33
Seminar «The role of Cyber Defence to protect and sustain EU economy» Rome, October 30th, 2014 Seminar «The role of Cyber Defence to protect and sustain EU economy» Rome, October 30th, 2014 CYBERCRIME, CYBER ESPIONAGE INFORMATION WARFARE AND «CYBER WAR»: THE FIL ROUGE WHICH CONNECTS THE DOTS Raoul Chiesa President, Security Brokers SCpA

Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Embed Size (px)

Citation preview

Page 1: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

CYBERCRIME CYBER ESPIONAGE INFORMATION WARFARE AND laquoCYBER WARraquo THE FIL ROUGE WHICH CONNECTS THE DOTS

Raoul Chiesa

President Security Brokers SCpA

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Disclaimer

The information contained within this presentation do not infringeon any intellectual property nor does it contain tools or recipe thatcould be in breach with known laws

The statistical data presented belongs to the Hackers ProfilingProject by UNICRI and ISECOM

Quoted trademarks belongs to registered owners

The views expressed are those of the author(s) and speaker(s) anddo not necessary reflect the views of UNICRI or others UnitedNations agencies and institutes nor the view of ENISA and its PSG(Permanent Stakeholders Group) neither Security Brokers itsAssociates and Associated Companies

Contents of this presentation may be quoted or reproducedprovided that the source of information is acknowledged

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Agenda

Introductions

Cybercrime

Scenarios and Actors

Profiling laquoHackersraquo

Information Warfare

Cyber Espionage

Conclusions

References

Agenda

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

President Founder Security Brokers

Principal CyberDefcon Ltd

Independent Senior Advisor on Cybercrime UNICRI (United Nations Interregional

Crime amp Justice Research Institute)

PSG Member ENISA (Permanent Stakeholders Group European Union

Network amp Information Security Agency)

Founder Board of Directors and Technical Commitee Member CLUSIT

(Italian Information Security Association)

Steering Committee AIPOPSI Privacy amp Security Observatory

Member Co-coordinator of the WG laquoCyber Worldraquo Italian MoD

Board of Directors ISECOM

Board of Directors OWASP Italian Chapter

Cultural Attachegrave and BoD Member for APWGEU

Supporter at various security communities

The Speaker

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

No common spellinghellip

bdquoCybersecurity Cyber-security Cyber Security rdquo

No common definitionshellip

Cybercrime ishellip

No clear actorshellip

Cyber ndash Crimewarterrorism

No common componentshellip

In those non English-speaking countries problems with correctly understanding words and terms rise up

First of all

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

The scenario(s) and the Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Crime -gt Today

You got the information you got the power

Simply put this happens because the ldquoinformationrdquo can be transformed at once intoldquosomething elserdquo

1 Competitive advantage (geopolitical business personal relationships)2 Sensiblecritical information (blackmailing extorsion)3 Money (Cash-out techniques Black Market amp Underground Economy)

hellip thatrsquos why all of us we want to ldquobe securerdquo

Itrsquos not by chance that itrsquos named ldquoISrdquo Information SecurityThe trend of the laquocyber-prefixraquo is from very recent years tough

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime

CybercrimeldquoThe use of IT tools and telecommunication networks

in order to commit crimes in different mannersrdquo

The axiom of the whole model ldquoacquiring different types of data (information) which can be transformed into an advantagerdquo

Key points Virtual (pyramidal approach anonimity CampC flexible and scalable moving quickly

and rebuilding fast use of ldquocrossrdquo products and services in different scenarios and different business models)

Transnational Multi-market (buyers) Differentiating products and services Low ldquoentry-feerdquo ROI Return of Investment (on each single operation which means that

exponentially it can be industrialized) Tax amp (cyber) Law heaven

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Why

ldquo2013 Cybercrime financial turnover apparentlyscored up more than Drugs dealing Human

Trafficking and Weapons Trafficking turnoversrdquo

Various sources (UN USDOJ INTERPOL 2013)

Financial Turnover estimation 12-18 BLN USD$year

laquoCybercrime ranks as one

of the top four economic

crimesraquo

PriceWaterhouseCoopers LLC Global Economic Crime Survey 2011

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

From Cybercrime tohellip

We are speaking about an ecosystem which is very often underevaluated most of times Cybercrime is the starting or transit point towards different ecosystems Information Warfare

Black Ops

Cyber Espionage

Hacktivism

(private) Cyber Armies

Underground Economy and Black Markets Organized Crime

Carders

Botnet owners

0days

Malware factories (APTs code writing outsourcing)

