Governments dont understand cyber warfare. We need hackers Rodrigo Bijou

In 2008, Burhan Hassan, age 17,

boarded a flight from Minneapolis

to the Horn of Africa.

And while Burhan was the youngest recruit,

he was not alone.

Al-Shabaab managed to recruit
over two dozen young men

in their late teens and early 20s

with a heavy presence
on social media platforms like Facebook.

With the Internet and other technologies,

they’ve changed our everyday lives,

but they’ve also changed
recruitment, radicalization

and the front lines of conflict today.

What about the links connecting Twitter,

Google and protesters
fighting for democracy?

These numbers represent
Google’s public DNS servers,

effectively the only
digital border crossing

protesters had and could use

to communicate with each other,
to reach the outside world

and to spread viral awareness

of what was happening
in their own country.

Today, conflict is essentially borderless.

If there are bounds to conflict today,

they’re bound by digital,
not physical geography.

And under all this is a vacuum of power

where non-state actors, individuals
and private organizations

have the advantage over slow, outdated
military and intelligence agencies.

And this is because,
in the digital age of conflict,

there exists a feedback loop

where new technologies,
platforms like the ones I mentioned,

and more disruptive ones,

can be adapted, learned, and deployed
by individuals and organizations

faster than governments can react.

To understand the pace
of our own government thinking on this,

I like to turn to something aptly named

the Worldwide Threat Assessment,

where every year the Director
of National Intelligence in the US

looks at the global threat landscape,

and he says, “These are the threats,
these are the details,

and this is how we rank them.”

In 2007, there was absolutely
no mention of cyber security.

It took until 2011,
when it came at the end,

where other things, like West
African drug trafficking, took precedence.

In 2012, it crept up, still behind things
like terrorism and proliferation.

In 2013, it became the top threat,

in 2014 and for the foreseeable future.

What things like that show us

is that there is
a fundamental inability today

on the part of governments
to adapt and learn in digital conflict,

where conflict can be immaterial,
borderless, often wholly untraceable.

And conflict isn’t just online to offline,
as we see with terrorist radicalization,

but it goes the other way as well.

We all know the horrible events
that unfolded in Paris this year

with the Charlie Hebdo terrorist attacks.

What an individual hacker or a small group
of anonymous individuals did

was enter those social media conversations
that so many of us took part in.

#JeSuisCharlie.

On Facebook, on Twitter, on Google,

all sorts of places where millions
of people, myself included,

were talking about the events

and saw images like this,

the emotional, poignant image of a baby
with “Je suis Charlie” on its wrist.

And this turned into a weapon.

What the hackers did
was weaponize this image,

where unsuspecting victims,

like all of us in those conversations,

saw this image, downloaded it

but it was embedded with malware.

And so when you downloaded this image,

it hacked your system.

It took six days to deploy
a global malware campaign.

The divide between physical
and digital domains today

ceases to exist,

where we have offline attacks
like those in Paris

appropriated for online hacks.

And it goes the other way as well,
with recruitment.

We see online radicalization of teens,

who can then be deployed globally
for offline terrorist attacks.

With all of this, we see that there’s
a new 21st century battle brewing,

and governments
don’t necessarily take a part.

So in another case,
Anonymous vs. Los Zetas.

In early September 2011 in Mexico,

Los Zetas, one of the most
powerful drug cartels,

hung two bloggers with a sign that said,

“This is what will happen
to all Internet busybodies.”

A week later, they beheaded a young girl.

They severed her head,
put it on top of her computer

with a similar note.

And taking the digital counteroffensive

because governments couldn’t even
understand what was going on or act,

Anonymous, a group we might not associate
as the most positive force in the world,

took action,

not in cyber attacks, but threatening
information to be free.

On social media, they said,

“We will release information

that ties prosecutors and governors
to corrupt drug deals with the cartel.”

And escalating that conflict,

Los Zetas said, “We will kill 10 people
for every bit of information you release.”

And so it ended there because
it would become too gruesome to continue.

But what was powerful about this

was that anonymous individuals,

not federal policia,
not military, not politicians,

could strike fear deep into the heart

of one of the most powerful,
violent organizations in the world.

And so we live in an era

that lacks the clarity
of the past in conflict,

in who we’re fighting,
in the motivations behind attacks,

in the tools and techniques used,

and how quickly they evolve.

And the question still remains:

what can individuals,
organizations and governments do?

For answers to these questions,
it starts with individuals,

and I think peer-to-peer security
is the answer.

Those people in relationships
that bought over teens online,

we can do that with peer-to-peer security.

Individuals have more power
than ever before

to affect national
and international security.

And we can create those positive
peer-to-peer relationships

on and offline,

we can support and educate the next
generation of hackers, like myself,

instead of saying, “You can either be
a criminal or join the NSA.”

