presented by ssa robert flaim federal bureau of investigation cyber division fbihq cyber attacks:...

39
Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Upload: kathlyn-washington

Post on 16-Dec-2015

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Presented by SSA Robert Flaim

FEDERAL BUREAU OF INVESTIGATIONCyber DivisionFBIHQ

Cyber Attacks: The Next Frontier

Page 2: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

“The nation is vulnerable to new forms of terrorism ranging from cyber attacks to attacks on military bases abroad to ballistic missile attacks on U.S. cities.

“Wars in the 21st century will increasingly require all elements of national power – not just the military. They will require that economic, diplomatic, financial, law enforcement and intelligence capabilities work together.”

Secretary Rumsfeld address to the National Defense University, January 31, 2002.

Page 3: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

DiscussionDiscussion

Critical Infrastructures

Terrorist Internet Exploits

Tactics and Strategy

Page 4: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Critical Infrastructur

esWhere the

Crown Jewels Are

Page 5: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier
Page 6: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Imagine Planning for These ContingenciesImagine Planning for These ContingenciesImagine Planning for These ContingenciesImagine Planning for These Contingencies

Unrelated Events or Strategic Attack?

Unrelated Events or Strategic Attack?

Power OutagesWorld Trade CenterWorld Trade Center

Oklahoma CityOklahoma City

ATM Failures

Airliner CrashBridges DownBridges Down

ISPs All OfflineISPs All Offline

Oil Refinery FireOil Refinery Fire 911 System Down911 System Down

Poisoned Water SupplyPoisoned Water Supply

Telephone OutagesTelephone Outages

Page 7: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Using Our Systems Using Our Systems Against UsAgainst Us

Aircraft – Pentagon/Twin Towers

Mail distribution network – Anthrax

Computers – next step ?

Page 8: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Real World Example – Real World Example – Australia 2000Australia 2000Maroochy Shire Waste Water Plant – Sunshine Coast

– Insider

– 46 intrusions over 2 month period

– Release of sewage into parks, rivers

– Environmental damage

Page 9: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Real World Example – Real World Example – USA 2001USA 2001San Francisco FBI Field Office Investigation

– Internet probes from Saudi Arabia, Indonesia, Pakistan

– Casings of web sites regarding emergency telephone systems, electrical generation and transmissions, water storage and distribution, nuclear power plants and gas facilities

– Exploring digital systems used to manage these systems

Page 10: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Why Cyber Attack on Why Cyber Attack on Critical Critical Infrastructures?Infrastructures? National Security

– Reduce the U.S.’s ability to protect its interests

Public Psyche– Erode confidence in critical services and

the government Economic impact

– Damage economic systems Enhancement of Physical Attacks

– Physical damage/distraction efforts Asymmetric Warfare

– Lack of attribution, low cost/high potential impact

Page 11: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

How are we How are we vulnerable?vulnerable? Globalization of infrastructures = vulnerabilityGlobalization of infrastructures = vulnerability

Anonymous access to infrastructures via the Anonymous access to infrastructures via the Internet and SCADAInternet and SCADA

Interdependencies of systems make attack Interdependencies of systems make attack consequences harder to predict and more consequences harder to predict and more severesevere

Malicious software is widely available and Malicious software is widely available and does not require a high degree of technical does not require a high degree of technical skill to useskill to use

More individuals with malicious intent on More individuals with malicious intent on InternetInternet

New cyber threats outpace defensive New cyber threats outpace defensive measures measures

Page 12: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Vulnerability TypesVulnerability Types

Computer basedComputer based– Poor passwordsPoor passwords– Lack of appropriate protection/or Lack of appropriate protection/or

improperly configured protectionimproperly configured protection Network basedNetwork based

– Unprotected or unnecessary open Unprotected or unnecessary open entry pointsentry points

Personnel basedPersonnel based– Temporary/staff firingsTemporary/staff firings– Disgruntled personnelDisgruntled personnel– Lack of trainingLack of training

Facility basedFacility based– Servers in unprotected areasServers in unprotected areas– Inadequate security policiesInadequate security policies

Page 13: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Al-QaedaAl-Qaeda

Al-Qaeda laptop found in Afghanistan contained:

Hits on web sites that contained “Sabotage Handbook”

Handbook – Internet tools, planning a hit, anti-surveillance methods, “cracking” tools

Al-Qaeda actively researched publicly available information concerning critical infrastructures posted on web sites

Page 14: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Terrorist Internet Exploits

What are we up against?

