Legal & Ethical Considerations of Offensive Cyber-Operations?



Similar documents
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Computer Security DD2395

7 Cs of WEB design - Customer Interface

Cybersecurity for the C-Level

Computer Security Literacy

CHAPTER 10: COMPUTER SECURITY AND RISKS

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Common Cyber Threats. Common cyber threats include:

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

JHSPH Acceptable Use Policy

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

BE SAFE ONLINE: Lesson Plan

How To Protect A Network From Attack From A Hacker (Hbss)

Promoting Network Security (A Service Provider Perspective)

"Cyber War or Electronic Espionage - Active Defense or Hack Back" David Willson Attorney at Law, CISSP Assess & Protect Corporate Information

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Security Threats on National Defense ICT based on IoT

24/7 Visibility into Advanced Malware on Networks and Endpoints

Detailed Description about course module wise:

FORBIDDEN - Ethical Hacking Workshop Duration

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

About Botnet, and the influence that Botnet gives to broadband ISP

Course Content: Session 1. Ethics & Hacking

Threat Events: Software Attacks (cont.)

Harmful Interference into Satellite Telecommunications by Cyber Attack

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FOUR. Principles of Cybersecurity.

Security A to Z the most important terms

GAO DEFENSE DEPARTMENT CYBER EFFORTS. DOD Faces Challenges In Its Cyber Activities. Report to Congressional Requesters

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Basic Computer Security Part 2

Denial of Service Attacks

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

How To Test For Security Protection

Defending Against Data Beaches: Internal Controls for Cybersecurity

11 NETWORK SECURITY PROJECTS. Project Understanding Key Concepts. Project Using Auditing and Event Logs. Project 11.3

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Data Management & Protection: Common Definitions

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Module 5: Analytical Writing

AASTMT Acceptable Use Policy

Current Threat Scenario and Recent Attack Trends

Top Ten Cyber Threats

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

EC Council Certified Ethical Hacker V8

ACCEPTABLE USE AND TAKEDOWN POLICY

Endpoint Security - HIPS. egambit, your defensive cyber-weapon system. You have the players. We have the game.

Hackers: Detection and Prevention

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

1 Introduction. Agenda Item: Work Item:

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

WHITE PAPER. Understanding How File Size Affects Malware Detection

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Certified Cyber Security Analyst VS-1160

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

1 Introduction. Agenda Item: Work Item:

Stopping zombies, botnets and other - and web-borne threats

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

October Is National Cyber Security Awareness Month!

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Loophole+ with Ethical Hacking and Penetration Testing

Computer Security Threats

EC-Council. Certified Ethical Hacker. Program Brochure

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Agenda , Palo Alto Networks. Confidential and Proprietary.

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Malware Trend Report, Q April May June

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Cybercrime in Canadian Criminal Law

Cyber Security Awareness. Internet Safety Intro.

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

COB 302 Management Information System (Lesson 8)

STATE OF CYBER SECURITY IN ETHIOPIA

Transcription:

Legal & Ethical Considerations of Offensive Cyber-Operations? David Willson Titan Info Security Group, LLC Ben Tomhave LockPath, Inc. Session ID: STAR-304 Session Classification: General Interest

David Willson, Attorney at Law

Ben Tomhave

Agenda Threat - A Brief Overview Recent Events What is a Cyber Weapon? an Offensive Cyber Response? Nation-State Response Corporate Response Pushing the Envelope 4

The Setup 5

Abstract Nations have the right - and in some cases obligation - to use cyberspace tools in an offensive manner to defend themselves. What about businesses, do they also have this right? This session will explore the legal and ethical issues surrounding the use of offensive cyberspace by both nations and corporations.

Learning Objectives Legal and ethical issues nations consider (at least the US) and corporations should consider when deciding whether or not to employ the use of offensive cyberspace. Recent attacks on nations and corporations. The decision and thought process the US uses to work through legal/ethical issues prior to using offensive cyberspace. Possible thought/decision process for corporations contemplating offensive cyberspace. Exposure to views from both sides of the spectrum on the legal and ethical use of offensive cyberspace.

Threat A Brief Overview Malicious Code A Case Example What can/should the US do? Image Source: http://www.flickr.com/photos/23905174@n00/1594411528/sizes/m/in/photostream/ 8

Recent Events High Profile

Recent Events Not-so-High Profile

Definitions 11

What Is a Cyber Weapon? Cyber weapons pose a significant threat to a nation's ability to protect itself and to wage war. They include: angle reflectors autonomous mobile cyber weapons backdoors in commonly used software defense shields against electronic attack electronic countermeasures false-target generators info-blockades worms sniffing spyware malware botnets key-loggers IP spoofing infrared decoys Trojan horses viruses rootkits spamming transient electromagnetic devices Source: www.technolytics.com/dept_of_ Cyber_ Defense.pdf

What Is a Cyber Weapon? Note: there are at least two other cyber weapons that are under development and classified. There are two key characteristics of a cyber weapon: versatility and propagation. Image Source: http://www.flickr.com/photos/1observatory/5206755959/sizes/m/in/photostream/

NATO Conf. on Cyber Conflict Definition 9. An information technology weapon, or shorter IT weapon, is an information technologybased system (consisting of hardware, software and communication medium) that is designed to damage the structure or operations of some other system(s).

