Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private...

35
Offensive IW Offensive IW Open Sources Open Sources

Transcript of Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private...

Page 1: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

Offensive IWOffensive IW

Open SourcesOpen Sources

Page 2: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 2

Reading List Reading List – Open Source Intelligence: Private Sector Capabilities to

Support DoD Policy, Acquisitions, and Operations , http://www.fas.org/irp/eprint/oss980501.htm

Interesting Read– INTellingence: Open Source Intelligence, CIA,

https://www.cia.gov/news-information/featured-story-archive/2010-featured-story-archive/open-source-intelligence.html

– Project Grey Goose Report on Critical Infrastructure, 2010, http://dataclonelabs.com/security_talkworkshop/papers/25550091-Proj-Grey-Goose-report-on-Critical-Infrastructure-Attacks-Actors-and-Emerging-Threats.pdf

Page 3: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 3

What is Intelligence?What is Intelligence? Predicting of emergent threats

– Information Relevant to a government’s policy, national security

interests, analyze threats from actual or potential adversaries

– Activities Collection and analysis on intelligence information Counterintelligence

– Organization Central Intelligence Agency (CIA)

Page 4: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

Modern Intelligence?Modern Intelligence?

CSCE 727 - Farkas 4

Mata Hari

James Bond

Cyber Intelligence

Page 5: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

Source of ThreatsSource of Threats

Physical attacks– Use of IT technology to predict traditional

threats– OSINT

Cyber attacks– Use of IT technology to predict cyber threats– Need: understanding of these threats and their

consequences on national security

CSCE 727 - Farkas 5

Page 6: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 6

InformationInformation “…relevant to a government’s formulation and

implementation of policy to further its national security interests and to deal with threats from actual or potential adversaries.” (A. Shulsky and G. Schmitt, Silent Warfare)

Examples:– Military matters of foreign nations– Diplomatic activities and intentions of foreign nations– Intelligence activities of foreign nations

Other party may or may not want to keep it secret Raw data and analyses and assessments based on raw data

Page 7: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

Technical IntelligenceTechnical Intelligence

Interesting read: Office of Scientific Intelligence:The Original Wizards of Langley, http://www.foia.cia.gov/collection/original-wizards-langley

Office of Scientific Intelligence– Track technical challenges– Originates back to 1954-1962– Aim: create and apply innovative technologies to meet

intelligence needs

CSCE 727 - Farkas 7

Page 8: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 8

Open SourceOpen Source

Unclassified information in the public domain or available from commercial services

Example sources: – Traditional: newspapers, magazines, scientific

publications, television and radio broadcasting, etc.

– Emerging: Internet, geospatial data, images

Page 9: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

Birth of Open Source Birth of Open Source IntelligenceIntelligence

1946: Central Intelligence Group (CIG) established– Track scientific development abroad and

estimate its importance– Consequences of foreign scientific development

on US national security– Issues: Soviet nuclear weapons, ballistic missile,

space exploration, air defense, chemical and biological weapons, etc.

CSCE 727 - Farkas 9

Page 10: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

Open Source ConcernsOpen Source Concerns

Acquisition of information – Open source intelligence– Privacy

Legal and ethical issues– Piracy– Infringement on intellectual property rights– Fraud

CSCE 727 - Farkas 10

Page 11: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

What kind of information resources What kind of information resources do YOU use?do YOU use?

How do YOU evaluate the accuracy How do YOU evaluate the accuracy of the data?of the data?

How do YOU analyze the collected How do YOU analyze the collected data?data?

CSCE 727 - Farkas 11

Page 12: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

Advances in ITAdvances in IT

Increased: data and analystsRaw data sharing

– Intelligence community– Government offices– Interest groups

CSCE 727 - Farkas 12

Page 13: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 13

ActivityActivity Obtaining or denying information Activities:

– Collection and analysis on intelligence information– Counterintelligence, deception

Collection: wide range (e.g., wiretapping, broadcasts, newspapers, research publications, aerial photography, espionage, etc.)

Analysis: quality of data, correctness of analysis, timeliness, etc.

Page 14: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

What are the OSI Challenges?What are the OSI Challenges?Collection?

– Data accuracy (correctness, timeliness, etc.)– Data integration (heterogeneous data, duplicate,

inconsistent data)– Volume of data (processing capability)

Analysis?– Statistical data analysis– Accuracy of results, application of results– Efficiency

CSCE 727 - Farkas 14

Page 15: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 15

CounterintelligenceCounterintelligence

Covert action Protect a nation against the actions of

hostile intelligence services– National Security – Nature of regime– Law

Page 16: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 16

CounterintelligenceCounterintelligencePassive measures

– Blocking access to the information – Information classification:

Top Secret: “exceptionally grave damage” Secret: “serious damage” Confidential: “damage”

Counter espionage– Surveillance, intelligence collections– Defectors and double agents– Deception

Page 17: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 17

CounterintelligenceCounterintelligence Foreign intelligence guidelines: classified

– Investigation of: Illegal activities: detecting and preventing foreign

espionage and terrorist activities Legal activities: foreign legal political activities like fund-

raising, organizational work, etc. Domestic intelligence guidelines (“Levi Guidelines”):

public– Investigation of groups that

hostile to government policies and fundamental principles seeks to deprive some class of people has violent approach to political change

