Cybernaughties - Knowledge on Line

advertisement
Cybernaughties
ACS Forum
National Professional Development
“Education Across the Nation”
May/June 2002
About Education Across
the Nation
ACS Professional Development Board identifies
topical topics and provides presentation material
for Forums in each ACS Branch – presentation is
also available on the ACS web site
Members earn PCP hours for attending, e.g. 1.5
hour session = 1.5 PCP, 1 hour = 1 PCP hour
Evaluations are requested to help with planning
future forums, please tell us what topics you
would like in future sessions, hand in the
evaluations at end of session - thanks
Copyright ACS
Cybernaughties May 2002
2
Relevance to CMACS
Program
The topics we are discussing tonight are covered in several
CMACS subjects
 *IT Trends
 *Business, Legal and Ethical Issues (BLE)
 Project Management
 *E-Business
 Management and Strategy for IS
 Software Development
* These have been updated already for 2002. Security and
privacy issues occupy a module, 17.5% of total content, in
BLE.
Copyright ACS
Cybernaughties May 2002
3
What are cybernaughties?
Which ones are cyberspace
crime?
Cyberterrorism
Identity theft
Fraud
Cyberstalking
Surveillance
Censorship
Privacy breaches
Damaging data
Cybersquatting
Web page defacement
Copyright ACS
Cookies
Dangerous emails
Trade secret theft
Social engineering
Plagiarism
Hacking and cracking
Unauthorised access/
computer trespass
Data theft
Cybernaughties May 2002
4
What we plan to cover
Some stats on who’s doing what and
to whom?
Are these things always naughty?
How can you protect against them?
Should vulnerabilities be publicly
discussed?
Are National ID cards the answer?
Copyright ACS
Cybernaughties May 2002
5
Cyberterrorism
Who’s protecting critical IT infrastructure from
naughty folk?







Health organisations
Banking and finance
Telecommunications
Transport
Power and Water
Emergency services
Other???
Copyright ACS
Cybernaughties May 2002
6
Netwar
Networked force can offset a disadvantage in
numbers, technology or position.
Hard to target




Few formal procedures to disrupt
Little physical infrastructure
Hard to infiltrate
“Borrow” expensive equipment when needed.
E.g. Boeing planes
Just like the self managing teams
recommended in business
Copyright ACS
Cybernaughties May 2002
7
Netwar 2
If you can accurately map a network,
you can figure out how to break it apart.
Inflow analyses and clusters nodes in
network according to activity,
betweenness and closeness
Read Thomas Stewart “America’s
Secret Weapon” in Business 2.0
December 2001
Copyright ACS
Cybernaughties May 2002
8
Netwar
FBI has used keylogging software to legally
“steal” encryption keys in a high profile Mafia
case
Echelon detection system can monitor
mobiles and Internet traffic. But who might be
monitoring the chatty emails to loved ones for
battlefield soldiers?
What’s the Internet equivalent of “loose lips
sink ships?”
Copyright ACS
Cybernaughties May 2002
9
DC-1000, nee Carnivore
FBI can request a court order to use
Carnivore when a person is suspected of





Terrorism
Child pornography/exploitation
Espionage
Information warfare
Fraud
Need to show probable cause
Copyright ACS
Cybernaughties May 2002
10
In Australia
States and territories are responsible for
protecting physical infrastructure, e.g.
roads, railway lines, sea ports, airports,
national icons (Opera House, MCG)
In US, Bush admin is establishing a
central office to co-ordinate government’s
response to cyber attacks
In Australia, national vs states issues are
being debated – will we ever learn?
Copyright ACS
Cybernaughties May 2002
11
Cyberterrorism
22 March, 2002
125,000 attempts to penetrate an air
force computer system
 A concerted and directed attack, “one of
the most orchestrated we’ve seen in
about the last six months”
 Originated overseas


Copyright ACS
The Harrow Report, 1 April, 2002
Cybernaughties May 2002
12
Email can be dangerous
2 workers at Narrabri Shire Council referred to
their superiors as Huey, Dewey and Louie in an
email
And lost their jobs
Employers face risks of
 Defamation
 Sexual harassment
 Discrimination
 Copyright infringement
Emails are like postcards no matter how many
caveats you include in them

