Confessions of a cyber spy hunter | Eric Winsborrow | TEDxVancouver


Translator: Cihan Ekmekçi
Reviewer: Riaki Poništ We see it everyday, in the news,
for the past decade, the battles that are being waged
across the Middle East. On YouTube and Facebook,
we get instant updates through satellites to give us a front row seat
into the action like never before. But what the cameras don’t capture is that there is another war,
going on beneath the surface, a digital cyber world, where the battles are not being fought
with bombs and bullets, but with bits and bytes. My name is not Doug Shmidt. (Laughter) But it could be if I wanted it to. (Laughter) My real name is Eric Winsborrow. And for past two decades
I’ve been involved in creating the next generation
disruptive technologies at companies such as Symantec and MacAfee. I currently run a cybersecurity company made up of PhDs from MIT
and scientists from the National Labs who are tasked by the US government to create the next generation
of cyber technology. Our customers include
the Office of the Secretary of Defense and the Department of Homeland Security. If there’s one thing
I’m certain of, it’s this: What’s going on today in cyber espionage
will profoundly impact our lives, and we may never even realize it. If you think about it, a lot of technologies
that impact our lives have been coming from
government sponsored research into next generation defense technologies. Last generation, the Cold War
created technology such as the computer, satellite communications
and navigation and even the internet. It has so permeated our everyday lives it has gotten to the point where we can’t imagine
ever having lived without it, to be able to see halfway
around the world instantly or just navigate around the block. So if yesterday’s
next generation technology has such a profound impact on us today, then what’s today’s
next generation technology? I’m going to show you
the future of cyber espionage with technology that’s actually
being created today to protect nations. There are cyber battles
taking place throughout the world, and we don’t even realize it. It’s gotten to the point of a confluence, a merging between men and machine
in a digital cyber world where we can never tell them apart. This is the age of a cyber spy. Now, when we think of spies, we might share Hollywood’s image
of a dashing and daring secret agent, who sneaks into some
underground nuclear facility somewhere halfway around the world
to protect us from a nuclear threat. Sometimes Hollywood goes a bit too far. In this case, however,
they don’t go far enough. You see, governments today
would never send a human operative into such a secret location. He’d never get in. Today’s spies are cyber spies. You see, it used to be that
James Bond used technology. Today, James Bond is technology. I want to walk you
on a journey into the future. But before I can take you there,
I have to take you to the past, to where the first virus actually started, and the beginning
of this journey of convergence. The first virus was actually written into a floppy disc video game
and inserted into a Macintosh. Yes, ironically, the world’s
first virus was aimed at a Mac. (Laughter) My! Have the world has changed! (Laughter) And we call these types
of viruses “sneakerware,” because you literally had
to walk around to install it. This is the first level of convergence where man is completely
separate from machines joined only by a pair of red sneakers. If James Bond wanted to insert a virus
into a computer in a nuclear facility, he’d have to sneak it in
his scuba gear and install it himself. (Laughter) I love you. Well, not you – we’ve only just met –
I’m talking about Melissa. Melissa is not my wife.
She is a stripper from Miami. (Laughter) You see, around the year 2000 or Y2K, the Melissa virus, named after the virus writer’s
favorite stripper from … Audience: Miami. was the world’s first email-borne virus. It was inserted into an email attachment
and sent with the subject line: “I love you.” Once the attachment was opened,
the process repeated itself, and within three months,
the world’s email systems were clogged up, inadvertently becoming
the world’s first spam. But this also marks the second leg
of our convergence story, because this is now the first time where man is leveraging
technology to do work. This would be the time
when James Bond used technology. But then, in the September
of 2001, the world changed. And I’m not talking about 9/11. I’m talking about one week later,
when the internet world changed. This was the introduction of Code Red. Code Red wasn’t an e-mail virus;
it wasn’t a zombie, a Trojan. It was all of the above. It was the world’s first
complex blended threat, and it went around the world
in three days. By September 21, it’d infected
2.2 million systems worldwide. Governments took notice, because they realized
they could take this technology and bring it up to a whole other level, to do the work its human spies could not. This enters the third phase, the phase where technology
replaces people. This is the beginning
of the era of the cyber spy. I’m going tell you a little bit
about how this cyber spy technology works. I’m going to take you
on a real-life mission that happened just
before the end of last decade, way off in the Middle East. You might already
have guessed its mission: to sneak in to an underground
nuclear facility halfway around the world to protect us from a nuclear threat. This is the Natanz nuclear
fuel enrichment facility in Iran and so is this, from space. The Allied nations were worried that this man, President Ahmadinejad,
was using those very centrifuges to create more nuclear fuel than he needed