Page 18: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 18

Scope of IntelligenceScope of Intelligence

Government -- national security – Range from peace time to war time intelligence– Type of government

Domestic Intelligence -- depends on nature of regime Business corporations – competitive advantage Economics and Intelligence

– Government-run economy– Economic well-being of nation (post-Cold War era)

Non-traditions Intelligence– Environmental issues

Page 19: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 19

Intelligence and Law Intelligence and Law EnforcementEnforcement

Transnational threats: – Do not originate primarily from a foreign government– Serious threats for nation’s well-being– Fall within law enforcement rather than intelligence– Examples: narcotics trafficking, international terrorism

Law enforcement: waiting until a crime has been committed

Intelligence: collection of convincing evidence Criminal investigation vs. criminal intelligence

investigation – Punishment of a given criminal act vs. struggle with an

organization engaged in criminal activity

Page 20: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 20

Intelligence and Information AgeIntelligence and Information Age

Advent of information age Change the mode of operations for business

corporations and government Technology: communicating and processing

information Behavioral and institutional change: information

as the key of organizational activities Intelligent Services vs. competing organizations

Page 21: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

Military AffairsMilitary Affairs

Enhanced usefulness of information– Weapon systems

Enhanced ability to collect, process and disseminate information in a timely manner

CSCE 727 - Farkas 21

Page 22: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

Government OperationsGovernment Operations

Circulation and use of information for policy making and implementation– Competitiveness of non-government

organizations– How to exploit information– How to integrate information from

heterogeneous sources

CSCE 727 - Farkas 22

Page 23: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 23

Intelligence and Information Age Intelligence and Information Age (cont.)(cont.)

Globalization: increased flow of information across borders– International trade– Division of labor– Increased travel– Increased penetration by news media

Page 24: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 24

Open Source Information Open Source Information CollectionCollection

Goal oriented Publications and broadcast Additional information available from non-

intelligence sources Special sources (e.g., speeches of political leaders,

legal documents, demographic data, etc. ) Large amount of openly available data Need

processing power

Page 25: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 25

Problem of Increased AvailabilityProblem of Increased Availability

How to locate sources?How to evaluate source reliability?How timely the data is?How to analyze information and integrate

with other intelligence information?How to protect confidentiality of policy

maker’s interest?

Page 26: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 26

Information SpecialistInformation Specialist

Policy makerStaff of policy makerIntelligence analysts

Page 27: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 27

IW and Open Source IW and Open Source IntelligenceIntelligence

Generally legal (uses readily available information)

Attacker gains access to protected information, e.g., – Business trade secrets– Military strategy– Personal information

Protected information: readily available in public domain, can be inferred from public data, or deduced from aggregated public data

Page 28: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 28

Open Source IntelligenceOpen Source Intelligence

Widely used (e.g., Department of Defense) Cheap, fast, or timely Most often legal Advantages: no risk for collector, provides

context, mode of information acquisition, cover for data discovery by secret operations

Disadvantages: may not discover important information, assurance of discovery(?)

Page 29: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 29

Online Open Source Online Open Source IntelligenceIntelligence

Large amount of public data online– Web pages, online databases, digital

collections, organizations on line, government offices, etc.

Freedom and Information Act (FOIA): industry data

U.S. Patent Office: copies of U.S. patentsTrade shows, public records, etc.

Page 30: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 30

PrivacyPrivacy

Use open source to find out confidential data about people

Find confidential data about people while they browse through open source (e.g., Web searches)

Page 31: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

Who is Selling Your Personal Who is Selling Your Personal Data?Data?

Online investigative industry Cash strapped government

– Maryland DMV: 1996 – driver’s license info and vehicle registration data

– Virginia: voter registration data– Washington State: 1997 WATCH (criminal history data)

Accidental:– Experian Inc. 08/13/1997, software error in web

application released other customers’ credit standing, http://www.highbeam.com/doc/1P2-738117.html

CSCE 727 - Farkas 31

Page 32: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 32

Privacy ViolationsPrivacy Violations

Snooping via Open SourcesOnline activities

– Questionnaires– Customers’ data– Web site data collection (Cookies, IP address,

operating system, browser, requested page, time of request, etc.) – without user’s permission

Page 33: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 33

LegislationsLegislations Privacy Act of 1974, U.S. Department of Justice

(http://www.justice.gov/opcl/1974privacyact-overview.htm ) Family Educational Rights and Privacy Act (FERPA), U.S.

Department of Education, (http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html )

Health Information Privacy, Health Insurance Portability and Accountability Act of 1996 (HIPAA), (http://www.hhs.gov/ocr/privacy/index.html )

Page 34: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

CSCE 727 - Farkas 34

Other Open Source AttacksOther Open Source Attacks Piracy

– Available in open source, but still protected by copyright, patent, trademark, etc.

Copyright Infringement– Acquisition of protected work without the owner’s

permission and sold for a fee– Human perception: not serious crime– Significant loss for

marketing/manufacturing/owner Trademark Infringement

Page 35: Offensive IW Open Sources. CSCE 727 - Farkas2 Reading List – Open Source Intelligence: Private Sector Capabilities to Support DoD Policy, Acquisitions,

Legal and Ethical IssuesLegal and Ethical Issues

See lecture notes for CSCE 522

Nov. 26, 2012  

http://www.cse.sc.edu/~farkas/csce522-2012/lecture.htm

CSCE 727 - Farkas 35