CSEC Cyber Threat Capabilities



Similar documents
CLASSIFICATION: TOP SECRET // COMINT // REL FVEY

Advanced Threat Protection with Dell SecureWorks Security Services

CSEC SIGINT Cyber Discovery Summary of the current effort

Bio-inspired cyber security for your enterprise

The Comprehensive National Cybersecurity Initiative

Cyber Watch. Written by Peter Buxbaum

Next Generation IPS and Reputation Services

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

Defending Against Cyber Attacks with SessionLevel Network Security

Covert Operations: Kill Chain Actions using Security Analytics

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

DYNAMIC DNS: DATA EXFILTRATION

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Network Based Intrusion Detection Using Honey pot Deception

Comprehensive Advanced Threat Defense

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

McAfee Network Security Platform

Unified Security, ATP and more

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Network Security Deployment (NSD)

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

POLIWALL: AHEAD OF THE FIREWALL

Swordfish

POLIWALL: AHEAD OF THE FIREWALL

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

RETHINK SECURITY FOR UNKNOWN ATTACKS

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

How To Create An Insight Analysis For Cyber Security

Fighting Advanced Threats

Introducing IBM s Advanced Threat Protection Platform

Cisco Security Intelligence Operations

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Persistence Mechanisms as Indicators of Compromise

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

BlackRidge Technology Transport Access Control: Overview

CALNET 3 Category 7 Network Based Management Security. Table of Contents

AMPLIFYING SECURITY INTELLIGENCE

Careers in Cyber Operations. Defence Signals Directorate

Content Security: Protect Your Network with Five Must-Haves

Spear Phishing Attacks Why They are Successful and How to Stop Them

[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks

SecurityDAM On-demand, Cloud-based DDoS Mitigation

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

integrating cutting-edge security technologies the case for SIEM & PAM

Cyber Situational Awareness for Enterprise Security

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

The Future of the Advanced SOC

Advanced Threats: The New World Order

The Cyber Threat Profiler

Cybersecurity Delivering Confidence in the Cyber Domain

ADVANCED KILL CHAIN DISRUPTION. Enabling deception networks

Denial of Service Attacks and Resilient Overlay Networks

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IBM SECURITY QRADAR INCIDENT FORENSICS

CyberReady Solutions. Integrated Threat Intelligence and Cyber Operations MONTH DD, YYYY SEPTEMBER 8, 2014

IBM QRadar Security Intelligence April 2013

HOW LOOKOUT S PREDICTIVE SECURITY UNMASKED A MOBILE THREAT

Hunting for the Undefined Threat: Advanced Analytics & Visualization

Security strategies to stay off the Børsen front page

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Carbon Black and Palo Alto Networks

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

IBM Advanced Threat Protection Solution

Providing Secure IT Management & Partnering Solution for Bendigo South East College

A New Perspective on Protecting Critical Networks from Attack:

Analysis of Network Beaconing Activity for Incident Response

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Open Source Software for Cyber Operations:

Hillstone Intelligent Next Generation Firewall

WhatWorks in Detecting and Blocking Advanced Threats:

Network Security Monitoring: Looking Beyond the Network

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Using SIEM for Real- Time Threat Detection

Intrusion Detection Systems

Cisco IPS Tuning Overview

Anti-Malware Technologies

SPEAR PHISHING UNDERSTANDING THE THREAT

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Chapter 9 Firewalls and Intrusion Prevention Systems

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Cyber and Operational Solutions for a Connected Industrial Era

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Click to edit Master title style

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Bridging the gap between COTS tool alerting and raw data analysis

DPI and Metadata for Cybersecurity Applications

Radware s Attack Mitigation Solution On-line Business Protection

Transcription:

1*1 Communications Security Centre de la sécurité T 0 P SECRET//COMINT//REL TO FVEY CSEC Cyber Threat Capabilities SIGINT and ITS: an end-to-end approach Préserver la sécurité du Canada par la supériorité de l'information Canada

T O p Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY " ~ 'jii'wwbmmmmml^m '''' iihliih WB'il'm" IBIIIi'l Cyber Security What do we mean by Cyber? - Detection / Discovery and Tracking of State-Sponsored Hacking - Counter-intelligence Reporting / Mitigation Advice and Defence against Cyber Threats SIGINT Detects Cyber Activity - Access Canadian and Allied collection to discover and track covert networks (counter-intelligence) IT Security Defends against Cyber Activity - Sensors Government of Canada networks to identify malicious activity and enhance defences Préserver la sécurité du Canada par la supériorité de l'information Canada

