Vigilante Hacker Outsmarts Cyber Mafia [4K] | Web Warriors | Spark

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
[Music] there's a way to make an entrance my destiny it was now a conspiracy of witches download veli today [Music] a hot summer afternoon in the northeast residents of new york and toronto look forward to the weekend no one could predict what is about to happen doors shut quickly at city hall nobody was allowed in because the metal detector massive power blackout hit the united states and canadian cities imposing nuclear power 100 power plants shut down and 50 million people in two countries emergency has been declared in new york state uh mayor bloomberg of new york city in a matter of seconds 50 million people simply fall off the grid phone lines and water systems fail and thousands of people are trapped in elevators and subways people start to panic you know like we couldn't breathe it'll be okay it is august 14 2003 and the largest blackout in north american history causes 6 billion in damages the official cause overgrown trees on power lines but there's more to this story than troublesome trees just three days earlier on august 11th someone somewhere released one of the most damaging computer viruses ever written blaster it was probably the biggest attack against the internet ever nico hipponen is one of the world's most respected virus hunters it is here at f secure an anti-virus lab based in helsinki that he and his team first identify blaster when it hits the internet what astonishes mikko is the impact the virus has on the physical world blaster was the first worm that really showed that an attack like this can affect society and the normal life air canada passengers were frustrated by long check-in lineups today after a virus overwhelmed some of the airline's computer networks as blaster explodes across the net air canada's check-in system shutters to a halt and three thousand kilometers south amtrak and csx railroad services are disrupted delaying train routes in 23 states we saw planes stopping and trains stopping and boats stopping we saw infections with military installations and then of course three days later there was the u.s blackout did a computer virus somehow contribute to this in the 21st century most of us have had a run-in or two with a virus they're usually the reason our computers act strangely or slow down but blaster was a new kind of threat it used to be that viruses traveled the internet by piggybacking on other programs they would arrive at your computer in the form of email attachments the virus could not activate until someone opened the attachment but blaster was a worm [Music] worms don't need other programs they propel themselves through the net and they are self-activating in other words you could get blaster simply by being connected you would get infected just by having your pc online you could be sleeping and your machine would get infected which meant anything connected was susceptible systems like the financial network water treatment centers and power plants in one case we know that a virus got into the major nuclear reactor in ohio nine months after the blackout the official report stated that blaster despite being released just three days earlier played no significant role in causing the huge shutdown some security experts remained unconvinced pointing to more than just the timing of the two events if you read the blackout transcripts of the operators who were in the middle of this when it was happening what keeps coming up in the transcripts is comments that you know stuff isn't moving there are screens for freezing which is exactly what the blossom worm does whether the blaster virus caused the 2003 blackout remains a contentious issue but after blaster no one doubted that online viruses could cause real-world damage it's been actually a real learning exercise for potential attackers and terrorists to see oh well if an accident can cause this maybe we could cause it as well eric byers is a former instructor at the british columbia institute of technology he researches the dangers of connecting critical infrastructure to the internet there's no question that you could build a virus to take down the critical infrastructure for example our power systems our water systems our transportation systems if those go away then our life radically changes today most critical systems are connected to the internet and the computers these utilities use are the same windows-based pcs that you might have in your kitchen 95 of the machines are running microsoft windows so when you have some sort of a worm or a virus or some sort of threat spreading that affects windows it spreads like wildfire a canadian oil company um came to us and said you know we have this this big infrastructure and we're curious you know can somebody attack this so eric went to work using only a laptop and some basic hacker software he easily broke into the holding tanks at the company's refinery so first of all i'm going to do what's called cut off visibility now i've fooled it so that the operator doesn't know anything anything's going wrong in the field and then i'm actually going to blow up the tank farm and you can see that all of a sudden this pump has just gone nuts and pretty soon that tank's going to be overflowing and in real life uh somebody be walking around with an oil spill i wish that i could say nope all our critical infrastructure is secure but it's not if connecting power plants and