Internet and Cyber Terrorism



Similar documents
Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

AT A HEARING ENTITLED THREATS TO THE HOMELAND

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

What is Cyber Liability

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Law Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

I ve been breached! Now what?

Network/Cyber Security

National Security Agency

Current Threat to the U.S. from Cyber Espionage & Cyberterrorism

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

Cyber Adversary Characterization. Know thy enemy!

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Policy Instruments & (Side)-Effects

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Security and Privacy

Background Report: 9/11, Ten Years Later

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Umar Patek: The Test of a Prison System

CTC Special Meeting on Communications and IT New York May Thank you very much. I am very pleased to be here to participate in

TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5

Franchise Data Compromise Trends and Cardholder. December, 2010

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

Protecting Organizations from Cyber Attack

10 Smart Ideas for. Keeping Data Safe. From Hackers

Project 25 Security Services Overview

The Recover Report. It s business. But it s personal.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Assessment of the terror threat to Denmark

Information Technology Security Review April 16, 2012

Data Security Concerns for the Electric Grid

INSIDE. Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow

Information Security: A Perspective for Higher Education

Secure Remote Control Security Features for Enterprise Remote Access and Control

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Understanding SCADA System Security Vulnerabilities

FERPA: Data & Transport Security Best Practices

Internet threats: steps to security for your small business

Training Courses Catalog 2015

Cyber Security. Protecting the UK water industry

Trends and Tactics in Cyber- Terrorism

How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System

Unit 3 Cyber security

Institute of Southern Punjab, Multan

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Digital Evidence and Threat Intelligence

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

Audit summary of Security of Infrastructure Control Systems for Water and Transport

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

Log Management, Compliance and Auditing

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

KEY STEPS FOLLOWING A DATA BREACH

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

INFORMATION SECURITY FOR YOUR AGENCY

CYBER SECURITY THREAT REPORT Q1

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

2012 Data Breach Investigations Report

Security Issues with Integrated Smart Buildings

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Safety and security are simply good business.

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Evolution Of Cyber Threats & Defense Approaches

Security Defense Strategy Basics

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Examples of International terrorist attacks since 9/11

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Into the cybersecurity breach

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES. Strengthening Your Community at the Organizational Level

Transcription:

Internet and Cyber Terrorism Knoxville Division

UNLCASSIFIED In the wake of the September 11 attacks, Usama Bin Ladin (UBL) said, hundreds of Muslim scientists are with me who would use their knowledge - ranging from computers to electronics - against the infidels. [Canadian Office of Critical Infrastructure Protection and Emergency Services, 2001]

In the past ten years, Al-Qa ida (AQ) and its affiliates have created a potent online presence. Extremists are not limiting their use of the Internet to radicalization; they are using it to propagate terrorism and recruit jihadists. [FBI Director Mueller, 28 July 2010]

Internet and Terrorism In 2011, Europol s director general emphasized his belief that the Internet has replaced Afghanistan as the terrorist training ground In 2011, Manfred Murck, head of the Hamburg branch of Germany s Domestic Intelligence Service stated that the Internet functions as a kind of Al-Qa ida virtual group

Definition of Cyber Terrorism The execution of a surprise attack by a sub-national foreign terrorist group, or individuals with a domestic political agenda, using computer technology and the Internet to cripple or disable a nation s electronic and physical infrastructures. The goal is not only to hurt the economy of a region or a country, but also to amplify the effects of a traditional physical terrorist attack by causing additional confusion and panic. It can also take the form of a physical attack without ever touching a computer keyboard that destroys critical internet communications and electric power nodes.

Al-Qa ida Evolvement Al-Qa ida is an organization Al-Qa ida is a Movement Al-Qa ida is an ideology

Al-Qa ida Evolving Toward Internet Jihad and Cyber Attack UBL s vast financial resources may have enabled him to purchase the expertise required for a cyber attack Intelligence recovered from the raid on UBL s compound in Pakistan indicated: Laptops contained plans to target U.S. Information Systems Discovery of large databases containing US infrastructure details Use of the Internet to collect intelligence on targets Al-Qa ida remains committed to striking the United States and its interests Islamic Extremist Websites encourage attacks on US SCADA System and financial and nuclear facilities located in the United States Jihadi Sheiks issued fatwas providing religious justification for today s era of Internet and Cyber Jihad

Al-Qa ida and the Internet AQ and its affiliates embraced technology both as a media platform and a planning tool The Internet s importance to jihadists increased after AQ was driven from its safe haven in Afghanistan in 2002 From 2003 to 2007, AQ s central media group grew its operations from 6 to 97 annual productions disseminated via the Internet Internet jihadists, Younis Tsouli and Malika al Aroud used the online environment to recruit, propagandize, train for, and conduct cyberattacks By 2008, AQ s core recognized that the Internet reduced the time and costs of operational communications while increasing the scope of information-sharing among geographically disbursed groups

Al-Qa ida s Affiliates and the Internet In 2004, Abu Musab al-zarqawi (Zarqawi) became well-known by a strategic combination of extreme violence and Internet savvy Due to the Internet, Zarqawi had a voice, if not a face, and a clear ideology to explain his violence By going online, Zarqawi was able to both control the interpretation of his violent message and achieve greater impact with smaller operations Legions of fans inspired by Zarqawi s online activity took up the banner of violent jihad online An online jihadi milieu emerged (jihadi environment) Increased numbers of violent jihadi websites became available in English, French, German, Spanish, and Dutch signifying both the rise of violent jihadism in the West and growing efforts by violent jihadist voices to reach Western Muslim population