Page 15: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Terrorist GroupsTerrorist Groups

Page 16: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

TerroristsTerrorists

Attention must be paid to studying the terrorists:

– Ideology

– History

– Motivation

– Capabilities

Page 17: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

TerroristsTerrorists

Terrorism is carried out by disrupting activities, undermining confidence, and creating fear

In the future, cyber terrorism may become a viable option to traditional physical acts of violence due to:– Perceived anonymity– Diverse targets– Low risk of detection– Low risk of personnel injury– Low investment– Operate from nearly any location– Few resources are needed

Page 18: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Terrorist Use of the Terrorist Use of the InternetInternet

Hacktivism

Cyber Facilitated Terrorism

Cyber terrorism

Page 19: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Cyber Arsenal for Cyber Arsenal for TerroristsTerroristsInternet newsgroups, web home pages, and

IRC channels include:– Automated attack tools (Software Tools)

•Sniffers (capture information i.e. password/log-on)

•Rootkits (facilitate/mask intrusion)•Network Vulnerability Analyzers

(SATAN/Nessus)•Spoofing•Trojan Horses•Worms•DoS

Page 20: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Cyber Attack Cyber Attack MethodologyMethodology Resource Denial

– Virus/malicious code– “Legitimate” traffic overwhelms

site (unauthorized high-volume links)

– DoS– DDoS

WWW Defacement– Defacement to embarrass– Content modification to convey

message– Content modification as component

of disinformation campaign

Page 21: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Computer System Computer System CompromisesCompromises System Compromise

– Data destruction– Data modification– Information gathering– Compromised platform :

•Launch pad for attacks•Jump off point for other compromises

Target Research and Acquisition– Internet makes significant

amounts of data instantly and anonymously accessible.

Page 22: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Hacktivism

Hacktivism is hacking with a cause and is concerned with influencing opinions on a specific issue.

Example: ELF hacks into the web page of a local ski resort and defaces the web page. This is done to reflect the groups objections to environmental issues.

Page 23: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Electronic Disturbance Theater

Electronic Disturbance Theater

SmithsonianMental Institution

SmithsonianMental Institution

HacktivismHacktivism

Page 24: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier
Page 25: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Cyber Facilitated Terrorism Terrorists utilize web sites to actively recruit members and publicize propaganda as well as to raise funds

Web sites also contain information necessary to construct weapons, obtain false identification

Use Internet as a communications tool via chat rooms, BBS, email

Hijackers utilized cyber cafés to communicate via Internet and order airline tickets

Page 26: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

1. Finsbury Park Mosque, North London

2. Djamel Beghal8. Abu Hamza

3. Kamel Daoudi

4. Zacarias Moussaoui

5. Richard Reid

6. Feroz Abbasi

7. Nizar Tribelsi

9. Abu Qatada

Page 27: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Kamel Daoudi – Kamel Daoudi –

Believed to be Al-Believed to be Al-Qaeda Cyber Qaeda Cyber Terrorist. Arrested Terrorist. Arrested for alleged for alleged involvement in plot involvement in plot to bomb American to bomb American Embassy in ParisEmbassy in Paris

Page 28: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

CyberterrorismCyberterrorism

Cyberterrorism is a criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda.

Page 29: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

The Cyberterrorist The Cyberterrorist ThreatThreat

Operational Practicality

Behavioral Profile

Assessing the threat

Technical Feasibility

THREAT

Page 30: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Cost of Capability

Availability of Capability

1955 1960 1970 1975 1985

Invasion

Precision

Guided

Munitions

ComputerStrategicNuclear

Weapons

Cruise Missile

Cost & Means of Cost & Means of AttackAttack

1945 Today

MissilesICBM & SLBM

Page 31: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Tactics and Strategy

Prevention and

cooperation

Page 32: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

FBI Cyber FBI Cyber TransformationTransformation Terrorism and Cyber Crime – top priorities

FBI recruitment of engineers and computer scientists – critical skills

Increasing agents dedicated to cyber crime

Creation of Cyber Task Forces in field offices

Page 33: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

USA Patriot Act USA Patriot Act

Felony to hack into computer used in furtherance of national security or national defense

2702 Emergency Requests

Legal Subpoena expanded

Sentencing increased

Page 34: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier
Page 35: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

USA Patriot Act USA Patriot Act cont’dcont’d

Share with DOJ for criminal prosecution Permits “roving” surveillance FISA orders for intelligence allowed if there is a significant reason for application rather than the reason Authorizes pen register and trap and trace orders for email as well as telephone conversations

Page 36: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

International Investigations

Cyber Evidence in USA

MLAT Request

Joint FBI-Foreign Police Investigation

Legal Subpoena

Page 37: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Cyber Terrorism Cyber Terrorism Prevention – Old Prevention – Old Methods for New Methods for New ProblemProblem Liaison

Critical Infrastructure Companies, i.e. FBI InfraGard

Internet Service ProvidersUniversitiesInternet CafesHacker clubsIT companies, developersInternational, local law enforcement

Look – on the Internet Coordinate - national security, terrorist

personnel

Page 38: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

ConclusionConclusion

Our national security, databases, and economy are extremely dependent upon automation

Therefore, there exists a “target rich environment” for those who would do harm via the Internet

Our critical infrastructures require joint private/public efforts to protect them

Page 39: Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier

Robert [email protected]