Here is the full transcript of Distrix Networks’ CEO Eric Winsborrow’s TEDx Talk: Confessions of a Cyber Spy Hunter at TEDxVancouver conference.
Listen to the MP3 Audio: Confessions of a Cyber Spy Hunter by Eric Winsborrow at TEDxVancouver
Eric Winsborrow – CEO, Distrix Networks’
We see it every day, in the news, for the past decade the battles that are being waged across the Middle East. On the YouTube and Facebook we get instant updates through satellites, to give us a front-row seat into the action like never before.
But what the cameras don’t capture is that there is another war going on beneath the surface — a digital cyber world where the battles are not being fought with bombs and bullets but with bits and bytes.
My name is not Doug Schmidt, but it could be if I wanted it to. My real name is Eric Winsborrow, and for the past two decades, I have been involved in creating the next-generation disruptive technologies at companies, such as Symantec and McAfee. I currently run a cyber-security company made up of PhDs from MIT and scientists from the National Labs who were tasked by the U.S. government to create the next generation of cyber technology. Our customers include the Office of the Secretary of Defense, and the Department of Homeland Security.
If there’s one thing I’m certain of, it’s this: that what’s going on today in cyber espionage will profoundly impact our lives, and we may never even realize it. If you think about it, a lot of technologies that impact our lives have been coming from government-sponsored research into next-generation defense technologies.
Last generation, the Cold War created technology such as the computer, satellite communications, and navigation and even the Internet. It is so permeated our everyday lives it’s gotten to the point where we can’t imagine ever having lived without it, to be able to see halfway around the world instantly or just navigate around the block.
So if yesterday’s next-generation technology has such a profound impact on us today, then what’s today’s next generation technology? I’m going to show you the future of cyber espionage with technology that’s actually being created today to protect nations. There are cyber battles taking place throughout the world and we don’t even realize it.
It’s gotten to a point of a confluence, emerging between man and machine in a digital cyber world where we can never tell them apart. This is the age of the cyber spy.
Now when we think of spy, we might share Hollywood’s image of a dashing and daring secret agent who sneaks into some underground nuclear facility, somewhere halfway around the world to protect us from a nuclear threat. Sometimes Hollywood goes a bit too far. In this case, however, they don’t go far enough.
You see governments today would never send a human operative into such a secret location he’d never get in. Today’s spies are cyber spies. You see it used to be that James Bond used technology. Today James Bond is technology.
I want to walk you on a journey into the future. But before I can take you there, I have to take you to the past to where the first virus actually started and the beginning of this journey of convergence.
The first virus was actually written into a floppy disk video game and inserted into a Macintosh. Yes, ironically the world’s first virus was aimed at a Mac. My, have the world has changed and we call these types of viruses ‘sneakerware’, because you literally had to walk around to install it. This is the first level of convergence where man is completely separate from machines, joined only by a pair of red sneakers. If James Bond wanted to insert a virus into a computer in a nuclear facility, he’d have to sneak in in his scuba gear and install it himself.
I love you. Well, not you, we’ve only just met. I’m talking about Melissa. Melissa is not my wife, she’s a stripper from Miami. You see around the year 2000 or Y2K, the Melissa virus named after the virus writer’s favorite stripper from — was the world’s first email born virus. It was inserted into an email attachment and sent with the subject line: I love you. Once the attachment was opened, the process repeated itself and within three months the world’s email systems were clogged up, inadvertently becoming the world’s first spam. But this also marks the second leg of our convergence story, because this is now the first time where man is leveraging technology to do work. This would be the time that James Bond used technology.
But then in the September of 2001, the world changed, and I’m not talking about 9/11. I’m talking about one week later when the Internet world changed. This was the introduction of Code Red. Code Red wasn’t an email virus; it wasn’t a zombie, a trojan; it was all of the above. It was the world’s first complex blended threat and it went around the world in three days.
By September 21st, it infected 2.2 million systems worldwide. Governments took notice, because they realized they could take this technology and bring it up to a whole other level, to do the work its human spies could not. This enters the third phase — the phase where technology replaces people. This is the beginning of the era of the cyber spy.