AQ s Affiliates and the Internet-Cont Anwar al-awlaki (Awlaki) was a master in the use of the Internet Awlaki s video-taped speeches - distributed online - produced real world terrorists from the online radical milieus Awlaki was implicated in a number of attacks and plots, including Major Nidal Hasan s shooting at Fort Hood in 2009, and the attempted Times Square car bombing in 2010 Above-noted individuals had been in online contact with Awlaki prior to their attacks Abu Dujana al-khurasani, who launched the suicide attack at U.S. Forward Operating Base Chapman in Afghanistan was crazy about Awlaki British Roshonara Choudhry was radicalized via YouTube videos featuring Awlaki s sermons

Internet War, a New Battlefield Jihadists connect with other like-minded individuals from the safety of their homes, sitting at their computers Online jihadists are free to read, participate, and ask questions in the privacy of their homes lowering the risk of detection Chat rooms and blogs mean that jihadists no longer have to physically meet Online jihadists are harder for authorities to detect Never before has one platform connected so many The challenge for authorities today is how to contain a social movement that simmers just beneath the surface

Islamic Extremist Hacktivists Hacking is part of the larger cyber security threats challenging Western capitals Numerous Western websites have been hacked by Islamic Extremist hacktivists acting on fatwas sanctioning their activities On 7 January 2013, police in Thailand arrested Hamza Bendelladj Algerian cybercrime suspect for stealing millions of dollars by hacking banks websites He was associated with the Izz Eddine Al Qassam Cyber Fighters On 2 January 2013, several US websites were hacked by Abu Ubayda Al-Masri to mark the anniversary of the December 30, 2009 suicide attack against CIA and Jordanian intelligence personnel in Afghanistan He offered his services to jihadi forum members, saying he was willing to start a workshop on device hacking, encryption, and computer programming

6 Worst Kinds of Hackers 1. State-sponsored 2. Hacktivist 3. Cyber Criminal 4. Insider (You) 5. Script Kiddie 6. Vulnerability Broker

2000 Maroochy Shire Cyber Event Intentional, targeted attack by a determined and knowledgeable person on an Industrial Control System (ICS). Accessed computers controlling the Maroochy Shire Council s sewerage system and altered electronic data in the sewerage pumping stations causing malfunctions in their operations. Pumps were not running when they should have been Alarms were not reporting to the central computer Maroochy Shire, Queensland, Australia (north of Brisbane) A loss of communication between the central computer Rural and tourist various destination pumping stations Population 120,000 Businesses have a need for cyber security to protect their trade secrets, proprietary information, and personally identifiable information (PII) of their customers or employees.

Cyberterrorist Insider? Vitek Boden Hunter Watertech (contractor) site supervisor on Maroochy SCADA project for two years Installed SCADA and radio-controlled sewage equipment for the Maroochy Shire Council Quit Hunter Watertech after a strained relationship in Dec 1999 Applied for job with Maroochy Shire Council Maroochy Water Services (rejected Jan 2000) Packed his car with stolen radio equipment connected to a laptop computer Drove around area on 46 occasions from February to April 2000 Gained unauthorized access to the control system via an insecure wireless network Issued radio commands to the sewage equipment Released 800,000 liters of raw sewage into local parks, rivers, and the grounds of a hotel Marine life died, creek water turned black, and the stench was unbearable for residents Cost of the attack was in the $1 million range

Attack Summary Vitek Boden was a disgruntled insider who was never an employee of the organization he attacked. He was an employee of a contractor that supplied IT/control system technology to the Maroochy Shire Council. With his knowledge he was the ultimate insider. The service contract was deficient or inadequate concerning Hunter Watertech s responsibilities. Lacked management, technical and operational cyber security controls Lacked personnel security controls that applied to its employees such as background investigations and protection from disgruntled employees A number of anomalous events occurred before recognition that the incidents were intentional. As a skillful adversary, Boden was able to disguise his actions. Extensive digital forensics were required to determine that a deliberate attack was underway There were no existing cyber security policies or procedures. There were no cyber security defenses.

Cyber Security Policies, Procedures, Defenses Access Physical Human Control Resource and Environmental Security Security IT Pre-employment screening at least 2 satisfactory professional references Control physical access Restrict User access (especially administrative privileges) Protect authentication (passwords) system files from unauthorized access Communicate transfer, resignation or termination of employees Regular review of the physical access list Timely Regular review revoke of physical Privileged access user s access of transferred, rights resigned, or terminated employees Control photography or video recording Regular audit of workstations - check for updates Anti-virus software, firewalls, Intrusion Detection Systems (monitoring), encryption Timely Use video revoke surveillance any electronic cameras access of at transferred, all entrances resigned, and or exits and other strategic points monitored 24/7 terminated employees (to include portable and mobile devices and remote access) Users For Use Secure Complex any employee, the Passwords system trainee, on intern, which or the contract access personnel control software is Don t installed write down or store passwords in readable format Terminate active sessions or lock workstations Just don t click on it!

Questions? IA Nicole Hembree IA Scott Peterson