Uploaded by 1997htat

Why Threat Intel

advertisement
Why Threat Intelligence?
Dr. Darren Hayes
Agenda
•
•
•
•
Executive Branch
National Security Strategy (NSS)
Russian Intelligence
Chinese Espionage
• Congressional Legislation
What Does a National Security Strategy
Consist of?
• National Security Strategy Signed by President
• Strategic Direction of the Country
• Strategies to Deal with Security Threats
• Ways to Strengthen National Power
•
•
•
•
Diplomatic
Informational
Military
Economic
• Maintain Advantage Over Nation / Bloc of Nations / State Actor
National Defense Strategy
• Domains of Dominance Challenged
• Air, Land, Sea, Space & Cyberspace
• Threats from Adversaries
• Information Warfare
• Proxy Operations
• New Technologies will Change Warfare
•
•
•
•
Big Data
AI
Robotics
Autonomy
National Defense Strategy
• Non-state Threats
• Terrorists
• Organized Criminals
• Hackers
• National Security Innovation Base
• Academia
• Private Sector
• National Labs
Russian Intelligence: FSB
• Formerly known as The Dzerzhinsky Higher School of the KGB
• Educates Russian Intelligence for Careers with Federal Security
Service of Russian Federation (FSB)
• Eugene Kaspersky, Technical Faculty of FSB Academy
Russian Intelligence
• GRU (Intelligence Directorate of Russian Forces)
• Military Intelligence
• Cyber Espionage
• SVR (Foreign Intelligence Service)
• Equivalent of CIA / NSA or MI6 (British Security Intelligence Service)
• Center for Research of Military Strength of Foreign Countries
Russian Intelligence: SVR
•
•
•
•
Focused on Foreign Espionage
Based in Moscow
Works Closely with GRU
Conducts Electronic Surveillance
•
•
•
•
Military, Strategic, Scientific, Economic, Technology Espionage
Protect Russian Interests Abroad
Recruitment of Russians Living Abroad
1992 – Secret Intelligence Agreement with China
Robert Hanssen
• Born 1944
• Worked for the FBI
• Spied for Soviet & Russian Intelligence (1979 – 2001)
• Approached the GRU in 1979
• Compromised KGB Agents working for US Intelligence
• Disclosed Eavesdropping Tunnel Built by FBI under
Soviet Embassy in Washington DC
• 2001 – Arrested & Sentenced to 15 Life Sentences
Aldrich Ames
•
•
•
•
Born 1941
Worked with CIA
Became a KGB Double-Agent
Compromised US Assets in Russia
• Life in Prison without Parole
Aldrich Ames
•
•
•
•
Suspicion about Purchases with a $60,000 Salary
$540,000 house in Arlington, Virginia, paid for in cash
$50,000 Jaguar luxury car
Home remodeling and redecoration costs of $99,000
• Monthly phone bills exceeding $6,000, mostly calls by Ames's wife
to her family in Colombia
• Premium credit cards, on which the minimum monthly payment
exceeded his monthly salary
Maria Butina
• Infiltrated NRA
• 2018 – Pled Guilty to Espionage
• Pushed for Closer Ties with
Russia
Legislation - Espionage
• Espionage Act of 1917
• 18 USC § 792 et seq.
