attacking (wireless) internet hannu h. kari
DESCRIPTION
Attacking (wireless) Internet Hannu H. Kari. National Defence University. professor, research director. ... a short flashback. Yksityisyys langattomissa verkoissa Hannu H. KARI 07.01.2003 virkaanastujaisesitelmä. Yksityisyys nykyaikana?. Yksilö ja yksityisyys. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/1.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 1/51
Attacking (wireless) Internet
Hannu H. Kari
professor, research director
National Defence University
![Page 2: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/2.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 2/51
... a short flashback ...
![Page 3: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/3.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 3/51
Yksityisyys langattomissa verkoissa
Hannu H. KARI
07.01.2003
virkaanastujaisesitelmä
![Page 4: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/4.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 4/51
Yksityisyys nykyaikana?
![Page 5: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/5.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 5/51
Yksilö ja yksityisyys
![Page 6: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/6.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 6/51
Yksityisyys ja sähkömagneettinen aura
![Page 7: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/7.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 7/51
Esimerkki: Ketkä ovat kavereita?
![Page 8: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/8.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 8/51
Esimerkki: Ketkä ovat kavereita?
Solu 1:
Solu 2:
Solu 3:
...
Samassasolussa
...
...
![Page 9: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/9.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 9/51
Yksityisyyden viisi/kuusi luokkaa
• Informaatio (data privacy)
• Kohde/lähde (identity privacy)
• Tapahtumapaika (location privacy)
• Tapahtuma-aika (time privacy)
• Olemassaolo (privacy of existence)
+ Tapahtuma (transaction)
![Page 10: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/10.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 10/51
Yksilö vs. yhteiskunta
Yksilön oikeus yksityisyyteen
Yhteiskunnan valvontatarve
![Page 11: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/11.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 11/51
And now back to our original program ...
![Page 12: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/12.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 12/51
History
![Page 13: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/13.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 13/51
Technology enhancements
(www.daimler.co.uk) (decorateyourgarage.com)
(www.macarthurcoal.com.au)
~100+ years
![Page 14: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/14.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 14/51
Technology enhancements
(www.route79.com) (www2.jsonline.com)
(www.openfire.us) (www.eia.doe.gov)
(www.pennways.com)
(en.wikipedia.org)
![Page 15: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/15.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 15/51
Technology enhancements
The same thing has happened in Internet in 10…15 years!
![Page 16: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/16.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 16/51
Need for privacy?
![Page 17: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/17.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 17/51
Analogy for identification: Pets
(news.wisc.edu)
ID database
Owner
ID
![Page 18: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/18.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 18/51
Human identification
today
![Page 19: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/19.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 19/51
Human identification
some 60 years ago ... and ... today
![Page 20: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/20.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 20/51
Need for privacy
![Page 21: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/21.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 21/51
Need for privacy
![Page 22: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/22.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 22/51
Need for privacy
![Page 23: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/23.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 23/51
Need for privacy
++
remote readable passport
![Page 24: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/24.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 24/51
Need for privacy
++
remote readable passport
![Page 25: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/25.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 25/51
Need for privacy
++
remote readable passport
![Page 26: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/26.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 26/51
Need for privacy
++
remote readable passport
![Page 27: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/27.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 27/51
Wireless network eavesdroppingBlueTooth Sniper rifle: range 1500+ metersWiFi Sniper rifle: range 10+ km(http://www.tomsnetworking.com/2005/03/08/how_to_bluesniper_pt1original page deleted, found still from Internet archive:http://web.archive.org/web/20050309033208/www.tomsnetworking.com/Sections-article106.php)
![Page 28: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/28.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 28/51
Privacy
• Definition of PrivacyPrivacy is the claim of individuals, groups, and institutions to determine for themselves, when, how, and to what extent information about them is communicated to others.