Copyright ACS
Cybernaughties May 2002
13
Vint Cerf on email
“Be thoughtful in what you commit to
email, news groups and other Internet
communication channels – it may well end
up in a web search some day”
Great presentations and papers at
www1.worldcom.com
Check out his “The Internet is for
Everyone” draft Feb 2002
Copyright ACS
Cybernaughties May 2002
14
Online gambling- is it
naughty?
Australia’s Interactive Gambling Act, passed
in July 2001 bans Australian online gambling
operators from offering their services to
Australians.
Feb 2001 – 3% of Australian Internet users
accessed an online casino from home PC
Feb 2002 – 3.4 % did the same
What’s the point of the above Act?
There are 1,400 Internet casinos – many of
them in the Caribbean.
Copyright ACS
Cybernaughties May 2002
15
Is Altnet naughty?
File swapping program Kazaa (Napster-like)
includes stealth software that is capable of
tapping spare computing capacity – maybe
20 million downloads in Feb 2002
Will work on opt-in basis, users will be
remunerated for services, you can de-install it
– but is it spam? Or a virus? How often do
you know what’s in a download? Or any
software?
Are cookies stealth software?
Copyright ACS
Cybernaughties May 2002
16
What about
cybersmearing?
Falsehoods about you or your organisation on
the Internet – attack sites/rogue sites.
Company found a concocted interview about it
during difficult negotiations with a union – could
not locate name or contact details of person who
posted it. Did find an email address.
Went to dejanews, typed in the email address and
found many postings from same email address, a
cancer survivors group, blues music group,
weddings group - where there were contact
details.
Copyright ACS
Cybernaughties May 2002
17
Cybersmearing cont.
Web page with offending material was on a real estate
agency’s site –a little digging showed that the
cybersmearer worked for the the real estate company.
Lawyer contacted the cybersmearer “Hello. We know you
had breast cancer, your favourite blues artist is BB King,
your daughter is getting married in July. We know you
posted a web page with inaccuracies…..if it’s still there in
half an hour, we will contact your boss who will not be
happy to know you are posting libelous material on her
site….
Is this a good approach to such a problem?
Copyright ACS
Cybernaughties May 2002
18
Spam
This is a vexed issue for ISPs as spam
generates traffic and traffic generates money
Dr John Costello proposed a hash-cash
solution in a letter to the Age




If you want to send me an email, my mail server requires
yours to perform a computationally intensive task
before it will decode and accept it
This is OK for one recipient – but for one million?
What’s needed is an upgrade to Internet mail protocol
……. plus the will to act.
Is this a good solution?
Copyright ACS
Cybernaughties May 2002
19
Cookies
The good news is that fewer large sites
are sending you cookies
Of the 100 most visited sites only 48%
use cookies, down from 78%
84% collect personal information, down
from 96%
Copyright ACS
Cybernaughties May 2002
20
Censorship
Is it naughty?
CSIRO report on effectiveness of
filtering software products showed that
few are successful
BUT – 60% of parents believe that
content filtering software is effective
Copyright ACS
Cybernaughties May 2002
21
CSIRO study
Net Nanny blocked 30%, passed 70%
I-gear blocked 98%, passed 2%
AOL under 12 years blocked 100%
Internet sheriff blocked 98%
Cyber sentinel blocked 90%
Copyright ACS
Cybernaughties May 2002
22
Reverse censorship
SafeWeb Triangle Boy give users the
ability to secretly lend internet address
to users behind restricted firewalls
Being funded by In-Q-Tel (CIA) and
Voice of America which has 100
Triangle Boy machines
Growing use in China, Saudi Arabia,
United Arab Emirates, Syria
Copyright ACS
Cybernaughties May 2002
23
Hacking
Stand up if you are





Male
14-28 years old
Intelligent
Could have done better in exams
Work or study in technical area
Based on averages, those standing represent
the likely hackers – but this is a gross
generalisation
Copyright ACS
Cybernaughties May 2002
24
Real hackers
Stay standing if you are indeed a hacker
Could any other hackers also please
stand so we can test this average
Copyright ACS
Cybernaughties May 2002
25
Why the naughty hack
Status
Media attention
Expose security flaw
Monetary gain
Payback, increasing number of disgruntled
ex-employees are hacking
Sex appeal?

