41
Security Wars Security Wars episode 3 episode 3 Revenge of Myth. Revenge of Myth. Ikuo Takahashi

Sec Wars Episode 3

Embed Size (px)

DESCRIPTION

Describing the paradigm shift of Information security at Mass Internet age. Bot Net Order look like Order 66. What are "New Hopes " of cyber warfare ?

Citation preview

Page 1: Sec Wars Episode 3

Security WarsSecurity Wars

episode 3episode 3

Revenge of Myth. Revenge of Myth. Ikuo Takahashi

Page 2: Sec Wars Episode 3

A long time agoin a network far ,far away

Internet has been messed up by the unprecedented attacks from people who

covet the Internet by lust, people who impose on others for economic interests, people who juggle

with the bot. The society has made up the mind to defend the Internet. However, conventional law

enforcement measures are useless against organized attack such as phishing and botnet. Is messed up Internet dying to

Wild World Web? How can we repair the Internet ?………………..

Page 3: Sec Wars Episode 3

previously Security Wars• Episode 1 Dark side of Hackers

– dark side hackers

– Society’s decision

エピソー

Ⅰ闇に堕ちたハッカー

Page 4: Sec Wars Episode 3

Sec Wars Episode 2

Attack of anonymous troops

エピソー

ド2

匿名軍団

の攻撃

Page 5: Sec Wars Episode 3

Anonymous Troops

• Cyber Attack as Organized Crime

• Anonymity– 2 channel

– misuse of encryption e.g. overlay network

• Order “Bot Net”– rental of attacking troops

匿名軍団

・匿名BBS

・ボットネット

Page 6: Sec Wars Episode 3

Change of backgrounds of Cyber crime

• from curiosity, self exhibition

• personal fun– individual attack

• domestic

• organisation crime

• monetary greed

• transborder

サイバー

犯罪の組織化・

金銭目的化・国際化

Page 7: Sec Wars Episode 3

Order 66 vs ”Bot net” Order

• Order 66– Holoscan appeared on the

palm of his gauntlet ”It is time” the holoscan said.”Execute Order Sixty-Six”

– Standing Order Number One was,apparently,Kill Everything That moves.

– Combat droids were equipped with sophisticated self-motivators that kicked in automatically.

• Star Wars ep3 Chapter 18

• Bot net Order– Bot net were equipped to attack

the target by D-Dos or posting spam

– They communicate each other with sophisticated self-motivators that kicked in automatically. They change their using port or protocol in order to hide themselves.

Page 8: Sec Wars Episode 3

Order “Bot Net” &ISP’s Network Management

A ブロック B ブロック C ブロック

ADSL/ 光

ISP-A

ISP-B ISP-C

・・

・・

ISP-D

DDoS!

・・

①detection

・・・・? ?

・・

Honey Pot

② infroamtion sharing

Page 9: Sec Wars Episode 3

Dark side of Web 2.0

• phishing is dark “long tail”-– abuse of long tail effect

cannot be defraud

defraud

Page 10: Sec Wars Episode 3

Conventional ways against phishing

• Infringement of copyright– duplicate the “Logo” service mark of business

• Anti-Spam Law– Amendment (May 30,2008)

• From “Opt out” to “Opt in”

• strengthen enforcement of law

著作権侵害を理由とす

る刑事事件・特定電子メ

ール法

Page 11: Sec Wars Episode 3

Actual cases 1

• “Yafoo!” false site– Accused duplicated the homepage of Yahoo

company without authorisation, publish “Yafoo” webpage and unauthorised accessed real Yahoo site with ID and passwords which he stole with above false site.

– Tokyo district court Judgement Sep.12,2005• violation of Anti illegal access law and copyright law• imprison 1 year and 10months /suspended 4 years

Page 12: Sec Wars Episode 3

Actual cases 2

• Phishing fraud gangsters – 8 persons were prosecuted

• stealing the personal information of some 1,000 people since last year and to have defrauded some 700 people out of about 100 million yen by using the data

• using Internet BBS to recruit members

– First -Takayuki Matsuoka-• leader of group• April 18,2006 Kyoto district court

– imprison 4 years and three million yen monetary penalty

組織犯罪としてのフィ

ッシング

Page 13: Sec Wars Episode 3

Limitation of conventional measure

• After battle of Mustafer, many Jedi and Padaone were killed.– Emperor’s tactical

enterprise.• Master Yoda

– “My failure,this was.Failed the Jedi.I did.”

– “Too old I was””Too rigid. Too arrogant to see that the old way in not the only way”

• Law enforcement system – recover actual damage– punish wrongdoer– ability to trace wrongdoer

• not effective– international organisation

crime

Page 14: Sec Wars Episode 3

Episodes3

Revenge of Myth.