NATO Conf. on Cyber Conflict Definition 10. A Cyber Weapon is an information technology based system that is designed to damage the structure or operations of some other information technology based system(s).

The Bottom Line A cyber weapon is: any tech tool used to deny, degrade, disrupt or destroy another s network, computer, or system, etc. A hammer is a hammer and a weapon it all depends on how it is used. Image Source: http://www.flickr.com/photos/thenationalguard/3586724830/sizes/s/in/photostream/

What is an Offensive Cyber Response? Cyber Attack A hostile act using computer or related networks and/or systems, and intended to disrupt and/or destroy an adversary's critical cyber systems, assets, or functions. The intended effects of cyber attack are not necessarily limited to the targeted computer systems or data themselves - for instance, attacks on computer systems which are intended to degrade or destroy infrastructure of C2 capability. A cyber attack may use intermediate delivery vehicles including peripheral devices, electronic transmitters, embedded code, or human operators. The activation or effect of a cyber attack may be widely separated temporally and geographically from the delivery. Source: DoD Intelligence Glossary

What is an Offensive Cyber Response? Offensive Cyberspace Operations Activities that, through the use of cyberspace, actively gather information from computers, information systems, or networks, or manipulate, disrupt, deny, degrade, or destroy targeted computers, information systems, or networks. This definition includes Cyber Operational Preparation of the Environment (C-OPE), Offensive Counter-Cyber (OCC), cyber attack, and related electronic attack and space control negation. Source: DoD Intelligence Glossary

Use of Force 19

Nation-State Use of Offensive Cyber Weapons Legal Issues: pretty straight forward. Issue of neutrality: Does the launching of an cyber attack from one nation to another violate the neutrality of all the nations it traverses? Ethical Issues: Is it ethical to launch/use an offensive cyber weapon? What if the cyber weapon is a virus or worm that is uncontrollable? Can anyone say STUXNET? Image Sources: http://www.flickr.com/photos/pincharrata/3672926041/sizes/t/in/photostream/ http://www.flickr.com/photos/paul_everett82/2833551397/sizes/s/in/photostream/

Corporate Response Legal Issues The Main Issue CFAA (in the US) and similar laws: Whoever intentionally accesses a computer without authorization or exceeds authorized access, and thereby... (must cause harm) Can we all agree it is illegal to gain unauthorized access to a computer we do not own or have not been given access to? Image Source: http://www.flickr.com/photos/ensh/6204837462/sizes/s/in/photostream/

Corporate Response Legal Issues (p2) Continuing the botnet theme What if you could put code on the phone-home function of the bot in your network and when it talks to its CnC server block the communication path essentially cutting the bot off from its master? Image Source: http://www.flickr.com/photos/caguard/5812224134/sizes/s/in/photostream/

Corporate Response - Questions Have you gained unauthorized access? Did you intentionally gain unauthorized access? What if the botnet was disrupted for some other reason and the code you embedded in the bot never went anywhere. Was the intent still there? What if other than blocking the communication path for this bot you did not cause any negative consequences for this CnC server? Image Source: http://www.flickr.com/photos/anhonorablegerman/5626502674/sizes/m/in/photostream/

Corporate Response Assumptions Pre-requisites You do not know where the CnC server is or who owns it! The bot in your network is persistent and causing damage or stealing data and, despite all attempts, you have not been able to rid yourself of it! You contacted LE and there was nothing they could do at this time! Illegal or Self-Defense? Image Source: http://www.flickr.com/photos/bill_lim/2710187651/sizes/m/in/photostream/

Ethical Issues Is placing embedded code on a bot ethical? Is it ethical to do this knowing it will access someone else s network and potentially have an impact on their system? Is it ethical for Ad companies and others to put cookies, adware, spiders, add-ons, spam, etc., on our machines? Is use of a virus or worm unethical simply due to their uncontrollable nature? Is it unethical to use a mirror to bounce a DDoS attack back on the originating site? Is it ethical for a social site to (MyLife.com) so post your name, address, past locations? Image Source: http://www.flickr.com/photos/11304375@n07/2769553173/sizes/m/in/photostream/

Pushing the Envelope Legal Issues: We know we can, but should we be pushing into the legal gray areas to defend ourselves? Gen. Alexander, US CYBERCOM: Active Defense = actively engaging in protecting your networks What s reasonable and proportional? Ethical Issues: Is it ethical to push into the gray areas? Have we basically tied our own hands legally when it comes to cyberspace? Image Source: http://www.flickr.com/photos/familymwr/5548053540/sizes/s/in/photostream/

Application 27

How to Apply This Talk The first three months: Understand your context Know your rights & responsibilities Within the year: Establish your own legal stance Codify your stance in policy Tool-up and train as appropriate * BLUF: Keep the discussion going! Image Source: http://www.flickr.com/photos/mcgraths/3248483447/sizes/m/in/photostream/ 28

Questions??

David Willson Attorney at Law david@titaninfosecuritygroup.com 719-648-4176 Ben Tomhave @falconsview ben.tomhave@lockpath.com www.lockpath.com Image Source: http://www.flickr.com/photos/fun_flying/340406105/sizes/m/in/photostream/