SlideShare a Scribd company logo
30 years living a happy life
Breaking Systems,
Chasing Bad Guys,
and Helping People Understand Internet Security
About.me/jhc
 Jonathan Care
 @arashiyama
 http://www.linkedin.com/in/computercrime
What makes you happy?
Highlights and lowlights
 Helped build one of the first Internet backbones
 Set up my own ISP from scratch (just add £2M…)
 Investigated numerous breaches in conjunction with major tech vendors and
law enforcement
 Expert witness testimony
 Cryptographic design for UK Government
 Discovered the iOS “location.consolidated” bug
 Dot.com millionaire!
 Risk research for a large credit card company
 CHECK accredited penetration tester
 PCI DSS auditor
Where did I get started?
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teaching People about Internet Security
What have I observed?
Real Statistics?
Real reality
 Regrettably the percentage of organisations reporting
computer intrusions has continued to decline. The key
reason given… was the fear of negative publicity. As a
consequence this has resulted in a belief that the threat
and impact has also been gravely underestimated –
Metropolitan Police
 If I report this, I am worried what else the police will find –
Anonymous IT Director
 We don’t handle payments so it doesn’t really matter if
our code is secure or not – Web Development firm
providing e-commerce (!)
How soon can we start our web server up again?
– Compromised Web Merchant
Why commit crimes on the Internet?
 Potentially High Financial Gain
 Anonymity
 Rapid, secure, global communications
 Global impact – 1 billion plus users (1 in 6 of the world’s
population)
 Virtual marketplace – reduced risks of being detected,
disrupted or caught
 Volatile evidential trail – ISP limited retention of data
 Cross Border investigations protracted for law enforcement
And… “Because that’s where the money is” – Willie Sutton
Anonymity? Not really.
Did somebody mention hacking?
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teaching People about Internet Security
Meanwhile …
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teaching People about Internet Security
Wide open webcams?
Oh yeah.
Data Privacy is Dead
Criminals get
ongoing access to
credit reports
SSNDOB Compromise of KBA and PII at Major Data Brokers
PII data combined with
financial records for sale
Serious web-code
vulnerabilities
compromise sensitive
information
Almost 1.5 billion usernames
and passwords stolen
*Source Symantec Internet Security Threat Report 2014
Conclusions
What have I learned?
 All software has bugs.
 Bugs will be discovered
 Some bugs will have a security impact
 Product owners continue to value functionality over security
 Investors place little value on security and privacy
 End users trust vendors
 Security is always trumped by convenience – bad design makes bad
security
What can we do?
Security architecture landscape
Customer friction
‘harder is better’
doesn’t keep bad
guys out and annoys
good guys
Systematic
compromise of
personal data &
credentials
Exceptions; you are
only as good as your
weakest link!
Enterprises want absolute
identity proofing but must
live with shades of
uncertainty
If you go into InfoSec, remember this…
PREPARE
DETECTRESPOND
A final thought …
Digital Humanism (don’t be a jerk)
 Don’t intrude on personal space
 Don’t try and engineer personal intelligence and prerogatives out of the
system
 Don’t try to maximise machine efficiency at the expense of usability
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teaching People about Internet Security

More Related Content

PPTX
Identity theft pp presentation
PDF
Detecting Frauds and Identifying Security Challenge | by Money2Conf
PDF
Dealing with Fraud in E-Banking Sphere
PPTX
Callcredit's Fraud Summit 2016 - Plenary session
PPTX
Callcredit's Fraud Summit - Customer experience stream
PPT
Web Application Hacking 2004
PDF
E-Commerce Security Workable Attacks Againest E-Commerce
PDF
What to do after a data breach
Identity theft pp presentation
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Dealing with Fraud in E-Banking Sphere
Callcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit - Customer experience stream
Web Application Hacking 2004
E-Commerce Security Workable Attacks Againest E-Commerce
What to do after a data breach

What's hot (20)

PPTX
Callcredit's Fraud Summit 2016 - Identity verification stream
PDF
Privacy and Security in Mobile E-Commerce
PDF
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
PPT
E-commerce and fraud
PPTX
PPTX
PPTX
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
PDF
Data Breach White Paper
PDF
Red Flags Rule General
PDF
Detecting Wire Fraud in Real-Time
PDF
10 of the Top Data Breaches of the Decade
PPTX
Investigating & proving cybercrime
PDF
How To Catch A Fraudster Live Webinar
PDF
India Legal 17 June 2019
PDF
The Changing Landscape of Cyber Liability
PPTX
CS3: Cybersecurity Extortion & Fraud
PDF
Cryptocurrency Scams | How Do You Protect Yourself?
PDF
Preventing P2P Fraud with Aite Group
PDF
e-Commerce: Chapter 6
PPTX
Cyber Threat Overview for Euro IT counsel
Callcredit's Fraud Summit 2016 - Identity verification stream
Privacy and Security in Mobile E-Commerce
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
E-commerce and fraud
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
Data Breach White Paper
Red Flags Rule General
Detecting Wire Fraud in Real-Time
10 of the Top Data Breaches of the Decade
Investigating & proving cybercrime
How To Catch A Fraudster Live Webinar
India Legal 17 June 2019
The Changing Landscape of Cyber Liability
CS3: Cybersecurity Extortion & Fraud
Cryptocurrency Scams | How Do You Protect Yourself?
Preventing P2P Fraud with Aite Group
e-Commerce: Chapter 6
Cyber Threat Overview for Euro IT counsel
Ad