That matters today.

And it’s not just individuals –
it’s organizations, corporations even.

They have an advantage
to act across more borders,

more effectively and more rapidly
than governments can,

and there’s a set
of real incentives there.

It’s profitable and valuable

to be seen as trustworthy
in the digital age,

and will only be more so
in future generations to come.

But we still can’t ignore government,

because that’s who we turn to
for collective action

to keep us safe and secure.

But we see where that’s gotten us so far,

where there’s an inability to adapt
and learn in digital conflict,

where at the highest levels of leadership,

the Director of the CIA,
Secretary of Defense,

they say, “Cyber Pearl Harbor will happen.”
“Cyber 9/11 is imminent.”

But this only makes us
more fearful, not more secure.

By banning encryption in favor
of mass surveillance and mass hacking,

sure, GCHQ and the NSA can spy on you.

But that doesn’t mean
that they’re the only ones that can.

Capabilities are cheap, even free.

Technical ability
is rising around the world,

and individuals and small groups
have the advantage.

So today it might just be
the NSA and GCHQ,

but who’s to say that the Chinese
can’t find that backdoor?

Or in another generation,
some kid in his basement in Estonia?

And so I would say that it’s
not what governments can do,

it’s that they can’t.

Governments today
need to give up power and control

in order to help make us more secure.

Giving up mass surveillance and hacking
and instead fixing those backdoors

means that, yeah, they can’t spy on us,

but neither can the Chinese

or that hacker in Estonia
a generation from now.

And government support
for technologies like Tor and Bitcoin

mean giving up control,

but it means that developers, translators,
anybody with an Internet connection,

in countries like Cuba, Iran and China,
can sell their skills, their products,

in the global marketplace,

but more importantly sell their ideas,

show us what’s happening
in their own countries.

And so it should be not fearful,

it should be inspiring
to the same governments

that fought for civil rights,
free speech and democracy

in the great wars of the last century,

that today, for the first time
in human history,

we have a technical opportunity

to make billions of people
safer around the world

that we’ve never had before
in human history.

It should be inspiring.

(Applause)

2008 年,17 岁的 Burhan Hassan

登上了从明尼阿波利斯

飞往非洲之角的航班。

虽然布尔汉是最年轻的新兵,

但他并不孤单。

青年党设法招募
了两打

十几岁和二十出头的年轻人,他们在

Facebook 等社交媒体平台上占有重要地位。

借助互联网和其他技术,

它们改变了我们的日常生活,

但它们也改变了今天的
招募、激进化

和冲突前线。

连接推特、

谷歌和
争取民主的抗议者的链接呢?

这些数字代表了
谷歌的公共 DNS 服务器,

实际上是唯一的
数字过境

抗议者拥有并且可以用来

相互交流
、接触外部世界

并传播他们自己国家

正在发生的事情的病毒意识

今天,冲突基本上是无国界的。

如果今天有冲突的界限,

它们受数字
而非自然地理的约束。

在这一切之下是权力真空

,非国家行为者、个人
和私人组织

比缓慢、过时的
军事和情报机构具有优势。

这是因为,
在冲突的数字时代,

存在一个反馈循环

,在这个循环中,个人和组织可以更快地适应、学习和部署新技术、
我提到的平台

以及更具破坏性的平台,

不是政府的反应 .

为了了解
我们自己的政府在这方面的思考速度,

我想求助于一个恰当地命名

为全球威胁评估的东西

,美国国家情报局局长每年都会在该评估中

审视全球威胁形势

,他说:“这些是 威胁,
这些是细节

,这就是我们对它们进行排名的方式。”

