Information Attack IW -160 College of Aerospace

advertisement
College of Aerospace
Doctrine, Research,
and Education
Information
Attack
IW -160
AF Information Operations
INFORMATION OPERATIONS
INFORMATION IN WARFARE
gain
INFORMATION WARFARE
defend
exploit
attack
COUNTERINFORMATION
ISR
WEATHER PRECISION
NAV
OTHER INFO COLLECTION/
DISSEMINATION ACTIVITIES
(Transmission, Storage,
Public Affairs)
DEFENSIVE
COUNTERINFORMATION
Information CounterAssurance Intelligence
OPSEC
Electronic
Protection
CounterPSYOP
CounterDeception
OFFENSIVE
COUNTERINFORMATION
Electronic
Warfare
PSYOP
PSYOP
Deception
Physical
Attack
Information
Attack
Overview
• Definition
• The Threat
• The Arsenal
• Defensive Measures
Information Attack
AFDD 2-5
...activities taken to manipulate or destroy an
adversary’s information or information
systems without necessarily visibly changing
the physical entity within which it resides.
Information Attack Benefits
Used not only in combat, but also before. It offers …
• Ability to incapacitate an adversary early
• Reduce collateral damage
• Prevent adversary and friendly losses
Information Attack capabilities and tools can
save conventional sorties for other targets
Information Attack Types
• Indirect
– Effects the adversary’s perception, interpretation,
and action by creating an information source
– Depends on the adversary’s decision process
• Direct
– Alters the adversary’s information
– Does not depend on the adversary’s decision
process
Information Attack Goals
• Alter information to affect decision making
• Destroy the enemy’s confidence in the system
• Force an adversary to use less technical, and in
most cases, less secure means to disseminate
critical information
• Allow information to be exploited by friendly
forces.
The Threat
•
•
•
•
•
•
EXTERNAL
INTERNAL
Terrorists
Drug-traffickers
Organized crime
Transnational
Nation-State actors
Hackers / Crackers /
Crooks
• Disgruntled employees
• Agents
• Unintentional errors
The Military Threat
Formal, state-sanctioned offensive IW programs
ongoing in Russia, China, France, India, Israel,
and Cuba
National Intel Estimate
Development of Russia’s IW capability is second only
to nuclear weapons in importance to future
Russian military security
Boris Yeltsin
Tomorrow’s terrorist may be able to do more damage
with a keyboard than with a bomb
National Research Council Report
The Adversary
All sorts of people want to get your info
- Curious
- Hackers / Crackers
- Telephone phreaks
- Crooks
WHY?
why NOT?
Why would the bad guys not do awful
things when we can’t catch them?
- Think Attitude
- Think Youth
- Think anonymous remote control
- NOW ...
- Think about our Adversaries
- Think about our VULNERABILITIES
Hacked Web Sites
TOTAL DEFACEMENTS…c/o www.attrition.org
Hacked Web Sites
DEFACEMENTS per DAY…c/o www.attrition.org
DOJ Homepage
Hacked - 17 Aug 96
CIA Homepage
Hacked - 1 Nov 96
AF Homepage
Hacked - 29 Dec 96
This is what your gov’t is doing to you everyday
Disguised Attacks
“ Hackers are scapegoats….. Hackers are also
far too loud and attention-seeking to be
anything more than an annoyance, because
they always end up talking or drawing
attention to themselves somehow. Industrial
spies and saboteurs do not. You will never see
them, you will never know they were there.”
Chris Goggans ( aka Bloodaxe )
The Arsenal
Clandestine Machine Code
Mercenaries
Repeat Dialers
(Denial of Service)
Trapdoors
Sniffers
Chipping
Malicious Software
Clandestine Machine Code
• Allows programmers to insert code into the
system that creates trapdoors; usually harmless
- Word
- Excel
- what else?
http://www.EEGGS.com
Mercenaries
• Terrorists have entered the information age
• During the Gulf War Mercenaries contacted
Sadam Hussein
– Offered to sell Sadam valuable info on the U.S.
and its allies logistic trails
– Sadam refused
– He didn’t appreciate the value of information
Repeat Dialers
Denial of Service (DOS)
• Explicit
by attackers to prevent legitimate
Errorattempt
502
users
of a service
service
Remote
server from
downusing
or notthat
responding.
- attempts to flood a network, preventing legitimate network
traffic
- attempts to disrupt connections between two machines,
preventing access to a service
- attempts to disrupt service to a specific system or person
Client
Server
SYN
SYN-ACK
ACK
Trapdoors
(aka Backdoors)
• Mechanism that’s built into a system by its
designer
- provides a way to sneak back into the system,
circumventing normal system protection
- what if …all US software could be equipped with a
trapdoor that would allow IW agencies to explore systems
and the stored data on foreign countries?
