SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
...setting the landscape
         for an emerging discipline...




inTELLiGEnCE anD naTiOnaL sECuRiTY aLLianCE
cyBer intelligence: Setting the landScape For an eMerging diScipline
SEPTEMBER 2011
ACknowlEDgEMEnTS
insa CHaiRWOMan
Frances Fragos Townsend

insa sTaFF
Ellen McCarthy, INSA President
Chuck Alsup, INSA Vice President for Policy
Jay Fox, INSA Senior Research Intern

CYBER inTELLiGEnCE TasK FORCE EDiTinG TEaM
Terry Roberts, Executive Director, Interagency & Cyber, CMU/SEI
Bill Studeman, Independent Consultant

CYBER inTELLiGEnCE TasK FORCE WRiTinG TEaM
Barbara Fast, Vice President, CGI
Michael Johnson, Senior Scientist/Computer Security Researcher, Sandia National Laboratories
Dick Schaeffer, Riverbank Associates, LLC

EDiTORiaL REViEW
Joseph M. Mazzafro, Oracle National Security Group




                                                                                       insa suppORTs a HEaLTHY pLanET
                                                                                       InSA white Papers are printed on
                                                                                       recycled paper that is
                                                                                       50% recycled content
                                                                                       including 25% post
                                                                                       consumer waste.
ExECuTIvE SuMMARy

E
     volving information systems technology has turned the cyber arena into a multi-dimensional attack space that extends
     the conventional landscape to a virtual domain where key economic and national security assets are exposed to
     significant threats. Individual, commercial, national, and international activities interact in this domain, increasing
the space for offensive and defensive operations. Cyberspace is a haven for a broad range of disruptive operations,
including reconnaissance, theft, sabotage, and espionage. It serves as an environment that allows threats to target
hardware, software, financial assets, intellectual property, and individual identities.

This paper is the first in a series developed by the Intelligence   This paper assesses the cyber threat dynamic, economic
and national Security Alliance’s (InSA) Cyber Council. It           costs of cyber attacks and security, as well as the current
is intended to broaden the vision of senior decision makers         uS approach to cyber intelligence. Based on these
in government and industry. our goal with this paper is             assessments, we believe further discussion on the following
to set the landscape for cyber intelligence by discussing           topics across industry, academia and government would
why it is necessary and providing thoughts on how to                be a prudent investment in the future security and reliability
approach the development of this function in the cyber              of the increasingly important cyber domain. These topics
domain. while there is a great deal of focus on current             include the need to:
cyber security issues, there is little focus on defining and        1. Systematically define and establish effective cyber
exploring the cyber threat environment at a higher level.              intelligence approaches, enduring professions, and
Its unique dynamics and impact on our economy and                      needed skill-sets/training/education and technologies
national security are understudied. In this paper, we will
focus primarily on defensive cyber activities. There is a           2. Enable the creation of cyber intelligence related
rapidly increasing need to fully leverage cyber intelligence           policies, approaches, and pilot efforts across industry,
assets and capabilities on a national and global scale                 academia/non-profits, and government that provide
to address this ubiquitous, diverse, and evolving group                unclassified situational awareness, indications,
of adversaries. There is also a need to clearly define an              warning data, analytics, and 24/7 unclassified and
emerging cyber intelligence discipline that can be quickly             classified (as appropriate) reporting to government
and transparently shared with appropriate private and                  agencies, trusted industry, and global partners. The
                                                                       Cyber Council believes these pilot efforts are the most
foreign partners.
                                                                       relevant value–added recommendations for setting
The Cyber Threat Dynamic can be broken into three                      the landscape for cyber intelligence provided by this
components:                                                            paper.
•	The Cyberspace Environment                                        3. Establish public-private partnership cyber outreach
                                                                       forums that address these issues/concerns in a
•	The Cyber Threat
                                                                       comprehensive, practical, and executable fashion
•	The Convergence of the Effects of the Cyberspace
                                                                    4. Build a meaningful virtual partnership among all
  Environment and the Threat
                                                                       relevant agencies and the private sector to ensure
The two overarching costs from the cyber threat dynamic                seamless sharing of threat information, timely
are losses due to adversarial activities and the expense               analytical judgments, and reasoned, measured
of providing and maintaining security. In cyberspace,                  responses to clear threats
the low cost of entry and easy access creates an                    ultimately, effective cyber intelligence will begin to
asymmetric environment in which public and private                  enable predictive, strategic warning regarding cyber
sector organizations incur a disproportionate cost to               threat activities, mitigate risks associated with the threat,
defend compared to the consequence of attack. while                 enhance our ability to assess the effects of cyber intrusion,
quantifiable assessments of the net impact of cyber attacks         and streamline cyber security into a more efficient and cost
are difficult to discern, the cost is great enough to warrant       effective process based on well informed decisions.
the need for a cyber security apparatus supported by
sophisticated cyber intelligence.
                                                                                                 InSA CyBER InTEllIgEnCE wHITE PAPER | 3
InTRoDuCTIon:                                   ToDAy’S CyBER EnvIRonMEnT