Lonely wolves

ldquocyberrdquo-Mercenaries

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime MO

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 2: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Disclaimer

The information contained within this presentation do not infringeon any intellectual property nor does it contain tools or recipe thatcould be in breach with known laws

The statistical data presented belongs to the Hackers ProfilingProject by UNICRI and ISECOM

Quoted trademarks belongs to registered owners

The views expressed are those of the author(s) and speaker(s) anddo not necessary reflect the views of UNICRI or others UnitedNations agencies and institutes nor the view of ENISA and its PSG(Permanent Stakeholders Group) neither Security Brokers itsAssociates and Associated Companies

Contents of this presentation may be quoted or reproducedprovided that the source of information is acknowledged

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Agenda

Introductions

Cybercrime

Scenarios and Actors

Profiling laquoHackersraquo

Information Warfare

Cyber Espionage

Conclusions

References

Agenda

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

President Founder Security Brokers

Principal CyberDefcon Ltd

Independent Senior Advisor on Cybercrime UNICRI (United Nations Interregional

Crime amp Justice Research Institute)

PSG Member ENISA (Permanent Stakeholders Group European Union

Network amp Information Security Agency)

Founder Board of Directors and Technical Commitee Member CLUSIT

(Italian Information Security Association)

Steering Committee AIPOPSI Privacy amp Security Observatory

Member Co-coordinator of the WG laquoCyber Worldraquo Italian MoD

Board of Directors ISECOM

Board of Directors OWASP Italian Chapter

Cultural Attachegrave and BoD Member for APWGEU

Supporter at various security communities

The Speaker

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

No common spellinghellip

bdquoCybersecurity Cyber-security Cyber Security rdquo

No common definitionshellip

Cybercrime ishellip

No clear actorshellip

Cyber ndash Crimewarterrorism

No common componentshellip

In those non English-speaking countries problems with correctly understanding words and terms rise up

First of all

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

The scenario(s) and the Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Crime -gt Today

You got the information you got the power

Simply put this happens because the ldquoinformationrdquo can be transformed at once intoldquosomething elserdquo

1 Competitive advantage (geopolitical business personal relationships)2 Sensiblecritical information (blackmailing extorsion)3 Money (Cash-out techniques Black Market amp Underground Economy)

hellip thatrsquos why all of us we want to ldquobe securerdquo

Itrsquos not by chance that itrsquos named ldquoISrdquo Information SecurityThe trend of the laquocyber-prefixraquo is from very recent years tough

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime

CybercrimeldquoThe use of IT tools and telecommunication networks

in order to commit crimes in different mannersrdquo

The axiom of the whole model ldquoacquiring different types of data (information) which can be transformed into an advantagerdquo

Key points Virtual (pyramidal approach anonimity CampC flexible and scalable moving quickly

and rebuilding fast use of ldquocrossrdquo products and services in different scenarios and different business models)

Transnational Multi-market (buyers) Differentiating products and services Low ldquoentry-feerdquo ROI Return of Investment (on each single operation which means that

exponentially it can be industrialized) Tax amp (cyber) Law heaven

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Why

ldquo2013 Cybercrime financial turnover apparentlyscored up more than Drugs dealing Human

Trafficking and Weapons Trafficking turnoversrdquo

Various sources (UN USDOJ INTERPOL 2013)

Financial Turnover estimation 12-18 BLN USD$year

laquoCybercrime ranks as one

of the top four economic

crimesraquo

PriceWaterhouseCoopers LLC Global Economic Crime Survey 2011

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

From Cybercrime tohellip

We are speaking about an ecosystem which is very often underevaluated most of times Cybercrime is the starting or transit point towards different ecosystems Information Warfare

Black Ops

Cyber Espionage

Hacktivism

(private) Cyber Armies

Underground Economy and Black Markets Organized Crime

Carders

Botnet owners

0days

Malware factories (APTs code writing outsourcing)

Lonely wolves

ldquocyberrdquo-Mercenaries

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime MO

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 3: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Agenda

Introductions

Cybercrime

Scenarios and Actors

Profiling laquoHackersraquo

Information Warfare

Cyber Espionage

Conclusions

References

Agenda

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

President Founder Security Brokers

Principal CyberDefcon Ltd

Independent Senior Advisor on Cybercrime UNICRI (United Nations Interregional

Crime amp Justice Research Institute)

PSG Member ENISA (Permanent Stakeholders Group European Union

Network amp Information Security Agency)

