Combating Corporate Espionage

advertisement
Espionage
&
The Law
Speakers
Jarrett Kolthoff, President / CEO
SpearTip
800.236.6550
jkolthoff@speartip.com
@SpearTipCyberCI
web: speartip.com
Jarrett Kolthoff, President / CEO of SpearTip, has 20 years of experience in
the Information Security field. As a former Special Agent – U.S. Army
Counterintelligence, he has experience in cyber investigations,
counterintelligence, and Fusion Cell analysis that assist SpearTip’s clients to
identify, assess, neutralize, and exploit threats leveled against their
corporation. His civil case work includes investigations in anti-trust
lawsuits, embezzlement, collusion, theft of intellectual property, and
corporate espionage. He has testified in civil cases as an expert computer
forensic witness in depositions in the U.S. Federal Court – Eastern District
of Missouri, and has acted as a liaison between companies and law
enforcement agencies.
 Board Member, National Forensic Science Technology Center (NFSTC)
 Adjunct Professor, Washington University in St. Louis – Cyber Security
Master’s Program
 Member, Association of Former Intelligence Officers (AFIO)
 Member, Espionage Research Institute International (ERII)
 Board Member & Past-President, St. Louis InfraGard Chapter
 Board Member & Past-President, St. Louis Chapter of the International
High Technology Crime Investigation Association (HTCIA)
Speakers
Shawn Tuma, Partner
BrittonTuma
469.635.1335
stuma@brittontuma.com
@shawnetuma
blog: shawnetuma.com
web: brittontuma.com
Shawn Tuma is a lawyer whose practice is focused on cutting-edge cyber and
information law and includes issues like helping businesses defend their data
and intellectual property against computer fraud, data breaches, hacking,
corporate espionage, and insider theft. Shawn stays very active in the cyber
and information law communities:
 Chair, Collin County Bar Association Civil Litigation & Appellate Law
Section
 College of the State Bar of Texas
 Privacy and Data Security Committee of the State Bar of Texas
 Computer and Technology, Litigation, Intellectual Property Law, and
Business Sections of the State Bar of Texas
 Information Security Committee of the Section on Science & Technology
Committee of the American Bar Association
 Social Media Committee of the American Bar Association
 North Texas Crime Commission, Cybercrime Committee
 International Association of Privacy Professionals
The information provided is for educational purposes only, does not constitute legal
advice, and no attorney-client relationship is created by this presentation.
Cyber Counterespionage
Competitive & State-Sponsored Threats
Outline
•
•
•
•
•
•
•
Emerging Threats / Market Analysis
Insider Threats
Malware Analysis
Fusion Cell Analysis
Espionage Case Studies
Computer Fraud & Abuse Act
Federal and Texas Law
5
Emerging Threats – Hacking Groups
Rapidly Emerging Underground
Industry (Several Examples Of
Successful Large Scale Operations)
• Organization: High
• Capability: High
• Intent
• “Hacktivisim”
• Financial / Political Gain
• Terrorist Organization Funding
6
U.S. DOJ – OIG Audit Division
April 2011
•
•
•
•
Compares Technical vs. Counterintelligence
Proper Use of Fusion Cell Analysis
Practical Experience Over Just Training
Intrusion Cases vs. Other Cyber Crimes
̶
Specialization – Forensics, Intrusion, Malware Analysis
7
Office of the National Counterintelligence Executive
•
Report to Congress on Foreign Economic / Industrial Espionage
̶
̶
̶
Governments of China & Russia
“Hacktivist” – Political & Social Agendas
Theft of Intellectual Property & Dual Use Technology
8
Forrester Research – Value of Corporate Secrets
• Current Data Security Strategies
̶
Identify the Most Valuable Information Assets
̶
Create a “Risk Register” – Compliance / Corporate Secrets
̶
Assess Balance Between Compliance & Protecting Secrets
• Establish Baseline
̶
Reprioritize Enterprise Security Investment
̶
Increase 3rd Party Vigilance
̶
Measure Effective – Key Performance Indicators (KPIs) and
“Audit the Auditor”
9
U.S. Intelligence Community
10
Insider Threat
NON-CYBER COLLECTION EFFORTS
•
Requests for Information (RFI). Foreign collectors make unsolicited direct and indirect requests for information
via personal contacts, telephone, e-mail, fax, and other forms of communication and often seek classified, sensitive, or exportcontrolled information.
•
Solicitation or Marketing of Services. Foreign companies seek entrée into US firms and other targeted
institutions by pursuing business relationships that provide access to sensitive or classified information, technologies, or
projects.
•
Conferences, Conventions, and Trade Shows. These public venues offer opportunities for foreign adversaries to gain access to
US information and experts in dual-use and sensitive technologies.
•
Official Foreign Visitors and Exploitation of Joint Research. Foreign government organizations,
including intelligence services, use official visits to US Government and cleared defense contractor facilities, as well as joint
research projects between foreign and US entities, to target and collect information.
•
Foreign Targeting of US Visitors Overseas. Whether traveling for business or personal reasons, US travelers
overseas—businesspeople, US Government employees, and contractors—are routinely targeted by foreign collectors, especially
if they are assessed as having access to some sensitive information.
•
Open Source Information. Foreign collectors are aware that much US economic and technological information is
available in professional journals, social networking and other public websites, and the media.
