apresentação de sergio amadeu
TRANSCRIPT
![Page 1: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/1.jpg)
CYBERWAR: A MILITARIZAÇÃO DA INTERNET
Militarização das redes, microeconomia do controle e
vigilância massiva
Sergio Amadeu da Silveira@samadeu
ACTANTES / UFABC
![Page 2: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/2.jpg)
![Page 3: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/3.jpg)
![Page 4: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/4.jpg)
Cryptorave 2014 São Paulo
John Arquilla e David Ronfeldt:
“Preparação para o conflito neste mundo exigirá a mudança para novas formas de
organização... a informação e o conhecimento estão se tornando os elementos-chave
do poder.”
![Page 5: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/5.jpg)
Cryptorave 2014 São Paulo
John Arquilla e David Ronfeldt:
“Isso implica, entre outras coisas, de que Marte, o antigo deus da força bruta e da guerra,
deve dar lugar a Atena, a bem armada deusa da sabedoria. Aceitar Athena como patrona desta era da informação
representa um primeiro passo, não só para a preparação para conflitos futuros, mas também para preveni-los.”
![Page 6: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/6.jpg)
Cryptorave 2014 São Paulo
John Arquilla e David Ronfeldt:
Fronteira terrestreFronteira marítima
Fronteira aéreaFronteira aeroespacial
Fronteira internaFronteira ciberespacial
![Page 7: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/7.jpg)
![Page 8: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/8.jpg)
![Page 9: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/9.jpg)
![Page 10: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/10.jpg)
![Page 11: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/11.jpg)
![Page 12: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/12.jpg)
@samadeu
O tráfego global de dados na internet poderá atingir 1,4 zettabytes por ano, até 2017, índice
três vezes superior ao observado em 2012.
Base: pesquisa Visual Networking Index, realizada anualmente pela multinacional americana Cisco
![Page 13: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/13.jpg)
@samadeu
Um Zettabyte é uma unidade de informação ou memória. Corresponde a
1.000.000.000.000.000.000.000 (10²¹ ) Bytes.
Fonte: wikipedia
![Page 14: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/14.jpg)
![Page 15: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/15.jpg)
@samadeu
Cada zettabyte equivale a
1 trilhão de gigabytes,
Equivalente a 1 bilhão de DVDs assistidos por dia durante um ano inteiro.
![Page 16: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/16.jpg)
![Page 17: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/17.jpg)
![Page 18: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/18.jpg)
![Page 19: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/19.jpg)
Cryptorave 2014 São Paulo
A CIBERGUERRA NÃO TEM FRONTEIRAS...NÃO RESPEITA CIDADÃOS, NEM INSTITUIÇÕES...
![Page 20: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/20.jpg)
Cryptorave 2014 São Paulo
Militarização da Internet:
A vigilância massiva se realiza a partir da entrega de nossas informações para um conjunto de corporações de
TI
![Page 21: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/21.jpg)
Cryptorave 2014 São Paulo
Telecommunications Industry Association (TIA):
“The ICT industry is very aware of the cyber threats being faced by U.S. institutions,
and it continues to play an important role in detecting, preventing, mitigating, and responding to
those rapidly changing threats.”
![Page 22: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/22.jpg)
Cryptorave 2014 São Paulo
persuasive soft power &
military hard power
![Page 23: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/23.jpg)
![Page 24: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/24.jpg)
![Page 25: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/25.jpg)
![Page 26: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/26.jpg)
![Page 27: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/27.jpg)
![Page 28: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/28.jpg)
![Page 29: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/29.jpg)
![Page 30: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/30.jpg)
![Page 31: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/31.jpg)
'''
![Page 32: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/32.jpg)
![Page 33: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/33.jpg)
![Page 34: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/34.jpg)
![Page 35: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/35.jpg)
![Page 36: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/36.jpg)
CISPA
O projeto de lei CISPA quer legalizara articulação entre as empresas e o governo federal para compartilhar informações com a finalidade de
prevenir ou organizar a defesa diante de ataques cibernéticos.
![Page 37: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/37.jpg)
CISPA
O projeto CISPA autoriza expressamente o monitoramento de nossas
comunicações privadas. Foi escrito de uma forma tão abrangente que permitirá que as empresas entreguem
grandes conjuntos de informação pessoais às agências de inteligência sem nenhuma
fiscalização judicial.
![Page 38: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/38.jpg)
CISPA
O projeto de lei CISPA foi aprovada na Câmara por 288 votos (92 Democratas e
196 Republicanos) contra 127, em 18/04/2013.
Desde 22/04/2013 está tramitando no Senado norte-americano.