for electrical energy production. And they were right. He was also using those centrifuges
to create nuclear fuel for atomic weapons. They needed to destroy those centrifuges. But how were they going to do it? They couldn’t send any
human agent in a scuba gear; they’re in the middle of a desert. (Laughter) And they actually debated
sending in fighter jets to drop bombs and blow the place apart. A little messy and not good PR.
I mean, imagine the fallout. (Laughter) Yeah, yeah, yeah, I know. I know, I know. (Applause) You just wait. (Laughter) So, instead of dropping a bomb,
they dropped a bug. Very clean. It was a – they called it
Operation Olympic Games. What a great name
for such a clean operation. I was here for the Olympics in Vancouver. It was clean. It was fun.
It’s a great name. It’s a great name. If they wanted to stick
with their old plan and set fire to everything
and have fallout for years, they would’ve called it
Operation Stanley Cup. (Laughter) (Applause) I was actually expecting
some boos there a little bit, sorry. But they had to get the agent in. And there are several ways they do it. I can’t describe them all, but one that was at least
publicly shared was this one, so that’s what we’ll go with. And it’s true. They did insert the agent
program into USB sticks, and then they scattered
those USB sticks around the compound. Some workers did manage to pick them up
and insert them in their computers. I know, look – you know the story. Before you get too judgmental,
think about this: what would you do
if you found a USB stick? (Laughter) Think about that the next time
you go to a trade show and some stranger from marketing hands you a USB and says,
“Read my collateral.” (Laughter) I don’t know how many security trade shows
I’ve been to where that’s happened. Now, that is a different story. (Laughter) But the agents did get in. And they did what all good agents do:
they started doing reconnaissance. They started working their way
around the network, walking the hallways so to speak,
looking for its target. And its target was that Siemens box. That Siemens box was a controller
for the centrifuges. And once they found it, they inserted
a rootkit and a weapons payload that, forgive me, altered the programmable logical controller
of the Step 7 software in the application. And then it phoned home in several ways. Phoned home and gave
the Americans and the Israelis full command and control
over that Siemens controller which, then of course, went
and spun up the centrifuges to such a state of supersonic speed
that they literally fell to pieces. They destroyed the centrifuges
for months, quite frankly, without ever stepping
foot into the facility. The program was a smashing success. (Laughter) Ahmadinejad was beside himself. He was firing his best scientists
because he thought they were incompetent. One small problem, though: the Allied spent so much time
trying to get this agent in, they didn’t think about
what if he actually got out. And bits of the program
actually did, and it did its job; it started searching its way
for other Siemens controllers. First in Iran, then
the Middle East, then Europe, and all the way to the doorstep
of the nuclear facilities in America. Now, before you get a little nervous, this spy knew it’s programming; it was told to look
for a specific signature of that controller in Natanz
so it didn’t do anything. However, its cover had been blown. The security industry, chiefly
a researcher from Kaspersky labs found it. And what was once a covert operation
to protect us from a nuclear threat became known as the advanced
persistent threat Stuxnet. In case you’ve ever heard of it. Now, there are battles like this
going on all around the world, and even in our backyards
and we don’t even realize it. The Chinese are particularly good at this. That video you saw earlier,
that’s just marketing. You don’t see what else goes on.
So let me explain a bit. Last year, the Chinese successfully hacked
into the RCA security company, through the HR department. And like Stuxnet, they weaved their way around
to find what they are after. They found the confidential
customer passwords for secure ID tokens. What do these tokens do? They get you into networks. Like military contractors:
Lockheed Martin, Northrop Grumman, L3. Now, given Lockheed Martin
makes stealth fighter planes, you can imagine
why that’s a good target. But they also focused on business. Operation Aurora,
you might have heard about, because it was famous for successfully
breaching Google’s network. But what people don’t realize
is that operation Aurora was about successfully targeting
more than 20 companies from Intel to Morgan Stanley. And here at home, companies
like Nortel were not immune. The Chinese had CEO level access
to confidential information and documentation for nearly 10 years. And if you’re involved
in natural resources, for example, bidding in the oil sands,
especially against the Chinese, a little bit of a wake up call, you might want to look up something
called Operation Night Dragon. It brings whole new meaning
to the term “bidding wars.” Now, these researchers of Kaspersky
who discovered Stuxnet also recently released a report that said that the number of network intrusions
around the world in a single year had skyrocketed from 220 million –
now, that’s already a big number – to 1.3 billion. What is going on? What’s the implications for all of us,
nationally or even personally? Well, nationally, you can see
why governments are so concerned. It’s not just about
the international espionage. It’s about the own
infrastructure that we have. After all, if you can take out
a nuclear facility in Iran, what’s to stop them
from returning the favor? And if you’re going to attack a nation, you want to take out
