Russian Federal Security Service (FSB) Internet Operations Against Ukraine A TAIA GLOBAL REPORT
|
|
|
- Anastasia Logan
- 10 years ago
- Views:
Transcription
1 Russian Federal Security Service (FSB) Internet Operations Against Ukraine A TAIA GLOBAL REPORT
2 COPYRIGHT 2015 TAIA GLOBAL INC ALL RIGHTS RESERVED Russian Federal Security Service (FSB) Internet Operations Against Ukraine On 31 March 2015, Ukrainian Security Service officials stated that their Internet monitoring component assessed that the Russian Federal Security Service's (RF FSB) 16th Center and 18th Center were behind Internet propaganda efforts directed at Ukraine1. The efforts included bogus social media postings generated by FSB controlled trolls and pseudo news postings from ostensibly Ukrainian news sites. According to the Ukrainians, the Ukrainian news sites were actually Russian controlled and coordinated with actions by Russian directed anti-ukrainian activists. Ukrainian security officials stated that they had intercepted Internet communications between the activists and accounts attributed to Russian security services. Taia Global research supports the Ukrainian official's assessment. Political Background In February 2015, Russian newspaper Novaya Gazeta published excerpts from a February 2014 Russian Presidential Administration planning document allegedly discussing plans for Russia's takeover of Eastern Ukraine2. The document concluded that then Ukrainian President Yanukovich would fall from power with unacceptable political and economic repercussions for Russia. The document provided a strategic outline for bringing eastern Ukraine under Russian influence. The outline stressed a concurrent PR campaign that depicted Russian actions as forced by the legitimate aspirations of pro-russians in the south and east of Ukraine. The document stated that the campaign need include both Russian and Ukrainian media. Russian implementation of the plan included supplementing ongoing political influence and traditional media operations with Internet operations directed against Ukraine3. The Internet operations include a significant effort to corrupt social media postings with controlled posting generated by hired Internet trolls almost certainly directed by Russian security services. While frequently stilted and transparent, the trolls postings create confusion and disrupt opposition efforts to use social media to generate political momentum. Former trolls have been interviewed by foreign media including Radio Free Europe/Radio Liberty and provided detailed accounts of troll operating methods and conditions. Russian media, working with former trolls, have identified the trolls den at 55 Savushkina Street in St. Petersburg and published both exterior and interior photos. The trolls are provided written guidance with their activities directed by management personnel4. Russian and Western media also identified several Internet news sites including the Kharkov News Agency, Neva News, novorus.info, newsdon.info, and newslava.info claiming to be Ukrainian news sites. The sites consistently provide a pro-separatist slant to their reporting. Media investigations found their claimed locations to be mostly bogus although Neva News was traced to the same location as the trolls den at 55 Savushkina Street. On 15 March 2015, Ukrainian security officials stated their Internet monitoring activities linked these sites to assets controlled by Russian security, specifically fingering the FSB's 16th and 18th Centers Moscow Novaya Gazeta Online in Russian 24 Feb 15 3 See The Menace of Unreality: How the Kremlin Weaponizes Information, Culture, and Money by Peter Pomerantsev and Michael Weiss for a full discussion modern Russian propaganda operations. 4 Security services frequently use the paradigm of directing a large number of uncleared personnel by a small cadre of cleared personnel to rapidly augment existing capabilities.
3 55 Savushkina Street, Yandex Maps Globalvoiceonline.org Internet Architecture and the 16th and 18th FSB Centers The news sites Internet architecture supports the Ukrainian assessment. The domain name registrations for novorus.info, newsdon.info, and newslava.info were all obtained from Hong Kong based OnlineNIC with ownership protected. As of late April 2015, the sites were hosted at the same IP address on a server located in France. However, critical supporting architecture, such as the domain name servers (DNS), are located on AS the main enterprise network for the Russian search engine Yandex (see below). In short, the support architecture is located at the heart of the Russian Internet on servers closely monitored by Russian security services. The Russian can monitor anyone accessing the news sites and use their control of the DNS architecture to quickly relocate the sites if they are disrupted. Also, any attempt to attack the DNS supporting the sites would entail a conspicuous attack on Yandex with potentially serious effects that would affect ordinary Russians. The primary organization responsible for monitoring Yandex is the FSB 18th Center, the Information Security Center.