Alan Westin 1967
![Page 29: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/29.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 29/51
Threats
![Page 30: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/30.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 30/51
Holmlund: Verkkohyökkäys voi uhata rahaliikennettä
{10.11.2008: MPK 187:n avajaiset} • YETTS: yhteiskunnan elintärkeät toiminnot tulee
turvata kaikissa tilanteissa• Myyrmanni, Jokela & Kauhajoki:
* syrjäytyminen sisäisen turvallisuutemme suurin uhka * monia ei-toivottuja kehitystrendejä
• Tarkoituksellisin verkkohyökkäyksin saatetaan heikentää valtion päätöksentekojärjestelmien tai esimerkiksi rahaliikenteen toimivuutta
• Ikävät tapahtumat tulevat eteemme aina jossain määrin yllätyksenä* varautumisesta ja riskianalyyseista huolimatta.
Asymmetrinen maailma, asymmetriset arvot ja motiivit Kaikki uhkat eivät välttämättä tule ulkoa
![Page 31: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/31.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 31/51
Main threats of Internet
1. We loose our confidence
2. Internet does not work
3. We loose data/money with Internet
![Page 32: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/32.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 32/51
Scenario ”3/2011”
![Page 33: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/33.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 33/51
Scenario “3/2011”
• Election in a small EU countrya country famous on ICT usage, including electronic voting
• During the election days, a massive DDoS attack is launched against the election system
Electronic voting system is unavailable for several hours
As a back up alternative, people will use ”traditional paper voting system”
No harm done????
![Page 34: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/34.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 34/51
Scenario “3/2011”
• Report for the Council of Europe: Internet voting in the March 2007 Parliamentary Elections in Estonia
– Internet attacks, such as DDoS (Distributed Denial of Service) attacks, could have hampered the ability to run the e-voting application. An extension of the e-voting period could potentially make it more difficult to launch such attacks.
• ... But will anyone really seriously think electronic voting as a viable alternative for paper voting after this???
• NO! We have lost the game permanently
![Page 35: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/35.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 35/51
Design flaws of Internet
![Page 36: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/36.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 36/51
Security problems in Internet, samplesOctober 2002, Scientific American
”9 out of 13 root DNS –servers were
crippled by DDoS attack”
November 2004, Damages caused by
worms/viruses, Mikko Hyppönen/F-Secure
Slammer: Intranet of nuclear power plant in Ohio downBank of America ATM network down
Blaster:
Electric power network down in NY, USA
Several SCADA systems down
Sasser:
All train traffic halted in Australia
Two hospitals in Sweden infected
January 2005, FBI/Tsunami
”Net criminals used fake web pages of American
Red Cross to get credit card data”
September 2006, Scientific American
”Attack on DNS (Domain Name System)
allows cybercriminal to hijack ordinary
netbanking sessions”
January 2007, www.idg.se
”Almost 1 Million € stolen from a
Scandinavian bank by a Russian hacker
with a trojan distributed with spam mail”
”The biggest so far..”
January 2005, BBC News”Internet gambling hit hard by the attacks.Extortionists are targeting net-based bettingfirms and threatening to cripple their websiteswith deluges of data unless a ransom is paid.”
May 2007, IT-Viikko
”Attacks on Estonian governmental and commercial net sites”
![Page 37: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/37.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 37/51
Security problems in Internet, samplesDDoS attacks
Design flawsDoS, DDoS attacksCriminal intentions
Viruses, worms, mallwareCriminal intentions
DNS attacks
Design flaws
DoS, DDoS attacks
Design flaws
Phishing
Users’ stupidity
Scams
Users’ stupidity
![Page 38: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/38.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 38/51
Who and Why?