oil refineries to the internet is putting them at risk why not leave them unplugged for business for business reasons for business efficiency mary kirwan is a security consultant and a columnist for the globe and mail one executive interviewed said that he thought it was it was fine it was worth taking the risk so they'd have an edge on the competition by having these open insecure hookups between the utilities and and the corporate network the problem is the internet was never designed to be secure it was never actually built to do a lot of the things we're using it for right now it was not meant to be an engine of commerce it was not meant to hold your banking information in the late 1960s researchers began developing a network that could share information between computers in the 90s it went public and exploded it was no longer just a handful of scientists on the internet it was now anyone with a modem when you have 25 people on a network you can be pretty sure they're going to play well but when you've got 2 billion people on the network you can be pretty sure that somebody is not playing fair there are no secure computers there are no secure networks amit ioran is the former director of cyber security within the u.s department of homeland security i think sooner or later we are going to be hit by a cyber failure that will affect either our nation's infrastructure or international infrastructures in a very significant and harmful way so the implication is that somebody remotely manages to gain access to these control systems and does that type of damage and leaves the economy at a standstill essentially because without our ability to bank online to make a phone call to switch on the lights we're literally in the dark [Music] like most viruses blaster had no specific target its damage was collateral releasing it an act of cyber vandalism something a kid might do most of the time when these guys get grabbed if and when they get grabbed it was just for sport or their pals or they were sitting in their school room in germany and somebody annoyed them so they decided to play a game and write viruses or whatever so usually they have particularly the kids they have no clue of what they're doing and that's why they can be very dangerous they're called hackers some would say they're nothing more than hobbyists kids mostly but hackers grow up too we are the people that that are behind the scenes of everything that you take for granted on the internet it's us there are three types the white hats are the good guys they're the virus hunters or the i.t people at your office the black hats are the bad ones the virus writers or the crooks who try to steal your credit card number online and then somewhere in the middle are the grey hats they work both sides of the street guns for hire in a wild west industry tell us how you work for donny let's go somewhere else right now donny makes his living as a professional hacker exactly how he won't say he is sometimes hired by companies to hack into their own systems it's called penetration testing that's where you get permission to break in just as a real hacker would but you are under a contract and that's so that they can identify their security flaws and fix those security flaws before a bad guy really does [Applause] like most professional hackers donnie has an infamous past i was approached initially by this company in india they wanted a demonstration of my skill set so to speak i ended up compromising um five different systems with five different exploit vectors looking further into one of the intrusions i had indeed broken into mail.gov dot i n for all intents and purposes i took down their government infrastructure had free reign on on the systems all i wanted i was able to plant back doors and gain later access i was able to read emails i was able to record keystrokes in hacker parlance we would say that i owned india i i owned a small country not no not small i own the second largest country in the world we asked donny to demonstrate his skills in less than five minutes he's broken into the database of a major international airline so basically i'm one step away from grabbing all of the reservation information all of the user information which would include your name your address your telephone number um your credit card information for verifying your flight with power like this at your fingertips we wonder what potential damage a group of dedicated hackers could cause we could certainly shut down the united states critical infrastructure i would assume probably within a day dedicatedly um i would give it one week of research one day to take it down and that means what that means taking out the power grid it means taking out the communication power it means taking out probably the military capacity of the united states to function properly we'd probably go into a police state at that point is that an exaggeration no i don't think so hacking is a growth industry there are now books magazines and classes that teach hackers how to breach internet security there are even hacker conventions defcon held every year in las vegas is the largest can you imagine 7 000 hackers loose in the entertainment capital of the world [Music] defcon isn't your average convention it's cash only at the door which isn't such a bad idea with 7 000 hackers a foot it's probably the last place you'd want to use your credit card well defcon's been going on a long time now various degrees of notoriety hacking