Accessed 23 September 2014].
The Economist logo THE ECONOMIST, 2010. War in the fifth domain [Online]. Available at: http://www.economist.com/node/16478792 [Accessed 23 September 2014].
Information Warfare Monitor report covers (x2) INFORMATION WARFARE MONITOR, 2011. Research. [Online]. Available at: http://www.infowar-monitor.net/research [Accessed 23
September 2014].
New Statesman front page VOXEUROP, 2012. Todays front pages. [Online]. Available at: http://www.voxeurop.eu/en/content/todays-front-pages/2217171-todays-front-pages [Accessed 23
September 2014].
New York Times logo GTECH, 2014. The New York Times Says You Cant Beat the Ease of the AirRam. [Online]. Available at: http://blog.greytechnology.com/the-new-york-times-says-youcant-beat-the-ease-of-the-airram [Accessed 23 September 2014].
The Guardian logo HARVISON, A., 2014. Lovereading survey features on Guardians Book Blog. [Online]. Available at: http://www.palamedes.co.uk/lovereading-home-library-guardian
[Accessed 23 September 2014].
Truthloader logo ITN PRODUCTIONS, 2014. ITN Productions. [Online]. Available at: http://itnproductions.co.uk [Accessed 23 September 2014].
The Daily Telegraph logo STREAMUK, 2011. The Daily Telegraph and Cisco choose StreamUK. [Online]. Available at: http://www.streamuk.com/the-daily-telegraph-and-cisco-choose-streamuk
[Accessed 23 September 2014].
Slide 8:
President Saakashvilis website defacement (Hitler comparisons) DANCHEV, D., 2008. Coordinated Russia vs Georgia cyber attack in progress. [Online]. Available at:
http://www.zdnet.com/blog/security/coordinated-russia-vs-georgia-cyber-attack-in-progress/1670 [Accessed 18 March 2014].
Associated Press tweet screenshot FOSTER, P., 2013. 'Bogus' AP tweet about explosion at the White House wipes billions off US markets. [Online]. Available at:
http://www.telegraph.co.uk/finance/markets/10013768/Bogus-AP-tweet-about-explosion-at-the-White-House-wipes-billions-off-US-markets.html [Accessed 24 September 2014].
BBC Weather twitter feed screenshot PALMER, A., 2013. BBC Twitter accounts hacked by Syrian Electronic Army, supporters of dictator President Assad. [Online].
http://www.mirror.co.uk/news/uk-news/bbc-twitter-accounts-hacked-syrian-1777005 [Accessed 24 September 2014].
Slide 9:
Unit 61398s alleged base photograph REUTERS, 2014. Chinese hackers repeatedly attacked U.S. computers of firms involved in movement of American troops and equipment, Senate probe
reveals. [Online]. Available at: http://www.dailymail.co.uk/news/article-2759753/Chinese-hacked-U-S-military-contractors-Senate-probe-finds.html [Accessed 24 September 2014].
Slide 11:
Koobface wall post example screenshot UWANG, 2011. New Koobface Campaign Spreading on Facebook. [Online]. Available at:
http://community.websense.com/blogs/securitylabs/archive/2011/01/14/new-koobface-campaign-spreading-on-facebook.aspx [Accessed 24 September 2014].
Slide 12:
Natanz facility photograph STEELE, J., 2008. Israel asked US for green light to bomb nuclear sites in Iran. [Online]. Available at:
http://www.theguardian.com/world/2008/sep/25/iran.israelandthepalestinians1 [Accessed 24 September 2014].
Sample of Stuxnets computer code (cropped and digitally altered video snapshot) TED - LANGER,R. 2011. Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon. [Online].
[Accessed 13 March 2014]. Available from: http://www.youtube.com/watch?v=CS01Hmjv1pQ
Nuclear centrifuge and rotor tube photograph BROAD, W. J., 2008. A Tantalizing Look at Irans Nuclear Program. [Online]. Available at:
http://www.nytimes.com/2008/04/29/science/29nuke.html [Accessed 24 September 2014].
Siemens Simatic photograph ULLI1105. 2007. Siemens Simatic S7-300. [Online]. [Accessed 17 September, 2014]. Available from: http://commons.wikimedia.org/wiki/File:S7300.JPG
Slide 13:
Video still of Aurora test ZETTER, K., 2007. Simulated Cyberattack Shows Hackers Blasting Away at the Power Grid. [Online]. Available from: http://www.wired.com/2007/09/simulated-cyber
[Accessed 25 September 2014].
Air traffic control tower photograph DANKO, M., 2011. Air Traffic Controllers Sleeping on Duty: A Simple Solution? [Online]. Available from:
http://www.aviationlawmonitor.com/articles/air-traffic-control-1 [Accessed 25 September 2014].