4 Robtex Record 27 April 2015 The FSB s Information Security Center (FSB ISC) also known as Military Unit (Vch) is the FSB s primary structure for counterintelligence operations involving Russia s internet infrastructure. FSB ISC operations include monitoring the Russian Internet RuNET and analyzing Internet content to identify threats. The FSB s Information Security Center was formed in 2002 when then FSB Director Nikolay Patrushev re-organized the Department of Computer and Information Security inherited from the Federal Agency for Government Communications and Information (FAPSI). The re-organization split some administrative and developmental functions transferring them to other FSB components including the Center for Communications Security; the Center for Licensing, Certification, and Protection of State Secrets; and the Scientific Technical Center while focusing FSB ISC on counterintelligence operations on the Russian Internet. According to archived directives posted on the FSB web site ( FSB ISC is also designated as an FSB expert investigative center performing forensic investigations for criminal prosecution. Russian Law authorizes FSB ISC to conduct legal investigations and take action against Russian citizens. FSB ISC works closely with the Russian Ministry of the Interior Directorate K responsible for cyber crime.
5 The FSB ISC headquarters is located on Butchers Street adjacent to main FSB headquarters on the Lubyanka. The Russian security services monitor Internet traffic using hardware and software installed at Russian Internet Service Providers (ISP), Internet access points, and Internet exchanges. The Internet monitoring system--known as SORM was first established in the 1990s. Despite some complaints by Russian ISPs, the system has evolved with RuNET and cooperation is mandated by Russian Law. FSB ISC HQ (Street View) Butchers Street No. 6/3 Google Earth According to Russian government tender documents and press reports, the FSB ISC began a major upgrade with contracts let during 2007 and The upgrade enhanced FSB ISC s ability to task the Internet monitoring system remotely and analyze collected information offline in a dedicated center located at the FSB ISC building on Butchers Street. The upgrade also enhanced FSB ISC nonattributable Internet operations. According to the Russian tender document, the new FSB ISC monitoring/analytic center was funded as part of the ongoing Electronic Russian Government project. The center incorporated the best technology available to achieve several tasks: ensure the information needs of concerned departments and organizations seeking necessary information in the Russian segment of the Internet; construct distributed systems to identify individuals carrying out terrorist activity or other events under the competence of the Federal Security Service of Russia; monitor information situation in the Russian segment of the Internet; identify key trends, and those other events of interest to users of the Russian-speaking Internet segment; provide retrospective and predictive analysis of information, events, fact-based content analysis
6 of Russian-speaking Internet segment; coordinate system development with information systems, located with the analytic divisions of the Russian FSB. The tender stated that the system would build on the existing monitoring and analytic systems installed at Russian ISPs with new equipment installed as needed. The center would exploit information from existing Russian search engines. The tender s language implied that access to search histories, site indexing and other data associated with search engines is already in place. The list included a reference to other unspecified sources that, in a security service context, normally refers to information obtained through covert intelligence collection. The tender specified that the center would include remote, and non-attributable, tasking of monitoring sensors. The center desired extensive automated initial processing and classification including geolocation of detected data for transfer to offline databases for further processing. The tender included detailed specification of the desired equipment by specifying that performance would at least equal the performance of well know western technical systems and software. In sum, the project would provide FSB ISC with a state-of-the-art monitoring/analytic center operating on the Russian Internet without attribution. In sum, any Internet operation originating in Russia are almost certainly monitored and probably overseen by the FSB ISC. Current Russian press covers Russian intentions to implement further restrictions on RuNet to counter foreign attempts to wage information warfare against Russian and ideologically subvert the Russian population. Whatever final form the new restrictions take, the FSB ISC will be heavily involved. The FSB 16th Center is the primary structure for Internet operations outside Russia. The Russia Federal Security Service (FSB) Center for Electronic Surveillance of Communications (TSRRSS) is responsible for the interception, decryption, and processing of electronic communications. The Center also known as the 16th Center (Directorate) FSB and Military Unit (Vch) is directly subordinate to the FSB Director. According to a 2004 unclassified history, the Soviet Committee for State Security (KGB) consolidated existing signals intelligence (SIGINT) activity in the KGB 16th Directorate in The 16th Directorate responsibilities included: Interception of foreign communications both legal and illegal inside the USSR; Location of foreign communication systems both legal and illegal inside the USSR; Decryption of intercepted communications; Technical penetration of foreign embassies and facilities both in the USSR and abroad; Interception of foreign government and military communications aboard; Clandestine audio surveillance aboard. In 1991, Russian President Yeltsin broke up the KGB transferring the 16th Directorate to the Federal Agency of Government Communications and Information (FAPSI) where it became the Main Directorate for Communications Systems Signals Intelligence (GURRSS). The KGB s 8th Main Directorate responsible for communications security also went to FAPSI, already responsible for running government communication networks.