Founder Board of Directors and Technical Commitee Member CLUSIT

(Italian Information Security Association)

Steering Committee AIPOPSI Privacy amp Security Observatory

Member Co-coordinator of the WG laquoCyber Worldraquo Italian MoD

Board of Directors ISECOM

Board of Directors OWASP Italian Chapter

Cultural Attachegrave and BoD Member for APWGEU

Supporter at various security communities

The Speaker

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

No common spellinghellip

bdquoCybersecurity Cyber-security Cyber Security rdquo

No common definitionshellip

Cybercrime ishellip

No clear actorshellip

Cyber ndash Crimewarterrorism

No common componentshellip

In those non English-speaking countries problems with correctly understanding words and terms rise up

First of all

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

The scenario(s) and the Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Crime -gt Today

You got the information you got the power

Simply put this happens because the ldquoinformationrdquo can be transformed at once intoldquosomething elserdquo

1 Competitive advantage (geopolitical business personal relationships)2 Sensiblecritical information (blackmailing extorsion)3 Money (Cash-out techniques Black Market amp Underground Economy)

hellip thatrsquos why all of us we want to ldquobe securerdquo

Itrsquos not by chance that itrsquos named ldquoISrdquo Information SecurityThe trend of the laquocyber-prefixraquo is from very recent years tough

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime

CybercrimeldquoThe use of IT tools and telecommunication networks

in order to commit crimes in different mannersrdquo

The axiom of the whole model ldquoacquiring different types of data (information) which can be transformed into an advantagerdquo

Key points Virtual (pyramidal approach anonimity CampC flexible and scalable moving quickly

and rebuilding fast use of ldquocrossrdquo products and services in different scenarios and different business models)

Transnational Multi-market (buyers) Differentiating products and services Low ldquoentry-feerdquo ROI Return of Investment (on each single operation which means that

exponentially it can be industrialized) Tax amp (cyber) Law heaven

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Why

ldquo2013 Cybercrime financial turnover apparentlyscored up more than Drugs dealing Human

Trafficking and Weapons Trafficking turnoversrdquo

Various sources (UN USDOJ INTERPOL 2013)

Financial Turnover estimation 12-18 BLN USD$year

laquoCybercrime ranks as one

of the top four economic

crimesraquo

PriceWaterhouseCoopers LLC Global Economic Crime Survey 2011

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

From Cybercrime tohellip

We are speaking about an ecosystem which is very often underevaluated most of times Cybercrime is the starting or transit point towards different ecosystems Information Warfare

Black Ops

Cyber Espionage

Hacktivism

(private) Cyber Armies

Underground Economy and Black Markets Organized Crime

Carders

Botnet owners

0days

Malware factories (APTs code writing outsourcing)

Lonely wolves

ldquocyberrdquo-Mercenaries

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime MO

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 4: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

President Founder Security Brokers

Principal CyberDefcon Ltd

Independent Senior Advisor on Cybercrime UNICRI (United Nations Interregional

Crime amp Justice Research Institute)

PSG Member ENISA (Permanent Stakeholders Group European Union

Network amp Information Security Agency)

Founder Board of Directors and Technical Commitee Member CLUSIT

(Italian Information Security Association)

Steering Committee AIPOPSI Privacy amp Security Observatory

Member Co-coordinator of the WG laquoCyber Worldraquo Italian MoD

Board of Directors ISECOM

Board of Directors OWASP Italian Chapter

Cultural Attachegrave and BoD Member for APWGEU

Supporter at various security communities

The Speaker

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

No common spellinghellip

bdquoCybersecurity Cyber-security Cyber Security rdquo

No common definitionshellip

Cybercrime ishellip

No clear actorshellip

Cyber ndash Crimewarterrorism

No common componentshellip

In those non English-speaking countries problems with correctly understanding words and terms rise up

First of all

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

The scenario(s) and the Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Crime -gt Today

You got the information you got the power

Simply put this happens because the ldquoinformationrdquo can be transformed at once intoldquosomething elserdquo

1 Competitive advantage (geopolitical business personal relationships)2 Sensiblecritical information (blackmailing extorsion)3 Money (Cash-out techniques Black Market amp Underground Economy)

hellip thatrsquos why all of us we want to ldquobe securerdquo

Itrsquos not by chance that itrsquos named ldquoISrdquo Information SecurityThe trend of the laquocyber-prefixraquo is from very recent years tough

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime

CybercrimeldquoThe use of IT tools and telecommunication networks

in order to commit crimes in different mannersrdquo

The axiom of the whole model ldquoacquiring different types of data (information) which can be transformed into an advantagerdquo

