cyber attacks

67 %
33 %
Information about cyber attacks

Published on March 20, 2008

Author: Riccard


Slide1:  Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier Slide2:  “The nation is vulnerable to new forms of terrorism ranging from cyber attacks to attacks on military bases abroad to ballistic missile attacks on U.S. cities. “Wars in the 21st century will increasingly require all elements of national power – not just the military. They will require that economic, diplomatic, financial, law enforcement and intelligence capabilities work together.” Secretary Rumsfeld address to the National Defense University, January 31, 2002. Discussion:  Discussion Critical Infrastructures Terrorist Internet Exploits Tactics and Strategy Critical Infrastructures:  Critical Infrastructures Where the Crown Jewels Are Slide6:  Imagine Planning for These Contingencies Unrelated Events or Strategic Attack? ISPs All Offline 911 System Down Poisoned Water Supply Telephone Outages Using Our Systems Against Us:  Using Our Systems Against Us Aircraft – Pentagon/Twin Towers Mail distribution network – Anthrax Computers – next step ? Real World Example – Australia 2000:  Real World Example – Australia 2000 Maroochy Shire Waste Water Plant – Sunshine Coast Insider 46 intrusions over 2 month period Release of sewage into parks, rivers Environmental damage Real World Example – USA 2001:  Real World Example – USA 2001 San Francisco FBI Field Office Investigation Internet probes from Saudi Arabia, Indonesia, Pakistan Casings of web sites regarding emergency telephone systems, electrical generation and transmissions, water storage and distribution, nuclear power plants and gas facilities Exploring digital systems used to manage these systems Why Cyber Attack on Critical Infrastructures?:  Why Cyber Attack on Critical Infrastructures? National Security Reduce the U.S.’s ability to protect its interests Public Psyche Erode confidence in critical services and the government Economic impact Damage economic systems Enhancement of Physical Attacks Physical damage/distraction efforts Asymmetric Warfare Lack of attribution, low cost/high potential impact How are we vulnerable?:  How are we vulnerable? Globalization of infrastructures = vulnerability Anonymous access to infrastructures via the Internet and SCADA Interdependencies of systems make attack consequences harder to predict and more severe Malicious software is widely available and does not require a high degree of technical skill to use More individuals with malicious intent on Internet New cyber threats outpace defensive measures Vulnerability Types:  Vulnerability Types Computer based Poor passwords Lack of appropriate protection/or improperly configured protection Network based Unprotected or unnecessary open entry points Personnel based Temporary/staff firings Disgruntled personnel Lack of training Facility based Servers in unprotected areas Inadequate security policies Al-Qaeda:  Al-Qaeda Al-Qaeda laptop found in Afghanistan contained: Hits on web sites that contained “Sabotage Handbook” Handbook – Internet tools, planning a hit, anti-surveillance methods, “cracking” tools Al-Qaeda actively researched publicly available information concerning critical infrastructures posted on web sites Terrorist Internet Exploits:  Terrorist Internet Exploits What are we up against? Terrorist Groups:  Terrorist Groups Terrorists:  Terrorists Attention must be paid to studying the terrorists: Ideology History Motivation Capabilities Terrorists:  Terrorists Terrorism is carried out by disrupting activities, undermining confidence, and creating fear In the future, cyber terrorism may become a viable option to traditional physical acts of violence due to: Perceived anonymity Diverse targets Low risk of detection Low risk of personnel injury Low investment Operate from nearly any location Few resources are needed Terrorist Use of the Internet:  Terrorist Use of the Internet Hacktivism Cyber Facilitated Terrorism Cyber terrorism Cyber Arsenal for Terrorists:  Cyber Arsenal for Terrorists Internet newsgroups, web home pages, and IRC channels include: Automated attack tools (Software Tools) Sniffers (capture information i.e. password/log-on) Rootkits (facilitate/mask intrusion) Network Vulnerability Analyzers (SATAN/Nessus) Spoofing Trojan Horses Worms DoS Cyber Attack Methodology:  Cyber Attack Methodology Resource Denial Virus/malicious code “Legitimate” traffic overwhelms site (unauthorized high-volume links) DoS DDoS WWW Defacement Defacement to embarrass Content modification to convey message Content modification as component of disinformation campaign Computer System Compromises:  Computer System Compromises System Compromise Data destruction Data modification Information gathering Compromised platform : Launch pad for attacks Jump off point for other compromises Target Research and Acquisition Internet makes significant amounts of data instantly and anonymously accessible. Hacktivism:  Hacktivism Hacktivism is hacking with a cause and is concerned with influencing opinions on a specific issue. Example: ELF hacks into the web page of a local ski resort and defaces the web page. This is done to reflect the groups objections to environmental issues. Slide23:  Electronic Disturbance Theater Hacktivism Cyber Facilitated Terrorism:  Cyber Facilitated Terrorism Terrorists utilize web sites to actively recruit members and publicize propaganda as well as to raise funds Web sites also contain information necessary to construct weapons, obtain false identification Use Internet as a communications tool via chat rooms, BBS, email Hijackers utilized cyber cafés to communicate via Internet and order airline tickets Slide26:  1. Finsbury Park Mosque, North London Slide27:  Kamel Daoudi – Believed to be Al-Qaeda Cyber Terrorist. Arrested for alleged involvement in plot to bomb American Embassy in Paris Cyberterrorism:  Cyberterrorism Cyberterrorism is a criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda. The Cyberterrorist Threat:  The Cyberterrorist Threat Operational Practicality Behavioral Profile Assessing the threat Technical Feasibility THREAT Slide30:  Cost of Capability 1955 1960 1970 1975 1985 Cost & Means of Attack 1945 Today Tactics and Strategy:  Tactics and Strategy Prevention and cooperation FBI Cyber Transformation:  FBI Cyber Transformation Terrorism and Cyber Crime – top priorities FBI recruitment of engineers and computer scientists – critical skills Increasing agents dedicated to cyber crime Creation of Cyber Task Forces in field offices USA Patriot Act :  USA Patriot Act Felony to hack into computer used in furtherance of national security or national defense 2702 Emergency Requests Legal Subpoena expanded Sentencing increased USA Patriot Act cont’d:  USA Patriot Act cont’d Share with DOJ for criminal prosecution Permits “roving” surveillance FISA orders for intelligence allowed if there is a significant reason for application rather than the reason Authorizes pen register and trap and trace orders for email as well as telephone conversations International Investigations:  International Investigations Cyber Evidence in USA MLAT Request Joint FBI-Foreign Police Investigation Legal Subpoena Cyber Terrorism Prevention – Old Methods for New Problem:  Cyber Terrorism Prevention – Old Methods for New Problem Liaison Critical Infrastructure Companies, i.e. FBI InfraGard Internet Service Providers Universities Internet Cafes Hacker clubs IT companies, developers International, local law enforcement Look – on the Internet Coordinate - national security, terrorist personnel Conclusion:  Conclusion Our national security, databases, and economy are extremely dependent upon automation Therefore, there exists a “target rich environment” for those who would do harm via the Internet Our critical infrastructures require joint private/public efforts to protect them Slide39:  Robert Flaim 1-571-223-3338