7 In 2003, Russian President Putin disestablished FAPSI with many communications security and intercept functions going to the FSB. Responsibility for running government communication networks went to the re-organized Federal Protection Service (FSO). Currently named the FSB Center for Electronic Surveillance of Communications (TSRRSS), the Center is also called the 16th Center (Directorate) reflecting the Center s bureaucratic heritage. For cover purposes, the Center is Military Unit (Vch) The FSB 16th Center Vch operations are increasingly focused on the Internet as communications that formerly moved through the air shift to wired digital networks. Vch is registered with the European Internet authority RIPE as holding a block of IP numbers. The block is located on Autonomous System Number (AS12695) registered to a Russian Closed Joint Stock Company (JSC) Digital Network ( According to the RIPE database, JSC Digital Network is a major service provider hosting networks for an extensive list of government and private entities. JSC Digital Network also maintains a block of IP numbers for Vch 43753, the FSB Communications Security Center. RIPE registration data for JSC Digital Network lists their Network Operations Center (NOC) at Yaroslavskaya Street Number 13A. The contact information from the JSC Digital Network web site also lists that address. Taia Global mapped the address using Google and Yandex maps checking the address in English and Cyrillic. They both agreed on the location and agreed with the map on the JSC Digital Network web site. The building at that location, however, is not capable of supporting a NOC for a major Internet Service Provider (the building is across the street from the Alekseevskii Cathedral). The address could be the NOC s administrative office. The location of the NOC is unknown. Taia Global estimates that the NOC is actually at one of the major Moscow area data-centers. Russian government contract tender postings5 show Vch seeking additional Internet access through commercial vendors. A Google translation of the initial posting is shown below. The Vch contract was awarded to a small limited liability company NEO Print in Mytischi 5
8 northeast of Moscow. NEO Print's address tracks to a large apartment building in Mytischi6 northeast of Moscow, an area long associated with Russian defense industry. Taia Global doubts Vch Internet service are run through an apartment building and assesses that the contract is probably a cover mechanism. OOO NEO Print, Mytischi, Summer Street, d 24, Bldg 3 Google Earth While the FSB 16th and 18th Centers run Internet operation outside and inside Russia respectively, overall FSB operations against Ukraine are almost certainly run by the FSB Fifth Directorate. The Fifth Directorate's acknowledged role is preparing analytic reports for Russia's President and managing FSB relations with foreign intelligence services. However, Russian and foreign press articles allege that the Fifth Directorate's Department of Operational Information conducts intelligence gathering and influence operations in the near abroad. 7 Russian press, however, shows Fifth Directorate leaders attending memorial services for Fifth Directorate personnel killed in counter-terrorist operations indicating that the directorate's role includes more aggressive options. Ukrainian press shows the Ukrainians seeking to interview Colonel-General Beseda regarding FSB involvement in violent attempts to suppress the Maydan movement8. 6 The address was plotted in both Yandex and Google Maps. Some of the tender posts linked to the same map location. 7 The near abroad is Russia's term for those neighboring countries that, though now independent, formerly comprised the Union of Soviet Socialist Republics (USSR). Russia intelligence activities in the near abroad are conducted by the FSB, the Russian internal security service. Russian intelligence activities beyond the near abroad are conducted by the Foreign Intelligence Service (SVR). 8 Moscow Yezhednevnyy Zhurnal 13 Apr 14
Home Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
THE SECRET ACADEMY THAT ISN T SECRET It took years to find and arrest the Serbian war criminal Karadzic who was
THE SECRET ACADEMY THAT ISN T SECRET It took years to find and arrest the Serbian war criminal Karadzic who was smart enough to hide in full view. But it is even smarter not to hide at all. Millions of
Confrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
THE SECURITY SERVICE OF UKRAINE (SBU)
THE SECURITY SERVICE OF UKRAINE (SBU) Dr. Taras Kuzio (Centre for Political and Regional Studies, Canadian Institute for Ukrainian Studies, University of Alberta) Copyright: Research Institute for European
NATIONAL SECURITY DECISION MAKING FORMAL VS. INFORMAL PROCEDURES AND STRUCTURES
GENEVA CENTRE FOR THE DEMOCRATIC CONTROL OF ARMED FORCES (DCAF) WORKING PAPER NO. 123 NATIONAL SECURITY DECISION MAKING FORMAL VS. INFORMAL PROCEDURES AND STRUCTURES CASE STUDY 1 THE FORMER SOVIET UNION,
Ukraine Document Based Question (DBQ) Central Question: What is happening in Ukraine?
