- Knowledge Center
- About Us
Abstract for B-Sides San Franciso - All registered attendees get a vote! A light-hearted look at how the Internet would be secured if the made-for-movie Corleone or Soprano mafia families governed the Internet. Register and Vote Here
Playing to Win – Designing Protection Based on Mafia Rules
Conventional wisdom dictates it should be possible to have virtual security in cyberspace. However, with its competing authorities, responsibilities, and domains, it is untenable to fully secure cyberspace. Even if it were technically possible, would we have what it takes to secure the Internet? The level of commitment required, the appetite for risk and the willingness to “do what it takes” to get the job done is not present within the cyber security community of interest.
So what would it take to effectively secure the Internet or at least the portion of the network relevant to you? Thinking outside of the norm, what would happen if the Corleone or Soprano Family governed the Internet? Could the fictional scenario of a made for movie mafia families do what can’t be done with current technology and policy?
If we look at the Internet as a turf war with different elements maneuvering for position within cyberspace for infractions involving losses of revenue that would have began large scale wars on the streets of Chicago, what would a cunning, ruthless, yet family oriented approach involve:
Commitment versus involvement – a willingness to “go to the mattresses” or hole up until the battle is won. Hackers live eat, sleep, and live their work. They are motivated to get the job done no matter the cost.
Laws are what the suckers follow – not constrained by policy that doesn’t forward the family goals. Laws punish the innocent in cyber space. At what point do you take off the gloves and change the rules to your favor? Leverage partners to do what we can’t do alone.
Break the family rules and there are consequences – self-policing, must abide by a code of conduct.
Mess with the family or those it protects and there is retaliation – not defensive minded, retaliation without remorse. Maintaining a sense of order. If attacked, attack back. There are no innocent victims.
They do not talk about the family outside the family – strong operational security.
Have the best technology money can buy – look at the tommy gun and the Ford Model 18 getaway car; or the sophistication of counterfeiting. Invoke the best technology money can buy.
We will explore how the Mafia family dynamic can be applied to securing each segment of their cyber ecosystem. Their methods, while brutal and sometimes unprovoked, are effective. If you are going to play, play to win!