Key points Virtual (pyramidal approach anonimity CampC flexible and scalable moving quickly

and rebuilding fast use of ldquocrossrdquo products and services in different scenarios and different business models)

Transnational Multi-market (buyers) Differentiating products and services Low ldquoentry-feerdquo ROI Return of Investment (on each single operation which means that

exponentially it can be industrialized) Tax amp (cyber) Law heaven

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Why

ldquo2013 Cybercrime financial turnover apparentlyscored up more than Drugs dealing Human

Trafficking and Weapons Trafficking turnoversrdquo

Various sources (UN USDOJ INTERPOL 2013)

Financial Turnover estimation 12-18 BLN USD$year

laquoCybercrime ranks as one

of the top four economic

crimesraquo

PriceWaterhouseCoopers LLC Global Economic Crime Survey 2011

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

From Cybercrime tohellip

We are speaking about an ecosystem which is very often underevaluated most of times Cybercrime is the starting or transit point towards different ecosystems Information Warfare

Black Ops

Cyber Espionage

Hacktivism

(private) Cyber Armies

Underground Economy and Black Markets Organized Crime

Carders

Botnet owners

0days

Malware factories (APTs code writing outsourcing)

Lonely wolves

ldquocyberrdquo-Mercenaries

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime MO

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 5: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

No common spellinghellip

bdquoCybersecurity Cyber-security Cyber Security rdquo

No common definitionshellip

Cybercrime ishellip

No clear actorshellip

Cyber ndash Crimewarterrorism

No common componentshellip

In those non English-speaking countries problems with correctly understanding words and terms rise up

First of all

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

The scenario(s) and the Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Crime -gt Today

You got the information you got the power

Simply put this happens because the ldquoinformationrdquo can be transformed at once intoldquosomething elserdquo

1 Competitive advantage (geopolitical business personal relationships)2 Sensiblecritical information (blackmailing extorsion)3 Money (Cash-out techniques Black Market amp Underground Economy)

hellip thatrsquos why all of us we want to ldquobe securerdquo

Itrsquos not by chance that itrsquos named ldquoISrdquo Information SecurityThe trend of the laquocyber-prefixraquo is from very recent years tough

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime

CybercrimeldquoThe use of IT tools and telecommunication networks

in order to commit crimes in different mannersrdquo

The axiom of the whole model ldquoacquiring different types of data (information) which can be transformed into an advantagerdquo

Key points Virtual (pyramidal approach anonimity CampC flexible and scalable moving quickly

and rebuilding fast use of ldquocrossrdquo products and services in different scenarios and different business models)

Transnational Multi-market (buyers) Differentiating products and services Low ldquoentry-feerdquo ROI Return of Investment (on each single operation which means that

exponentially it can be industrialized) Tax amp (cyber) Law heaven

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Why

ldquo2013 Cybercrime financial turnover apparentlyscored up more than Drugs dealing Human

Trafficking and Weapons Trafficking turnoversrdquo

Various sources (UN USDOJ INTERPOL 2013)

Financial Turnover estimation 12-18 BLN USD$year

laquoCybercrime ranks as one

of the top four economic

crimesraquo

PriceWaterhouseCoopers LLC Global Economic Crime Survey 2011

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

From Cybercrime tohellip

We are speaking about an ecosystem which is very often underevaluated most of times Cybercrime is the starting or transit point towards different ecosystems Information Warfare

Black Ops

Cyber Espionage

Hacktivism

(private) Cyber Armies

Underground Economy and Black Markets Organized Crime

Carders

Botnet owners

0days

Malware factories (APTs code writing outsourcing)

Lonely wolves

ldquocyberrdquo-Mercenaries

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime MO

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 6: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

The scenario(s) and the Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Crime -gt Today

You got the information you got the power

Simply put this happens because the ldquoinformationrdquo can be transformed at once intoldquosomething elserdquo

1 Competitive advantage (geopolitical business personal relationships)2 Sensiblecritical information (blackmailing extorsion)3 Money (Cash-out techniques Black Market amp Underground Economy)

hellip thatrsquos why all of us we want to ldquobe securerdquo

Itrsquos not by chance that itrsquos named ldquoISrdquo Information SecurityThe trend of the laquocyber-prefixraquo is from very recent years tough

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime

CybercrimeldquoThe use of IT tools and telecommunication networks

in order to commit crimes in different mannersrdquo

The axiom of the whole model ldquoacquiring different types of data (information) which can be transformed into an advantagerdquo