エピソー

ド3

   

通信の秘密の足

かせ

Page 15: Sec Wars Episode 3

Paradigm shift to Mass Internet society

• Concept of Internet Society– “Jefferson

Democracy” as Ideal • “Thomas” of

Congress Database• Based on rich

educated• Self fulfillment and

self governance• Netizen and

Netiquette

• Mass Internet Society– “forever beginner”

– Mass society

– “anonymous coward”

– No Self-fulfillment & governance

 大衆インター

ネット社会へのパラダイム

シフト

・ジェファー

ンデモクラシー

 

自己実現 

己統治

・「永遠のビギナー

」「

匿名の卑怯者」

Page 16: Sec Wars Episode 3

Defend “Innocent User(Forever Beginner)”

• “Research Group concerning next generation information security policy” (MIC) – (Jisedai no jyohou security seisaku ni kansuru

kenkyukai houkokusyo) Soumusho– User who is not highly conscious to information

security or highly skilled.– They (e.g. retired post war generation) are joining to

network community.

• Start from actual facts

Page 17: Sec Wars Episode 3

“Weapon” of Cyber Attack

• “Transborder”– difficulties of international cooperation of

law enforcement activities

• “Anonymity”– economic hurdle to trace wrongdoer.

– privacy of communication is barrier to defense activities.

Page 18: Sec Wars Episode 3

Is this WAR?• Presumably

– Start from actual fact.

• definition of “War”– “asymmetric war”– no nation, no blood

• Defend the “Innocent User”– Refer; “Wire fraud recovery

Act”

•“Victory?” Yoda echoed with great skepticism. ”The shroud of the dark side has fallen. Begun,this clone War has!”

•Master Yoda after “War of Geonosis”

Page 19: Sec Wars Episode 3

How to “repair” the Internet

• Defense concept-”Cloud defense”– from client to “in the cloud”

– from reactive to proactive

– compare “furikome sagi-telephone fraud”

• against misuse of transborder character

• against misuse of anonymity

Page 20: Sec Wars Episode 3

Suggestions from War against ”furikome –fraud”

• furikome –fraud”– spohisticated telephone fraud

– organization crime-affiliated group of Yakuza

• Against ”furikome –fraud”– national movement, culture-kind warnings

– “to prevent your parents”

– legal defense

Page 21: Sec Wars Episode 3

Suggestions from War against ”furikome –fraud”

legal aspect

• against “furikome –fraud”– multiple package of legal methods

• Identifying account holder law (amended 2004)• Anti misuse of cellphone law(2005)

– request IDs @ contract of cellphpne– Chief of police ask ISP to produce account information

• Remedies of damage from furikome –fraud law (2008)

– freeze the criminal’s account – distribute the assets of account by easy way

Page 22: Sec Wars Episode 3

The Other Star Wars concept

• Strategic Defense Initiative– proposal by U.S. President Ronald

Reagan on March 23, 1983[1] to use ground and space-based systems to protect the United States from attack by strategic nuclear ballistic missiles.

Page 23: Sec Wars Episode 3

Rediscover of Communication sovereign

-role of sovereign-

• “Constitution of the International Telecommunication Union”

– Article 34 bis Member States also reserve the right to cut off, in accordance with their national law, any other private telecommunications which may appear dangerous to the security of the State or contrary to its laws, to public order or to decency.

– Article 35 Each Member State reserves the right to suspend the international telecommunication service, either generally or only for certain relations and/or for certain kinds of correspondence, outgoing, incoming or in transit, provided that it immediately notifies such action to each of the other Member States through the Secretary-General.

Page 24: Sec Wars Episode 3

Inspection of border

• Quarantine Law– The objective of this law is to prevent pathogen causing infectious diseases

nonexistent in Japan from entering the country through vessels or aircraft, and to take measures necessary for prevention of other infectious diseases borne through vessels or aircraft.

• How about communication?– Information security 80% from outside Japan

– contents

– execution of sovereign-wide discretion

Page 25: Sec Wars Episode 3

Concept of proactive defense

• ISP activity– security

– phishing

– inappropriate information

– copyright

• Domain Registrar's take down procedure

Page 26: Sec Wars Episode 3

ISP against Myth.-dogma (JP) “secrecy of communication “

• Secrecy of communication– Electronic communication business law sec.4

• Dogma– Intermediates cannot reveal the sender information– ISP can act as long as the “defence” stands.

• Appropriate business activity

• Self defence

• crime prevention

通信の秘密のドグマとの闘い

・電気通信事業法4条

・違法性阻却事由のなかでの活動

Page 27: Sec Wars Episode 3

Development of Dogma

• No distinction between content and communication data– Traffic data is too protected

• Warrant is necessary for search of traffic data in criminal case

• Disclosure procedure of sender is useless

– Chilling effect to ISP • Ambiguous legality of ISP’s management

activities

ドグマの肥大化

・通信デー

タへの適用 

法執行への制限 

匿名性強化 

発信者情報

開示-

無用さ

・ISPへの萎縮効果

Page 28: Sec Wars Episode 3

Two aspects of Secrecy of Communication

• Traceability– (civil) difficult to file a litigation against

sender– (criminal) LEA have to overcome high

barrier

• No control or restriction of contents– censorship– historical issue

追跡可能性と伝達の保

Page 29: Sec Wars Episode 3

Traceability

• differences –mixi v. LinkedIn

• economical cost

• “Such cost is expensive by far in Japan”