the communications network and the infrastructure, like banking. And while we’re talking about
technology replacing people in this current level of convergence, then who flies commercial
airplanes these days? Is it pilots or programs? If a decade ago, a number of operatives,
human operatives, could storm into
the cockpit of an airline, what’s to stop a program from invading an autopilot
or the air traffic control? Just last week, Leon Panetta, The Secretary of Defence
for the United States publicly went on record and said
there’s a high probability, and I quote, ”Of a cyber Pearl Harbor with physical
destruction and loss of life.” Now, what about us individually? There are a lot of hackers
who are so intelligent they know how reverse-engineer
these types of attacks and use some of those techniques
for their own gain. You might have heard, last year, over 100 million user accounts
were stolen from Sony Playstation network. I see some nodding heads,
but what you might not have known is that those attacks actually happened
over a series of several months. Many different individual attacks,
and Sony never realized it. And as we get more and more dependant
on internet appliances, you know, I wonder what’s next,
taking over our food supply? Maybe creating killer cookie robots? (Laughter) The government always warned me
cookies were bad for our children but I just never knew. (Laughter) But a little bit more seriously, if we think about those
centrifuges off in Iran, or if we could spin them up and out
of control until they fell to pieces, what other devices are we reliant on under the assumption of perfectly secure
wireless internet connectivity? If this scares you
just a bit, remember this: that our parents’ generation
were so terrified of the technologies that were being invented
during the Cold War that they built bomb shelters
and yet they survived. And those very same technologies
that terrified them are changing our lives today in a way
we can never imagine living without them. Now, also remember this: Those technologies I am talking about
were invented last decade. I promised you that I would take you
on a vision to espionage of the future with technologies
that are being invented today. So let me share that with you now. I’m going to take you
down a digital wormhole – a wormhole, by the way,
that we planned to send those attackers. You see, if you’re going
to defend yourself against technology that replaces people, then the next step of convergence is to create technology
that behaves like people, that in the digital world
you cannot tell one from the other. We’re capable of creating
mass of network so real that you cannot tell them apart. So when those attackers
come in to a nuclear facility or to an HR department, instead of finding
the real network, they find ours. And they walk around just like Stuxnet was trying to do
what the Chinese did, looking for systems to infect, but instead of finding
real ones, they find ours. These shadow systems that look
and behave just like real employees, checking their emails or spending
too much time on Facebook. (Laughter) Yeah, we know. (Laughter) But here’s the thing, if one of those attack programs
sends us an email attachment and asks us to open it, we gladly do. If they ask for confidential data, we happily hand it to them
hoping they call home, because these shadow networks
are for watching and recording. I’m actually going to show you
such a recording. Now, I have to be honest here,
we couldn’t show you everything. We had to actually change a lot of names,
scribble out some IP addresses, and we’re not allowed to bring you
as deep into the network as we want. It’s a good thing because if we showed you
everything, we’d have to shoot you. (Laughter) Or even worse, even worse,
make you a government employee. (Laughter) So this is, like I said, a real video,
those aren’t the real locations of course, but what is real is it did attack,
did start in the HR department. It actually did, maybe a coincidence. Those are real, real systems doing emails, real people sending out,
backing up their systems, but they are actually impacted
with this spy program and we don’t know it. So then we turn on our shadow network. These are systems that behave like real. They interlace with the actual systems
and start communicating. In fact, it’s the bad guys
that communicate to us, into our systems, and we let them. “Come on in!” “Send me an attachment!” Because when they do that,
we have every bit of information. Because we can’t look
into the real computers but we can look into ours. And we can see the processes they use and then decide to quarantine
the actual system, using the software-defind networking. And then, they can’t talk
out to the real world and instead, we tunnel them down
to a shadow HR department that isn’t real
but just behaves like real, and they can take whatever they want. And we know exactly where they’re going. Now, what would we do
with this kind of information, and more importantly,
what would James Bond do? (Laughter) James Bond had a licence to kill. Or at least kick them
really hard where it hurts. Now, today 007 has an ally: Agent 001. So we’ve come to the end of our journey
of convergence of man and machine, of confluence between two separate streams that come together
to make things more powerful. We’ve seen technology go
from completely separate from man to leveraged, to replacing man,
to behaving like man. What comes after behaving, I wonder. Well, if history is any guide,
the question shouldn’t be, if this technology will one day
profoundly impact our lives. The question should be, will we ever even realize it? Thank you very much. (Applause)