         D
                 uring the 20th Century, the united States experienced tremendous
                 economic and industrial growth as inventors, entrepreneurs, and                    The United States
                 policy makers partnered to turn ideas into labor saving and life                   as a whole has
          enhancing technology. During this time period, government and industry
                                                                                                    yet to put in
          needed to collaborate in unprecedented ways in order to serve national
          interests and meet security requirements.                                                 place systemic
                                                                                                    approaches,
          Advances in information systems technology enabled collaboration among
          individuals and states regardless of location. Innovation accelerated, and                tradecraft,
          benefits to the united States overshadowed concerns about how these                       technologies,
          new capabilities might be used for malicious purposes. These same
          breakthroughs gave unprincipled individuals, organizations, and nations
                                                                                                    and end-to-end
          a new range of tools with which to perpetrate theft, fraud, sabotage,                     solutions across
          and espionage.                                                                            government,
          A reactive patchwork of technology and processes with the purpose of                      academia,
          developing a preplanned comprehensive approach to constructing and                        and industry.
          using the global network emerged to address the deficiencies created by
          what was viewed as a temporary fad by these “hackers” and other unsavory
          interlopers. Historically, government and industry often collaborated
          on key technological innovations, like nuclear power, to utilize efforts
          for the common good. Today, government agencies and industry often
          seem to pursue separate (perhaps counter-productive) policies, in lieu of
          cooperating effectively to address incoming threats to our local and global
          network domains.

          The government, as in other areas, has unique insights into the threat space but cannot seamlessly share these
          insights with the very industries that own and operate over 90 percent of the telecommunications’ infrastructure
          and operations. This is further exacerbated by the common misperception that these threats are technical
          and tactical level attacks best handled at the unit or individual domain level. This bifurcated approach has
          resulted in the loss of precious years while the cyber threat vectors and activity levels have grown exponentially.
          Furthermore, the united States as a whole has yet to put in place systemic approaches, tradecraft, technologies,
          and end-to-end solutions across government, academia, and industry.

          while there is a great deal of focus on current cyber security issues, there is very little focus on truly defining and
          exploring the cyber threat environment at a higher level, its unique dynamics, and the potential impact on our
          economy and national security. we need to fully leverage cyber intelligence assets and capabilities to address
          this ubiquitous, diverse and ever evolving category of adversaries. This white paper addresses the following
          dimensions of the cyber threat environment:
          I. The new Dimension: Cyber Threat Dynamics                  III. The Role of Intelligence in the Cyber Arena
          II. Impact of Current levels of Cyber Attacks:               Iv. Areas for Further Discussion and Review
              The Economics

4 | Intelligence and national Security Alliance | www.insaonline.org
I. THE nEw DIMEnSIon: CyBER THREAT DynAMICS