Fusion Cell Analysis
• Building Diverse Team – Tech/JD/GRC/Biz/Linguist
• HUMINT / Network & Host Forensic / OSINT / TSCM
• Combination of disk forensics and memory forensics can
paint a more complete picture.
• Time-Event Charts / Association Matrices / Link Analysis
• Analysis of Diverse Data – Mature Methodology
12
Malware Analysis
• Contains information that may not be found on disk
• Can locate keyloggers running on the system
• Can reveal malware that may not leave traces on disk
• Attackers making more use of “on the fly” memory
modifications to foil disk forensics and antivirus
• Lsass.exe was trying to talk within the network environment on
port 6666 (Process Injection)
13
Introduction
It has become the industry standard, and a
necessity for enterprises, to defend their external
perimeter with the latest firewalls and most
advanced intrusion prevention systems (IPS).
Although these devices play an important role in
any enterprise network, they all lack one crucial
capability and functionality:
Cyber Pre-Attack Intelligence
Cyber Threats
• SpearTip has identified a number of organizations,
consisting of loose networks of hackers, who
communicate through forums, social networks and
more established communities
• The following are individual analyses of the players
identified in the context of cyber-attacks against
financial institutions
Advanced Cyber Threat Detection - Analysis Summary
Cyber Counterintelligence provides the unique combination of up-todate malware-related threat intelligence gathered from live botnets,
correlated with an enterprise’s external IP addresses
•
•
•
•
•
•
•
•
Information Stealers
Worms
DDoS Malware
Remote Access Tools
Downloaders
Spammers
HTTP-Proxy Malware
Exploit Kits (Currently Active)
THE FOLLOWING INFORMATION WAS ETHICALLY COLLECTED WHILE CONDUCTING CYBER SOURCE OPERATIONS
ON THOUSANDS OF CRIMINAL NETWORKS.
Computer Fraud and Abuse Act
Federal Law – 18 U.S.C § 1030
17
Computer Fraud = Fraud 2.0
•
Deception, through the use of a computer
•
“old crimes committed in new ways … using computers
and the Internet to make the task[s] easier”
•
computer hacking, data theft, theft of money, breaches
of data security, corporate espionage, privacy breaches,
computer worms, Trojan horses, viruses, malware, denial
of service attacks
•
mouse and keyboard = modern fraudster tools of choice
18
Who knows the percentage of
businesses that suffered at least one act
of computer fraud in last year?
90%
(Ponemon Institute Study)
19
The CFAA says
has a processor or stores data
“the term ‘computer’ means an electronic, magnetic,
optical, electrochemical, or other high speed data
processing device performing logical, arithmetic, or
storage functions, and includes any data storage facility
or communications facility directly related to or
operating in conjunction with such device, but …”
IMPORTANT! “such term does not include an automated
typewriter or typesetter, a portable hand held calculator, or other
similar device;”
20
What about . . .
21
The Fourth Circuit says
“’That category can include coffeemakers,
microwave ovens, watches, telephones,
children’s toys, MP3 players, refrigerators,
heating and air-conditioning units, radios, alarm
clocks, televisions, and DVD players, . . . .”
-United States v. Kramer
22
The CFAA applies only to “protected” computers
This may limit the problem of applying it to
alarm clocks, toasters, and coffee makers – for
now?
Protected = connected to the Internet
Any situations where these devices are connected?
23
The CFAA access of or transmission to a
protected computer that is
 Without authorization, or
 Exceeds authorized access
24
Where the person accessing







Obtains information
Commits a fraud
Obtains something of value
Transmits damaging information
Causes damage
Traffics in passwords
Commits extortion
25
More Federal Laws for Combating Fraud 2.0
•
•
Electronic Communications Privacy Act - 18 U.S.C. § 2510
•
Wiretap Act ≠ intercept communications
•
Stored Communications Act ≠ comm. at rest
Fraud with Access Devices - 18 U.S.C. § 1029
•
•
devices to obtain passwords, phishing, counterfeit
devices, scanning receivers, drive through swipe cards
Identity Theft – 18 U.S.C. § 1028
26
Texas Laws for Combating Fraud 2.0
•
Breach of Computer Security Act (Tx. Penal Code § 33.02)
•
•
•
•
•
•
•
•
knowingly access a computer without effective consent of owner
Notification Required Following Breach of Security of
Computerized Data (Tex. Bus. Comm. Code sec. 521.053)
amended by SB 1610 (eff. 6/14/13)
Fraudulent Use or Possession of Identifying Info (TPC § 32.51)
Unlawful Interception, Use, or Disclosure of Wire, Oral or
Electronic Communications (TPC § 16.02)
Unlawful Access to Stored Communications (TPC § 16.04)
Identity Theft Enforcement and Protection Act (BCC § 48.001)
Consumer Protection Against Computer Spyware Act (BCC §
48.051)
Anti-Phishing Act (BCC § 48.003)
27
• Welcome to the world of Cyber Espionage
• CFAA is very broad and covers all kinds of
computer fraud (sometimes) – evolving!
• Data Breaches – be prepared – it will happen!
• Many other Federal and Texas laws also
available for combating computer fraud
• Cyber Insurance
28
Download