2007 年,完全
没有提到网络安全。

直到 2011
年结束

,西非贩毒等其他事情
占据了主导地位。

2012 年,它悄悄崛起,仍然落后于
恐怖主义和扩散等事件。

2013 年,

在 2014 年和可预见的未来,它成为最大的威胁。

这样的事情向

我们表明,
今天政府根本

无法适应和学习数字冲突

,冲突可能是无关紧要的、
无国界的,通常完全无法追踪。

正如我们在恐怖主义激进化中所看到的那样,冲突不仅是从线上

到线下的,而且还会以另一种方式发生。

我们都知道今年在巴黎发生的可怕事件

,即查理周刊恐怖袭击事件。

个人黑客或一小
群匿名个人所做的

是进入
我们这么多人参与的那些社交媒体对话。

#JeSuisCharlie。

在脸书、推特、谷歌上,

数以百万计
的人,包括我在内,

在各种地方都在谈论这些事件,

并看到了这样的

图像,一个
带有“Je suis Charlie”的婴儿的情感、凄美的形象。

而这变成了武器。

黑客所做的
是将这张图片武器化

,毫无戒心的受害者,

就像我们在这些对话中的所有人一样,

看到了这张图片,下载了它,

但它嵌入了恶意软件。

因此,当您下载此图像时,

它入侵了您的系统。

部署全球恶意软件活动花了六天时间。 今天

,物理
域和数字域之间的鸿沟

不复存在

,我们有
像巴黎那样的离线攻击被

用于在线黑客攻击。

反过来
,招聘也是如此。

我们看到青少年的在线激进化,

然后他们可以在全球部署
以进行离线恐怖袭击。

有了这一切,我们看到
一场新的 21 世纪战争正在酝酿之中,

而政府
并不一定要参与其中。

所以在另一种情况下,
匿名与洛斯齐塔斯。

2011 年 9 月上旬在墨西哥

,最
强大的贩毒集团之一

洛斯泽塔斯吊死了两名博主,上面写着:

“这将是
所有互联网忙碌者的下场。”

一周后,他们斩首了一个年轻女孩。

他们砍下她的头,
把它放在她的电脑上,上面

写着类似的字条。

由于政府甚至无法
理解正在发生的事情或采取的行动,因此采取了数字反攻,

匿名组织,我们可能不会将其
视为世界上最积极的力量,

采取行动,

不是网络攻击,而是威胁
信息自由 .

他们在社交媒体上说,

“我们将发布信息

,将检察官和州长
与卡特尔的腐败毒品交易联系起来。”

并且升级了这场冲突,

Los Zetas 说:“你发布的每一条信息,我们都会杀死 10 人
。”

所以它就在那里结束了,因为
它会变得太可怕而无法继续。

但这件事的强大之

处在于,匿名的个人,

而不是联邦警察,
不是军人,也不是政客,

可以在世界上

最强大、最
暴力的组织之一的心脏深处引发恐惧。

因此,我们生活在一个

缺乏过去冲突、

我们在战斗的人、
攻击背后的动机、

使用的工具

和技术以及它们发展的速度的时代。

问题仍然存在:

个人、
组织和政府能做什么?

对于这些问题的答案,
它从个人开始

,我认为点对点安全
就是答案。

那些在
网上购买青少年的人,

我们可以通过点对点安全来做到这一点。

个人比以往任何时候都拥有更大的权力

来影响国家
和国际安全。

我们可以

在线上和线下建立积极的点对点关系,

我们可以支持和教育
像我这样的下一代黑客,

而不是说,“你可以成为罪犯,也可以
加入 NSA。”

这在今天很重要。

不仅仅是个人——
它是组织,甚至是公司。 与政府

相比,它们具有
跨越更多国界、

更有效、更迅速采取行动的优势

而且
那里有一套真正的激励措施。 在数字时代被视为

值得信赖是有利可图的和有价值的

而且
在未来几代人中只会更加如此。

但我们仍然不能忽视政府,

因为我们求助于政府
采取集体行动

来保障我们的安全。

但我们看到了迄今为止我们的处境,

在数字冲突中无法适应和学习,

在最高领导层

,中央情报局
局长,国防部长,

他们说,“网络珍珠港将会发生。 "
“网络 9/11 迫在眉睫。”

但这只会让我们
更加恐惧,而不是更加安全。

通过禁止加密以
支持大规模监视和大规模黑客攻击

,GCHQ 和 NSA 可以监视您。

但这并不
意味着他们是唯一可以做到的。

功能很便宜,甚至是免费的。

世界范围内技术能力正在上升

,个人和小团体
具有优势。

所以今天可能
只是 NSA 和 GCHQ,

但谁能说中国人
找不到那个后门呢?

或者在另一代人中,
爱沙尼亚地下室里的某个孩子?

所以我想说,这
不是政府能做的,

而是他们不能做的。

今天的政府
需要放弃权力和控制

,以帮助我们更加安全。

放弃大规模监视和黑客攻击
,转而修复这些

后门意味着,是的,他们无法监视我们,

但中国人

或爱沙尼亚的黑客也不能在
一代人之后。

政府
对 Tor 和比特币等技术的支持

意味着放弃控制权,

但这意味着古巴、伊朗和中国等国家的开发人员、翻译人员以及
任何有互联网连接的人

都可以在全球市场上出售他们的技能、他们的产品,

但更重要的是推销他们的想法,

向我们展示
他们自己国家正在发生的事情。

所以它不应该害怕,

它应该鼓舞

那些在上世纪大战中为公民权利、
言论自由和民主

而战的政府

,今天,
人类历史上第一次,

我们拥有一个技术

让全世界数十亿人
更安全的机会,


是人类历史上从未有过的。

它应该是鼓舞人心的。

(掌声)