E
     merging information systems technology enables the cyber arena to extend the
     conventional landscape to a virtual domain where key economic and national                 There is a rapidly
     security assets are subject to threats. The convergence of the cyberspace                  increasing need
environment and threat vectors creates a complicated dynamic.
                                                                                                to fully leverage
The Cyber Threat Dynamic can be broken into three components:                                   cyber intelligence
1. The Cyberspace Environment                                                                   assets and
2. The Cyber Threat                                                                             capabilities on
3. The Convergence of the Effects of the Cyberspace Environment and the Threat                  a national and
                                                                                                global scale to
1. THE CYBERspaCE EnViROnMEnT                                                                   clearly define
Cyberspace has become a global commons that has enhanced interaction,
information exchange, and productivity. However, it is also a haven for a broad
                                                                                                the emerging
range of disruptive operations, including sabotage, reconnaissance, theft, and                  cyber intelligence
espionage. It serves as an environment that allows threats to deny, disrupt, degrade,           discipline.
or destroy hardware, software, and intellectual property.

The Relevance of the “information super-Highway.”
Although the Internet and highway system analogy may be a bit of a cliché, commerce
is instructive when examining the cyberspace environment and the economic impact
of cyber intrusions. Imagine if businesses in the united States could not use the
interstate system to reliably transport goods. Similarly, in the early days of overseas
commerce, ships would often be captured by pirates and bandits who would
rob merchants with impunity and little penalty. During world war II, merchant
convoys relied on military escorts, which in turn, relied on industry for supplies
and innovations. This symbiotic partnership between industry and government was
foundational to the economic growth of this nation and the world economy. Today
90 percent of all commerce takes place on the seas, mostly without incident. The
Internet has assumed an analogous stature in its role in financial transactions and
the exchange of information. Protecting this “super-highway” is a global imperative
for the public, private, and academic sectors.

a Multi-Dimensional attack space.
The cyber environment, coupled with technology, has created a new multi-dimensional
attack space. There is an interconnection between the spatial, physical, logical,
and social layers through which the adversary moves with impunity. The complexity
of this attack space means that investigators must understand the relationship
between these layers and pinpoint the perpetrator’s origin and intent in order to gain
attribution. with the convergence of computers and telecommunications networks,
the defenders must look at this problem as a whole and then disaggregate into its
parts. There is a merging of wired, wireless, and optical technologies (networks
and RF). whereas before enterprise networks might be viewed distinctly from hand-
held devices or tactical radios, now the cyber network stretches from the enterprise
network and its infrastructure to wireless devices being used at the tactical edge by
the military, law enforcement, shoppers, or drivers using gPS-enabled devices.