• Economic Espionage Act of 1996
• 18 U.S.C. § 1831 – 1839
• Section 1831 – Economic Espionage
• Section 1832 – Theft of Trade Secrets
• Arms Export Control Act (AECA)
• 22 U.S.C. 2778
Espionage Cases: USAF
•
•
•
•
Noshir Gowadia
B-2 Stealth Bomber Engineer
Sold Military Secrets to China
Sentenced to 32 Years
• Guilty on 14 Counts
• Communicating National Defense Information to Aid a Foreign Nation
• Arms Export Control Act
Espionage Cases: USAF
•
•
•
•
John Reece Roth
Sentenced to 48 Months
Violated Arms Export Control Act
Conspired to Export Technical Information Relating to a U.S. Air
Force to China
• Unmanned Aerial Vehicle (UAV) → Drone
Espionage Cases: NASA
• Dongfan "Greg" Chung
• Stole Restricted Technology & Trade Secrets
• Space Shuttle Program & Delta IV Rocket
• Sentenced to 16 Years in Federal Prison
• Found Guilty
• Conspiracy to Commit Economic Espionage
• 6 Counts of Economic Espionage to Benefit a Foreign Country
• Acting as an Agent of People’s Republic of China
China
• MPS – Domestic Intelligence
• MSS – HUMINT Operations
• Students, Diplomats, Businessmen, Scientists
• MID – HUMINT Relating to Technical Information
• Trade Shows
• Military
• People's Liberation Army (PLA) General Staff Department (GSD)
Third Department (A.K.A. 3PLA) ~ NSA
• SIGINT Ops
China – PLA Covert Espionage
•
•
•
•
Peoples Liberation Army
PLA General Staff Department (GSD)
Responsibilities:
HUMINT
• Theft & Intelligence
• SIGINT
• Phone Call Intercepts
• Launching Cyber Attacks
• ELINT
• Intercepting Satellite & Radar Communications
China – PLA Overt Espionage
•
•
•
•
Overseas Influence
Targets Influential People in Community
Overseas Chinese Affairs Office – Tracks Expats
Work with Tongs & Community Associations
• Work with Triads & OCGs
China – Financial Motivation
• 70% of Military Operating Expenses Covered by State Budget
• PLA Must Make Up Difference
• 2010 – 3,200 Military Front Companies Operating in USA
• Dedicated to IP Theft
• All Companies in China with 50+ Employees Required to Pay a
Chinese Communist Party Liaison
• Project 863
• Funding Available for IP Theft of US Technology
• Targets: Biotech, Energy, Telecom, Laser Tech, Space
China – Facilitating Espionage
• Study Abroad Programs
• Chinese Students in Foreign Universities
• Students Traveling to China
• http://www.theepochtimes.com/n3/968736-chinese-student-spiesoverwhelm-us/
• Foreign Recruits
• Front Companies
• Huawei & ZTE
• http://www.bloomberg.com/news/articles/2012-10-07/huawei-zteprovide-opening-for-china-spying-report-says
China
•
•
•
•
•
•
•
•
•
F-35
Cost = $400 bn
F-35 Helmet = $400k
Max. Speed = 1,119 mph
USA with Funding from UK, Italy, Australia, etc.
Chinese Hackers → Lockheed Martin
FC-31
Both Carry Guided & Unguided Missiles
Both Use Two Tracking Mirrors
China – OPM Breach
•
•
•
•
Office of Personnel Management (OPM)
5.6 Fingerprints Stolen
21.5 Million Social Security Numbers Stolen
SFS-86 Form Information Stolen
•
•
•
•
•
Applications for Security Clearance
127-Page Form
Arrests
Drug Use
Mental Illness
• CIA Officers in Beijing Pulled
China - Operation Iron Tiger
•
•
•
•
Cyber Espionage Attack on US Defense Contractors
Stole IP, Emails, Strategic Planning Documents
Group - Panda Emissary APT
Attacks on Unpatched Vulnerabilities
• Java (CVE-2011-3544 & CVE-2010-0738)
• Compromised 100+ Websites
• http://securityaffairs.co/wordpress/40199/cybercrime/operation-iron-tiger.html
Cybersecurity Information Sharing Act of 2015
• Obama Administration
• Permits Sharing of Internet Communications between Government
& Private Sector
• Cyber Threat Information Sharing
• Indemnification for Businesses
• https://www.congress.gov/bill/114th-congress/senate-bill/754
President Biden’s Executive Order
• President Signs Executive Order Charting New Course to Improve
the Nation’s Cybersecurity and Protect Federal Government
Networks
• https://www.whitehouse.gov/briefing-room/statementsreleases/2021/05/12/fact-sheet-president-signs-executive-order-chartingnew-course-to-improve-the-nations-cybersecurity-and-protect-federalgovernment-networks/
Questions
Download