Supervisory Special Agent R. David Mahon 1961 Stout Street, #1823 Denver, Colorado (303) 629-7171 FBI Denver Cyber Squad.

Slides:



Advertisements
Similar presentations
Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
Advertisements

Department of Homeland Security Site Assistance Visit (SAV)
Kenneth Watson Partnership for Critical Infrastructure Security Partnership for Critical Infrastructure Security.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
FBI Intelligence Houston Field Intelligence Group Overview Carlos J. Barrón FIG Coordinator Field Intelligence Group H O U S T O N UNCLASSIFIED.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
DHS, National Cyber Security Division Overview
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
InfraGard A Partnership For Protecting America. What is InfraGard “ A cooperative undertaking between the U.S. Government (the FBI) and an association.
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Mark S. Bruhn, Interim Director University Copyright.
InfraGard Update SSA John V. Gillies SA Matthew E. Morin.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Business Crisis and Continuity Management (BCCM) Class Session
Network Security of The United States of America By: Jeffery T. Pelletier.
June 9, 2003 Updated July 2004 Slide 1 Critical Infrastructure Assurance: The US Experience.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
PAR CONFERENCE Homeland Defense A Provider’s Perspective Lessons from TMI Dennis Felty November 15, 2001.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
OverviewOverview Critical InfrastructuresCritical Infrastructures Presidential Decision Directive 63Presidential Decision Directive.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
FBI’s InfraGard.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
Association of Defense Communities June 23, 2015
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Sharing Challenges, Trends and Opportunities
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
Cyber Security Nevada Businesses Overview June, 2014.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
The U.S. Secret Service Shhhhhh!
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Infrastructure Protection
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 2: 25 March 2006.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Ken Watson 9 Sep 2003 Critical Infrastructure Assurance: Business Case for Public-Private Partnership Ken Watson 9 Sep 2003
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
8 Building Blocks of National Cyber Strategies
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Role for Electric Sector in Critical Infrastructure Protection R&D
The U.S. Department of Homeland Security
Presentation transcript:

Supervisory Special Agent R. David Mahon 1961 Stout Street, #1823 Denver, Colorado (303) FBI Denver Cyber Squad

Presidential Decision Directive 63 “The US will take the necessary measures to swiftly eliminate significant vulnerability to both physical and cyber attacks on our critical infrastructures, including our cyber systems.” May 22, 1998 May 22, 2003

Increased government security by 2000 Secure information system infrastructure by 2003 Federal agencies to serve as model in reducing infrastructure vulnerabilities Seeks participation of private industry Presidential Decision Directive 63

4 National Infrastructure Assurance Council Critical Infrastructure Coordinating Group Information Sharing and Analysis Center(s) The Private Sector SectorLead Agency Special Function Agencies DoJ / FBI Law Enforcement Internal Security DoD National Defense CIA Intelligence DoS Foreign Affairs National Infrastructure Protection Center Executive Office of the President OSTP (R&D) National Security Advisor National Coordinator Banking & Finance Transportation Electric and Gas & Oil Information / Comms Emergency Law Enforcement Government Services Emergency Fire Public Health Services Water Supply Dept of Treasury Dept of Transportation Dept of Energy Dept of Commerce Dept of Justice FEMA HHS EPA Critical Infrastructure Assurance Office

PDD 63 Requires the FBI through the NIPC to: Serve as national infrastructure threat gathering, assessment, warning, vulnerability & law enforcement investigation/response entity Be linked electronically as a national focal point Establish its own relationships with private sector Be the principal means of coordinating US Govt response, mitigation, investigation and reconstitution efforts.

Coordinate FBI computer intrusion investigations Support other agencies and state & local governments involved in infrastructure protection NIPC Mission Detect, deter, warn of, investigate, and respond to attacks on critical infrastructures

Share, analyze, & disseminate information Provide training for Federal, state and local cyber investigators Clearinghouse for technological developments 24/7 watch and warning capability NIPC Mission

NIPC Organization Location Located at FBIHQ in Washington, D.C., the NIPC is one of the fastest growing investigative areas in the FBI Composition Multiple government agencies Federal, state, and local law enforcement Private sector representatives

