<<

The Geopolitics of Cyberspace

Ron Deibert Director, the , University of Toronto [email protected] JR02-2009 Tracking GhostNet: Investigating a Cyber Espionage Network

JR03-2010

Information Warfare Monitor March 29, 2009 SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0

JOINT REPORT:

Information Warfare Monitor Shadowserver Foundation

April 6, 2010

WEB VERSION. Also found here: http://shadows-in-the-cloud.net

INFOWAR MONITOR http://www.infowar-monitor.net/ghostnet Selected Infections

ASEAN Deloitte and Touche United Nations Embassy of , US Stock Exchange Ministry of Foreign Affairs, Dept of Foreign Affairs, Embassy of Indonesia, High Commission of India, UK NATO (Germany) Prime Minister’s Office, ...... From: "[email protected]" Date: 25 July 2008 Subject: Translation of Freedom Movement ID Book for Tibetans in Exile

Translation of Freedom Movement ID Book for Tibetans in Exile.

Front Cover

Emblem of the Tibetan government in Exile

Script: Voluntary Contribution into common fund for Tibetan Freedom Movement

Inside Cover

Resolution was passed in the preliminary general body meeting of the Tibetan Freedom Movement held on July 30, 1972 that the Tibetan refugees in exile would promise for each individual’s share of the voluntary contribution into the Tibetan Freedom Movement Receipt book. This resolution was later reaffirmed by the 11th Tibetan People’s Deputies and passed into the law on April 01, 1992 (Tibetan King Year 2119)

Until the last page of this book is used, the book stands valid until August 15, 2012

Date: August 16, 2008 Emblem of the Tibetan Government in Exile

Official Signature

Attachment: Translation of Freedom Movement ID Book for Tibetans in Exile.doc

Indian Diplomatic and National Security Establishment “Secret” “Classified” “Restricted”

National Security Council Secretariat Indian Armed Forces Indian Defense Contractors

Embassy of India, Kabul, Embassy of India, Moscow Embassy of India, US Consulate General of India, Dubai, High Commission of India in Abuja, Nigeria

Fusion Methodology

Technical Interrogation Field Research accomplished through undertaken by local network probes, experts in situ; reconnaissance, and interviews and tests software-based tests Multi- Disciplinary Analysis Advanced data fusion, visualization & analysis

Global Partnerships Transformation of Signals Intelligence

• Cold War Sigint platforms: billions of dollars • Cyber-collection platform: Cost of deployment is near zero • Entered the age of DIY Sigint

The Age of Auto-Surveillance JR04-2010 : Inside a Crimeware Network

By NART VILLENEUVE with a Foreword by Ron Deibert and Rafal Rohozinski

November 12, 2010

WEB VERSION. Also found here: INFOWAR http://www.infowar-monitor.net/koobface MONITOR First Phase (1990s): Cyber Commons Liberal “hands off” state regulations; telecom development policies; dot-com boom; citizen mobilization

Second Phase (2000s): Cyber Borders The unintended and perceived negative consequences of an unfettered Net lead to greater state and corporate intervention

Present Phase (10s): Cyber Arms Race Cyberspace has become an object of intense geopolitical contestation among states and non-state actors alike Just-in-Time Blocking Legal and Normative Disabling or attacking critical Measures cyberspace assets at key moments in Broad use of slander, libel and other time (e.g., elections, public laws to restrict information; create demonstrations) climate of self censorship Computer Network Attacks Informal Requests As a component of military action And other pressures applied to or low intensity conflict (e.g., ISPs and OSPs to “take down” or Estonia, Russia-Georgia remove offensive posts or information that threatens “national security”

Patriotic Hacking Government security services Outsourcing/ informally encourage or tacitly Downloading approve actions of citizen groups -- Includes decisions taken by private China 50 cent party; Russian companies to comply with spirit of local laws or to turn over Targeted Surveillance/ information on users Social attacks Infiltration of adversarial networks though targeted “social malware” and drive-by web exploits Militarization of Cyberspace

Cyber Arms Race Cyber Arms Race

Regulatory Physical Sphere Code sphere Idea Sphere Sphere The Perfect Storm The whole human memory can be, and probably in a short time will be, made accessible to every individual... It need not be concentrated in any one single place. It need not be vulnerable as a human head or a human heart is vulnerable. It can be reproduced exactly and fully, in Peru, China, Iceland, Central Africa, or wherever else seems to afford an insurance against danger and interruption. It can have at once, the concentration of a craniate animal and the diffused vitality of an amoeba.

H.G. Wells “World Brain” 1937 For more info:

opennet.net infowar-monitor.net citizenlab.org