Hacking Conference (02:39)
Thousands attend the DEF CON conference in Las Vegas each year. Katie Moussouris explains that white hat hackers are good people who do bad things. The "Wall of Sheep" contains the names and passwords of those who accidentally leave the Wi-Fi and Bluetooth operational on their devices.
Cyber Elite (02:06)
In the back room of the DEF CON conference, 100 of the most adept hackers attempt to break into each other's computers. Luke Harrison attempts to fix vulnerabilities in his system while attacking someone else's. The U.S. government reached out to the private sector to recruit hackers.
"Hack the Pentagon" (02:01)
The Secretary of Defense created a contest to recruit hackers who could obtain access to the Pentagon's mainframe. Moussouris describes how the government is exploring new methods to recruit technology experts. General Michael Hayden discusses Tailored Access Operations at the NSA.
Expert Cyber Hacker (02:06)
Kevin Mitnick was incarcerated for five years for hacking major corporations like NOKIA and Motorola. He demonstrates how to hack into someone's private account by setting up a fake Wi-Fi hub. Today, people can download tools to help them retrieve the personal information of other people from the internet.
Hacking Attack (03:05)
Two men set up a bank account under a stolen identity they obtained after hacking phones on a fake Wi-Fi network. Arthur Katsogiannis describes how they recruit mules to open fraudulent accounts and withdraw money. Alastair MacGibbon explains why cybercrime is profitable and low risk.
Hacking is Big Business (03:04)
Any electronic device linked to the internet is vulnerable to hacking. Linton Besser notifies Matthew Edwards that a copy of his hard drive was uploaded to the internet. Tim Wellsmore states that hacked computer servers sell for five dollars.
Attacks on Governmental Agencies (02:08)
Kaspersky Lab released a report detailing hundreds of thousands of globally suspect computers. The ABS shut down the Australian Census because there was a low-level denial of service attack. MacGibbon states that DDoS attacks are predictable
Australia Hacked (03:23)
The Australian government confirmed that the Department of Meteorology was hacked; the offenders might have been looking for intelligence from the Australian Geospatial Organization. "Four Corners" confirmed China was responsible for the attack as well as hacking into "Austrade" and the Defense Science Industry. MacGibbon, Hayden, and Wellsmore emphasize the need to protect information.
NewSat Hacked (04:02)
The Australian Signals Directorate notified NewSat that their network was corrupted. After working in conjunction with the governmental organization, Daryl Peter determined that the majority of the attacks came from China.
Criticism of the Australian Government (02:02)
Dmitri Alperovitch believes the Australian government needs to do more to protect and educate people. MacGibbon states the Australian government took many steps to improve cyber security. Hayden states the Chinese government attacks private enterprise for intellectual property and economic advantage.
Democratic Party Hacked (02:22)
The Democratic Party asked Alperovitch to investigate a potential hacking. Hillary Clinton stated Russian intelligence hacked the party. Hayden describes how Russia weaponized the data found by releasing inflammatory emails on WikiLeaks.
Is the U.S. a Cybercrime Perpetrator? (02:06)
The U.S. and Israel receive blame for creating Stuxnet to slow down Iran's nuclear enrichment program. By injecting malware into the company's computers, centrifuges in nuclear facilities would spin out of control, damaging critical infrastructure. Experts describe its hacking legacy.
Zero-Day Exploits (03:03)
Zero-day vulnerability refers to a problem in software that is unknown to the vendor or public; hackers can turn it into a weapon. Companies like Zerodium and Mitnick's security company sells these exploits to third parties— Mitnick refuses to comment.
Training in Cyber Security (04:33)
The Australian Signals Directorate wants to develop Zero-day exploits to use on oversea targets. Alperovitch states that most modern countries see the need for network defense. At the Australian Defense Force Academy, students compete to damage critical infrastructure on an imaginary city through cyber warfare.
Cyber Grand Challenge (02:54)
Hackers compete the hacking competition sponsored by the US Department of Defense. Mayhem recieves $2 million for creating an AI to defend and attack other systems. Moussouris states that technology is created faster than it can be secured.
Credits: Cyber War (00:25)
Credits: Cyber War
For additional digital leasing and purchase options contact a media consultant at 800-257-5126
(press option 3) or firstname.lastname@example.org.