NIPC Programs

Key Asset Initiative

Develop Database for specific entities within each infrastructure Key Asset: An organization, group of organizations, system, or group of systems is considered to be a key asset if it is determined that the loss of associated goods or services or information would have widespread and dire economic or social impact. Develop Emergency Points of Contact Cyber and Physical Threats Contingency Planning Vulnerability Assessments for Assets with National Importance Develop Database for specific entities within each infrastructure Key Asset: An organization, group of organizations, system, or group of systems is considered to be a key asset if it is determined that the loss of associated goods or services or information would have widespread and dire economic or social impact. Develop Emergency Points of Contact Cyber and Physical Threats Contingency Planning Vulnerability Assessments for Assets with National Importance

Critical Infrastructures “Critical infrastructures are those physical and cyber-based systems essential to the minimum operations of the economy and government.” Presidential Decision Directive-63 May 1998

Control systems Emergency coordination Control systems Comms Transactions Control systems Comms Control systems Comms Control systems Comms Telecomm site power Power for systems & facilities Emergency backup power Power for systems & facilities Emergency backup power Power for systems & facilities Emergency backup power Power for systems & facilities Emergency backup power Fuels for backup power Fuels for primary or backup power Fuels for backup power Energy for distribution systems Fuels for backup power Fuels for system support Corporate finance Corporate & local government finance Major bridges & crossings Vehicles & routes for system service & response Major bridges & crossings Vehicles & routes for system service & response Major bridges & crossings Vehicles & routes for system service & response Transport of canceled checks, etc. Vehicles & routes for system service & response Cooling water 911 systems Emergency response control Cooling water 911 systems Emergency response services Cooling water 911 systems Emergency response services Drinking water 911 systems Emergency response services Cooling water 911 systems Emergency response services Information & Communications Electrical Power Gas & Oil Storage & Distribution Banking & Finance Physical Distribution Vital Human Services Information & Communications Electrical Power Gas & Oil Storage & Distribution Banking & Finance Physical Distribution Vital Human Services How are infrastructures on the left reliant on infrastructures across the top? New Thinking Required To Appreciate Infrastructure Interdependencies

Pipeline disruption Power outage Submarine cable lost Bomb threats in two buildings Threat to water supply Two bridges down Oil refinery fire Telephone service disrupted FBI phones jammed 911 unavailable Two regional ISP’s out of service What if…...

Computer Intrusion Program

Vulnerabilities: A New Dimension Physical vulnerabilities and threats are known. Cyber vulnerabilities are growing and are not well understood.

Cyber vulnerability stems from easy accessibility to infrastructures via Internet New Risks and Threats Tools to do harm are widely available and do not require a high degree of technical skill Globalization of infrastructures increases exposure to potential harm Interdependencies of systems make attack consequences harder to predict and perhaps more severe

CSI/FBI 2001 Computer Crime and Security Survey Source: Computer Security Institute Likely Sources of Attack 76% 81% 49% 31% 25% Independent Hackers Foreign Competitors

CSI/FBI 2001 Computer Crime and Security Survey Source: Computer Security Institute Unauthorized use of computer system within the last 12 months 64% 25% 11% YesNo Don’t Know

CSI/FBI 2001 Computer Crime and Security Survey Source: Computer Security Institute Types of Attacks 26 40% 36% 64% 49% 91% 94% Theft of Proprietary Info System Penetration Denial of Service Laptop Unauthorized Access by Insider Insider Abuse of Net Access Virus

Structured Threats Organized Crime Industrial Espionage Hacktivists National Security Threats Terrorists Intelligence Agencies Information Warfare Unstructured Threats Insiders Recreational Hackers Institutional Hackers Cyber Threats

Hackers

Types of Attacks Denial of Service Hijacked Domain Names Defacement of Web Page Denial of Service Hijacked Domain Names Defacement of Web Page

Vladimir Levin In 1994, hackers compromised passwords to impersonate account holders Attempted 40 transfers totaling $10 million Actual losses of $400,000 5 individuals arrested All pled guilty to either bank fraud or conspiracy to commit bank fraud

CREDIT CARD EXTORTION Russian hackers break into more than 40 e- commerce businesses/databases in 10 states One business had 38,000 credit-card numbers compromised; another had 15,700 credit cards numbers stolen Businesses contacted by subjects – they offered to “fix” the problem for a price. And, one victim company hired a hacker as a computer security consultant!!