![Page 39: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/39.jpg)
CISPA
O apoio ao projeto de lei CISPA deixa claro
quais as fronteiras da ciberguerra...
http://intelligence.house.gov/
![Page 40: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/40.jpg)
![Page 41: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/41.jpg)
![Page 42: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/42.jpg)
![Page 43: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/43.jpg)
![Page 44: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/44.jpg)
![Page 45: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/45.jpg)
![Page 46: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/46.jpg)
![Page 47: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/47.jpg)
![Page 48: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/48.jpg)
CISPA:
Airlines for AmericaAmerican Bankers AssociationAmerican Chemistry Council
American Fuel & Petrochemical ManufacturersAmerican Gas Association
American Public Power AssociationASIS International
Association of American RailroadsAT&TBoeingBSA
Business Roundtable
![Page 49: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/49.jpg)
CISPA:
Canadian Electricity AssociationCentury Link
Chamber of CommerceCiena
The Clearing HouseComcastComptel
Consumers Bankers AssociationConsumers Energy
CSC
![Page 50: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/50.jpg)
CISPA:
CTIA-The Wireless AssociationEdison Electric Institute
Electric Power Supply AssociationElectricity Consumers Resource CouncilElectronic Funds Transfer Association
Electric Power Supply AssociationEMC
Exelon CorporationFinancial Joint Trades
Financial Services Information Sharing and Analysis Center (FSISAC)
![Page 51: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/51.jpg)
CISPA:
GridWise AllianceHP
IBMInformation Technology Industry Council
Institute Transmission Access Policy Study GroupIntel
Internet Security AllianceJoint Broadband Providers
Juniper NetworksLarge Public Power Council
![Page 52: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/52.jpg)
CISPA:
McAfeeMotorola Solutions
NACHA - The Electronic Payments AssociationNational Association of Manufacturers
National Association of Regulatory Utility Commissioners National Business Coalition on E-Commerce & Privacy
National Cable & Telecommunications AssociationNational Rural Electric Cooperative Association
Nuclear Energy Institute
![Page 53: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/53.jpg)
CISPA:
ORACLEPepco
Securities Industry and Financial Markets Association (SIFMA)
Software & Information Industry AssociationSymantec
TechAmericaTechNet
![Page 54: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/54.jpg)
CISPA:
Telecommunications Industry Association (TIA)Time Warner Cable
Transmission Access Policy Study GroupUSTelecom, the Broadband Association
VerizonVisual Data SoftwareXOCommunication
![Page 55: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/55.jpg)
CISPA:
Telecommunications Industry Association (TIA)Time Warner Cable
Transmission Access Policy Study GroupUSTelecom, the Broadband Association
VerizonVisual Data SoftwareXOCommunication
![Page 56: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/56.jpg)
@samadeu
HÁ UMA MICROECONOMIA DA INTRUSÃO, INTERCEPTAÇÃO E RASTAREAMENTO
HÁ UMA BIOPOLÍTICA DA MODULAÇÃO
TECNOLOGIAS CIBERNÉTICAS SÃO TECNOLOGIAS DE CONTROLE
![Page 57: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/57.jpg)
@samadeu
TECNOLOGIAS DE CONTROLE SÃO AMBIVALENTES
… ESTA É A BASE DA HIPERTROFIA E DO HACKING...
![Page 58: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/58.jpg)
@samadeu
O QUE PODE SER FEITO?
- USAR CRIPTOGRAFIA NO DIA-A-DIA;
- DIFICULTAR A CAPTAÇÃO DE SUAS INFORMAÇÕES;
- ATRAPALHAR, CONFUNDIR E BLOQUEAR A FORMAÇÃO DE SEU PERFIL, DO SEU PADRÃO DE CONSUMO...
![Page 59: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/59.jpg)
@samadeu
O QUE PODE SER FEITO?
- AJUDAR A DISSEMINAR SOFTWARES LIVRES;
- UTILIZAR FORMATOS ABERTOS;
- EXIJA QUAIS INFORMAÇÕES QUE OS GOVERNOS E CORPORAÇÕES TÊM SOBRE VOCÊ.
![Page 60: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/60.jpg)
@samadeu
O QUE PODE SER FEITO?
- DISSEMINE A IDEIA DE GOVERNOS ABERTOS, COM DADOS DISPONÍVEIS E ACESSÍVEIS PARA MÁQUINAS;
- DEFENDA A NEUTRALIDADE DA REDE;
![Page 61: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/61.jpg)
@samadeu
O QUE PODE SER FEITO?
- APÓIE AS REDES SOCIAIS LIVRES, ABERTAS E FEDERADAS;
- DENUNCIE A LEI ANTITERROR.
![Page 62: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/62.jpg)
![Page 63: Apresentação de Sergio Amadeu](https://reader031.vdocuments.pub/reader031/viewer/2022020111/55d2a336bb61ebdf048b46e9/html5/thumbnails/63.jpg)
Cryptorave 2014 São Paulo
OBRIGADOSERGIO AMADEU DA SILVEIRA
@samadeuACTANTES /
UFABC