Moore's law buy a house for 1m in 1968, worth .20 today
cell phone of the future - video camera, internet connected, rfid chips - embedded technology, manufactured for .06 - hackers are trying to get virus' to hop rfid chips
software trends - draws a contrast between analog and digital systems (bridge analogy - bolts missing, no problem, in a digital system, one line of code kills the bridge)
Wirth's law (Nicholas Wirth invented Pascal) - software becomes slower faster than hardware becomes faster
software complexity - increasing
shoppers at UK supermarket - hackers had added chip underneath credit card readers and transmitted credit card info offsite
Google hack summary hacked the facebook accounts of friends of google accounts, send links from facebook accounts that had been hacked, vulnerability in IE allows software to be downloaded onto the sysadmin machine - opens ssl tunnel and admin box was popped
human is the weakest link - key point of vulnerability
human genome - vulnerability
brain computer interfaces - bci - you can purchase right now, helmet will control video games
Jim Simon Microsoft -institute for advanced technology in government
democratization of weapons and technology - can build them in your garage
cyber crime has surpassed drugs
US has lost supremecy -
march of technology is not stoppable
China produced more cs majors than any country
ubiquitous encryption is a few years away
cost of breaking cell phone call will be prohibitive
minicore - laptop will be 100 times faster, will require 256 character password - fingerprints not long enough, requires 18 points - technology doesn't exist
waiting list for this tech, us gov is not on the list, will take 2-3 years to certify it before it can be bought
quantum computing - may or may not work, but would change the game
cybercrime - companies don't prosecute b/c it would require giving away trade secrets.
market for hacks
attestation - how do we know it is you on the other end of the cell phone or computer?
crowdsourcing - photosynth
tempest - intercept apple Iphone calls from 400 meters -
us government is absolescent tending toward obsolete, just approving windows vista for use
civil governments are insecure
need some formal mechanism to get congress to take on issues that are important
Ken Flamm -
interception of communications has been most discussed today, but is the smallest part of the problem
pace of technology is due to investment, not some natural force and will continue into indefinite future
what are the origins of this technology pace problem - U.S. played a major role as the parent
"cyberpower" - abiliy to use cyberspace to create advantages and influence events...
tech policy - direct and indirect measures to promote national R&D investment
different than my previous understanding - Flamm claims regulation of technology is related to other issues
manufacturing - interchangeable parts for rifles - after Napoleonic wars
World War II - cyberpower won the war - first modern digital computers were created, decryption of intercepted axis powers communications - tipped the balance of war, not declassified until 1970
1950's and 60's government poured money into tech, huge increases - did not happen accidentally, man made event
So what is new now?
- scale - rates of decline 15 - 30% in cost
- is the toyota problem a software problem? etc.
- border between mil and commercial increasingly nebulous
- globalization of IT
Tech policy is important b/c it is what got us here
what investments do we currently have in place to solve these security problems?
QUESTION AND ANSWER
elliptical curve encryption - is the change - will this take off?
ubiquitous encryption - if all communications are encrypted, how do you know which communications to capture?