WHY
Motivations:1.Social behavior2.Vandalism3.Money4. Ideology5.Military strategic
interests
WHO
Amateurs are just tip of the iceberg• Hackers: Fun, can-I-do-it?,
show-up, ... (1, 2)
The real problem: Professionals• Mafia, organized crime (3)• Industrial espionage,
competitors (3)• Cyber terrorists (2, 4)• Terrorist-countries (4, 5)• Military (5)
![Page 39: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/39.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 39/51
Internet design criterion• Primary goals
– Multiplexing of channel– Various network archtectures– Administrative boundaries– Packet switching– Gateways (routers) between networks
• Secondary goals– Robustness (loss of routers and links)– Multiple services (reliable or realtime data)– Usage of various networks– Distributed management– Cost efficient implementation– Simple attachement to network– Resource usage monitoring
Based on David D. Clark:”The Design Philosophy of the DARPA Internet Protocols”
![Page 40: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/40.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 40/51
Implicit Internet design criterion
• Silent assumptions– Benevolence– Openness– Low level of dynamicity– No mobility– Limited computation capacity– High cost of crypto algorithms
– Limited bandwidth
AS
SU
MP
TIO
NS
NO
T
VA
LID
AN
Y M
OR
E !
!!
![Page 41: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/41.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 41/51
Internet design flaws
• Original design principles: The enemy is out there!– ”Everybody can send anything to anybody”– Security measures are introduced afterwards
• The new design principles: The enemy is among us!– We must be prepared to pay for security/reliability
• in form of computation power, bandwidth, energy, etc.
– Strong security as the fundamental building block– Legal sanctions against malevolent entities
Every packet must have an owner!
![Page 42: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/42.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 42/51
Security domains
![Page 43: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/43.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 43/51
Four security domains
2. End-to-end secured communication(Data integrity and confidentiality)
3. Content integrity/authenticity/timelyness(information sharing)
1. Reliable operation of the critical network infrastructure
PGP, S/MIME
Restricted caller groups
IPsec, TLS
PLA, MPLS, Freq.hopping, Link encryption, Physical protection,...
4. Virtual communities(Knowledge sharing)
![Page 44: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/44.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 44/51
Four security domains
2. End-to-end secured communication(Data integrity and confidentiality)
3. Content integrity/authenticity/timelyness(information sharing)
1. Reliable operation of the critical network infrastructure
PGP, S/MIME
Restricted caller groups
IPsec, TLS
Partial solutions: MPLS, Physical protection
4. Virtual communities(Knowledge sharing)
GOOD
“BRAND”
MANAGEMENT
IS M
OST IMPORTANT
![Page 45: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/45.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 45/51
Securing network infrastructure
![Page 46: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/46.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 46/51
Traditional Internet usage
R
R
![Page 47: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/47.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 47/51
Short term solution:Secured Infrastructure Router (SIR)
SIR
SIR
![Page 48: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/48.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 48/51
Secured Infrastructure Router (SIR)
SIR
QoS control,duplication
SIR
QoS control,duplicateremoval
QoS reporting,management signaling
![Page 49: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/49.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 49/51
Alternative SIR operation
SIRSIR
SIR
SIR
SIR
SIR
SIR
SIR
![Page 50: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/50.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 50/51
Conclusions
![Page 51: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/51.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 51/51
Conclusions
• Privacy in Internet is vital– Especially in wireless environment in all 5/6 categories
• Risks with Internet are imminent – ...due to original design flaws of Internet
• Architecture with several levels of security• Plan-B: ”What shall we do, when our network
doesn’t work?”• What is the minimum level of service?• How to handle ”Internet brand”
![Page 52: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/52.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 52/51
NATIONAL DEFENCE UNIVERSITY
”Do the work that has a meaning” Thank you for your Questions? attention!
![Page 53: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/53.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 53/51
Good/Bad things of Internet
• Google.cn: ”tiananmen square” – 12 first image hits
![Page 54: Attacking (wireless) Internet Hannu H. Kari](https://reader035.vdocuments.mx/reader035/viewer/2022062309/568149ae550346895db6ec9b/html5/thumbnails/54.jpg)
National Defence University, www.mpkk.fiprofessor Hannu H. Kari Page 54/51
Good/Bad things of Internet
• Google.com: ”tiananmen square” – 12 first image hits