TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012.

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
THE INSIDER THREAT AND DATA LOSS PREVENTION CSCE 727.
Information Security Overview in the Israeli E-Government April 2010 Ministry of Finance – Accountant General E-government Division.
Cyberterrorism. Critical Infrastructure Vulnerability.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
Information Warfare Theory of Information Warfare
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
11 Karen Atkins 12 September 2013 The Importance of New Hire Orientation - FISWG.
Cyber Resilience Simon Onyons Financial Stability – Resilience Team.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
NSF Cyber Security Conference FBI Counterintelligence Domain Program Briefing.
National Governor’s Association September 29-30, 2003 Salt Lake City, Utah.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Maritime Cyber Risks – What is real, what is fiction?
Military Sentinel Presentation November 19, 2008 John Krebs, Attorney Consumer Sentinel Network Program Manager Federal Trade Commission.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Information Warfare Playgrounds to Battlegrounds.
Cyber Security Nevada Businesses Overview June, 2014.
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Recent Cyber Attacks and Countermeasures September 2006.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Mission: NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
Understanding the Threats of and Defenses Against Cyber Warfare.
Creating an Insider Threat Program.
Hurdles in implementation of cyber security in India.
Unclassified/FOUO Intelligence Community Directive (ICD) 119 Media Contacts Training.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Warfare Playgrounds to Battlegrounds.
BAE Systems Small Business Program
TLP:Green FIRST/TF-CSIRT Technical Colloquium January 25 th – 27 th, 2016 Prague, CZ TLP:Green.
Chapter 17: Foreign Policy and National Defense Section 2.
A Unique Challenge INTERNATIONAL ORGANIZED CRIME.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Crown capital management international relations International Affairs.
Scottish Policing 2011 – Risks To Communities & Information-Sharing Russell Scott Visiting Academic Edinburgh Napier University Serious Organised Crime.
crimes-report
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
A Project on CYBER SECURITY
What is the CYBERSECURITY plan for tomorrow?
Helping Veterans to Protect their Identity and Online Privacy
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Cybersecurity Awareness
Protecting Your Company’s Most Valuable Asset
Records Management Network
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
October is National Cybersecurity Awareness Month
Presentation transcript:

TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

TOPICS Introduce you to NCIS Discuss our Challenges Outline CI in Cyberspace Methods

THE RAPID EVOLUTION OF INFORMATION TECHNOLOGY “The sharing of information, using technology as an enabler, is a culture change that has been fully embraced by political, military, and the business communities.” “If we do not develop robust capabilities to detect, expose, and hold accountable individuals and organizations who use technology to conduct their dubious trade, we will lose mission, relevance, and respect. …it is a human problem” Quote from a Cyber Crime Investigator in 1998

FIGHTING COMPUTER CRIME IN 1998 Value/Volume of Open Source Data Foreign Exploitation Computer Fraud The Insider Threat Security of our networks Training of personnel to secure networks

Cyber Threats in 2012 FOREIGN INTELLIGENCE ENTITIES Technology Theft Espionage Insider Threat TERRORISM / DISRUPTIVE ACTIVITIES Denial of Service Attack Venue for communicatio n Venue for Information Collection Financial Crimes Identity Theft 419 Scams Theft of Financial data WORKPLA CE VIOLENCE Stalking Communicati on of Threats Self Radicalizatio n CRITICAL INFRASTRUCTURE SCADA Transportation Public Safety

LEGISLATIVE INITIATIVES Comprehensive National Cybersecurity Initiative of 2008 Cybersecurity Act of 2012 –Leiberman Bill S.2105 Cybersecurity Information Sharing Act of 2012 –Feinstein/Mikulski Bill S.2102 Strengthening and Enhancing Cybersecurity by Using Research, Education, Information, and Technology Act of 2012 (SECURE IT) –McCain Bill S.2151

BASIC APPROACH TO CYBERSECURITY Understand what programs/technologies are critical to customers Identify foreign interest in these focus areas Locate information and personnel at high risk to collection/exploitation Work with personnel responsible for information/ networks to protect critical information

BEST PRACTICES IN IDENTIFYING THREAT Understanding Open Source Data –Queries of public-facing websites –Biography searches of company officials Cross-discipline Collaboration –Computer Network Personnel –Marketing Personnel Program-Cyber-CI/Security Collaboration Collaboration with DoD LE/CI/Cyber agencies

CYBERSPACE: THE NEW FRONTIER FOR FIE Adversaries use Internet and social networking sites (SNS) to obtain information on DON personnel for exploitation through elicitation, inducements, and coercion. Frequently monitored and exploited SNS: Online dating Virtual gaming Twitter LinkedIn Facebook Google + YouTube Blogs Frequently monitored and exploited SNS: Online dating Virtual gaming Twitter LinkedIn Facebook Google + YouTube Blogs

INSIDER THREAT WIKILEAKS Army PFC Bradley Manning Accused of leaking 250,000 classified documents Charged with 13 counts of premeditated murder and 32 counts of attempted murder FORT HOOD Army MAJ Nidal Malik Hasan

GUESS WHO IS THE INSIDER THREAT

INSIDER THREAT Cyberspace contacts with Foreign Nationals –Business relationship Management of the interaction Unwitting victim of targeting –Attribution of contact Outbound Network Activity –Large enclosures –Network data flow activity at irregular times Challenges with Audit tools

ESPIONAGE STATISTICS 67% volunteer Motives: #1 divided loyalties #2 disgruntlement #3 money/debt Motives: #1 divided loyalties #2 disgruntlement #3 money/debt 37% no clearance 26% Secret 20% Top Secret 17% TS/SCI 37% no clearance 26% Secret 20% Top Secret 17% TS/SCI More naturalized citizens, foreign attachments, foreign business connections, or cultural ties 83% are 30 years old or older civilian and military members are about even Increased reliance on the Internet

WHAT ARE THE CAUSES? Divided loyalties Disgruntlement Money Thrills Ego/Recognition Coercion Ideology TRIGGER CHARACTERISTICS MOTIVATION Divorce Death of a loved one Money problems/debt Physical relocation/PCS New significant relationship Medical problems Work problems Anti-social Narcissistic Entitled Vindictive Paranoid Impulsive Risk-seeking

WHERE DO WE GO FROM HERE? Issues –Cross-trained analysts that understand networks and counterintelligence threats –Dialogue with owners of the data targeted for exfiltration –Proactive approach to understanding network anomalies Generates investigative leads to anticipate threats –Management of Data in Aggregate –Understanding threats across contractor teams –Building CI in Cyberspace requirements into contracts –Maintaining relationships with DoD LE/CI agencies

Questions Michael T. Monroe Deputy Assistant Director (571) UNCLASSIFIEDTITLE HERE19