their badges and hacking each other and hacking each other's cell phone and can be a dangerous thing to attend at defcon you can learn how to pick a lock electronic or otherwise or how to hijack a digital billboard and though most attendees are hackers there's also more than a few federal agents more recent years you have so many undercover fbi agents that it's hard to tell law enforcement apart from the from the real deal depending on who you talk to the fbi are there to either spy on the hackers or recruit them we seek out the rockstar hackers to find out what the cutting edge threats and vulnerabilities and tomorrow's issues and problems are because they know somebody told us it's easy to spot the fbi they're the guys over 35 [Music] and today with software designed for children as young as six months old a new and far younger generation of hackers is right behind this one when we return how a 15 year old hacker paralyzed the internet's biggest players if they were up and they were online they could be shut down in the shady online world of the hacker there is no one more notorious than mafia boy a surprise move today by the montreal teenager known as mafia boy he admitted in court he is the hacker who crashed several popular websites last winter the turn of the millennium saw the peak of the first dotcom gold rush internet giants like yahoo ebay and dell.com were doing hundreds of millions of dollars in online business every day but in february 2000 these sites suddenly found themselves at the mercy of a 15 year old kid michael calce aka mafia boy a high school student from montreal my dad got me a computer when i was extremely young i was six years old it just it just i don't know it fascinated me what i could do with this machine at 12 michael was already a respected hacker and by the time he was 15 he was asked to join what was then one of the most powerful hacker groups online and i felt honored at the time you know we're talking about tnt force this was a big russian hacker group that had a big big foundation and serious programmers in it as tnt's newest member michael was eager to show off his skills he hatched a plan to destroy a rival hacker gang by building the ultimate online weapon i'm gonna make a new tool something that is so powerful people have never seen before and they're gonna run for their lives and wish they were never hackers but before he attacks his enemies michael must first test the weapon he picks a target yahoo to this day the biggest busiest and most profitable website in the world it really never entered his mind that one of the most important sites on the internet one of the most valuable e-commerce companies out there would actually get taken out by what he built in the early morning hours of february 7 2000 michael prepares his attack he puts the weapon on a timer thereby creating an alibi and then heads off to his grade 9 classroom so he's sitting in a classroom the teacher's talking and mike isn't paying any attention because all he's thinking about is three two one it's launched and at 10 am what is still the largest internet attack in history begins i got home i was just dying to get on the computer and see exactly what the results were and i realized it was more than successful when i got home because yahoo.com was still down michael's weapon launched a direct assault on yahoo computers it was called a denial of service attack every time you access a website you make a request from that site's computers what michael did was harness the bandwidth of dozens of larger computers mostly from universities in the u.s by turning them all onto yahoo and making millions of requests every second he crashed yahoo's site it's like if you call a pizza place and the phone is busy it means that they're dealing with too many phone calls same thing i bombard them with so many requests they're just offline even today there are very few defenses against this kind of attack after seeing yahoo collapse michael got a little carried away cnn amazon ebay dell all multi-billion dollar companies all easily shut down by mafia boy cnn was probably one of the biggest attacks because they lost 1200 other sites when cnn.com went down everything linked to cnn just went poof with it i started to realize i had something way more powerful than i could imagine here i felt a sense of it before but this was the moment i realized you know there's not much that can stop me here the attacks made headlines around the world and sent shock waves rippling through the new economy you have a situation where the price of these companies that were hit they take hits on the stock market you have the attorney general of the united states standing up and saying that we will get the ones who are responsible for this you have president clinton convening a cyber security summit at the white house and talking about finding ways to fend off future attacks like this the first reports came out they were estimating the damage to be 1.7 billion dollars damage all from a pentium 133 it was michael's bragging that eventually got him arrested he served eight months in a juvenile home but he left a legacy suddenly the internet didn't seem like such a great place to do business after all people didn't really realize the extent to which the internet was vulnerable until a 15 year old kid kind of showed them i think it in a sense showed that the emperor had no clothes that the thing experts had known all along that building e-commerce on top of the