Ted Gordon
1 Smilax Dr
Old Lyme, CT 06371
tedjgordon@gmail.com
US And China Seek Arms Deal For Cyberspace
Active Wordpress Malware Compromises Thousands Of Websites
Huge Hack Of US Government Data Affected 21.5 Million
Cyber Attack On U.S. Power Grid Could Cost $1 Trillion
Silk Road Mastermind (Ross Ulbricht) Gets Life Prison Sentence
Homeland Security Moves To Prevent Attack On Power Grid
Zeus Malware Gang Take-down
Hacker: 'Hundreds Of Thousands' Of Vehicles Are At Risk Of Attack
China Acknowledges That It Has Units For War On Computer Networks
Ransomware Porn App Takes Photos Of Users And Holds Phone Hostage
White House Shoots Down Petition To Pardon Edward Snowden
Heartbleed Is Far From Dead. 200,000+ Vulnerable Devices
United (Airlines) Should Thank, Not Ban, Researcher Who Pointed Out A Major
Security Flaw
Anthem
Target
Sony
Neiman Marcus
JPMorgan Chase
Experian
eBay
Home Depot
Department of Defense
16
14
12
10
Number of
8
When a SIMAD Might respondents
6
0
prior to 2015 2015-203 2030-20150 2050-2075 after 2075
www.lonewolfthreat.com or never
US Cyber Command
Plan and conduct activities to defend specified
DoD information networks
http://www.wired.com/2015/02/silk-road-ross-ulbricht-verdict/
Hacking
Viruses
Trojan horses
Denial of service
Back doors Purchasing contraband
Impersonation
Of particular concern:
Insertion of false information
3.6 million PC’s are said to be infected in the U.S. alone
Big targets (financial system, agriculture, electricity grid,
frauds)
Facial recognition
Sting and honeypot operations
Receiving information from informants
Online surveillance: chat rooms, postings, email
Tracking associates of known terrorists (including photos)
Tracking purchases of poisons and bomb-making chemical
Automated screening and synthesis of big data bases
Third-party reporting of unusual behavior
Psychological screening
Consider attacks on:
control systems (e.g. Stuxnet) create risks for transport systems,
public services (e.g. water, electricity, pipelines, industry,
sanitation, agriculture)
http://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/#summary
Potential will be recognized for:
massive disruptions from non state actors
threat of cyber lone wolves and SIMAD
new cyber crime targets and anti-crime weapons