Add a comment

Related presentations

Related pages

Cyber-attack - Wikipedia, the free encyclopedia

Cyber-attack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures ...
Read more

Cyberwarfare - Wikipedia, the free encyclopedia

As of that month, there had been no significant economic or physical damage to India related to cyber attacks. Cyberwarfare in Iran Iran has been both ...
Read more

Cyber Attack |

During a Cyber Attack Immediate Actions. Check to make sure the software on all of your systems is up-to-date. Run a scan to make sure your system is not ...
Read more

What is a Cyberattack? - Definition from Techopedia

Cyberattack Definition - A cyberattack is deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyberattacks use...
Read more

Cyber Attack News, Photos and Videos - ABC News

Browse Cyber Attack latest news and updates, watch videos and view all photos and more. Join the discussion and find more about Cyber Attack at ...
Read more

Cyberattacke – Wikipedia

Das Verteidigungsministerium Südkoreas in Seoul erhöhte die Alarmstufe für Cyber-Bedrohungen auf den Wert drei einer fünfstufigen Skala.
Read more

The history of cyber attacks - a timeline - NATO - Homepage

NATO Review's timeline on cyber attacks shows the history - and seriousness - of attacks since they began in the 1980s. Use the interactive timeline to ...
Read more

Cyber Attacks - The Huffington Post

If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and ...
Read more

Digital Attack Map

Digital Attack Map - DDoS attacks around the globe
Read more

Cyber Attacks | MIT Technology Review

Cyber Attacks. What are the biggest threats? By Mikko Hypponen, Chief Research Officer of F-Secure on July 10, 2014 | Provided by BBVA
Read more