internet is maybe not the best idea it also showed that there wasn't a coordinated strategy in the government in industry to actually combat and fix a lot of these flaws and to fight off these attacks the internet has little to no law enforcement it's simply too big too international and too anonymous it's very difficult to identify who is online at any one time where do they come from and they can just disappear into the ether just take out their connection and they're gone they're like like specters like ghosts for the most part black hats target one company and its ubiquitous operating system now this company is looking for a little vigilante justice microsoft established an anti-virus reward program that will pay people if they provide information on a virus writer and it leads to an arrest and conviction it's a cash bounty 250 thousand dollars for information leading to the arrest and conviction of anyone who has written a destructive virus we asked donny if he was up for the challenge i don't know if it's entirely possible it's really really hard to identify the creator of a piece of code a piece of code can be as small as four lines um that you can anybody could type out on a computer anywhere if i were to successfully track someone down and actually i'll be able to obtain this bounty so to speak 250 thousand dollars would be enough to secure my future his target a microsoft word virus so called because it hides inside a microsoft word document that the author then emails across the internet where blaster was mindlessly destructive simply flooding the internet the microsoft word virus is much more sinister after infecting a computer it begins to collect documents it then sends these documents back to the authors of the virus the range of documents being collected concerns donnie cad drawings for computer aided design spreadsheets pdf documents architectural and machine blueprints the nature of the data that's being taken to me it's it it's it goes straight to our critical infrastructure it goes straight to the core of the united states military and the virus is known to have targeted power systems and government agencies it is literally spyware donny's first stop in his search for the authors is russia home to the blackest of the world's black hats we may not be able to pull this off but we can certainly try when we return the most lethal online threat yet the estimates are that it alone has affected 50 million machines so there's this hovering literally perfect storm of a potential attack in the past few years hackers and their viruses have evolved mischievous kids are no longer the main problem now it's all about the money and viruses are designed expressly to steal your data in the good old days all the viruses were written by you know hobbyists and geeks and nerds in their basement for fun for faye really and that started changing five years ago or so to professionals and criminals people who do this to make money even people who make millions and while thieves used to break into your house these days it's much easier for them to break into your computer what they're looking for is personal information credit card numbers and banking details anything that can be sold for quick and easy cash a hacker recently told me that you know identity theft is a great new career you know it has great benefits and why would you make minimum wage when you can stay in the best hotels and buy big screen tvs with somebody else's money today tjx announced the theft of millions of credit card numbers and other personal customer information in 2007 tjx a department store giant with over 2 000 retail outlets around the world found themselves the victim of the largest known internet theft to date attackers broke into their systems probably over an insecure wireless network and basically had the run of their network as far as we can make out for as much as 18 months maybe even a few years we're not entirely sure hackers downloaded credit card numbers millions of them the exact figure will probably never be known initial estimates of the numbers of individual credentials was around the 45 46 million mark in more recent filings we believe it may be as much as 94 million and credit cards aren't the only thing thieves took initially we thought it was just credit card bank card details over time we discovered there were driver's licenses as well which is much more significant you're getting into pieces of identification that can really allow identity thieves to build identities from the ground up the thieves were able to break into the system by using a hacker trick called war driving basically driving around with a laptop and a homemade antenna often just an empty pringles chip can covered in tin foil use this antenna to search for unprotected wireless connections once they find one they break in and steal everything on your computer i've known people who remain nameless who do this for fun and what they're doing is trying to spot open wireless connections and they will show you sometimes on their computers the number of in some cases fortune 500 companies perhaps that may have open network connections finding open connections isn't difficult nowadays they're almost everywhere i've seen it in banks at the airport all the time you'll see the ticket counter have an open wireless port which makes catching the thieves almost impossible because they're wireless the hackers are constantly in motion the only way to catch one is in the act itself