I ^ I Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY Comprehensive Cyber Capabilities Processing and Enrichment Protocol Analysis Crypt Attack Selection and Filtering Data Repositories Intelligence Canada Internet 0 Network Analysis Cyber Analysis Counter Intelligence Knowledge Transfer Threat Evaluation Canada

I ^ I Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY H.. ~~~ ' The Grand Challenge - Detection EONBLUE is the cyber threat detection sensor developed and deployed in SIGINT and ITS - Cyber threat tracking (signature-based detection) - Cyber threat discovery (anomaly-based detection) A 6+ year effort that incorporates the best of breed detection algorithms/technology in collaboration with our 5-eyes partners - Based on classified knowledge - Scales to major ISP network speeds (10G) - Enables rapid prototyping to adapt to ever changing threats Préserver la sécurité du Canada par la supériorité de l'information Canada

^ Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P The Cyber Landscape Adversaries and Targets - Operate globally - Varying degrees of sophistication - Constantly changing tools and techniques Detection / Discovery - Tools must operate at all network speeds - Deep Packet Inspection at scale - Targeting tradecraft / protocols vs. individuals - We must live' in cyber space Préserver la sécurité du Canada par la supériorité de l'information Canada 5

1*1 Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P Vhihí Why is Cyber Critical? «Nodong Missile Range: 1300km fi Type: Ballistic h Korea Taepodong Missile Range: 2900km Type: Multistage Pay load: Nuclear Desktop PC Range: Type: IBM Pay load: DDoS Cost: 500$

^ Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T O P Working in Cyber Space Tools must adapt constantly / quickly - Signature based targeting - Metadata analytics - Custom tradecraft for discovery Would I do a better job from my PC at home? - Enhance / Enable collaboration - Adopt Internet technologies on our Classified networks SKYPE / Web 2.0 / Video Chat / Google Apps / etc - Centralize our 'cyber' analytics CyberDMZ Préserver la sécurité du Canada par la supériorité de l'information Canada

^ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY m u i : WÊÊÊÊÊÊÊÊÊÊaËgB^rnnr rri " SEEDSPHERE - Discovery EONBLUE anomaly detection utilities isolate network anomalies - Discover network beacons in Warranted full-take collection Knowledge developed is shared with CNE - During CNE activities, implant is found to be cohabitating - Implant is copied to CSEC HQ for reverse engineering IT Security detects SEEDSPHERE attacks against Government of Canada weekly Préserver la sécurité du Canada par la supériorité de l'information Canada

^ Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T O P Repositories - At Collection Site Global Access is pushing tradecraft to the front-end of access - 50 terabytes of high speed storage - Processing over 125GB/hour of HTTP metadata Cluster throughput (File system) 400 Mb& 06/11 06/14 06/16 06/18 06/21 06.-23 06/26 Inbound Outbound 09/1? 08/14 06/15 06/16 06/17 06/14 06/19 06/20 08/21 06/22 08/23 06/24 06/25 Black Line: Total data into the Cluster "Blue Line: Data Outbound from SAN 08/11 06/14 06/16 06/18 06.121 06/23 06/25 Data deduplication at sight results in much > system. u S er Total better use of limited bandwidth Préserver la sécurité du Canada par la supériorité de l'information Data into the cluster is balanced across multiple nodes. Each color denotes a separate node, automatically dividing the load amongst all systems Canada

Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY Cyber Repositories In 2009 an average of 112,794 IP traffic items related to cyber threat collected each day from Canadian and Allied sources Traditional SIGINT sources prove invaluable in cyber threat analysis - Travel Tracking Databases used to attribute CNE activity along with SMS collection IT Security domestic sensors store 300TB of full-take - Equivalent to 'months' of traffic - Enables historical analysis and anomaly detection In 2009 IT Security domestic sensors enable 95 mitigation actions Préserver la sécurité du Canada par la supériorité de l'information Canada 10

1 * 1 Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P WÊÊÊmm F: Network Analysis I497j IIJ Internet Initiative Japan Inc. NRCNET-AS -NätiDnä- ResearchCouncil ofcanada SAWIS - Sawis NAP-THREE -RA-NflP DNDCFNEÎ'2 Department of NationalDefence/DISEM

1 * 1 Communications Security Establishment Canada T 0 P Centre de la sécurité SECRET//COMINT//REL TO FVEY des télécommunications Canada Cyber Analysis Préserver la sécurité du Canada par la supériorité de l'information Canada