100 Responses

  1. A YZ says:

    Fascinating talk….

  2. Adawg420 says:

    the chinese had access for 10 years, huh…that 1 Trillion dollar annual defense budget is really worth the price tag

  3. Bill Bird says:

    " they'd never send in a spy, he'd never get in" Then who stole the digital keys to the controlers hacked by the 'Olympic Games' (STUXNET) virus? You had to get into the facility that holds those keys and physially remove them to then add them to the program. A spy had to do that.

  4. David Edgerly says:

    We're all dooomed!!!! run away!!!

  5. Yardmaster's Wealth Education Center says:

    Old School Theory (not uploaded to my channel yet…) counters this threat beautifully!

  6. William Griffin says:

    U REMEMBER STUXNET. COMBINED EFFORTS OF ISRAEL AND USA /NASA

  7. Hummer Ram says:

    You did not acknowledged that iloveyou virus came from phils!

  8. Samuel Turner says:

    The first virus was written on punch cards in 1968. The internet didn't even exist as we know it today, it was a connection between universities and military so that data could be quickly shared. A collage kid wrote it to see what would happen. And he also wrote the first virus protection program.

  9. Calm Energy says:

    What a great presenter! These jokes really kept me engaged lol

  10. Pam Cota says:

    Excellent Presentation !! Although scary !!!

  11. John Stutz says:

    This was 2013, now we know Kaspersky was actually the Russian government.
    Kaspersky was successful in deploying their products to the us government.

    We paid them to penetrate our systems.

  12. ChaosInFlux says:

    Funny this video now has no sound on it.

  13. Jason Mills says:

    This speech is informative about the way the present and future will be on cyber defense and infiltration. The down side is its bias to oneside, saying that this country or that country is making nuclear weapons. Let countries like the USA, Russia and China also have stock nuclear weapons. So if another country tries to arm itself it is added to a sanctions list. Its a case of a story not being bias to one country and keep it neatral to all countries. Keep it to science and tech and not politics.