Key points Virtual (pyramidal approach anonimity CampC flexible and scalable moving quickly

and rebuilding fast use of ldquocrossrdquo products and services in different scenarios and different business models)

Transnational Multi-market (buyers) Differentiating products and services Low ldquoentry-feerdquo ROI Return of Investment (on each single operation which means that

exponentially it can be industrialized) Tax amp (cyber) Law heaven

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Why

ldquo2013 Cybercrime financial turnover apparentlyscored up more than Drugs dealing Human

Trafficking and Weapons Trafficking turnoversrdquo

Various sources (UN USDOJ INTERPOL 2013)

Financial Turnover estimation 12-18 BLN USD$year

laquoCybercrime ranks as one

of the top four economic

crimesraquo

PriceWaterhouseCoopers LLC Global Economic Crime Survey 2011

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

From Cybercrime tohellip

We are speaking about an ecosystem which is very often underevaluated most of times Cybercrime is the starting or transit point towards different ecosystems Information Warfare

Black Ops

Cyber Espionage

Hacktivism

(private) Cyber Armies

Underground Economy and Black Markets Organized Crime

Carders

Botnet owners

0days

Malware factories (APTs code writing outsourcing)

Lonely wolves

ldquocyberrdquo-Mercenaries

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime MO

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 7: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Crime -gt Today

You got the information you got the power

Simply put this happens because the ldquoinformationrdquo can be transformed at once intoldquosomething elserdquo

1 Competitive advantage (geopolitical business personal relationships)2 Sensiblecritical information (blackmailing extorsion)3 Money (Cash-out techniques Black Market amp Underground Economy)

hellip thatrsquos why all of us we want to ldquobe securerdquo

Itrsquos not by chance that itrsquos named ldquoISrdquo Information SecurityThe trend of the laquocyber-prefixraquo is from very recent years tough

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime

CybercrimeldquoThe use of IT tools and telecommunication networks

in order to commit crimes in different mannersrdquo

The axiom of the whole model ldquoacquiring different types of data (information) which can be transformed into an advantagerdquo

Key points Virtual (pyramidal approach anonimity CampC flexible and scalable moving quickly

and rebuilding fast use of ldquocrossrdquo products and services in different scenarios and different business models)

Transnational Multi-market (buyers) Differentiating products and services Low ldquoentry-feerdquo ROI Return of Investment (on each single operation which means that

exponentially it can be industrialized) Tax amp (cyber) Law heaven

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Why

ldquo2013 Cybercrime financial turnover apparentlyscored up more than Drugs dealing Human

Trafficking and Weapons Trafficking turnoversrdquo

Various sources (UN USDOJ INTERPOL 2013)

Financial Turnover estimation 12-18 BLN USD$year

laquoCybercrime ranks as one

of the top four economic

crimesraquo

PriceWaterhouseCoopers LLC Global Economic Crime Survey 2011

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

From Cybercrime tohellip

We are speaking about an ecosystem which is very often underevaluated most of times Cybercrime is the starting or transit point towards different ecosystems Information Warfare

Black Ops

Cyber Espionage

Hacktivism

(private) Cyber Armies

Underground Economy and Black Markets Organized Crime

Carders

Botnet owners

0days

Malware factories (APTs code writing outsourcing)

Lonely wolves

ldquocyberrdquo-Mercenaries

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime MO

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 8: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime

CybercrimeldquoThe use of IT tools and telecommunication networks

in order to commit crimes in different mannersrdquo

The axiom of the whole model ldquoacquiring different types of data (information) which can be transformed into an advantagerdquo

Key points Virtual (pyramidal approach anonimity CampC flexible and scalable moving quickly

and rebuilding fast use of ldquocrossrdquo products and services in different scenarios and different business models)

Transnational Multi-market (buyers) Differentiating products and services Low ldquoentry-feerdquo ROI Return of Investment (on each single operation which means that

exponentially it can be industrialized) Tax amp (cyber) Law heaven

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Why

ldquo2013 Cybercrime financial turnover apparentlyscored up more than Drugs dealing Human

Trafficking and Weapons Trafficking turnoversrdquo

Various sources (UN USDOJ INTERPOL 2013)

Financial Turnover estimation 12-18 BLN USD$year

laquoCybercrime ranks as one

of the top four economic

crimesraquo

PriceWaterhouseCoopers LLC Global Economic Crime Survey 2011

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

From Cybercrime tohellip

We are speaking about an ecosystem which is very often underevaluated most of times Cybercrime is the starting or transit point towards different ecosystems Information Warfare

