1 Information Warfare: The Warriors Casey J. Dunlevy CERT Survivable Enterprise Management.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

High Performance Research Network. Development Lab. / Supercomputing Center 1 Design of the Detection and Response System against DDoS attacks Yoonjoo.
DETECTING A CYBER-ATTACK SOURCE IN REAL TIME R. Romanyak 1), A. Sachenko 1), S. Voznyak 1), G. Connolly 2), G. Markowsky 2) 1) Ternopil Academy of National.
Welcome HITRUST 2014 Conference April 22, The Evolving Information Security Organization – Challenges and Successes Jason Taule, Chief Security.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Introduction to Information Operations Attaché Corps- SEP 09
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
CERT Centers, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA SEI is sponsored by the U.S. Department of Defense ©
CERT Centers, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA SEI is sponsored by the U.S. Department of Defense ©
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Computer Security Fundamentals
Chapter 14 Crime and Justice in the New Millennium
1`1 Hacking and Information Warfare. 2 Overview Information Warriors  Who Are They  What Do They Do Types of Threat PsyOps Civil Affairs Electronic.
1  Carnegie Mellon University System Security and U. Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh, PA
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Hands-On Ethical Hacking and Network Defense
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security on the Internet: The Problem, Solutions and Perspectives Alain Patrick AINA Copyright, ECA, June 2006.
Legal and Ethical Issues in Computer Security
Or, How to Spend Your Weekends… Fall 2007 Agenda General Overview of the CISO Arena Technical Security Information Security Strategic Security Kirk Bailey.
Lecture 11 Reliability and Security in IT infrastructure.
Cyber-Warfare: The Future is Now!
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
CYBER CRIME AND SECURITY TRENDS
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Introduction and Security Trends Chapter 1.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Submitted by: Abhashree Pradhan CA (1)
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
Computer Crime and Information Technology Security
© 2002 Carnegie Mellon UniversityAttackers: 1 Attackers and Defenders.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Lecture 1 Introduction Basic Security Concepts
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
1  Carnegie Mellon University Protecting Information Infrastructures Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh,
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Warfare Playgrounds to Battlegrounds.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Larry Clinton Operations Officer Internet Security Alliance
Computer & Internet Security. Today’s Situation – Universal Access… There are an estimated 304 million people with Internet access. All 304 million of.
WELCOME CyberSecurity and Global Affairs Workshop Enhancing Situational Awareness Through Cyber Intelligence Henry Horton, CISM Partner, CyberSecurity.
Scott Charney Cybercrime and Risk Management PwC.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
Information Warfare Playgrounds to Battlegrounds.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Security Mindset Lesson Introduction Why is cyber security important?
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Computer Security Incidents
Cyber Security: State of the Nation
Secure Software Confidentiality Integrity Data Security Authentication
Legal and Ethical Issues in Computer Security
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Cyber Security coordination in Europe CERT-EU’s perspective
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
امنیت اطلاعات و ضرورت آن
1:53:58 AM.
Computer Security Incidents
Cyber Security Challenges
Intrusion Detection system
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Presentation transcript:

1 Information Warfare: The Warriors Casey J. Dunlevy CERT Survivable Enterprise Management

2 Overview Information Warriors  Who Are They  What Do They Do Types of Threat PsyOps Civil Affairs Electronic Warfare Hackers/Crackers Cyber Terror Defenders

3 References InfoWar: Culture: Terrorism: Books : Sterling - The Hacker Crackdown Stoll - The Cuckoo’s Egg Honeynet Project – Know Your Enemy Schneier – Beyond Fear

4 Information Warriors Information Warfare much more than Computer Network Operations (CNO)  Psychological Operations  Civil Affairs  Electronic Warfare Ops  Computer Warriors  Counter-IW Specialists (Defenders)

5 Threats National Security Critical National Infrastructure Cyber-Warfare/Computer Network Operations Cyber Crime Organized Crime Identity Theft Extortion Fraud Non-State Actors Terrorists Political Activists

6 Threats Nation States  Information Warfare is recognized as a part of military strategy and doctrine around the world  The study and practice of military usage of Information Warfare is taught in military academies and educational facilities

7 Example - Chinese Activities What We Have Observed: A series of activities over 3 years from similar network locations A series of attack tools in last 1.5 years QAZ, Red Lyon, Code Red Political timing What We Surmise: Diverse team with resources Using hackers/loose ISP for cover Keeping attacks below threshold Studying reaction/defense