  14. Bobby Richards says:

    less drama dude. I wish ted people would stop thinking they need to sound like ted people

  15. Nemesi Your says:

    😳👏🏻👏🏻👏🏻👏🏻🤔

  16. Xavier says:

    Quit snake Oiling us and JUST SAY HACKER!

  17. John Smith says:

    They almost ended the world….

  18. Aaron R says:

    Um… Agent 111, maybe?

  19. Justine Baker says:

    USB not surprising, I remember I love you and everyone at the company being warned BUT STILL opening it. Uggh, pain for the day.

  20. Dustin Rodriguez says:

    'What was once a covert operation to protect us from a nuclear threat'… no. It was an attack on the Iranian power grid. And when such attacks are used against our own power generation facilities, we had best not act surprised and offended. If we wanted to stop the Iranian power program, it would have been a better idea to accept their offer when they offered to completely shut down all nuclear facilities if the US and the IAEA were willing to build and run heavy water reactors for them to generate power. Panetta may have been right about his warnings, but it's impossible to trust him at all. He openly lied to Congress on multiple occasions and is actively opposed to cooperating with our democratic system of government, believing he knows better than any representative elected by the people. He speaks only to manipulate and should be ignored as completely untrustworthy.

    He mentioned the Sony gaming network hacks, but didn't mention who did them or their motivation or anything. He suggested that the next step might be invading the food supply. That betrays a complete misunderstanding. The Sony gaming network hacks weren't done by a state actor. They were done by consumers who were angry about Sony's corporate anti-consumer practices. Those gamers have no interest in attacking anyone's food supply. Companies certainly should be worried about their systems, and even more worried if they're actively hostile to consumers who have far more time and expertise on their side than Sony is even remotely willing to pay for.

    When Sony WAS attacked by a state actor, we got to see just how flagrantly and blatantly incompetent they were. Despite the fact that modern companies rely almost completely upon their computer systems to operate their businesses, they are still unwilling to concern themselves with security in any real way. Companies have started to at least hire some people to do 'cybersecurity', but it's a joke. They're nothing but 'patch patrol' and go around making sure computers are updated. They don't hire software developers who have knowledge and experience with security to make their own custom code safe. They don't provide developers with the tools and training necessary to learn how to create secure software. If a company isn't actually a software company, the executives at companies still say "IT is an expense to be reduced, we're an X company, not a software company." Then when their software goes down, like it did at Sony, they literally have to close the doors and send everyone home until IT fixes it. One day they'll wake up and understand the world they're living in.

    Here's a fun thing I like to do. Next time you hear a news story about a company getting hacked, and hear their statements that they take security seriously and will do better in the future… go to their website. Click on their "Careers" link. See if they even have any openings for cybersecurity folks. They might, some companies do nowadays. But they ALWAYS have openings for software developers. Check THOSE listings. See if they even MENTION security there. See if they require knowledge of safe and secure coding practices. It doesn't matter if their OS is updated and they're running Symantec on all their servers if the code they're running on those servers that actually runs their business and manages all of your data is full of holes. And oh, I can tell you from personal knowledge, it is FULL of holes. If you're not in the industry, I promise you, it is worse than you could ever possibly imagine.

  21. Lolly Pedregosa says:

    The USA must concentrate on Cyber Technology development because this is the backbone of the US Military and defense. The US must protect its Satellites from the attack of the enemies because this is the GPS that guides Military Aircraft, Missile, and other Smart Bombs, UAV, etc. which protect our FREEDOM and Democracy.

  22. West Wind Zigns says:

    Hm… this very guy comes across as a trojan horse himself. Best thing you can do is ditch all tech stuff, cellphones ipads etc.

  23. M ZAKRIA says:

    When Quantum arrives , the internet will be gone , No information will be safe ! The Race is on with China and USA … 2025

  24. sylvester john says:

    Wait cyber spy. Your shirt doesn’t fit 😂

  25. LordFryofKent says:

    I think he needs to talk to some old British people about who actually invented the computer. They may have invented new ones, during the cold war, but it started during WWII in Bletchly.