”All the girls thought it was cool” said one 16
year old male hacker
Copyright ACS
Cybernaughties May 2002
26
Lots of hacking
Every 13 seconds, computer networks
of federal government are probed by
hackers
Auscert – security incidents reported by
members doubled in 2001
Security software – CAGR 22% to 2004
according the Gartner
Copyright ACS
Cybernaughties May 2002
27
Hacker praised by judge
for Bill Gates prank
“You demonstrated some sense of
humour by sending Viagra to Bill Gates
to mock him. Even the prosecution had
difficulty identifying the criminality of
what you did. You have computer skills
which many, including myself, envy.”
How do we change judicial attitudes?
Copyright ACS
Cybernaughties May 2002
28
Internet abuse
It was reported in The Age in Feb 2002
that 4 New Zealand judges were being
investigated for surfing Internet sex
sites using computers provided by the
Department of Courts.
Is this naughty?
Copyright ACS
Cybernaughties May 2002
29
Security is more than money
“You can spend a huge amount of
money and be tremendously ineffective.
It’s about having the intellectual
capability to conceive of how to address
those issues, and then having the
commitment, enthusiasm and support to
actively execute those things.”

Stephen Ford, Assoc Dir IT security at
Macquarie Bank
Copyright ACS
Cybernaughties May 2002
30
Top ten security threats
Complacency
Poor execution
Virus attack
Hackers and crackers
Trojan horses
DoS attacks
Disgruntled employees
Naïve employees
Mobile devices
Data hijacking
Copyright ACS
Cybernaughties May 2002
31
Data security
NSW Bureau of Crime Statistics
In 2000, 10,221 laptops were stolen
336 were recovered
None of the recovered had data
security
Hands up if your laptop has any data
security.
Copyright ACS
Cybernaughties May 2002
32
CSI/FBI computer crime and
security survey
Activity
2001
2000
System penetration from
outside
Denial of service attacks
40%
25%
38%
22%
Employer abuse of Internet
access
Detected computer viruses
91%
79%
94%
85%
Copyright ACS
Cybernaughties May 2002
33
CSI/FBI computer crime and
security survey
Intrusions take place despite the
presence of firewalls
Theft of trade secrets takes place
despite the presence of encryption
Net abuse flourishes despite corporate
edicts against it
Copyright ACS
Cybernaughties May 2002
34
Liability issues
You could be accountable for compromised
data due to cyberintruders
Even if security measures are in place and in
your organisation has done anything wrong
Distributed denial of service is one example –
you get hijacked but still could be liable for
damage caused
Copyright ACS
Cybernaughties May 2002
35
Cyberfraud – who’s doing it?
Top 12 countries – US data
Ukraine
Indonesia
Yugoslavia
Lithuania
Egypt
Romania
Copyright ACS
Bulgaria
Turkey
Russia
Pakistan
Malaysia
Israel
Cybernaughties May 2002
36
What are teens doing
most on Internet
Download music
Play games
Seek health info
Chat
Shop
Check sports scores
Copyright ACS
72%
72%
75%
67%
50%
46%
Cybernaughties May 2002
37
Teens get health info
Net
School
Parents
Doctors
Copyright ACS
75%
47%
45%
41%
Cybernaughties May 2002
38
Biggest online fraud?
Online auctions, up from 63% of frauds
in 2000 to 78% in 2001.
Nigerian money offers up from 1% in
2000 to 11% in 2001.
Web sites are the most common way for
fraudsters to solicit, but there is an
increase in con artists contacting by
email.
Copyright ACS
Cybernaughties May 2002
39
Credit card fraud
Harvey Norman closed its online shopping
site – 25% involved stolen credit cards
Recent research by KPMG put it at 20-25%
5% of Internet transactions are fraudulent,
compared with .05% of bricks and mortar
ones
Editor at MSNBC challenged 2 reporters to go
online and get credit card numbers, names
and expiration dates. Within 2 hours, they
had 2,500.
Copyright ACS
Cybernaughties May 2002