Sniffers
• Essentially a program that eavesdrops on network
traffic. A sniffer looks for packets carrying login
information
- they run “silently”; the software is simply watching
packets go by without sending anything itself
- they are essentially packet analyzers; common tools that
have been in world-wide use for years
Chipping
• Making electronic chips vulnerable to destruction
by designing in weaknesses
- the chips could be built to so they fail after a certain time
- blow up after they receive a signal on a specific frequency
- send radio signals that allow identification of their exact
location
How do we get the “right” people to use the affected chips?
Malicious Software
• Virus: code fragment that copies itself into a
larger program, modifying that program
- ‘86 = less than 10 known
- ‘97 = 14,137+
- ‘90 = new one every 2 days - ‘98 = 21,000+
- ‘95 = 6,800+
- ‘99 = 2,000,000+
• Trojan Horse: code fragment that hides inside a
program and performs a disguised function
• Logic Bomb: a type of Trojan Horse, used to
release a virus, a worm or some other system
attack
Scanner Shortfalls
• No scanner is 100% accurate or effective
– They can only detect known viruses
• New viruses appear daily and may be undetectable
– Updates to software are usually every month to
month-and-a-half
Computers and Networks
Every
military
capability
depends on
computers
and
networks in
one way or
another!!
Why do it?
"I don't care how many millions of dollars
you spend on hardware, if you don't have
people trained properly I'm going to get in
if I want to get in.”
Hacker, Cyberpunk Magazine
Organizations
AF Network Control Center
HQ
Firewall
Internet
AFNCC
•Controlled Connectivity
•Network Monitoring
AF NCC
• Single focal point for base network operations
• Performs fault, performance, configuration,
accounting, network and security management
• Monitors networks for suspicious activity
• Reports incidents, data, and technical problems
to MAJCOM and AFIWC
• Provides boundary protection, intrusion
detection, internal controls, recovery from
damages, and protection from denial of service
attacks
Air Force Computer Emergency Response Team
Indications
&
Warning
ASIM/Intrusion
Detection
JTF - CND
AFOSI
CERTs
AFNOC
Other
Incident Response/Recovery
Base Suspicious
Activity Reports
Threat
Team
Assessment
Teams
Countermeasures
Team
Automated Security Incident Measurement System
ASIM
Detect and identify network intrusive activity . . .
. . . in time to prevent impact on
Air Force Operations!
AF NETWORK TRAFFIC
5-7 Billion Events Annually
368 Million Suspicious Connections
ASIM Captured Event
ASIM Event Assessment
2.6 Million Transcripts
1.4 Million Transcripts Evaluated
Suspicious Event Reports
2474 SERs
Validate
AFCERT Analysis
Base Validation
71 Incidents
in 1999
False Positive
Denial of Service
5
2
Poor Security False Intrusions
5
3
User Intrusions
Root Intrusions
22
34
In 1999, hidden in 368 million suspicious connections on Air Force Networks
were 71 incidents that attempted to disrupt or exploit Air Force Operations!
On-Line Survey (OLS)
AFCERT Operations
Structured Threat
Close and
lock the front doors . . .
. . . to protect bases worldwide
...
Base POC
. . . against exploitation
and disruption!!
Unstructured Threat
On-Line Survey (OLS)
• Detect system vulnerabilities
• Assess base ability to identify and report
suspicious activity
• Advise MAJCOM/SC and commander of
results within a week of survey completion
• Encourage MAJCOMs and bases to
conduct surveys
• Exercise Air Force IP capabilities
Incident Response (IR)
Air Force Response Forces
AFCERT Incident Response (IR) Personnel
Countermeasure Engineering Team
Computer Security Engineering Team
Major Command Network Operations and Security Center (NOSC)
AF (Base) Network Control Centers
AF Office of Special Investigations
Attacker! Need Help!
Base
AFCERT
Attacker
Incident Response (IR)
•
•
•
•
Analyze unauthorized network activity
Confirm incident details with base
Notify AFOSI and DOD CERT
Develop and recommend course of action
 Secure and recover
Monitor base recovery
Remote recovery assistance
Deploy to assist base recovery
 Pursue
Fishbowl with law enforcement operations
Law enforcement operations only
AFCERT
Interfaces
Threat Support
Service CERTs
Information Warfare Flight
JTF-CND
AF Network Control Center
AF Major Command
DOD CERT
Standard Systems Group
CERT
AF Network Operations Center
AFOSI
FIRST
LEGEND
DOD
Air Force
Civilian
Summary
• Definition
• The Threat
• The Arsenal
• Defensive Measures
Download