lowe's is a uh you know large retailer of building supplies with you know huge mega stores um all over mostly the united states and they recognize that somebody was hacking into their system so they called in the fbi who deployed a couple dozen agents in a store in southfield michigan and the agents you know were so unaware of what was actually happening they thought that somebody was walking into the store and plugging into a network connection in a wall but an agent on the roof noticed that there was a beat up old car in the parking lot with a pringles can covered with tin foil and they said maybe we should investigate that and sure enough the driver of the car was hacking into lowe's in order to steal credit card information which was then to be sold to russian mafia in detroit donny shows us how quick and easy war driving is in the past five minutes the bell has gone off um looks like about 64 times and what does that mean 65. that means that we found an access point some connected to somebody's wireless right now if we were let's say someone with malicious intent now i'd be able to go to um you know whatever website or send emails so we can see that um you know leaving your wireless open is just another avenue of attack that a hacker could use war driving isn't the only easy to learn hacker trick nowadays the internet is bursting with hacker tool kits these kits are essentially highly developed and highly illegal bundles of programs that allow even the beginner to become a junior cyber thief if you're looking for a hacker's toolkit you can just download them off the web there's lots of them out there they're easy to find and they're most of them in fact many of the best are absolutely free for example there's some virus writing kits i was showing a little while ago you basically select the type of virus you want to write and it builds a virus nowadays you don't need much skill to become a cyber criminal you just need the software i don't think that it's ever been easier to launch an attack that can cause damage or they can steal sensitive information it's a google search away it doesn't make that person a hacker but it certainly makes them dangerous with the abundance of tool kits you'd think you'd hear about cyber attacks more often but some companies choose to keep that information to themselves if you have a cyber incident you know traditional best practice is cover it up right don't you know don't tell anybody about it currently there are few laws that force companies to disclose cyber criminal activity and most organizations aren't that eager to make their customers nervous they don't want their customers to know that 10 million credit card numbers got stolen they don't want to have to disclose that they don't want their stock price to take the hit it's important for security researchers out there to be able to share data and to see how attacks are evolving but if companies won't even admit they've been attacked let alone show how it happened how are we supposed to get better it's a real problem once thieves have your information they sell it to the highest bidder often advertising it in a thriving online black market that's the biggest development in internet security in the last two and a half years has been the advent of markets for identities in the black market working credit card numbers go for as little as a dollar each there's sampling just like there's in the drug trade where they'll give you 10 to test and then you test them all they're all good you know i could i could actually get money out of them or buy something with them and full identities which can include social insurance numbers and addresses sell for as little as five dollars there's been cases where kids have made up to 150 000 in six months from various types of credit card fraud and fishing schemes and and have gone on a spree of electronics buying in the past few years cyber crime has exploded some reports put it on a par with the drug trade and a 2006 survey found it was more costly to businesses than conventional crime and most of it comes from one place when you think today about you know what what's this sort of country of hacking right now i think most experts would point to russia a few years ago the russian mob sensing a unique opportunity went online and why not it was less risky than traditional crime and the internet allowed the mobsters to go international all they needed was a few programmers you have actual organized crime in russia recruiting promising young programmers and other technical people to work in a cyber crime syndicate these russian syndicates are responsible for the bulk of viruses and hacker exploits released onto the internet every day it took 20 years to go from the very first viruses to 250 000 viruses and that's where we were in the beginning of 2007. by the end of 2007 we were already at 500 000 viruses so we effectively doubled the amount of all of the malware in one single year because of this internet security has become a booming business in the past few years anti-virus labs have sprung up all over the world kaspersky in moscow is one of the biggest we receive over 2 000 of new viruses trojans and worms every day to this lab in order to provide constant and non-interrupt protection virus analysts have to work every hour every day of the week we have a special name for them they're called woodpeckers that's because they hammer their keyboards very fast donnie seeks help tracking down the authors of the