Notes on The Cyber Threat The threat gets worse
Author : mitsue-stanley | Published Date : 2025-07-16
Description: Notes on The Cyber Threat The threat gets worse before it gets better Ted Gordon 1 Smilax Dr Old Lyme CT 06371 tedjgordongmailcom Much cyber activity in 2015 here are some headlines US And China Seek Arms Deal For Cyberspace Active
Presentation Embed Code
Download Presentation
Download
Presentation The PPT/PDF document
"Notes on The Cyber Threat The threat gets worse" is the property of its rightful owner.
Permission is granted to download and print the materials on this website for personal, non-commercial use only,
and to display it on your personal computer provided you do not modify the materials and that you retain all
copyright notices contained in the materials. By downloading content from our website, you accept the terms of
this agreement.
Transcript:Notes on The Cyber Threat The threat gets worse:
Notes on The Cyber Threat The threat gets worse before it gets better Ted Gordon 1 Smilax Dr Old Lyme, CT 06371 tedjgordon@gmail.com Much cyber activity in 2015: here are some headlines US And China Seek Arms Deal For Cyberspace Active Wordpress Malware Compromises Thousands Of Websites Huge Hack Of US Government Data Affected 21.5 Million Cyber Attack On U.S. Power Grid Could Cost $1 Trillion Silk Road Mastermind (Ross Ulbricht) Gets Life Prison Sentence Homeland Security Moves To Prevent Attack On Power Grid Zeus Malware Gang Take-down Hacker: 'Hundreds Of Thousands' Of Vehicles Are At Risk Of Attack China Acknowledges That It Has Units For War On Computer Networks Ransomware Porn App Takes Photos Of Users And Holds Phone Hostage White House Shoots Down Petition To Pardon Edward Snowden Heartbleed Is Far From Dead. 200,000+ Vulnerable Devices United (Airlines) Should Thank, Not Ban, Researcher Who Pointed Out A Major Security Flaw Big data thefts in the US in 2014-15 Anthem Target Sony Neiman Marcus JPMorgan Chase Experian eBay Home Depot Department of Defense SCORE: about 100 million records There are many actors; from lone wolves to nation states, with a wide range of objectives WMD Systems control Surveillance Intimidation Money laundering US China Russia N Korea UK Iran Israel Others Actors Principal Objectives In a recent foresight study, global experts projected the killing potential of lone wolves, including through the use of cyber weapons When a SIMAD Might Kill 100,000 or more Number Killed in a SIMAD Attack www.lonewolfthreat.com At the other end of the spectrum of actors, much activity by nation states Plan and conduct activities to defend specified DoD information networks Conduct military cyberspace operations to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. Assemble cyberspace resources and synchronize war-fighting to defend the information security environment US Cyber Command Nation State Actors US (NSA) China Russia N Korea UK Iran Israel Many others Well Known Activities Office of Personnel Mgmt data breech Stuxnet Attack on SONY to prevent “The Interview” MI 6 “cupcake caper” “Red October” data theft malware in Word and Excel DDoS in Estonia, Georgia, and Ukraine Cyber attacks on large banks Social media are important to cyber terror activities and communications Manifestos (many terrorists write them) Plans and Confessions (for various reasons Lone Wolves tell plans and confess their crimes) Recruitment, funding (Al Qaeda and ISIS are expert,