40
Cheque fraud
TV show Dateline did a report on
cheque fraud.
Produced a $1,000 cheque with “Void”
written all over it
Plus the words “Please don’t pay me. I
am a counterfeit cheque.”
The cheque was cashed.
Copyright ACS
Cybernaughties May 2002
41
Cyberforgery
25 years ago, it took 12 weeks to create a forged
cheque and a 4-colour printing press cost
$250,000
Today, it takes 12 minutes and requires a laptop,
laser printer, scanner which is about US $5,000
But the good news is that you can print the
cheque to pay for it.
On laser printed cheques, you can remove the
name and dollar amount with cloudy type scotch
tape
Copyright ACS
Cybernaughties May 2002
42
Disposable credit
cards?
What about a one-time use card?
You get a private payment number that
can be used once and only once
Available/being trialled from American
Express and Visa
Copyright ACS
Cybernaughties May 2002
43
Encryption –how
effective is it?
Powerful ciphers guarantee absolute security
in theory
But hardly ever in practice
Because people don’t use them properly
A good key is a long string of random
symbols – hard to remember, so write it on a
post-it or put it in a file, protected with a
password like “1234”?
Copyright ACS
Cybernaughties May 2002
44
What about ID theft?
In 2001, identity theft became the top
consumer fraud complaint reported to
the US govt.
750,00 citizens will have their identities
stolen in 2002
Do National ID cards solve the
problem?
Copyright ACS
Cybernaughties May 2002
45
Michelle Brown’s story 1
Single, late 20’s, owned 15 credit cards,
never late on a payment
Call from bank – overdue payment on her car.
But not her car.
Bank officer explained they had trouble
finding her as phone calls in credit application
not valid – so they used directory assistance.
Yet it was her name and her social security
number on the loan form.
Copyright ACS
Cybernaughties May 2002
46
Michelle Brown’s story 2
She contacted credit reporting agencies and
division of motor vehicles, duplicate licence
recently issued, delinquent bills for thousands
of dollars, arrest warrant in Texas for drug
offences
It took her about 2 years to sort things out,
and she has never really recovered, now has
shredder at home.
Check out how to avoid identity theft at
Australian Bankers Association site
Copyright ACS
Cybernaughties May 2002
47
Don’t make is too easy!
Pre-approved credit applications sent via mail
is a known method of identity theft – all the
naughty person has to do is forge a signature
and change the address on the form.
Expert advice is to shred all documentation
with your financial details, and use a post
office box as mail theft is often a prelude to
identity theft.
There’s heaps of identity theft information on
the web
Copyright ACS
Cybernaughties May 2002
48
Australian Financial
Review 13 May 2001
National Crime Authority investigation
into
identity fraud
Crime group (Sydney-based) allegedly using illicit
bank accounts to claim tax returns
Serving/former ATO officers under investigation
Illicit bank accounts opened in name of people
whose tax history suggests are unlikely to ever
get a refund
Improvements in scanning technology make it
easier to produce fake IDs
Copyright ACS
Cybernaughties May 2002
49
Organised drug
make/traffic
Motorcycle gangs in Australia and New Zealand use the
Internet for secure encrypted transmission of drug recipes,
Illegitimate financial transactions, business case proposals
and communications
Web sites in the Netherlands and the UK offer to sell and
deliver potent varieties of cannabis to almost any
destination in the world
The Internet itself has numerous sites where the recipes for
illicit drug preparation are detailed in step by step detail,
including alternative ingredients for those hard to obtain
supplies. (Int.Narcotics Control Board, 2000)