microsoft word virus he gets in contact with a group of russian cyber criminals these guys are really no different than a criminal ring that would be specializing in stolen car parts or or you know stolen electronics whether trying to turn it sell it launder the money and you know get some sort of type of percentage out of it one of the group agrees to meet with donnie in a [Music] cafe the russian tells donny that he's part of a hacker crew that works primarily as carters they steal credit card information and then sell it online for a year or something like a regard we save a hustle the leader one crew that i was working with he makes like from nine to fifteen thousand dollars a week i had no idea is that kind of money i mean i was thinking like with a thousand dollars a week donny then inquires about purchasing viruses that would allow him to steal information from anyone's computer so you know one of the things that i'm also interested in is the trojans and back doors yes exactly it gets until like one hundred one thousand dollars really yes thousand bucks for a church from uh 400 to 1000 wow that's insane but not all viruses have such a clear purpose in 2007 a new type of virus appears on the internet storm worm it infects without warning and seemingly without consequence and to this day no one knows what its purpose is people often ask me about how do i know if i'm infected by storm and you really don't because it doesn't show you any messages it doesn't destroy anything it doesn't play any music or anything any of the fun stuff you used to see with old school viruses it's really invisible not just invisible but impossible to detect this is because it's always changing this worm keeps morphing itself every time you download it you get a different copy and if you do find it and try to remove it the worm attacks but the biggest reason stormworm is making headlines around the world is that it turns a computer into a so-called zombie or robot the author of stormworm can then control your computer now a zombie remotely without you knowing the zombie computer means a computer which is no longer in control of its owner the person who actually owns the pc doesn't see this he thinks the pc works just fine but there's someone else behind the scenes who has access to that machine can do whatever he wants on that machine over the network any time of day he wants the worm infects thousands of pcs creating thousands of zombies the author of the worm then links all of the zombies together creating a robot network or botnet so the idea of these botnets is that uh characters who manage to get bad code onto your computer they own your computer you know they have i like to call it the key under the mat they can come back anytime they like they you don't know even that they're there once you have a botnet at your disposal you can use the combined power of all these computers at the same time so you can for example send an instruction that all of those machines start to send as much traffic as they can against one single website that's denial of service attack [Music] the same type of attack mafia boy used to take down yahoo there are russian botnet operators right now selling denial of service attacks launched from their bot nets by the hour or by the day what's unique about stormworm's botnet is its size and sophistication experts estimate the number of linked computers to be in the millions but still no one knows this botnet's purpose the estimates are that it alone has infected 15 million machines and it has not been used for anything so there's this hovering literally perfect storm of a potential attack so the concern is that the storm worm has created all these compromised computers that in themselves create a kind of an almost a massive supercomputer and a very bad people have control of this they may be able to do very bad things on a very very big scale [Music] donnie continues his search for the authors of the microsoft word virus he asks his source if the russians are involved they're getting like cad drawings and design design features from from companies like that are making like missiles that are building like subcontractors for the glasses we don't get into it to have people that do it so i don't know so you don't know anything about this microsoft word virus i mean some people tell me you know this stuff is coming the russians are using china is yes they have the technology and they have everything so they're the most uh people who get into hype says they're going for the big things yes when we return the specter of cyber warfare nations attacking nations i think you have to concern yourself with the possibility of a digital pearl harbor in april of 2007 estonia suddenly found itself on the losing side of a battle with the largest country on earth what began as a protest over estonia's relocation of a soviet war memorial quickly turned ugly riots broke out and russian hackers launched what some people call the world's first cyber war what happened in estonia was a major cyber attack somebody tried to harm the country the government of the country the financial organization of the country cyber warfare it's a terrifying premise and up until recently mostly hypothetical estonia was particularly vulnerable like canada it is one of the most wired countries on earth more than 78 of the estonian citizens are doing their banking business via the internet in a place where most people bank online attacking the internet makes