Black Ops

Cyber Espionage

Hacktivism

(private) Cyber Armies

Underground Economy and Black Markets Organized Crime

Carders

Botnet owners

0days

Malware factories (APTs code writing outsourcing)

Lonely wolves

ldquocyberrdquo-Mercenaries

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime MO

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 9: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Why

ldquo2013 Cybercrime financial turnover apparentlyscored up more than Drugs dealing Human

Trafficking and Weapons Trafficking turnoversrdquo

Various sources (UN USDOJ INTERPOL 2013)

Financial Turnover estimation 12-18 BLN USD$year

laquoCybercrime ranks as one

of the top four economic

crimesraquo

PriceWaterhouseCoopers LLC Global Economic Crime Survey 2011

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

From Cybercrime tohellip

We are speaking about an ecosystem which is very often underevaluated most of times Cybercrime is the starting or transit point towards different ecosystems Information Warfare

Black Ops

Cyber Espionage

Hacktivism

(private) Cyber Armies

Underground Economy and Black Markets Organized Crime

Carders

Botnet owners

0days

Malware factories (APTs code writing outsourcing)

Lonely wolves

ldquocyberrdquo-Mercenaries

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime MO

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 10: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

From Cybercrime tohellip

We are speaking about an ecosystem which is very often underevaluated most of times Cybercrime is the starting or transit point towards different ecosystems Information Warfare

Black Ops

Cyber Espionage

Hacktivism

(private) Cyber Armies

Underground Economy and Black Markets Organized Crime

Carders

Botnet owners

0days

Malware factories (APTs code writing outsourcing)

Lonely wolves

ldquocyberrdquo-Mercenaries

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime MO

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 11: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cybercrime MO

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 12: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Profiling Actors

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 13: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

New Actors joined in

Cybercrime and Information Warfare have a very wide spectrum of action and use intrusion techniques which are nowadays somehow available to a growing amount of Actors which use them in order to accomplish different goals with approaches and intensity which may deeply vary

All of the above is launched against any kind of targets Critical Infrastructures Governative Systems Military Systems Private Companies of any kind Banks Medias Interest Groups Private Citizenshellip

National States

IC LEAs

Organized Cybercrime

Hacktivists

Industrial Spies

Terrorists

Corporations

Cyber Mercenaries

Everyone against everybody

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 14: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Welcome to HPP

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 15: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

HPP V10

Back in 2004 we launched the Hackerrsquos

Profiling Project - HPPhttpwwwunicriitspecial_topicscyber_threats

Since that year

+1200 questionnaires collected amp analyzed

9 Hackers profiles emerged

Two books (one in English)

Profilo Hacker Apogeo 2007

Profiling Hackers the Science of Criminal Profiling asApplied to the World of Hacking TaylorampFrancisGroup CRC Press (2009)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 16: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Evaluation amp Correlation standards

Modus Operandi (MO)

Lone hacker or as amember of a group

Motivations

Selected targets

Relationship between motivations and targets

Hacking career

Principles of the hackers ethics

Crashed or damaged systems

Perception of the illegality of their own activity

Effect of laws convictions and technical difficulties as a deterrent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 17: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

OFFENDER ID LONE GROUP HACKER TARGET MOTIVATIONS PURPOSES

Wanna Be Lamer 9-16 years ldquoI would like to be a hacker but I canrsquotrdquo

GROUP End-User For fashion Itrsquos ldquocoolrdquo =gt to boast and brag

Script Kiddie 10-18 years The script boy

GROUP but they act alone SME Specific security flaws To give vent of their anger attract mass-media attention

Cracker 17-30 yearsThe destructor burned ground

LONE Business company To demonstrate their power attract mass-media attention

Ethical Hacker 15-50 yearsThe ldquoethicalrdquo hackerrsquos world

LONE GROUP (only for fun)

Vendor Technology For curiosity (to learn) and altruistic purposes

Quiet Paranoid Skilled Hacker

16-40 yearsThe very specialized and paranoid attacker

LONE On necessity For curiosity (to learn) =gt egoistic purposes

Cyber-Warrior 18-50 yearsThe soldier hacking for money

LONE ldquoSymbolrdquo business company End-User

For profit

Industrial Spy 22-45 yearsIndustrial espionage

LONE Business company Corporation

For profit

Government Agent 25-45 yearsCIA Mossad FBI etc

LONE GROUP Government Suspected TerroristStrategic companyIndividual

EspionageCounter-espionageVulnerability testActivity-monitoring

Military Hacker 25-45 years LONE GROUP Government Strategic company

Monitoring controlling crashing systems

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 18: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Information Warfare (Cyberwar)