Similar to 30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teaching People about Internet Security (20)

PDF
Verizon 2014 data breach investigation report and the target breach
PPTX
11 19-2015 - iasaca membership conference - the state of security
PPTX
What i learned at the infosecurity isaca north america expo and conference 2019
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PDF
The good, the bad and the ugly of the target data breach
PPTX
IT-Risks-for-Non-profits-September-18SEPT17.pptx
PDF
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
PPTX
Emerging Threats to Digital Payments - Is Your Business Ready
DOCX
87161911 selected-case-studies-on-cyber-crime
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PPT
Information security management v2010
PPTX
CRI Retail Cyber Threats
PPTX
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
PPTX
Ecommerce security
PPTX
Data Security for Nonprofits
PDF
Forthright Security Lunch and Learn - Ransomware Focus 2
PPTX
CRI "Lessons From The Front Lines" March 26th Dublin
PPTX
Cyber crime ppt
PPTX
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Verizon 2014 data breach investigation report and the target breach
11 19-2015 - iasaca membership conference - the state of security
What i learned at the infosecurity isaca north america expo and conference 2019
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
The good, the bad and the ugly of the target data breach
IT-Risks-for-Non-profits-September-18SEPT17.pptx
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Emerging Threats to Digital Payments - Is Your Business Ready
87161911 selected-case-studies-on-cyber-crime
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Information security management v2010
CRI Retail Cyber Threats
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Ecommerce security
Data Security for Nonprofits
Forthright Security Lunch and Learn - Ransomware Focus 2
CRI "Lessons From The Front Lines" March 26th Dublin
Cyber crime ppt
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Ad

Recently uploaded (20)

PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
My India Quiz Book_20210205121199924.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PPTX
20th Century Theater, Methods, History.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
IGGE1 Understanding the Self1234567891011
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
What if we spent less time fighting change, and more time building what’s rig...
LDMMIA Reiki Yoga Finals Review Spring Summer
Environmental Education MCQ BD2EE - Share Source.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
My India Quiz Book_20210205121199924.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
20th Century Theater, Methods, History.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
IGGE1 Understanding the Self1234567891011
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Weekly quiz Compilation Jan -July 25.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
HVAC Specification 2024 according to central public works department
Uderstanding digital marketing and marketing stratergie for engaging the digi...
What if we spent less time fighting change, and more time building what’s rig...

30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teaching People about Internet Security

  • 1. 30 years living a happy life Breaking Systems, Chasing Bad Guys, and Helping People Understand Internet Security
  • 2. About.me/jhc  Jonathan Care  @arashiyama  http://www.linkedin.com/in/computercrime
  • 3. What makes you happy?
  • 4. Highlights and lowlights  Helped build one of the first Internet backbones  Set up my own ISP from scratch (just add £2M…)  Investigated numerous breaches in conjunction with major tech vendors and law enforcement  Expert witness testimony  Cryptographic design for UK Government  Discovered the iOS “location.consolidated” bug  Dot.com millionaire!  Risk research for a large credit card company  CHECK accredited penetration tester  PCI DSS auditor
  • 5. Where did I get started?
  • 7. What have I observed?
  • 9. Real reality  Regrettably the percentage of organisations reporting computer intrusions has continued to decline. The key reason given… was the fear of negative publicity. As a consequence this has resulted in a belief that the threat and impact has also been gravely underestimated – Metropolitan Police  If I report this, I am worried what else the police will find – Anonymous IT Director  We don’t handle payments so it doesn’t really matter if our code is secure or not – Web Development firm providing e-commerce (!) How soon can we start our web server up again? – Compromised Web Merchant
  • 10. Why commit crimes on the Internet?  Potentially High Financial Gain  Anonymity  Rapid, secure, global communications  Global impact – 1 billion plus users (1 in 6 of the world’s population)  Virtual marketplace – reduced risks of being detected, disrupted or caught  Volatile evidential trail – ISP limited retention of data  Cross Border investigations protracted for law enforcement And… “Because that’s where the money is” – Willie Sutton
  • 18. Data Privacy is Dead Criminals get ongoing access to credit reports SSNDOB Compromise of KBA and PII at Major Data Brokers PII data combined with financial records for sale Serious web-code vulnerabilities compromise sensitive information Almost 1.5 billion usernames and passwords stolen *Source Symantec Internet Security Threat Report 2014
  • 20. What have I learned?  All software has bugs.  Bugs will be discovered  Some bugs will have a security impact  Product owners continue to value functionality over security  Investors place little value on security and privacy  End users trust vendors  Security is always trumped by convenience – bad design makes bad security
  • 21. What can we do?
  • 22. Security architecture landscape Customer friction ‘harder is better’ doesn’t keep bad guys out and annoys good guys Systematic compromise of personal data & credentials Exceptions; you are only as good as your weakest link! Enterprises want absolute identity proofing but must live with shades of uncertainty
  • 23. If you go into InfoSec, remember this… PREPARE DETECTRESPOND
  • 25. Digital Humanism (don’t be a jerk)  Don’t intrude on personal space  Don’t try and engineer personal intelligence and prerogatives out of the system  Don’t try to maximise machine efficiency at the expense of usability