0 likes | 10 Views
The cyber threat landscape is evolving rapidly with increasing incidents of malware attacks, data breaches, and state-sponsored cyber warfare. Major events include hacks on US government data, power grids, and financial institutions, as well as ransomware and spyware threats. The Dark Web presents a platform for illicit activities, including the sale of contraband. Various actors engage in cyber activities ranging from lone wolves to nation-state organizations, posing serious risks to critical infrastructure, financial systems, and personal data security.
E N D
The threat gets worse before it gets better Ted Gordon 1 Smilax Dr Old Lyme, CT 06371 tedjgordon@gmail.com
US And China Seek Arms Deal For Cyberspace Active WordpressMalware Compromises Thousands Of Websites Huge Hack Of US Government Data Affected 21.5 Million Cyber Attack On U.S. Power Grid Could Cost $1 Trillion Silk Road Mastermind (Ross Ulbricht) Gets Life Prison Sentence Homeland Security Moves To Prevent Attack On Power Grid Zeus Malware Gang Take-down Hacker: 'Hundreds Of Thousands' Of Vehicles Are At Risk Of Attack China Acknowledges That It Has Units For War On Computer Networks Ransomware Porn App Takes Photos Of Users And Holds Phone Hostage White House Shoots Down Petition To Pardon Edward Snowden HeartbleedIs Far From Dead. 200,000+ Vulnerable Devices United (Airlines) Should Thank, Not Ban, Researcher Who Pointed Out A Major Security Flaw
Anthem Target Sony Neiman Marcus JPMorgan Chase Experian eBay Home Depot Department of Defense SCORE: about 100 million records
Relative Impact 12 Systems control WMD Principal Objectives Sabotage/espionage Theft 10 Blackmail Intimidation Surveillance Recruitment Terror 8 Money laundering Disruption 6 US China Russia N Korea UK Iran Israel Others Vandalism 4 Show prowess 2 Actors 0 Hackers Lone Wolves Terrorist Organized Crime Intel Org Nation State Orgs
Number Killed in a SIMAD Attack ? 16 14 12 10 Number of respondents 8 When a SIMAD Might Kill 100,000 or more 6 4 2 0 prior to 2015 2015-203 2030-20150 2050-2075 after 2075 or never www.lonewolfthreat.com
US Cyber Command Plan and conduct activities to defend specified DoD information networks Conduct military cyberspace operations to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. Assemble cyberspace resources and synchronize war-fighting to defend the information security environment
Well Known Activities Office of Personnel Mgmt data breech Stuxnet Attack on SONY to prevent “The Interview” MI 6 “cupcake caper” “Red October” data theft malware in Word and Excel DDoSin Estonia, Georgia, and Ukraine Cyber attacks on large banks US (NSA) China Russia N Korea UK Iran Israel Many others
Manifestos (many terrorists write them) Plans and Confessions (for various reasons Lone Wolves tell plans and confess their crimes) Recruitment, funding (Al Qaeda and ISIS are expert, use horror as a magnet) Cyber bullying (15% of all high school students last year) Encryption (now available to all) DIY Instructions (How to make a bomb in your Mom’s kitchen) Clandestine market places
DyreWolf discovered by IBM Cyber Security Target: people in specific companies using email attachments The malware activates when the user logs onto a bank website A fake screen says the bank’s site is temporarily down and offers instructions to call a phone number. A live “operator” answers with the name of the bank Users typically share their wire transfer details to withdraw funds The thieves then move the money to another bank to avoid detection On request for a download of a fake porno site to a smart phone Ransomware takes unauthorized photo of user Threatens a report to FBI, locks the phone Demands a “fine” of $500 Quoted from: http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype=WH&infotype=SA&htmlfid=SEW03073USEN&attachment=SEW03073USEN.PDF
Dark web’s Amazon: unregulated bazaar anything bought and sold, narcotics In three years 1,5 million purchases; called billion dollar marketplace Ross Ulbricht convicted of seven crimes including narcotics and conspiracy Sentenced to life http://www.wired.com/2015/02/silk-road-ross-ulbricht-verdict/
Hacking Viruses Trojan horses Denial of service Back doors Impersonation Purchasing contraband Of particular concern: Insertion of false information 3.6 million PC’s are said to be infected in the U.S. alone
Big targets (financial system, agriculture, electricity grid, frauds) Hacking automated autos, trucks, aircraft control, robots Consumer products: AI dolls and Internet of Things Spy devices, tiny cameras Facial recognition
Sting and honeypot operations Receiving information from informants Online surveillance: chat rooms, postings, email Tracking associates of known terrorists (including photos) Tracking purchases of poisons and bomb-making chemical Automated screening and synthesis of big data bases Third-party reporting of unusual behavior Psychological screening
Consider attacks on: control systems (e.g. Stuxnet) create risks for transport systems, public services (e.g. water, electricity, pipelines, industry, sanitation, agriculture) algorithms create risks for financial systems, funds transfer, equities markets, payment systems (e.g. social security) data bases result in lack of trust, social chaos, anarchy communications result in loss of command and control, diminished trust in news reporting, and government authority http://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/#summary
Potential will be recognized for: massive disruptions from non state actors threat of cyber lone wolves and SIMAD new cyber crime targets and anti-crime weapons New measures for dealing with cyber crime will be devised technical, military, and legal solutions automated screening and synthesis of big data bases to identify terrorists and possible attacks against people, data, or infrastructure. rewards for capture of cyber criminals (e.g. $3 m by FBI) International bilateral or multilateral agreements about cyber war http://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/#summary http://www.cnn.com/2015/02/24/politics/russi an-cyber-criminal-reward/ http://www.nytimes.com/2015/09/20/world/asia/us-and-china-seek-arms-deal-for-cyberspace.html?_r=0 The race between cyber offense and defense will intensify
Lone Wolf Terrorism Prospects and Potential Strategies to Address the Threat E-book: www.lonewolfthreat.com Paperback: www.amazon.com by Theodore J. Gordon, Co-Founder, The Millennium Project YairSharan, Director TAM-C/FIRST group, Co-Chair Israel MP Node Elizabeth Florescu, Director of Research, The Millennium Project