1 * 1 Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P Mitigation Direct protection of GC systems and information M Government of Canada Cleanup / Strengthen - Prevention and response activity 4 u c <D o - Leverage SIGINT and 5 Eyes intelligence, complemented by our own GC domestic sensor capabilities Systems of Importance - Report: Actionable technical mitigation reports provided to client's IPC Cyber threat situational awareness reports provided to departments - CSEC review of incidents against systems of importance - CSEC analysts deployed to capture technical evidence to develop/support mitigation activity - CSEC information is merged with all-source cyber threat activities to create complete picture of cyber threats Préserver la sécurité du Canada par la supériorité de l'information Canada

I ^ I Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY Positioning for the future Today from RESPONSE to ACTION Tommorrow Préserver la sécurité du Canada par la supériorité de l'information V_ydX lcxcld,

1 ^ 1 Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P I Synchronized SIGINT / ITS Mission Space

1 * 1 Communications Security Establishment Canada Centre de la sécurité T0P SECRET//COMINT//RELTOFVEY TOP SECRET//COMINT//REL TO FVEY des télécommunications Canada Situational Awareness ZZZZ3 SA is: - The perception of environmental elements within a volume of space and time The comprehension of their meaning Projection of their status in the near future Insight - the capacity to understand hidden truths In the Cyber Context: - Gathering and enabling access to cyber information Event Metadata / Event Content / Near Real-Time Exchange - Data mining of cyber information to create understanding in broader context - Predict our adversaries actions based on this knowledge " oo, ; vsi ii^v&v^ OO! 1 oo -- ' V^'oÎVIÎ.^»" 1 -'*» N. 1 oni ~ ~,* "rp.vlîsf ÏJ # i-* VùWiMÊn / i ir* w y v * Préserver la sécurité du Canada par la supériorité de l'information Canada

1 * 1 Communications Security Centre de la sécurité TOP SECRET//COWHNT//REL TO FVEY Cyber Session Collection : Victim Computer CNE Actor Canada

m.m Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY H H M H I I M ' ^ Enabled by Sydney Resolution ITS Event Store f ITS Analyst ; \, Photonic Prism y EONBLUE NRT Alerting Engine Decision Logic SIGINT Analyst SIGINT Store Préserver la sécurité du Canada par la supériorité de l'information Canada 18

ZLTZZ Tipping and Cueing (Why) SIGINT - data volumes/network speeds impose severe temporal restrictions on collection (use it or lose it) - ability to extend cyber target tracking across all 5-Eyes accesses and/or analytic event stores instead of just domestic - global aperture - ability to uncover covert overlay networks - cyber session collection? Uncover tradecraft/binaries/exploit vectors... CND - network edge vs. network core (microscope vs. telescope) - enable mitigation of cyber exploitation and/or attack (dynamic defence) - facilitate indications and warning - can SIGINT provide me with the true threat picture in NRT? Could we detect "test firing" of new tools/techniques? - collaborative defence - can my partners see malicious activity in SIGINT against networks I need to protect? Can they tell me in NRT? Préserver la sécurité du Canada par la supériorité de l'information Canada 19

^ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY SIGINT -> ITS Tipping Sample of CNO tips provided to ITS from SIGINT SSO on May 05, 2010. DS800 SEEDSPHERE DS800 SEEDSPHERE DS800 SEEDSPHERE DS800 SEEDSPHERE DS800 SEEDSPHERE DS800 SEEDSPHERE DS800 SUPERDRAKE DS800 SEEDSPHERE DS800 SUPERDRAKE DS800I SEEDSPHERE The Network Name is: The Network Name is: The Network Name is: The Network Name is: The Network Name is: Canadian house of commons environment Canada federal office of regional development (quebec) forestry Canada public works and government services Canada Préserver la sécurité du Canada par la supériorité de l'information

^ Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T O P Dynamic Defense All elements acting as one Defence at: - Network Edge (ITS) Localized/tailored mitigation (e.g. blocking, binary neutering, redirection) Focused response to ongoing and potential threats - Network Core (SIGINT) Global mitigation possible (e.g. redirection, null routing, filtering) Large scale (but still focused!) response to ongoing and potential threats - Adversary Space (CNE) Reconnaissance - probe/explore/learn adversarial network space Co-habitate covert network infrastructure for info gathering, tool extraction, etc Préserver la sécurité du Canada par la supériorité de l'information Canada