(this section includes materialfrom Prof Dr Alexander Klimburg)

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 19: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

In the very near future many conflicts will not take place on the

open field of battle but rather in spaces on the Internet fought

with the aid of information soldiers that is hackers

This means that a small force of hackers is stronger than the

multi-thousand force of the current armed forcesldquo

Former Duma speaker Nikolai Kuryanovich 2007

The DUMA knew it long time agohellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 20: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Military Trends

Situational awareness

Self-synchronizing ops

Information pull

Collaboration

Communities of Interest

Task post process use

Only handle information once

Shared data

Persistent continuous IA

Bandwidth on demand

IP-based transport

Diverse routing

Enterprise services

COTS based net-centric capabilities

Scouting elite hacker parties

Single operational pic

Autonomous ops

Broadcast information push

Individual

Stovepipes

Task process exploit disseminate

Multiple data calls duplication

Private data

Perimeter one-time security

Bandwidth limitations

Circuit-based transport

Single points of failure

Separate infrastructures

Customized platform-centric IT

OUT IN

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 21: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Making ldquoCyber Warrdquohellip

bull bdquodummy listldquo of bdquoID-10Tldquo for phishingbull background info on organisation (orgchart etc)bull Primer for sector-specific social-engineeringbull proxy serversbull banking arrangementsbull purchase attack-kitsbull rent botnetsbull find (trade) good CampC server

bull purchase 0-days certificatesbull purchase skill-set bull bespoke payload search terms bullPurchase L2L3 system data

bull equipment to mimic target networkbull dummy run on similar networkbull sandbox zerodays

Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 22: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Possible CWUs Structure

Strategic Governance Unit

Structure Governance

Process Engineering

Information Management

Operations Management

Unit

CyberoperationsUnit

CyberintelligenceUnit

RampD Unit

Attack amp Defense Methodology

Research

Toolkit Research

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 23: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionagea case study from India

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 24: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Cyber Espionage

The complexity and the infrastructural and operating costs of espionage (in the wide sense of the term) dramatically lowered down along the years because of the IT revolution and the so-called ldquoDigital Societyrdquo

In most of the cases the information sits on (also or ldquojustrdquo) on digital storages and travels over the Net

As a first effect the concept of ldquostealingrdquo doesnrsquot exist anymore (itrsquos virtual) and we must speak about copying the information (espionage approach)

What is ldquostill thererdquo is ldquosaferdquo

More time needed to realize the ldquotheftrdquo

Less time needed to transfer or reselling the information -gt cashing out

(public) incidents do happen both in the private and public (even Military and Governmental) business

insiders (drivers political ethics religious fame and mass media corruption blackmail ignorance)

contractors (external suppliers consultants VPN and RAS access etc)

ldquocompetitorsrdquo (civilian and military) both State-Sponsored and Independent

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 25: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

GUI pret-agrave-portegraver

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 26: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Mistakes from MoDs when dealing with these topics

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 27: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Typical mistakes After having worked over the last five years with different MoDs from Europe GCC and Asia-

Pacific Irsquove been able to identify some issueshellip

1 Generational problem Decision-makers are too old often they donrsquot speak English and theydonrsquot really know the topic Younger Officials donrsquot have the needed decision-power

2 Terminology problems laquociberneticraquo to us means something elsehellip

3 Lack of internationally-agreed laws on laquocyber attacksraquo (UN where are you)

ITU Dubai 2012 showed this from another PoV (see later)

4 Not understanding of Information Security real-life they relay on Vendors

5 Mostly focus on preventive defense (and they do it wrong lack of international information exchangeshellip laquoI wanna get but I canrsquot give outraquohellip)

hellipwhile they would like to play with Offensive Operations

6 Lack of know-how on hackingrsquos history mood people - and underground conferences

7 Not flexible procedures environments ndash and mindsets they spend MLNs for missiles and jet-fighters while they argue on 0days prices (this happens all over)

8 Tough people not so laquoflexibleraquo But once yoursquoll get intimate with them they are just humans asall of us

9 Strict rules and procedures doesnrsquot allow them to laquothink out of the boxraquo

10 Itrsquos so hard to explain them they need mixed hybrid teams

And each country just want their own national experts into these teams

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 28: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

laquoAttack attributionraquo

bdquoAttribution is not really an issueldquo Senior DoD official 2012 Aspen Strategy Group

bdquoThe greatest challenge is finding out who is actually launching the attackldquo