                                                                                          InSA CyBER InTEllIgEnCE wHITE PAPER | 5
with each other. In most cases,
                                                                                              laws have not kept pace with the
                                                                                              technical ability of an adversary
          Ultimately, effective cyber intelligence will begin                                 to move rapidly through national,
          to enable predictive, strategic warning regarding                                   academic,      commercial,     and
                                                                                              private internet service providers.
          cyber threat activities, mitigate risks associated                                  The lexicon is especially confusing
          with the threat, enhance our ability to assess the                                  because it remains immature.
                                                                                              For example, there is no agreed
          effects of cyber attacks, and streamline cyber
                                                                                              definition of what constitutes an
          security into a more efficient and cost effective                                   attack on a nation or a breach
          process based on well informed decisions.                                           of    sovereignty.   often    theft,
                                                                                              espionage, reconnaissance, or
                                                                                              even simple hacking is described as
                                                                                              an attack.
          Contrary to physical domains and sciences, this
                                                                    The Consequences of Outsourcing.
          environment is truly a complex and dynamic cyber-
                                                                    The u.S. government has significantly outsourced
          ecosystem that demonstrates unexpected emergent
                                                                    significant portions of the design, implementation,
          behaviors every day. Similar to physics in the early
                                                                    and maintenance of Information Technology (IT) to
          1800s, we are still in the early stages of understanding
                                                                    other countries, where our potential adversaries can
          cyber as a domain and its implications. Cyber
                                                                    easily insert themselves into our logistical chains.
          science, engineering, and domain are in their infancy,
                                                                    The united States and other developed countries
          and all are being driven at the speed of continuous
                                                                    have outsourced their IT development for economic
          technological development. little is designed with the
                                                                    reasons, but the market is failing to account for the
          strategic vision to systematically mitigate threats; much
                                                                    reality of the increased security risk. The present
          is evolved in a tactical, reactive way. new versions
                                                                    situation is as dangerous as if the united States
          of exploits are launched globally every day, resulting
                                                                    decided to outsource the design of bridges, electrical
          in new vulnerabilities. given this
          flaw of software and systems, there
          is no end in sight to the repetitive
          iterations of tactical attack and
          defense.
                                                           The government has unique insights into the
                                                                       threat space but cannot seamlessly share these
          The Gap Between Law and the Threat.                          insights with the very industries that own and
          national and international laws,
                                                                       operate over 90% of the telecommunications’
          regulations,     and    enforcement
          are still struggling to catch up to                          infrastructure and operations.
          cyber activities worldwide. Rules,
          protocols, and standards are few
          and disconnected, often conflicting




6 | Intelligence and national Security Alliance | www.insaonline.org
grids, and other physical infrastructure                                                 Attack Sophistication vs. Intruder Technical Knowledge
                                                                                                                                             g
to the Soviet union during the
                                                                                                                                                                                                         ounterfeit
                                                                                                                                                                                              malicious counterfeit
                                                                                                                                                                                              hardware                                        High
                                                                                                                                                             persistent malware infiltration
                                                                                                                                  email propagation of
                                                                                                                                                               & persistent surveillance
Cold war.       In tandem with the                                                                        “stealth”/advanced scanning
                                                                                                                                     malicious code
                                                                                                                                                                                                                   adaptive, high-impact,
                                                                                                                    techniques
outsourcing of IT development, the
                                                                                                                                                 sophisticated                                                     targeted attacks on
                                                                                                                                                   command           control systems
                                                                                                                                                                                                                   critical infrastructures




                                                     Average Intruder Knowledge
                                                                                                                                                                         targeted
                                                                                                                                                   & control

IT systems themselves are becoming                                                         widespread attacks using NNTP
                                                                                                to distribute attack
                                                                                                                                                 increase in
                                                                                                                                                                                            supply-chain
                                                                                                                                                                                            compromises            coordinated
increasingly complex.         Increased                                                                                                            worms                                                            cyber-physical
                                                                                                                                                                                                                   attacks




                                                                                                                                                                                                                                                  Attack Sophistication
                                                                                            widespread attacks on
system complexity means that there                                                            DNS infrastructure
                                                                                                                                              DDoS attacks
                                                                                                                                                                         massive botnets
                                                                                                                                                                                                                   increase in targeted
                                                                                                                                                                                                                     phishing & vishing

are more exploitable vulnerabilities                                                                executable code
                                                                                                    attacks (against                                                                                            widespread attacks on
                                                                              automated                browsers)                                                   anti-forensic techniques
that arise by accident and more
                                                                                                                                                                                                                  client-side software
                                                                              widespread
                                                                                attacks

opportunities to hide deliberately                                           GUI intruder
                                                                                                                                                             home users targeted
                                                                                                                                                                                     widespread attacks on
                                                                                                                                                                                        web applications
introduced vulnerabilities, while it
                                                                                 tools
                                                                                                                                                               distributed attack
                                                                                                                                                                      tools
                                                                           hijacking sessions
becomes harder for the finite number                                                                                                          increase in wide-scale
                                                                                                                                            Trojan horse distribution

of trusted experts to check systems for
                                                                            Internet social
                                                                          engineering attacks                 widespread
                                                                                                            denial-of-service

integrity.                                                                                                       attacks
                                                                                                                            techniques to analyze code
                                                                                                                                for vulnerabilities         Windows-based remote
                                                                                                       automated               without source code           controllable Trojans
                                                                                  packet spoofing
                                                                                                      probes/scans                                              (Back Orifice)