1*1 Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P CNE/CNA Cyber Activity Spectrum SECRET//COMINT CNE Implant OPSEC Monitoring CNE Pursuit - Recover Binarles / etc - CNE Pursuit - implant Adversary Infrastructure - CNE Insertion CNE Disruption - Control Adversary Infrastructure - CNE Disruption - Disable Adversary Infrastructure - CNA - Destroy Adversary infrastructure - Deception Techniques DARKSPACE Leverage SSO for I&W - Honey Token - Deploy In GoC / Track In SIGINT - Honeypot - Deploy in GoC / Track in SIGINT - Honey net - Deploy in GoC / Track in SIGINT - False Flag Operations - create unrest - Effects - Alter adversary perception - Passive SIGINT Techniques Network Monitoring (Tracking Known) - international - Network Monitoring (Discovery) - international No 2-End CDN Rlter Network Monitoring (Tracking Known) - domestic - Network Monitoring (Discovery) - domestic - O o 3 Dynamic Defence Technologies In-line IP Blacklisting Domain Name System Control (redirection / disruption / etc) Traffic Alteration (inbound i.e. Neuter malware) Traffic Redirection (Inbound I.e. quarantine traffic) Traffic Alteration (outbound i.e. insert malware) Host Based Defence O Red Teaming Defensive Implant (OPSEC Monitoring) Network Monitoring Techniques Network Monitoring (Tracking Known) Network Monitoring (Discovery) QRC (Lightweight Network Sensor) Commercial / Industry / Relationships Dept Resp Commercial Defence (Anti-Virus / Firewall / ETC) Influence Technology (provide Signature to AV) Supply Chain Political Demarche Defensive Operation Passive Operation Active Operation

1*1 Communications Security Centre de la sécurité T 0 P SECRET//COMINT//REL TO FVEY : HHBHI Dynamic Defense Scenarios Rules Engine Canada

^ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY Next Steps. Synchronize SIGINTand ITS Mission Alignment with Cyber Strategy Funding Joint Approach for Domestic Partners Recruitment and Staffing for Growth Joint Capabilities Development (Sensors and Analytics) Consider Legislative Amendments Develop Career Framework International Tipping and Cueing Interoperability Policy Coordination S-Eyes Interoperability and Policy Préserver la sécurité du Canada par la supériorité de l'information Canada

^ Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T O P If you build it... thev will come y * % K ^ M i M 1 Rather Than Préserver la sécurité du Canada par la supériorité de l'information

1+1 Communications Security Centre de la sécurité T 0 P SECRET//COMINT//REL TO FVEY CSEC Cyber Threat Capabilities SIGINT and ITS: an end-to-end approach Safeguarding Canada s security through information superiority Préserver la sécurité du Canada par la supériorité de l'information Canada

^ Communications Security Centre de la sécurité T ^ T 0 P SECRET//COMINT//REL TO FVEY S Cyber Security What do we mean by Cyber? - Detection / Discovery and Tracking of State-Sponsored Hacking - Counter-intelligence Reporting / Mitigation Advice and Defence against Cyber Threats SIGINT Detects Cyber Activity - Access Canadian and Allied collection to discover and track covert networks (counter-intelligence) IT Security Defends against Cyber Activity - Sensors Government of Canada networks to identify malicious activity and enhance defences Préserver la sécurité du Canada par la supériorité de l'information Canada

JÉU Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P T Comprehensive Cyber Capabilities / ^ f t l Selection.and Filtering e! y «Processing h o Ch x ^. and Ennchment Protocol Analysis Crypl Attack O r V, Intelligence Network Analysis Cyber Analysis t Counterintelligence Knowledge Transfer Threat Evalualion Canada Speak: (GA4) - Added output to the 5-Eyes which is labelled as Knowledge Transfer (mention the sharing of tradecraft / techniques / tools / etc) - Mention how analytic work load is split among parnters

^ Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P The Grand Challenge - Detection EONBLUE is the cyber threat detection sensor developed and deployed in SIGINT and ITS - Cyber threat tracking (signature-based detection) - Cyber threat discovery (anomaly-based detection) * A 6+ year effort that incorporates the best of breed detection algorithms/technology in collaboration with our 5-eyes partners - Based on classified knowledge - Scales to major ISP network speeds (10G) - Enables rapid prototyping to adapt to ever changing threats Safeguarding Canada s security through informationsuperiority C^' 1 n ' 1 r i o Préserver la sécurité du Canada par la supériorité de l'information V_/ci.I lci.vj.ci_ Speaker: - Message is commercial is not enough 4