  26. Karman Hoyt says:

    Nerds act like there wasn't a life before modern technology lol.

  27. Leon Corriveau says:

    Someone has cotton mouth

  28. judeska de bom says:

    BOYCOT INTERNET 😛 FK EM ALL!

    2030dc we can life ,but we need WATER .FOOD, WIND ,FIRE and INTERNET ! hahahahah

  29. judeska de bom says:

    waiting till the day comming AFTER ME, accusing for ,.,, MINORITY REPORT! fk them all!

  30. Franny Ward says:

    Cyberdyne Systems series T-800 Model 101 is already old news.

  31. Steven Reid says:

    Nerds the real slight on humanity.

  32. Murtaza Bijani says:

    “Imagine the fallout.” …hah! I’m dying at these dad jokes!

  33. Axel Kvilekval says:

    Bell labs research son of director 1967,68,sent the first replicating Trojan horse virus on the Ethernet . 6months in jail!

  34. Axel Kvilekval says:

    Our public Shadow government covers all such activities with secrecy,as it must, illegal intrusions,our side and theirs!

  35. Spiri Rosetti says:

    Used by fb and social media with the same awesome success

  36. Eis Vogel says:

    Who would have thought of this??? Or better: Who wouldn't? And the same criminal governments (like most obvious are) WILL or ARE using it against their own ppl. 1984 has come, known as NWO.

  37. SolaraProject says:

    They attacked a Mac cause it was worthless anyways and still is. lol

  38. Kadag says:

    I am not a number. I am a free man!

  39. BTsMusicChannel says:

    14:21 I don't know. Ask Boeing maybe?

  40. Suzy Siviter says:

    If you run a nuclear facility, pull out the ethernet and wifi adaptors, job done.

  41. Ghazie Arsalan says:

    man I recall all those viruses name from my childhood when I was so obsessed with computer magazines

  42. Jean Carlos Ayala says:

    "Imagin the fallout", I see what you did there, and I love it.

  43. Drunken FPV says:

    This guy needs a drink holysh it the second worst tong slapper sounds I have come across

  44. Mad Dog Morgan says:

    Do all TedXer's all go to the same school to teach them how to talk…Every Ted talk ever starts the same…Imagine…..blah blah blah

  45. handyman heroes says:

    When you gonna say we're going to teach you something new do it nothing new here people go on

  46. Compliment Thief says:

    Are you the same Eric that lived in the nr Harvard area of Boston, rode scooters (member Boston Stranglers SC) and owned a mercedes SLK. Also you knew my ex gf, Heather Parker? Is that you Eric? EDIT: Ok, just remembered that guys name was Fred, but he def worked for Symantec mid 2000’s…

  47. praxis22 says:

    Bull, the first virus was on a Vax long before the Mac ever existed. Fred Cohen wrote the book. I bought the book and brought it to 6th form college, not knowing they had a Vax. The admin of the Vax was so alarmed, he called the principal. I was ushered into his office shortly afterwards.

    Oh, he's talking about Stuxnet/flame, the most idiotically assanine giveaway of an electronic weapon ever. Because the US electric grid is archaic and runs on, you guessed it, Siemens SCADA controllers.

    If you want to read something cogent, type "everything is broken medium" into Google. There is no security, certainly not with a computer. Anyone who tells you otherwise is selling you something.

  48. hemp64731 says:

    I wonder what they came up with now 6 and a half years later.

  49. Simply Space says:

    "Imagine the fallout" Ahhhh, I see what you did there.

  50. All World Misanthrope says:

    …………….absolutely one of the best TEDxTALKS…quality work

  51. Lauren Sappington says:

    He was hired. This whole talk is all hollywood.

  52. The Kaiser says:

    Computers are vastly overrated.

  53. jim beam says:

    Nuclear fuel…needs to be enriched at 90%…they only enrich to 6%,cannot be used for weapons.Liars.