2. CYBER THREaT                                                                   1990                                                                                                                2010                                    Low

The threats to our national security
and economic interests in the cyber
                                                                                                          © 2011 Carnegie Mellon University                                                                                                   1




arena vary in identity, objectives,             Figure 1: The Evolution of Attack Techniques/Technologies1
assets, and capabilities. Their
range can stretch from disruption, to
simple theft, to taking down critical                                   property is not an uncommon practice among some
infrastructure, to disrupting government functions. The                 national governments and state industries. Some
advantage almost always lies with the threat. Ability and               states use the Internet to conduct offensive operations
intent of these actors become important distinctions to the             as part of their doctrine. These operations include
defender’s action.                                                      disrupting lines of communication and the target’s
                                                                        communications medium. This should be viewed as a
Varying profiles.                                                       new tool in the warfare toolbox—not unlike the advent
Attackers do not need to be well educated nor well                      of armored or aerial warfare.
resourced. They can come from any social cross section.
They simply need to have intent and the ability to use               no Boundaries to Geographic Location or Objectives.
technology to perpetrate their activity. Below are a few             There are no geographic boundaries in cyberspace.
illustrations:                                                       Individual, group, and/or nation-state attackers can reside
•	Age is irrelevant. young teenagers in various countries            anywhere. objectives are similarly boundless. Attack
   have used the Internet to hack into Pentagon sites.               motives vary from simple curiosity, personal vendettas,
                                                                     financial or intellectual property gain, and/or a desire to
•	Criminals have created international gang activity                 harm an institution or state. Targets include individuals,
   using the Internet as their medium with drugs,                    groups, commercial interests, infrastructure, and nations.
   pornography, human trafficking, and financial gain
   among their activities. Criminals also sell capabilities          assets and Capabilities.
   and services to other criminals, groups, and even
                                                                     offensive techniques and technologies have rapidly
   states.
                                                                     evolved over the past twenty years. Figure 1 illustrates the
•	Terrorist groups are using the Internet to conduct their           emergence of new and more sophisticated threat assets
   operations, recruit, and coordinate on a larger scale.            and capabilities since 1990. This emergence is based on
                                                                     an improvement in attacker skill sets and more advanced
•	nation-states are using the Internet to conduct                    technology at their disposal.
   reconnaissance and espionage. Stealing intellectual



                                                                                                                                                                            InSA CyBER InTEllIgEnCE wHITE PAPER | 7
3. THE COnVERGEnCE OF THE EFFECTs OF THE                                         Fostering an asymmetric Cyber Threat.
CYBERspaCE EnViROnMEnT anD THE THREaT                       The cyber domain encompasses a new and profound
The heart of the cyber threat dynamic is where the effects  dimension of asymmetric warfare. Historically, adversaries
of the cyberspace environment and the threat meet. This     of all types have chosen to take advantage of an opponent
convergence has a multiplying effect on the vulnerabilities where and when he or she is weakest, especially if
of cyber targets.                                           the attacker is outmatched. Because of the attacker’s
                                                                                   familiarity with the infrastructure,
                                                                                   cyberspace offers an opportunity
                                                                                   to extend the landscape to a virtual
While there is a great deal of focus on current                                    domain where both key economic
                                                                                   and national security dynamics are
cyber security issues, there is very little focus on truly                         at play. Individual, commercial,
defining and exploring the cyber threat environment at                             national, and international activities
a higher level, its unique dynamics, and the potential                             all work and socialize in this
                                                                                   domain, increasing the space to
impact on our economy and national security.                                       attack and defend.