Major General Keith B Alexander Commander US CYBERCOM NSA testimony May 8th 2009

bdquoCyberspace as a Warfighting Domainrdquo ndash US Congress

Attribution tactical level = irrelevant

operational level = helpful

strategic level = important

political (board) level = critical

Source Alexander Klimburg 2012

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 29: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Non-state proxies and ldquoinadvertent Cyberwarrdquo

bdquo During a time of international crisis a [presumed non-state CNE] proxy network of country A is used to wage a bdquoserious (malicious destruction) cyber-attackldquo against country Bldquo

How does country B know if

a) The attack is conducted with consent of Country A (Cyberwar)

b) The attack is conducted by the proxy network itself without consent of Country A (Cyberterrorism)

c) The attack is conducted by a Country C who has hijacked the proxy network (False Flag Cyberwar)

copy Alexander Klimburg 2012

Mistyping may lead to (very) different scenarioshellip

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 30: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 31: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Conclusions

Everything has changed

You just cannot fight on your own this war anymore You maywin a single battle while it wonrsquot be enough If you are insecure I will be insecure toohellip

Information Sharing Security Awareness Attackerrsquos Profiling balanced InfoSec approach amp processes this is what youneed

Ask for technical solutions from the Security Industry be compliant with security standards and regulations but donrsquotforget both taking from and giving back to the security communities

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 32: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

References[1] httpwwwdsdgovauinfoseccsochtm[2] Gary Waters Desmond Ball Ian Dudgeon ldquoAustralia and cyber-warfarerdquo Australian National University Strategic and Defence Studies Centre ANU E press 2008[3] httpwwwdsdgovau[4] httpwwwunidirchpdfouvragespdf-1-92-9045-011-J-enpdf[5] httpwwwreuterscomarticle20120308china-usa-cyberwar-idUSL2E8E801420120308[6] httpwwwtheaustraliancomauaustralian-itchinas-blue-army-could-conduct-cyber-warfare-on-foreign-powersstory-e6frgakx-1226064132826[7] httpwwwatimescomatimesChinaNC15Ad01html[8] httpengmodgovcnOpinion2010-0818content_4185232htm[9] httpwwwreuterscomarticle20110601us-korea-north-hackers-idUSTRE7501U420110601[10] httpwwwwashingtonpostcomworldnational-securitysuspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies20110807gIQAvWwIoJ_storyhtml[11] httpwwwslidesharenethackfestdprkhf[12] Jeffrey Carr ldquoInside Cyber Warfare Mapping the Cyber Underworldrdquo OReilly December 2011[13] httpwwwnatointcpsenSID-C986CC53-5E438D1Anatolivetopics_78170htm[14] Charles Billo and Welton Chang ldquoCyber Warfare An Analysis of means and motivations of selected Nation Staterdquo Darthmouth College Dec 2004[15] httpwwwdefencepkforumsindian-defence122982-new-war-between-india-pakistan-cyber-warfarehtml[16] httpwwwdnaindiacomindiareport_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352-all34 httpwwwjpostcomDefenseArticleaspxid=24986435httpinternet-haganahcomharchives006645html36 httparticlestimesofindiaindiatimescom2010-10-16india28235934_1_cyber-security-hackers-official-agencies37httpfmsoleavenwortharmymildocumentsRussianvuiwhtm38httpwwwconflictstudiesorgukfilesRussian_Cyber_Commandpdf39 httpwwwdefensegovnewsnewsarticleaspxid=6573940 httpwwwdefensegovnewsnewsarticleaspxid=6573941 httpwwwdefensegovhomefeatures20110411_cyberstrategydocsNDAA20Section2093420Report_For20webpagepdf42 httpwwwenisaeuropaeumedianews-itemsenisa-teams-up-with-member-states-on-pan-european-exercise43httpenglishnctbnlcurrent_topicsCyber_Security_Assessment_Netherlands44 httpwwwccdcoeorg

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS

Page 33: Raoul Chiesa President, Security Brokers SCpA · Key points: Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, ... Pacific, I’ve been able to identify some issues

Seminar laquoThe role of Cyber Defence to protect and sustain EU economyraquoRome October 30th 2014

Contacts QampA

Need anything got doubts wanna ask me smth

rc [at] security-brokers [dot] com

Pub key httpwwwsecurity-brokerscomkeysrc_pubasc

Thanks for your attention

QUESTIONS