Cyber Jihad - Holyoke Community College

advertisement
Jeff Bardin
jbardin@treadstone71.com
www.treadstone71.com
Adjunct Professor, Cyber Intelligence, Cyber Counterintelligence, Cyber
Terrorism and Cybercrime
Utica College
Treadstone 71 LLC©
Cyber Intel – CC Market
Looking for Cyber Jihadists Like Cybercriminals Look for Your
Rapid Look at cyber intel exercise - web 2.0 and beyond
Looking at HCC
Closing
Treadstone 71 LLC©
Sophisticated
attacks designed
to use and
exploit as many
possible avenues
of attack / threat
vectors as
required to
succeed
•Uses people, process and technology
weaknesses
•Dynamic methods
•Focuses effort and emphasis on weakest
areas
•Human Intelligence (HUMINT)
•Information Security (INFOSEC)
•Communications Intelligence (COMINT)
•Signals Intelligence (SIGINT)
•Open Source Intelligence (OSINT)
•Cyber Intelligence (CYBINT)
•Culturonomics
Normally
clandestine
means to
consistently
gather
intelligence
Risk
assessment
based – path
of least
resistance
Treadstone 71 LLC©
Opportunistic
Only as sophisticated as it needs to be
Sophistication determined and dictated by
aggressors after intelligence gathering
Exploits technological vulnerabilities
•Repeatable process
•Metrics used (what gets measured gets
results)
•Exploits human vulnerabilities
•Uses denial and deception to obfuscate
•Remains hidden and resident
•Extracts information of value for
monetization, economic advantage,
strategic advantage
4
Treadstone 71 LLC©
Infiltration
Jeff Bardin
jbardin@treadstone71.com
www.treadstone71.com
Adjunct Professor, Cyber Intelligence, Cyber Counterintelligence, Cyber
Terrorism and Cybercrime
Utica College
Treadstone 71 LLC©
Treadstone 71 LLC©
http://www.onstrat.com/osint/
http://www.touchgraph.com/
http://www.paterva.com/
Treadstone 71 LLC©
‫دار الحرب‬
House of War
‫دار االسالم‬
House of Islam
Five Pillars of Islam (Arabic: )‫أركان اإلسالم‬is the
term given to the five duties incumbent on Economic Jihad
every Muslim. These duties are:
1) Shahadah (profession of faith)
2) Salat (ritual prayer five times each day)
3) Sawm (fasting during Ramadan)
4) Zakat (Islamic tax or tithing)
5) Hajj (Pilgrimage to Mecca at least once
during life).
6) Jihad
‫جهاد‬
Political Jihad
‫كافر‬
Salafi
‫السلفيه‬
Liberation ‫التحرير‬
Infidel
‫الجهاد االقتصادي‬
‫الجهاد السياسي‬
Intelligence Jihad
‫االستخبارات الجهاد‬
Subversive Jihad
‫التخريبيه الجهاد‬
Diplomatic Jihad
‫الجهاد الدبلوماسية‬
Treadstone 71 LLC©
Treadstone 71 LLC©
Treadstone 71 LLC©
Treadstone 71 LLC©
Treadstone 71 LLC©
Treadstone 71 LLC©
Arabic
English Translation
1
Allah ( )
The Greatest Name
2
Ar-Rahman (
3
Ar-Rahim (
4
Al-Malik (
5
Al-Quddus (
6
As-Salam (
7
Al-Mu'min (
8
Al-Muhaymin (
9
Al-Aziz (
)
The All-Compassionate
)
The All-Merciful
)
The Absolute Ruler
)
The Pure One
)
The Source of Peace
)
The Inspirer of Faith
) The Guardian
)
10 Al-Jabbar (
The Victorious
)
The Compeller
11 Al-Mutakabbir (
12 Al-Khaliq (
13 Al-Bari' (
)
The Greatest
The Creator
)
14 Al-Musawwir (
Treadstone 71 LLC©
)
The Maker of Order
)
The Shaper of Beauty
Treadstone 71 LLC©

Create Personas
 Create email addresses
 Document personas










Acquire pre-paid phones
Establish Twitter and Facebook
accounts to match personas
Setup IRC accounts to match
personas – unique nic
Human Intel
Cyber Intel
Open Source Intel
Need historical understanding
Need religious understanding
Need cultural understanding
Need linguistic understanding
Treadstone 71 LLC©
Treadstone 71 LLC©
Treadstone 71 LLC©
Cyber Intelligence
Jeff Bardin
jbardin@treadstone71.com
www.treadstone71.com
Adjunct Professor, Cyber Intelligence, Cyber Counterintelligence, Cyber
Terrorism and Cybercrime
Utica College
Treadstone 71 LLC©

Tools












Google.com (maps and search
engine)
Spokeo.com
Intellius.com
Yahoo.com
Paterva
Facebook.com
Myspace.com
LinkedIn.com
VisualCV.com
Treadstone71.com
▪ Bing
▪ Silobreaker
▪ Public Records (free sites, and those
available from ancestry.com)
▪ Social Networking sites: LinkedIn,
Classmates.com, Facebook, YouTube

Special OSINT tools
▪
▪
▪
▪

Methods
Web searches and sites
MaltegoCE
Web Data Extractor
TouchGraph SEO Browser
FOCA
HUMINT
▪ Phone calls and emails to known
associates and/or relatives

Social Engineering Attempts
 Online Search Engines
 Government Records Search
Treadstone 71 LLC©
An example – 27 minutes work
Jeff Bardin
jbardin@treadstone71.com
www.treadstone71.com
Adjunct Professor, Cyber Intelligence, Cyber Counterintelligence, Cyber
Terrorism and Cybercrime
Utica College
Treadstone 71 LLC©
Treadstone 71 LLC©
Jeff Bardin
jbardin@treadstone71.com
www.treadstone71.com
Adjunct Professor, Cyber Intelligence, Cyber Counterintelligence, Cyber
Terrorism and Cybercrime
Utica College
Treadstone 71 LLC©
Download