  54. PST3K NaN says:

    And you wonder where China got its stealth fighter plans…

  55. Josiah Eichelman says:

    Skip to 16:45 for interesting stuff

  56. Tom Kenney says:

    Lost a bunch of graphics and music to Melissa.

  57. Tejas B T says:

    @7:12 it's Natanz not Nantaz .

  58. Alex Jesus says:

    Well, I did realise it and went with it just for fun. Now they got my genetics but… who's tricking who?

  59. I B says:

    US has never gone against a nation with Nuclears.Iran must have nuclears as a deterent for the israelis and the US

  60. Saucedanator D says:

    i used a securid … since it changes codes every 30 sec that is tough

  61. Mark Marola says:

    Get rid of technology. Its satanic

  62. Mark Marola says:

    This guy works against the people

  63. Alan Werner says:

    NOBODY stormed into the Cockpit of Any Commercial Airliner on 9-11. Sorry. Didn’t Happen.

  64. Existence Beyond says:

    He is a very great presenter! Thanks!

  65. James Duckett says:

    Not sure which is scarier, the stories or the dad jokes.

  66. Anonymous Anonymous says:

    It sounds like he's selling something and this is just a product presentation..

  67. drrugee says:

    Someone get this man a glass of water

  68. Alessandro Cernuzzi says:

    Next Halloween I'll just skip the usual horror movies and theme thing and I go to the next level. I watch a lecture by Eric Winsborrow

  69. 10 Billion Subs - 2 Sh*t videos says:

    imagine this for a second, Donald Trump knows more about China than he is letting on.

  70. J da high roller says:

    He IS the virus!

  71. Joel Gonzalez says:

    On the YouTube

  72. Adis Hamzic says:

    Bravo

  73. Anthony Gorss says:

    This is a good video to share with those who are oblivious to the real-world threats we face on the digital battleground.

  74. Phil Marsay says:

    I like the way America handed control to the Israeli's… I wonder what would happen if someone did the same thing to an American or Israeli facility

  75. charlie frost the first says:

    Cluster

  76. KevinDawson Music Variety says:

    Am I watching a Tedx talk or Stand up Comedy

  77. Pavel Kocfelda says:

    Contact Mansard Security for your legit hacker-for-hire. They are 100% guaranteed.

  78. April Malone says:

    Hire-hacker at Mansard Security, you can visit their youtube channel or search for them on Google

  79. Dean Cantave says:

    This was an EXCELLENT talk on CyberSecurity, wow! Seems simple enough but I would have never thought about enabling network intrusion via the creation of a dummy or "shadow network". Since we aren't in a space where we can re-architecture how networks pass data its an ingenious idea to use a network to trap and direct hackers to make them think they've hit paydirt.

  80. Jake Britton says:

    Might not have been called project Olympic Games, maybe it was Nitro Zueus, and the attack never called home, it was autonomous and was programmed to attack the Siemens Controller, only their specific model with the specific number of centrifuges. They knew what was happening because the employees were fired for not understanding why the controller was not working properly. Even one of the employees who was in a public promotional picture was killed in a planned car bomb. The code had a kill date as well, which was the last day Obama was in office. This Stuxnet was later re-coded by the enemies and destroyed or damaged lots of oilfield equipment in the US. For more information on this, Watch Zero Day. And I too had similar idea's back in the day to prevent my system from being hacked, allowing features to be used maliciously, and after the system was destroyed, I simply started it back up as it was fake destroyed, allowing the hacker to feel like they succeeded in the attack when in fact they never touched me. Same with people who hammer my network, I allow them in and give them access to nothing, preventing them from continuing the attack. But since I learned of a operating system running on the processor which calls skynet the very moment you plug in your computer, even if it is off (yes, it is really on in a low power mode), this layer can capture RAM, turn on your video camera, capture keystrokes and read or manipulate data from your hard drive. Hackers recently exploited this, which caused a real problem with corporations and Government equipment as they had to somehow disable this feature which they secretly militarized through Intel Manufacturing of processors. Something to think about. Only hardware not affected are Open source processors based on Power PC RISC processors. Who ever thought about open source hardware anyways, great idea in my opinion. The day when corporations code their own software and stop using closed source software like Microsoft if the day that all the security holes and back doors are no longer exploited by governments, spies and hackers. Most hackers are not responsible for damaged or infiltrated infrastructure, data or hardware, but the very people who designed in the closed source software the very feature permitting outside sources access to it. However because the media is owned by these Elite class people, they would never entertain unraveling that idea as it would shut down their exploitation. Manipulating Perception by propaganda is essential in controlling a population.