Communications Security Centre de la sécurité T 0 P SECRET//COMINT//REL TO FVEY The Cyber Landscape Adversaries and Targets - Operate globally - Varying degrees of sophistication - Constantly changing tools and techniques Detection / Discovery - Tools must operate at all network speeds - Deep Packet Inspection at scale - Targeting tradecraft / protocols vs. individuals - We must 'live' in cyber space Préseiver la sécurité du Canada par la supériorité de l'information Canada

JÉU Communications Security Centre de la sécurité T 0 P SECRET//COMINT//REL TO FVEY T Why is Cyber Critical? Nodong Missile Range: 1300km Type: Ballistic th Korea Taepodong Missile Range: 2900km Type: Multistage Payload: Nuclear Desktop PC Range: Type: IBM Payload: DDoS Cost: 500$ Hi

1 ^ 1 Communications Securitv Centre de la séniirila T 0 P SECRET//COMINT//REL TO FVEY Working in Cyber Space Tools must adapt constantly / quickly - Signature based targeting - Metadata analytics - Custom tradecraft for discovery Would I do a better job from my PC at home? - Enhance / Enable collaboration - Adopt Internet technologies on our Classified networks SKYPE / Web 2.0 / Video Chat / Google Apps / etc - Centralize our 'cyber' analytics CyberDMZ Safeguarding Canada 's security through information superiority Préserver la sécurité du Canada par la supériorité de l'information Canada

^ Communications Security Centre de la sécurité T 0 P SECRET//COMINT//REL TO FVEY SEEDSPHERE - Discovery EONBLUE anomaly detection utilities isolate network anomalies - Discover network beacons in Warranted full-take collection Knowledge developed is shared with CNE - During CNE activities, implant is found to be cohabitating - Implant is copied to CSEC HQ for reverse engineering IT Security detects SEEDSPHERE attacks against Government of Canada weekly Préserver la sécurité du Canada pat la supériorité de l'information Canada Speaker: -Major point: How it is an all-source collection effort to get the data -Explain the value of COVENANT to seed new discovery -How CNE is now seeding new discovery -How ITS detects attacks into GC 8

^ Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P Repositories - At Collection Site Global Access is pushing tradecraft to the front-end of access - 50 terabytes of high speed storage - Processing over 125GB/hour of HTTP metadata Black Line: Total data into the Cluster Line: Data Outbound from SAN Data deduplication al si «lit results in much srtum».rem belter use of limited bandwidth Préserver la sécurité du Canada par la supériorité de l'information Data into the cluster is balanced across multiple nodes. I iacli color denotes a separate node, automatically dividing the load amongst all systems Canada Speaker: I We are talking about the massive volumes (Reference to earlier SSO brief ng). There is so much traff c we keep it at the front-end and do advanced datamining / new tradecraft development 50TB = Library of Congress 3 times over 125GB of data = 14 Hours of High Def nition Video SIGINT 2010 - Keep stuff online 9

Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY I t 11 fr"*"* Cyber Repositories In 2009 an average of 112,794 IP traffic items related to cyber threat collected each day from Canadian and Allied sources Traditional SIGINT sources prove invaluable in cyber threat analysis - Travel Tracking Databases used to attribute CNE activity along with SMS collection IT Security domestic sensors store 300TB of full-take - Equivalent to 'months' of traffic - Enables historical analysis and anomaly detection In 2009 IT Security domestic sensors enable 95 mitigation actions Préserver la sécurité du Canada pat la supériorité de l'information v>dl ld.vj.cl. Speaker:! Major Point (Traff c breakdown is 70/30 for SIGINT) Canadian Collect is almost all actionable Canadian Collect is more precise because of EONBLUE IT Security generates Mass quantity of valuable information on attacks (Linked to their fulltake capability) 10

T 0 P JÉU Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T F: Network Analysis Expand on how ANT provides best point of access (TBD)

^ Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P Cyber Analysis ^mtmimiimm Hi Préserver la sécurité du Canada par la supériorité de l'information Canada 12 Speaker: Major Points - A lot goes into a Cyber Threat Report We must stay on top of Tasking, Traff c Analysis / Reverse Engineering, Network Analysis all feed into a Cyber Report. We do this quickly because of tradecraft 12

