Jeff Bardin jbardin@treadstone71.com www.treadstone71.com Adjunct Professor, Cyber Intelligence, Cyber Counterintelligence, Cyber Terrorism and Cybercrime Utica College Treadstone 71 LLC© Cyber Intel – CC Market Looking for Cyber Jihadists Like Cybercriminals Look for Your Rapid Look at cyber intel exercise - web 2.0 and beyond Looking at HCC Closing Treadstone 71 LLC© Sophisticated attacks designed to use and exploit as many possible avenues of attack / threat vectors as required to succeed •Uses people, process and technology weaknesses •Dynamic methods •Focuses effort and emphasis on weakest areas •Human Intelligence (HUMINT) •Information Security (INFOSEC) •Communications Intelligence (COMINT) •Signals Intelligence (SIGINT) •Open Source Intelligence (OSINT) •Cyber Intelligence (CYBINT) •Culturonomics Normally clandestine means to consistently gather intelligence Risk assessment based – path of least resistance Treadstone 71 LLC© Opportunistic Only as sophisticated as it needs to be Sophistication determined and dictated by aggressors after intelligence gathering Exploits technological vulnerabilities •Repeatable process •Metrics used (what gets measured gets results) •Exploits human vulnerabilities •Uses denial and deception to obfuscate •Remains hidden and resident •Extracts information of value for monetization, economic advantage, strategic advantage 4 Treadstone 71 LLC© Infiltration Jeff Bardin jbardin@treadstone71.com www.treadstone71.com Adjunct Professor, Cyber Intelligence, Cyber Counterintelligence, Cyber Terrorism and Cybercrime Utica College Treadstone 71 LLC© Treadstone 71 LLC© http://www.onstrat.com/osint/ http://www.touchgraph.com/ http://www.paterva.com/ Treadstone 71 LLC© دار الحرب House of War دار االسالم House of Islam Five Pillars of Islam (Arabic: )أركان اإلسالمis the term given to the five duties incumbent on Economic Jihad every Muslim. These duties are: 1) Shahadah (profession of faith) 2) Salat (ritual prayer five times each day) 3) Sawm (fasting during Ramadan) 4) Zakat (Islamic tax or tithing) 5) Hajj (Pilgrimage to Mecca at least once during life). 6) Jihad جهاد Political Jihad كافر Salafi السلفيه Liberation التحرير Infidel الجهاد االقتصادي الجهاد السياسي Intelligence Jihad االستخبارات الجهاد Subversive Jihad التخريبيه الجهاد Diplomatic Jihad الجهاد الدبلوماسية Treadstone 71 LLC© Treadstone 71 LLC© Treadstone 71 LLC© Treadstone 71 LLC© Treadstone 71 LLC© Treadstone 71 LLC© Arabic English Translation 1 Allah ( ) The Greatest Name 2 Ar-Rahman ( 3 Ar-Rahim ( 4 Al-Malik ( 5 Al-Quddus ( 6 As-Salam ( 7 Al-Mu'min ( 8 Al-Muhaymin ( 9 Al-Aziz ( ) The All-Compassionate ) The All-Merciful ) The Absolute Ruler ) The Pure One ) The Source of Peace ) The Inspirer of Faith ) The Guardian ) 10 Al-Jabbar ( The Victorious ) The Compeller 11 Al-Mutakabbir ( 12 Al-Khaliq ( 13 Al-Bari' ( ) The Greatest The Creator ) 14 Al-Musawwir ( Treadstone 71 LLC© ) The Maker of Order ) The Shaper of Beauty Treadstone 71 LLC© Create Personas Create email addresses Document personas Acquire pre-paid phones Establish Twitter and Facebook accounts to match personas Setup IRC accounts to match personas – unique nic Human Intel Cyber Intel Open Source Intel Need historical understanding Need religious understanding Need cultural understanding Need linguistic understanding Treadstone 71 LLC© Treadstone 71 LLC© Treadstone 71 LLC© Cyber Intelligence Jeff Bardin jbardin@treadstone71.com www.treadstone71.com Adjunct Professor, Cyber Intelligence, Cyber Counterintelligence, Cyber Terrorism and Cybercrime Utica College Treadstone 71 LLC© Tools Google.com (maps and search engine) Spokeo.com Intellius.com Yahoo.com Paterva Facebook.com Myspace.com LinkedIn.com VisualCV.com Treadstone71.com ▪ Bing ▪ Silobreaker ▪ Public Records (free sites, and those available from ancestry.com) ▪ Social Networking sites: LinkedIn, Classmates.com, Facebook, YouTube Special OSINT tools ▪ ▪ ▪ ▪ Methods Web searches and sites MaltegoCE Web Data Extractor TouchGraph SEO Browser FOCA HUMINT ▪ Phone calls and emails to known associates and/or relatives Social Engineering Attempts Online Search Engines Government Records Search Treadstone 71 LLC© An example – 27 minutes work Jeff Bardin jbardin@treadstone71.com www.treadstone71.com Adjunct Professor, Cyber Intelligence, Cyber Counterintelligence, Cyber Terrorism and Cybercrime Utica College Treadstone 71 LLC© Treadstone 71 LLC© Jeff Bardin jbardin@treadstone71.com www.treadstone71.com Adjunct Professor, Cyber Intelligence, Cyber Counterintelligence, Cyber Terrorism and Cybercrime Utica College Treadstone 71 LLC©