secrets of superspies ira winkler, cissp [email protected] +1-410-544-3435

35
Copyright ISAG Secrets of Superspies Ira Winkler, CISSP [email protected] +1-410-544-3435

Upload: phoenix-keen

Post on 01-Apr-2015

225 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

Secrets of Superspies

Ira Winkler, [email protected]+1-410-544-3435

Page 2: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

2

The Second Worst Spy in the World

Page 3: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

3

The Worst Spy in the World

Page 4: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

4

They are Everything You Want

• They kill people

• They blow things up

• They infiltrate enemy positions

• Their enemies fear them

Page 5: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

5

But…

• They kill people• They blow things up• Their enemies know who they are• They always get caught

Page 6: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

6

How Can You Miss This?

Page 7: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

7

What Do Spies Really Do?

• They determine requirements• They collect information• They analyze information• They re-evaluate their needs• Collection is the apparent focus, but it is

the requirements that are most critical

Page 8: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

8

Science vs Art

• Hackers like to portray themselves as “artists”

• Spies are “scientists”• There is a repeatable process to what

they do which is required for expertise• Ability vs. Practice vs. Training• You need two• No training makes you dangerous

Page 9: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

9

Spies Protect Themselves From Other Spies

• Counterintelligence• They know the tricks of the trade, so they

know what to expect• They know they have to be right 100% of

the time, while their adversary just has to be right once

• There is nothing there about protecting computers for the sake of protecting computers

Page 10: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

10

The Key

• Spies focus on Information• Technology is only important in that it

provides access• Different classifications get different

levels of protection• While there is tremendous threat, the

actual losses are relatively small

Page 11: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

11

Risk

Risk = ( Threat * Vulnerability

Countermeasures) * Value

Page 12: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

12

Risk Broken Down

• Threat – Who or What is out to get you

• Vulnerability – Your weaknesses that allow the Threat to exploit you

• Value – Value of your information or services at risk

• Countermeasures – Measures taken to mitigate the Risk

Page 13: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

13

What’s Important to You?

• People focus on the Threat• Spies acknowledge the Threat is a given• Threat is irrelevant

– For the most part

• They focus on mitigating Vulnerabilities

Page 14: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

14

Case Study #1

• Compromise of nuclear secrets

• Full scale espionage simulation

• No holds barred attack

• Multi-faceted attack– Open source research

– Misrepresentation

– Walk through facilities

– Internal hacking

Page 15: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

15

Background

• Organization is very large with a large central organization

• Had traditional security issues, but no major issues that they knew about

• Organization as a whole experienced massive layoffs

• Only one security manager at HQ, with an intern, and no unit security managers

Page 16: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

16

RestaurantFishbowl

FacilityAccess

UnlockedDoor

SecurityOffice

Company

Badge

FakeSignature

LocateEmpty Office

Ethernet Port

NuclearReactorDesigns

CompanyOperator

GraphicsDepartment

IP Address

ProposalPrep Dept

EnterFacility

SimpleHack

AuditLogs

IndiaHack

Page 17: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

17

Results

• Nuclear reactor designs compromised• Emerging technologies compromised• Production potentially compromised• National security implications• It was extremely simple• ID card was unnecessary

Page 18: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

18

Believe it or Not

• Critical compromises accomplished within a half day

• No reports of any activities

• India hack was previously unknown

Page 19: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

19

Case Study #2• Placement of a person as a temporary

employee in a high tech firm• Full scale industrial espionage simulation• No holds barred attack• Multi-faceted attack

– Open source research– Misrepresentation– Walk through facilities– Internal hacking– Internal coordination of external accomplices

Page 20: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

20

Background

• Company has many emerging developments• Developments valued in excess of $10 Billion

by Wall Street analysts• Company has experienced several cases of

industrial espionage• Research mentality of openness causes an

operational security nightmare• Security manager is very well aware of the

threat

– Secures what he can

Page 21: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

21

Open SourceInfo

ResearcherTeam

LeaderMeetingMinutes

BusinessManager

GovernmentAffairs

User ID Password

CriticalServers

Knowledgeas the Key

WalkThrough

PortableComputer

InternetSecurity Scanner

SmartCard

SLIP/PPP

VulnerabilityScanner

Inside Account& Accomplices TELNET

Password FilePrioritizedAccounts

CrackPhone

Directory

Accounts

• Manufacturing Information• Other Sensitive Information

Misc. Data

Forgery

Misc.Data

RootAccess

NFS

• Manufacturing Data• Patent Applications• Other Sensitive Information

“Everything a competitor may wanton all but one top development.”

• Manufacturing Data• Sensitive Data

Page 22: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

22

Results

• All but one emerging development was seriously compromised

• Information valued in the billions of dollars

• Pending litigation posture compromised

• Patent applications compromised• What else is there to say

Page 23: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

23

Believe it or Not

• Critical compromises accomplished within one and a half days

• No reports of any activities

• They have much better than average security– Technical Security– Physical Security

Page 24: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

24

Remember Risk

Risk = ( Threat * Vulnerability

Countermeasures) * Value

Page 25: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

25

Threat and Decisions

• The Vulnerabilities exploited were all preventable

• People are however fascinated by Threat• It only takes bad intent to accomplish

what was demonstrated– True for any attack

• Stop treating the bad guys as celebrities

Page 26: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

26

What is a Spy’s Security Program?

• The implementation of Countermeasures• Spies determine the Vulnerabilities that

will most likely be exploited• They then implement Countermeasures to

mitigate the Vulnerabilities• Defense in Depth

Page 27: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

27

Optimizing Risk

Cost

Countermeasures

Vulnerabilities

Risk Optimization Point

Page 28: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

28

Potential Loss Should Drive Budget

• Most security programs are determined by money available– Risk is a result, not a consideration

• Security program budgets should be a factor of Optimized Risk– Risk is the driver for the budget

• Remember, there is a great deal of ROI for most Countermeasures– There are only two ways to hack a computer

Page 29: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

29

The Two Ways to Hack a Computer

• Take advantage of problems in the software– OS, applications, firmware– Your custom designed software

• Take advantage of configuration errors– The way users and administrators configure the

systems

Page 30: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

30

Why is Bristow the Worst Spy?• She runs into good security programs• She runs into redundant security

measures• The Countermeasures catch her• She is not a real spy to begin with• Alias actually demonstrates good

security programs

Page 31: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

31

Make Bad Movies• The reason they are bad spies is because

the producers want “good” movies• They have to have dramatic tension• Defense in Depth accomplishes this• They want intrigue and sex• I’m still waiting for that myself

Page 32: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

32

Awareness Training

• Awareness• Awareness• Awareness• Awareness

Page 33: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

33

Summary• The real spies are sadly better than Bond and

Bristow• Countermeasures should not result from budgets

and vendor hype• Information and services focus, not computer focus• There should be Defense in Depth• You must focus on Countermeasures that mitigate

Vulnerabilities• Realistic security is achievable

– Just look at Bristow and Bond

Page 34: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

34

For More Information

Page 35: Secrets of Superspies Ira Winkler, CISSP winkler@isag.com +1-410-544-3435

Copyright ISAG

35

For More Information

Ira Winkler, CISSP, CISM

[email protected]

+1-410-544-3435