Source Peter Wilkins presentation to Privacy Conference 2001
Copyright ACS
Cybernaughties May 2002
50
Organised Child Pornography
and Trafficking in Human
Beings
Trafficking in women and children for prostitution and
forced labour has become a highly lucrative and well
organised growth industry. (Interpol General Secretariat)
Nexus between viewing large amounts of child porn and the
propensity of offending. A child molester who after viewing
child porn went to a school and raped two five year old girls
said “I was determined next day to grab a kid, that stuff
fuelled me”
Offender possessed on his computer 30,000 child porn
images in 175 directories. (Victoria Police)

Source – Peter Wilkins slides from Privacy Conference 2001
Copyright ACS
Cybernaughties May 2002
51
Development of policing
strategies
The commissioners have prioritised the strategy
development and priority issues as follows:
The development of national accredited training
for all levels of law enforcement ranging from
initial action at e-crime crime scenes, through to
forensic analysis
e-crime law reform
The identification of private sector partnerships
including; their role and function; and
The development of the proposal for a national
centre for cybercrime (Source: Peter Wilkins)
Copyright ACS
Cybernaughties May 2002
52
Available at
www.privacy.gov.au
MALCOLM CROMPTON
FEDERAL PRIVACY COMMISSIONER
Biometrics and Privacy:
The End of the World as We Know IT or The White Knight of
Privacy
Biometrics, Security and Authentication Conference
10 March 2002
See also Roger Clarke’s April 2002 paper, referenced in
second last slide
Copyright ACS
Cybernaughties May 2002
53
Biometrics – what’s
driving it?
Authentication – efficient and
fraud proof
Law enforcement
Technology developments
Cost – cheaper and cheaper
Security – post 11 September
Copyright ACS
Cybernaughties May 2002
54
International Biometric Industry
Association
“Simply put, it’s getting harder and
harder to preserve personal privacy
without using biometrics…”

Copyright ACS
Cybernaughties May 2002
Richard E Norton, IBIA
55
But then……..
“…Biometrics are among the most
threatening of all surveillance
technologies, and herald the severe
curtailment of freedoms, and the
repression of ‘different thinkers’,
public interest advocates and
‘troublemakers’.”

Copyright ACS
Cybernaughties May 2002
Roger Clarke
56
Biometrics and Privacy
“ Biometrics need not subvert
informational privacy. A pro-privacy
position should not be construed as
anti-biometric. The technology can
actually be privacy enhancing if systems
are designed with that objective in
mind.”
Information Privacy Commissioner, Ontario,
Canada
Copyright ACS
Cybernaughties May 2002
57
Resistance to biometrics
There’s a reluctance to use human body parts
for security systems
In US, Christian fundamentalists have
brought 2 court cases

…clear warnings in the bible against “marking” of
individuals
But, “if God did not want us to use biometrics,
he would not have given us individual iris
patterns.”
Copyright ACS
Cybernaughties May 2002
58
Not all resist
At Heathrow airport, passengers are
volunteering to use iris scanning – Sydney
airport is trialling face recognition
But terrorists are unlikely to volunteer so we
still need face recognition improvements
The good get through security quickly with iris
scanning
The naughty get caught by the face
recognition software
Copyright ACS
Cybernaughties May 2002
59
What about fingerprinting?
It is no 2 in reliability, after iris scanning
But it is more affordable
Fingerprinting looks below the skin so latex
fingers and severed fingers do not work
What about acceptance?
What about fingerprinting school kids?
Would you volunteer for a biometrics pilot?
Copyright ACS
Cybernaughties May 2002
60
Fingerprinting in
schools
In US, at least one school has mugged
and fingerprinted all parents and
volunteers……..
A failed school employee had moved from
school to school molesting children
employee.
Will fingerprinting prevent this happening
again?
Copyright ACS
Cybernaughties May 2002
61
Quebec’s new IT
Framework Law
A person’s identity may not be verified or confirmed by
means of a process that allows biometric characteristics or
measurements to be recorded except with the express
consent of the person concerned……..…
The creation of a database of biometric characteristics and
measurements must be disclosed beforehand to the
Commission d’accès à l’information. As well, the existence
of such a database, whether or not it is in service, must be
disclosed.
The Commission may make orders determining how such
databases are to be set up, used, consulted, released and
retained and how measurements or characteristics
recorded for personal identification purposes are to be
archived or destroyed.
The Commission may also suspend or prohibit the bringing
into service of such a database or order its destruction, if
the database is not in compliance with the orders of the
Commission or otherwise constitutes an invasion of
privacy.
Copyright ACS
Cybernaughties May 2002
62
Biometrics in Australia
Edith Cowan Uni in WA uses fingerprint scanning
to secure the PCs controlling access to campus
buildings
Melbourne’s Crown Casino and the Australian
Customs Service are trialling face recognition
using Face-IT from US
CSIRO is developing SQUIS – system for quick
image search
NSW Police, casinos and retailers are using face
recognition
Sydney airport is trialling iris scanning
Copyright ACS
Cybernaughties May 2002
63
Biometics future?
CSIRO has developed face
recognition based surveillance but
there are reliability problems.
Maybe the solution is a mix of iris
scanning and face recognition with
humans making the problematic
matches
Copyright ACS
Cybernaughties May 2002
64
Surveillance
Carnegie Mellon project to identify humans at
up to 150 metres –Human Id at a Distance
Blue Eyes – IBM product used in retail stores
to record face and eye expressions and
measure effectiveness of in-store promotions
Vegas security systems have used face
recognition for three years
In UK where video surveillance is used, per
capita crime is down
Copyright ACS
Cybernaughties May 2002
65
Ethically speakeing
“We develop the technologies. The
policy and how you implement them is
not my province.”