Ukraine Document Based Question (DBQ) Central Question: What is happening in Ukraine? Map of the Soviet Union and Eastern Europe during the Cold War: Located in Eastern Europe, Ukraine became a part of
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
NSA Surveillance, National Security and Privacy
NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM
Surveillance and Security Systems
Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
EAGLE EYE Wi-Fi. 1. Introduction
1. Introduction Internet access has become very popular by the emergence of broadband services, and busy yet unregulated Internet traffic causes challenges to administration and management. When it comes
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the
CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA
LAW ON MILITARY SECURITY AGENCY AND MILITARY INTELLIGENCE AGENCY I GENERAL PROVISIONS. Article 1
LAW ON MILITARY SECURITY AGENCY AND MILITARY INTELLIGENCE AGENCY I GENERAL PROVISIONS Article 1 This Law shall regulate competences, activities, tasks, authority, oversight and control of the Military
Corporate Spying An Overview
Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential
Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace
, pp.137-146 http://dx.doi.org/10.14257/ijseia.2014.8.9.11 Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace Jung ho Eom Military Studies, Daejeon University, 62 Daehakro,
Legal Issues / Estonia Cyber Incident
Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia
Global Information Society Watch 2014
Global Information Society Watch 2014 Communications surveillance in the digital age This report was originally published as part of a larger compilation, which can be downloaded from GISWatch.org Association
Offensive capabilities
Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and
2008 DIB CIP CONFERENCE MIAMI, FL April 9, 2008
1 2008 DIB CIP CONFERENCE MIAMI, FL April 9, 2008 INTELLIGENCE AND THREAT WARNING THE THREAT IS CORPORATE AMERICA IT IS ASYMMETRIC WARFARE 2 Annual Report to Congress: Foreign Economic Collection and Industrial
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES GERMANY September 2007 Kapitel 1 www.coe.int/gmt A. National policy 1. Is there a national policy
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
GOOD SECURITY IS A GROUP EFFORT
THE OFFICE OF SECURITY Operations Security (OPSEC) GOOD SECURITY IS A GROUP EFFORT Operations Security (OPSEC) "Even minutiae should have a place in our collection, for things of a seemingly trifling nature,
Secure Data Centers For America A SOLUTION TO
Secure Data Centers For America A SOLUTION TO A HOMELAND & NATIONAL SECURITY THREAT AGAINST CRITICAL INFRASTRUCTURE AND KEY RESOURCES IN STATE AND LOCAL GOVERNMENTS By Ralph R. Zerbonia and Universe Central
One Hundred Twelfth Congress of the United States of America
H. R. 515 One Hundred Twelfth Congress of the United States of America AT THE FIRST SESSION Begun and held at the City of Washington on Wednesday, the fifth day of January, two thousand and eleven An Act
MI5. www.mi5.gov.uk/careers Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.
Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff. MI5 Discretion is vital. You should not discuss your application, other than with your partner or a close
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
AT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
LEGAL AND ILLEGAL MONEY TRANSFERS AS RUSSIAN FOREIGN POLICY INSTRUMENTS
LEGAL AND ILLEGAL MONEY TRANSFERS AS RUSSIAN FOREIGN POLICY INSTRUMENTS FATIH OZBAY SENIOR FELLOW, CENTER ON FOREIGN POLICY AND SECURITY, HASEN FATIH OZBAY 128 Migrants who are mostly coming from former
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing
KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting
WHITE HOUSE OFFICE, OFFICE OF THE SPECIAL ASSISTANT FOR NATIONAL SECURITY AFFAIRS: Records, 1952-61 NSC Series, Briefing Notes Subseries
WHITE HOUSE OFFICE, OFFICE OF THE SPECIAL ASSISTANT FOR NATIONAL SECURITY AFFAIRS: Records, 1952-61 NSC Series, Briefing Notes Subseries CONTAINER LIST Box No. Contents 1 AEC--Policy on Use of Atomic Weapons
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.
TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
Confrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have
Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the
Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc. Before the U.S. House of Representatives Committee on Science, Space, and Technology
Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006)
Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting (Moscow, 15-16 June 2006) At their meeting in Moscow on 15-16 June 2006 the G8 Justice and Home Affairs Ministers
Measures for Security Protection Administration of the International. Networking of Computer Information Networks
Measures for Security Protection Administration of the International Networking of Computer Information Networks Full text Chapter I General Provisions Chapter II Security Protection Liability Chapter
KUDELSKI SECURITY DEFENSE. www.kudelskisecurity.com
KUDELSKI SECURITY DEFENSE Cyber Defense Center connection for remote information exchange with local monitoring consoles Satellite link Secure Data Sharing, a data-centric solution protecting documents
Vulnerabilities in the U.S. Passport System Can Be Exploited by Criminals and Terrorists
Statement of Michael Johnson Former Special Agent in Charge, Miami Field Office, Diplomatic Security Service United States Department of State Before the U.S. Senate Homeland Security and Governmental
Addressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN)
MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN) Brief presentation of the program: The training covers specialized courses in sciences for risk, geopolitics and security, environmental and
Enterprise Security Platform for Government
Enterprise Security Platform for Government Today s Cybersecurity Challenges in Government Governments are seeking greater efficiency and lower costs, adopting Shared Services models, consolidating data
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
James R. Clapper. Director of National Intelligence
Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide
U.S. Department of Justice
U.S. Department of Justice Federal Bureau of Investigation Office of the Director Washington, D.C. 20535-0001 February 1,2013 The Honorable Barbara A. Mikulski Chairwoman Senate Appropriations Committee
Computer Facilitated Crimes Against Children International Law Enforcement Training
Computer Facilitated Crimes Against Children International Law Enforcement Training The Computer Facilitated Crimes Against Children training seminar was designed to provide law enforcement around the
A Detailed Strategy for Managing Corporation Cyber War Security
A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait [email protected] ABSTRACT Modern corporations
Oversight of Russia s Intelligence and Security Agencies
Oversight of Russia s Intelligence and Security Agencies The Need for and Prospects of Democratic Control PONARS Policy Memo 281 Mark Kramer Harvard University October 2002 For a brief while after the
Research Note Engaging in Cyber Warfare
Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines
Foreign Ministry archives services of the European Union MEMBER STATES CZECH REPUBLIC
Foreign Ministry archives services of the European Union MEMBER STATES CZECH REPUBLIC 1. Full title of Ministry and of archives service Ministry of Foreign Affairs of the Czech Republic. Archives of the
Natalya Ryabinska New media and democracy in post Soviet countries
Natalya Ryabinska New media and democracy in post Soviet countries As the use of the Internet in the post Soviet space continues to evolve, Natalya Ryabinska shows how tools of control, surveillance and
RUAG Cyber Security. More security for your data
RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making
Cyber Operations at Maidan: A First-Hand Account
Cyber Operations at Maidan: A First-Hand Account by Glib Pakharenko Chapter 7 in Kenneth Geers (Ed.), Cyber War in Perspective: Russian Aggression against Ukraine, NATO CCD COE Publications, Tallinn 2015
Estonia 2007 Cyberattakcs
Estonia 2007 Cyberattakcs 2010 Agenda Background April 2007 What is cyberattack Estonia as an information society Cyberattacks Protection measures used Lessons learned What are we doing - measures Background
Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
18th Annual Space & Missile Defense Symposium IAMD Evolution and Integration/Key Topic: Predictive Cyber Threat Analysis Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY
Historical Legacies and Law Enforcement in Russia
Historical Legacies and Law Enforcement in Russia PONARS Eurasia Policy Memo No. 150 May 2011 Brian D. Taylor Syracuse University The Russian militia has been consigned to the dustbin of history, replaced
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
Jagello 2000. Hybrid Warfare: A New Phenomenon in Europe s Security Environment
Jagello 2000 Hybrid Warfare: A New Phenomenon in Europe s Security Environment Road to WARSAW SECURITY FORUM 2015 1. Hybrid warfare as a concept The war in Clausewitz s concept is seen as a continuation
Threat Advisory: Accellion File Transfer Appliance Vulnerability
Threat Advisory: Accellion File Transfer Appliance Vulnerability Niara Threat Advisories provide timely information regarding new attacks along with how Niara helps companies quickly detect an attack to
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
RUSSIA CHINA NEXUS IN CYBER SPACE
RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest
The FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
Although the dominant military confrontations of the 20 th century were centered on the
To what extent were the policies of the United States responsible for the outbreak and development of the Cold War between 1945 and 1949? Although the dominant military confrontations of the 20 th century
COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA
COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA 09/1 8/2009 version UNCLASSIFIED//FOR OFFICIAL USE ONLY Cl VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA DEFINING COUNTERINTELLIGENCE
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
Hybrid Warfare & Cyber Defence
Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