8 Threats Organized Crime  Utilized Information Warfare in various forms for centuries Extortion is a form of Information Warfare New technologies breed new criminals  Technology creates trans- national criminal organizations  In certain nations, the lines between state actions and organized crime can be blurred

9 Transnational Organized Crime Organized crime Hacktivism Insider crime Hackers/ Crackers Cyber-crime

10 Example -Transnational Organized Crime Individual crime may be difficult to differentiate from organized crime:  Distribution and Coordination tools  Mass exploitation methods Organized crime exploits Information technologies  Enhanced efficiencies – on-line management of illegal gambling schemes  Intelligence tool for risk management – Cali organization in 1995 had state of the art equipment  Force multiplier – GPS for sea drops New channels and new targets for crime

11 Threats Non-State Actors  Terrorists  Hacktivists Sometimes different sides of the same page As with organized crime, sometimes the lines between state and non- state actors is blurred

12 Example - Hacker to Terrorism? Defaced Health-care web site in India  "This site has been hacked by ISI (Kashmir is ours), we want a hospital in Kashmir" and signed by Mujahideen-ul-dawat  Linked to G-Force Pakistan Global Hactivism linked to Mid- East conflict Information Warfare successfully utilized in Chiapas conflict with Mexican gov’t

13 Examples - Cyber-Intifada Prolonged campaign  Palestinian hackers/web defacers  Targeting Israeli and Israel-supporting organizations  Low innovation level Counter-campaigns  Publicity  Counter-hacking: 2xS.co.il

14 The Warriors Sociology of warriors Morale Vigilance vs. assumed invulnerability Organization Motivation of warriors Accountability vs. anarchy Delayed vs. immediate gratification Internal vs. external gratification Preparation of warriors Training Tool selection Intelligence Strategy

15 The Warriors Psychological Operations Warriors  Specialize in using information warfare to change an enemy’s state of mind Propaganda (Not limited to PsyOps)  Non-threatening  Threatening Computer Network Operations  Goal is to eliminate confidence  Impacts decision-making and C2

16 The Warriors Civil Affairs  Winning the Hearts and Minds! Essential to military operations Utilizes Information Warfare strategies to calm and utilize populations  Specialists must understand subtleties of language and culture Research begins long before the battle Operations last long after the battle is won

17 The Warriors Electronic Warfare Ops  Goal is to utilize electronic information infrastructure against your enemy Information lost or modified Make the enemy blind, deaf, and dumb  Restrict or control electronic information sources

18 The Warriors Computer Warriors  Computer Network Operations Offensive attacks against enemy information/computer networks Utilization of sophisticated attack tools and malware  Newest form of Information Warfare Principles are the same

19 Attack Sophistication vs. Intruder Technical Knowledge High Low password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sweepers sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools Attackers Intruder Knowledge Attack Sophistication “stealth” / advanced scanning techniques burglaries network mgmt. diagnostics distributed attack tools Cross site scripting Staged attack Time

20 Examples – Response Time to CNO

21 Cyber Terrorism Cyberterror is still emerging  No verified example of cyber terror attack to date  Evolving threat  Integrating critical missions with general Internet  Increasing damage/speed of attacks  Continued vulnerability of off-the-shelf software Much confusion of descriptions and definitions Technology widely viewed as critical weakness of Western nations

22 Defenders Highly trained specialists  Part detective, intelligence analyst, technologist, and bad guy Red Teams/Tiger Teams Vulnerability / Risk Analysts Intrusion Response Teams

23 Defense Flow Analysis & Assessment Remediation Indications & Warnings Mitigation Response Reconstitution Threshold? No Yes

24 Intrusion Response teams Types:  Automated  Local dedicated or volunteer team  Contracted team Why?  Single-point of contact for fast response  Provide for consistent response  Provide for collateral relationships Problems:  Resources  Authorization to act  Trust

25 Summary Information Warriors are the same as warriors have always been  Utilize different weapon Long-bow or Computer?  Have to react faster Aircraft or Data packets?  New skills Hand-to-Hand or Computer Network Operations?

26 Summary Increasingly diverse threat Ongoing challenge to track, trend, pursue Who may be as important as what