Human ID at A Distance Program Manager
“They that can give up essential liberty
to obtain a little temporary safety
deserve neither liberty nor saftey”

Benjamin Franklin
Copyright ACS
Cybernaughties May 2002
66
Surveillance technology
Cookies
Travel cards/e-tolls
Employee id cards
Phone cards
Credit card records
Airline tickets
Cell phones
GPS
Video camera
Copyright ACS
Cybernaughties May 2002
67
Bullet proof ID?
Does not exist
3-factor security
Something you know, e.g. a password
 Something you have, e.g. ID card/security
token
 Something that confirms who you are, e.g.
a biometric

Copyright ACS
Cybernaughties May 2002
68
ID cards – an each-way bet?
Americans should carry drivers license
with routine data plus a biometric
identifier….. Stored in uniform
databases in every state, tied into a
national network, to verify identities at a
moment’s notice
But not a National ID card as these
raise civil liberties concerns
Copyright ACS
Cybernaughties May 2002
69
Who’s got ID cards?
Spain – id cards for citizens over 14
Argentina – card at 8, re-register at 17
Kenya – carry card at all times
Germany_over 16,m carry a card
Belgium – used since WW1, over 15,
carry a card which police can request at
any time
Copyright ACS
Cybernaughties May 2002
70
ID cards
Finland – voluntary smart card with chip
used as a travel card in 15 European
countries
In US. Most likely use will be id cards
for immigrants and foreign visitors
Malaysia – piloting a smart card that is
drivers license, cash card, health card,
and passport.
Copyright ACS
Cybernaughties May 2002
71
What’s needed?
Organisations need security software but it’s
not enough. Need







Policies
Processes
Risk analysis – ongoing
Disaster recovery – tested
Business continuity plans – tested
Awareness and training – ongoing
The will to act
Copyright ACS
Cybernaughties May 2002
72
Disclosing
vulnerabilities
Who needs to know when vulnerabilities
are discovered?
Does public disclosure encourage the
naughty to take advantage of the
vulnerability?
Microsoft and several specialist security
firms have announced voluntary
adherence to a new disclosure policy
Copyright ACS
Cybernaughties May 2002
73
Case study
You are an IT manager where a
detection tool report shows that IT
staff member Freda is accessing
restricted Internet sites and
downloading objectionable material.
You remotely access Freda’s PC to
obtain evidence
You find the evidence, and fire Freda
Copyright ACS
Cybernaughties May 2002
74
Evidence issues
Data collected for purpose of evidence
Untampered with
 Accounted for at every stage of its life from
collection to presentation in court
 Comply with Law of evidence

This can be “just too hard” for some
organisations to pursue
Don’t disturb the crime scene
Copyright ACS
Cybernaughties May 2002
75
Can you steal data?
In some jurisdictions, theft permanently
deprives a victim of property.
If I copy your database, you still have it,
so it has not been stolen.
In any case, is data “property”?
Copyright ACS
Cybernaughties May 2002
76
Good reads
Tangled Web by Richard Power - excellent. Que,
2001. Useful links
The Art of the Steal - very readable. Frank
Abagnale. Bantam, 2001
Access Denied - useful explanations and best
practice checklists. Cathy Cronkhite & Jack
McCullough. Osborne, 2001
Roger Clarke’s notes from the Computers,
Freedom & Privacy 2002 Conference at
www.anu.edu.au/people/Roger.Clarke/DV/NotesCFP02.html
Lots of useful links including Roger’s slides on biometrics
Copyright ACS
Cybernaughties May 2002
77
What’s next?
Thanks you for your attendance and for
completing your evaluation form.
The next Education Across the Nation forum is
“The Getting o Agility”- alternative ways of
developing systems – lite, extreme, agile
methods. These are not just a return to the
“quick and dirty” approaches of the past – they
are rigorous methods which work well if done
properly.
Tell us what you would like to know about these
approaches on your evaluation for tonight and
we’ll try and meet all needs.
Copyright ACS
Cybernaughties May 2002
78
Download