Page 30: Sec Wars Episode 3

Traceability-Beyond the dogma

• JP– Warrant for search

of traffic data

– Disclosure procedure of sender is useless

– Ambiguous of ISP’S management activities

• US/UK– Subpoena for traffic data

(civil)

– Subpoena for account information and §2703 (d) order (criminal)

– ISP’s code of Practice   in UK

追跡可能性におけるドグマを超える

ために

・米国における提出命令制度・d命

令・ISPの行為規範

Page 31: Sec Wars Episode 3

US network and privacy

real time Stored communicationacquisition use disclosure

content Provider exception

Network Neutrality

Voluntary disclosure

(civil org.) ?(LE)

consent exception,

computer intruder exception

(civil org.)

Prohibited/

exception

(LE) ditto.

compulsory

(LE) Title 3(Interception) 、 FISA

(LE) search warrant/subpoena with notice

Communication data

Aggressive acquisition

? (civil org.)?

(LE) Pen register/Trace Trap Order

(civil org.) subpoena

(LE) subpoena/

(d)order

Page 32: Sec Wars Episode 3

ISP’s cooperation• Co-operation with

Law Enforcement• Cooperation

against CybercrimeTuesday 1 - Wednesday 2 April 2008Council of Europe, Strasbourg, France

• Find  - Peter Cassidy, Secretary General, Anti Working Phishing Group

ISPとLEとの協力

Page 33: Sec Wars Episode 3

Against illegal/inappropriate traffic

• “traffic”– not only content

• traffic itself become weapon of attack

• “illegal” and “Inappropriate”

• History– Telegram Act article 5 (prohibition of communication) was

deleted in 1952at the introduction of Public Electronic Telecommunication Law.

– Authority might order the prohibition from“public safety or good order”

Page 34: Sec Wars Episode 3

Framework against illegal / inappropriate information

against public order

misc illegal

infringing right

harmful to juvenile

ISP may delete on contract.

disclose suicide information

filtering

by disclose of sender

ISP may delete on contract.

ISP may delete on contract.

illegal inappropriate

Page 35: Sec Wars Episode 3

ISP’s issue against illegal traffic

• take down the Phishing site– Information sharing– ISP can delete phishing information file legally.

”Present status of Phishing and direction of ISP’s counter measure” issued by Ministry of Internal Affairs and Communication(Aug,2005)

• warning user whose PC is infected virus.

• warning copyright infringing user

• Throttling the P2P traffic

フィッシングの遮断

ウイ

ルス感染P

C

のお知らせ

P2P

トラフィックの制限?

Page 36: Sec Wars Episode 3

“Revenge” of secrecy of communication

• ISP cannot refuse to deliver illegal traffic.– right of intermediates vs. privacy of parties?

– based on contracts?

– waiver of privacy ?

• compare – real flu virus/ Post office may refuse (Postal law)

– duties to avoid jamming (Electronic wave law)

Page 37: Sec Wars Episode 3

Interpretation of secrecy of communication

• Three elements– “actively acquire”

• How about ping?

– “unauthorised disclose”• coordinated response ?

– “Use for self or others”• public purpose?

• There is no official interpretation at the Internet era.

Page 38: Sec Wars Episode 3

More burden

• Block the illegal traffic ?– Blocking child porno.

• world trend

• Germany– In Germany, based on the initiative of the Federal Ministry of

Family Affairs,Senior Citizens, Women and Youth (BMFSFJ), the government has had discussions for several months now on how to block child pornography sites hosted on servers outside of the country.

– UK via IWF (cleanfeed)

– Copyright guardian.

Page 39: Sec Wars Episode 3

Copyright Guardian?

• Three strike law– France

• 3 strikes law pass Parliament (May 13.2009).• "Creation and Internet" law has finally been adopted by the

National Assembly.– UK

• Agreement between ISP and copyright holder.– Judgement in Belgium, Denmark

• “Belgium Says ISPs Must Protect Copyright”• IFPI Forces Danish ISP to Block The Pirate Bay

– Disconnect Finland

著作権制度の擁護者?

Page 40: Sec Wars Episode 3

ISP’s grief

• Vador didn’t intend to kill Padome.– “I’m very sorry, Lord

Vador.(..) It seems in your anger, you killed her”

• “No…no. it is not possible” (ep3) – Darth Vader

ISPの悲しみ

・言論の自由の制限のつもりはない

・どのように・何を・コストは誰が

Does not intend to regulate “Freedom of

speech” concepts

How to control?What control?Who control?

Who pay for costs?

Page 41: Sec Wars Episode 3

CU @Episode 4

May the Force be

with U!

どのようなエピソー

ド4

を描けるのか