CREDIT CARD HACKERS… November, 2000: Undercover sting set up in Seattle; two subjects lured to US Subjects demonstrate their hacking prowess for their new “employers,” then arrested on the spot 250 gigabytes of stolen data recovered through a “reverse hack” into the subjects’ computers

Terrorist Groups Aum Shinrikyo Usama Bin Laden

Terrorist fundraising, communications on Internet Ramzi Yousef: –Plotted to bomb 11 U.S. airliners in Pacific –Details of plot encrypted on laptop Ramzi Yousef: –Plotted to bomb 11 U.S. airliners in Pacific –Details of plot encrypted on laptop Tamil Tigers: web site defacement Zapatista National Liberation Army (EZLN) Terrorists

“Several countries have or are developing the capability to attack an adversary’s computer systems.” “Developing a computer attack capability can be quite inexpensive and easily concealable: it requires little infrastructure, and the technology required is dual-use.” George Tenet, CIA Director 2/2/99 Information Warfare

"... attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy's army without fighting is the true pinnacle of excellence." Sun Tzu, The Art of War c. 350 B.C. “Information warfare is the use of, destruction or manipulation of information on a computer network to destroy the enemy’s telephone network, fuel pipelines, electric grid, transportation control system, national funds transfer system...in order to achieve a strategic victory.” --Beijing Jianchuan Zhishi (Chinese Press) 30 June, 1999

Ownership of Problem Risk is shared among public and private interests Risk is shared among public and private interests Partnership is the Foundation for Infrastructure Protection Partnership is the Foundation for Infrastructure Protection

INFRAGARD A Government and Private Sector Alliance

InfraGard Overview Voluntary Program/Public and Private Sectors National Identity, yet Locally Flexible Information Shared Locally and Nationally Fosters Trust Between Members, Locally and Nationally

Forum for members to communicate Prompt dissemination of threat warnings Help in protecting computer systems Education and training on infrastructure vulnerabilities A community that shares information in a trusted environment Membership Benefits

Primary Features Secure Web Site Intrusion Alert Network Seminars and training

Intrusion Alert Network NIPC transmits sanitized description to other members via NIPC analyzes incident –Trends identified and reported –Investigation opened if appropriate Member sends encrypted message about attack to NIPC and FBI Field Office via –Detailed description –Sanitized description

Secure Web Site Information about recent intrusions Archives of intrusion incidents Original research on security issues Chat and conference with other members InfraGard news Links to other security sites Contact information

Chapter begun November 15, 2000 Membership from every infrastructure sector Quarterly meetings of general membership Individual sectors meet more frequently Training planned on vulnerabilities, risk assessment, solutions Denver InfraGard Chapter

DENVER INFRAGARD CEO/Senior level briefing projects planned Educational initiatives underway involving computer forensic training; regional cyber crimes survey “Action” item projects underway with private sector

IFCC MISSION STATEMENT To develop a national strategic plan to address fraud over the Internet, and to provide support to law enforcement and regulatory agencies at all levels of government for crimes that occur over the Internet.

PURPOSE OF THE IFCC DEVELOP NATIONAL STRATEGY IDENTIFY AND TRACK FRAUD ANALYZE INTERNET CRIME TRENDS TRIAGE INTERNET COMPLAINTS DEVELOP INVESTIGATIVE PACKETS FORWARD INFO TO APPROPRIATE AGENCY

ADVANTAGES WHICH THE INTERNET PROVIDES CRIMINALS Identification and Location of victims Victims do not see or speak to fraudsters Accepted vehicle for commerce Minimal cost to set up web page Technology has made Internet company set up very easy

IFCC INTERNET COMPLAINTS 2000 AVG 1,848 PER MONTH 2000* TOTAL 14, AVG 4,155 PER MONTH 2001 TOTAL 49, AVG 5,942 PER MONTH 2002** TOTAL 35,657 * MAY 8, 2000 THROUGH DECEMBER 31, 2000 ** JANUARY 1, 2002 THROUGH JUNE 1, 2002

Federal Bureau of Investigation FBI – Denver Division Cyber Squad Tel: (303) Stout Street Suite 1823 Fax: (303) Denver, Colorado