everyone a little nervous down to the point that people may ask is my money still in the bank if that if i don't have access to my money within minutes hackers shut down the banks they also targeted broadcasters newspapers and government offices we saw the single largest attack against all of the infrastructure of a single country we've ever seen and it really started to affect the everyday life of people and though the russian government denies any involvement there's no doubt the attacks were politically motivated we don't have solid evidence that this is related to any governments however we have reasonable evidence to believe that this has its roots in russian federation at one time the u.s saw russia as the main cyber warfare opponent as early as 1998 the country was accused of hacking into u.s government systems but these days america fears a new cyber spy china that is the country that we're most worried about rick howard is a retired lieutenant colonel of the u.s army he spent the last two years of his career as the chief of the army's computer emergency response team the cyber swat team of the u.s military china in their own doctrine their own military doctrine says they'll be ready to take on the u.s by 2025. they're not going to do that tank on tank that's not what their plan is their plan is to go at us with asymmetric warfare using the internet as part of their attack vehicle rick believes that chinese hackers are currently mining u.s government computers using tools that are similar to the microsoft word virus they steal every document on those hard drives every word document every powerpoint document every excel document and they bring them back to china we're talking about millions of documents stealing national secrets over the net has replaced old-fashioned espionage but rick's greatest concern is that the chinese military is training and recruiting hackers the pla in china recruit hackers from the chinese population and they train them in military information warfare tactics they give them a regular salary so that they can go and try to penetrate u.s government and other government institutions in 2007 the u.s claimed china cyber attacked the pentagon the chinese government officially denies these claims so how vulnerable are we to a cyber attack and what exactly would it mean the complete breakdown of financial health traffic air traffic government structure of a country you have to concern yourself with the possibility of a digital pearl harbor i think there's a there's there's always the possibility that a rogue terrorist group were to have a very significant denial of service attack if there's anything that people need to understand in cyberspace is that this is hard stuff you have to take it serious [Music] so if and when an attack comes are we ready [Music] donny abandons his pursuit of the microsoft word virus he reasons that now it's too risky we're not just looking at black hat hackers we're not looking at kids we're not looking at script kitties but we're really looking at a coordinated effort sponsored by the chinese government against not only united states but the west in general he's not as interested in collecting the bounty as he once was the percentage of it being successful is really low in my personal opinion and like a true gray hat he's already on to something else so who are you working for now donnie i'm not going to comment on that fair enough michael calce has written a book about his life as a notorious hacker i couldn't stand back knowing what was going on and what's gonna happen and how how bad it's getting eight years after his attack he says he could do it all over again if he wanted to because they haven't done anything about it they say they're investing this into internet security and this and that but the situation is only getting worse for everybody attacks are increasing the number of viruses has doubled in a year and places like the pentagon ward off a cyber attack nearly every day is cyber security a significant threat to the critical infrastructure of canada in the world absolutely no question this is serious stuff it is supposed to be a little bit turbulent it is supposed to be a little bit uncontrollable and to have that openness and that freedom you have to deal with the other things the interconnected nature of the internet and critical infrastructures is a point of significant vulnerability for modern society we really have to think carefully about putting critical infrastructure online i would prefer critical stuff to be disconnected and when i mean disconnected i mean that they are in separate cables increasingly all aspects of our lives are funneled through the internet what's at stake is impossible to dismiss because the 911 commission their summary of the 9 11 events was that it was a failure of imagination and i think the one thing we don't want to do again is for imaginations to fail you
Info
Channel: Spark
Views: 677,858
Rating: undefined out of 5
Keywords: CNN, Conflict, Cyber defense strategy, Cyber espionage, Cyber risk management, Cyber security, Cyber warfare tactics, Cyber weapons, Cyber weapons development, Cybersecurity governance, Cybersecurity training, Dell, Donnie Werner, Facebook, Global economy, Malware detection, Phishing, Russian cyber mafia, Shutting down websites, Spark, Spark channel
Id: Db4MBkX6Rtw
Channel Id: undefined
Length: 49min 35sec (2975 seconds)
Published: Wed Jun 15 2022
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.