* Communications Security Centre de la sécurité I Eslablishment Canada des télécommunicatio TOP SECRET//COMINT//REL TO FVEY Mitigation Direct protection of GC systems and information Cleanup / Strengthen - Prevention and response activity - Leverage SIGINT and 5 Eyes intelligence, complemented by our own GC domestic sensor capabilities - Report: Actionable technical mitigation reports provided to client's IPC Cyber threat situational awareness reports provided to departments - CSEC review of incidents against systems of importance - CSEC analysts deployed to capture technical evidence to develop/support mitigation activity - CSEC information is merged with all-source cyber threat activities to create complete picture of cyber threats Préserver la sécurité du Canada par la supériorité de l'information Canada 13 Speaker: I3

JÉU Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P T wmmêêêêêêmgri Positioning for the future DETECT ( Discover and Track) DESCRIBE / DEFEND (Hvaluation) / (Protect Government) enable by ACCESS CYBER THREAT PURSUIT from RESPONSE to ACTION Préserver la sécurité du Canada par la supériorité de l'information Canada 14

T 0 P JÉU Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T Synchronized SIGINT / ITS Mission Space

JÉU Communications Security Centre de la sécurité T 0 P SECRET//COMINT//REL TO FVEY T SAis: Situational Awareness - The perception of environmental elements within a volume of space and time The comprehension of their meaning Projection of their status in the near future Insight - the capacity to understand hidden truths In the Cyber Context: - Gathering and enabling access to cyber information Event Metadata / Event Content / Near Real-Time Exchange - Data mining of cyber information to create understanding in broader context - Predict our adversaries actions based on this knowledge Préserver la sécurité du Canada par la supériorité de l'information Canada

JÉU Communications Security Centre de la sécurité T 0 P SECRET//COMINT//REL TO FVEY T Cyber Session Collection Canada

1+1 Communications Security Centre de la sécurité T 0 P SECRET//COMINT//REL TO FVEY Enabled by Sydney Resolution NRT Alerting Engine» M V Decision Logic IP # SIGINT Analyst SIGINT Event Store Préserver la sécurité du Canada pai la supériorité de l'information Canada

^ Communications Security Centre de la sécurité SECRET//COMINT//REL TO FVEY T 0 P T Tipping and Cueing (Why) SIGINT - data volumes/network speeds impose severe temporal restrictions on collection (use it or lose it) - ability to extend cyber target tracking across all 5-Eyes accesses and/or analytic event stores instead of just domestic - global aperture - ability to uncover covert overlay networks - cyber session collection? Uncover tradecraft/binaries/exploit vectors... CND - network edge vs. network core (microscope vs. telescope) - enable mitigation of cyber exploitation and/or attack (dynamic defence) - facilitate indications and warning - can SIGINT provide me with the true threat picture in NRT? Could we detect "test firing" of new tools/techniques? - collaborative defence - can my partners see malicious activity in SIGINT against networks I need to protect? Can they tell me in NRT? Préserver la sécurité du Canada par la supériorité de l'information Canada

1*1 Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY SIGINT -> ITS Tipping Sample of CNO tips provided to ITS from SIGINT SSO on May 05, 2010. DS800 SEEDSPHERE DS800 SEEDSPHERE DS800 SEEDSPHERE DS800 SEEDSPHERE DS800 SEEDSPHERE DS800 SEEDSPHERE DS800 SUPERDRAKE DS800 SEEDSPHERE DS800 SUPERDRAKE DS800 SEEDSPHERE The Network Name is: The Network Name is: The Network Name is: The Network Name is: The Network Name is: Canadian house of commons environment Canada federal office of regional development (quebec) forestry Canada public works and government services Canada Préserver la sécurité du Canada par la supériorité de t'infoi nation Canada

Communications Security Centre de la söcuritd SECRET//COMINT//REL TO FVEY T 0 P t Establishment Canada des telöcommumcations Canada Dynamic Defense i ""THilig"'! All elements acting as one Defence at: - Network Edge (ITS) Localized/tailored mitigation (e.g. blocking, binary neutering, redirection) Focused response to ongoing and potential threats - Network Core (SIGINT) Global mitigation possible (e.g. redirection, null routing, filtering) Large scale (but still focused!) response to ongoing and potential threats - Adversary Space (CNE) Reconnaissance - probe/explore/learn adversarial network space Co-habitate covert network infrastructure for info gathering, tool extraction, etc Préserver la sécurité du Canada par la supériorité de l'information Canada