  81. RUCookoo Jackson says:

    more of your BRAIN WASHING ? who pays you to do this ?

  82. RUCookoo Jackson says:

    more of your BRAIN WASHING ? who pays you to do this ?

  83. Mike‘s World says:

    very interesting

  84. javier escontrias says:

    This guys "dad jokes" must be epic.

  85. Zack says:

    The closing statement i bet everyone thought it would be "its not if it will, but when it will" but instead he gave us a straight twilight zone ending.

  86. pharcyde110573 says:

    Love this guy, wish I had a boss like this!!

  87. TheSaviour says:

    Next convergence is probably Skynet

  88. Chris Austin says:

    I honestly wouldn’t be surprised if he turned out to be a robot.

  89. Scooty McHustle says:

    Snorefest.

  90. Hop says:

    Anyone know what software he is using towards the end of the talk? Some sort of network visualizer?

  91. Carlos Mendes says:

    What is sad is that the same technology that does this, could be used to improve life for everyone on the planet.

    But since we are full of stupidity and greed this is what we have.
    I am about to hit 50 years old, I saw the internet growing, I saw amazing innovations and was hopefully for the future, and this is what my kids kids, will have.

  92. Dave SuperDave Lyon says:

    Great f'ing talk.

  93. francesco quadrio says:

    One of the best Ted talks

  94. Ashley Haadt says:

    He ended with a warning, so I thought I would point out for people who are unaware: there are bots culling comment sections like this one for information. Google, YouTube, Alphabet et al all want, aggregate and sell your data. They are salaciously, leg-humpingly anxious to associate each data-point you put online with your real identity. You are throwing dissociated bits around that eventually find their way into a dossier that holds your personal data. It's like being eaten by a snake. You are not free, increasingly your fate is going from random to rut. Would unplugging completely change this?

  95. Robert Smart says:

    There were 67 PBYs (Catalinas) with a range of 3000 miles and endurance of 15 hours that could carry 2 x 2000 pound torpedoes or 4 x 1000 pound bombs in Pearl Harbor. Not one of them was in the air looking for the Japanese fleet on the morning of the attack in which they were all destroyed or damaged beyond repair? Nice windfall for the Consolidated Aircraft Company who got to build 67 replacements? PBYs spotted the Japanese fleet at the battle of Midway. PBYs flew out at night and sunk the Japanese convoys supplying the Japanese base at Guadalcanal? Pearl Harbor attack was allowed to happen by Roosevelt so he had an excuse to get involved in WW2 which he set up using Churchill and mass murderer Stalin (Uncle Joe) who became the (Red Menace) after WW2 to keep the US arms industry in business during the cold war with WW2 ally the Soviet Union?

  96. Robert Smart says:

    This guy is bought and paid for by the US government that is bought and paid for by Israel? USA spends more on defence than the rest of the world's countries together. USA is bankrupt and they are itching to fight WW3 so they can reset the US$ like they did in WW2? Is it surprising that countries likely to become victims of the USA want to know what the USA is up to?

  97. JuanCGFranko AQuaCliCk says:

    best example of an analogic virus.

  98. Zoran M. says:

    ok you persuaded me. I'm buying your services…

  99. Thomas Africa says:

    I wonder what this guy thinks of media today

Leave a Reply

Your email address will not be published. Required fields are marked *