                                                                                                         In this domain, it is not necessary
                                                                                                         for a peer-on-peer relationship to be
                                                                                                         present, nor is it necessary for the
attacker’s Familiarity with the Cyber infrastructure.                            attacker to be victorious. The lone individual, the criminal
Attackers derive an advantage in preparing and executing                         group, or a developing country can be just as dangerous
an attack from their familiarity with the hardware and                           as the well resourced and situated advanced player. The
software the victim uses. The attacker can experiment and                        disadvantage lies with states and global commercial interests
perfect an attack on the same commodity infrastructure his                       whose equities rely on the Internet and interconnectivity
victim is likely to have. Part of the cost of using a cookie                     for national security and economic trade. while every
cutter computing platform has been to give attackers                             nation is vulnerable, there are places that offer particularly
the blueprints to our infrastructure. These blueprints,                          lucrative launch points for the hacker. Failed states enable
combined with the complexity of the infrastructure that                          opportunities for hackers, as they do for criminals and
gives them a place to hide, are all they need. The                               terrorists. These states are simply not resourced, or they
software architecture is both intricately complex and                            are too corrupt to bring governance, law, or order to
relatively inexpensive, resulting in economies of scale                          bear on the issue. There are other nations that tolerate
that complicate cost metrics. we have taken advantage                            hackers within their borders so long as they are not the
of this economic leverage to such a degree that virtually                        victim themselves.
everyone has a clone of everyone else’s infrastructure. A
cyber threat retains an advantage due to the inscrutable
complexity of IT infrastructure but also to its ubiquity as an
inexpensive commodity.




Terry Roberts. Executive Director Interagency and Cyber, Carnegie Mellon, SEI Cyber Intelligence - Foundational to Cyber Mission Assurance. February 8, 2011
1



8 | Intelligence and national Security Alliance | www.insaonline.org
Exploiting the Current Defense paradigm.
As in other forms of asymmetric warfare,
a perimeter defense is not effective. In            Because of the attacker’s familiarity with the
cyberspace, it is all the more challenging          infrastructure, cyberspace offers an opportunity
with the extra obstacles of time, technology,
                                                    to extend the landscape to a virtual domain
laws, and attribution, among others.
Attackers continue to migrate from less             where both key economic and national security
sophisticated denial of service operations          dynamics are at play.
to very complex attacks. The Stuxnet attack
on select networks that operate centrifuges
in nuclear facilities provides an example.
Attackers now assume legitimate identities                  as the speed of networks increases, it allows the
to illegally procure intellectual property and conduct      perpetrator to maintain the initiative. The hacker can
other operations. Attackers also insert command and         take full advantage of the speed of hardware, software,
control code that lies in wait inside a victim’s network    and communications technology upgrades to expedite
until activated to conduct a pre-designated activity.       his/her attack vectors. The defender is continuously in a
They are increasingly able to manipulate the content        game of catch-up. As the defender identifies new attacks
of information in order to meet their objective and         and implements new security measures under ever tighter
influence the actions of the victim. All of these actions   timelines, the attacker simply continues to outrun these
can be easily perpetrated from locations thousands of       measures. For example, some criminals now sell an instant
miles away at a time of the perpetrator’s choosing with     identification service of ongoing on-line transactions to
chilling effect.                                            customers who then are able to steal money in that same
                                                            time space.
Time Favors the attacker.
The dimension of time has changed the threat environment,      shared Threat and shared Responsibility.
favoring the attacker. Attacks from around the globe
                                                 Today’s cyber threat dynamic is a shared threat among
happen in seconds, transiting through multiple waypoints
                                                 public, private, and government entities. This common
that often mask their movement to the victim. The lack
                                                 threat creates additional and unprecedented risks,
of geographic boundaries permits optimized, virtual
                                                 realities, and vulnerabilities. The attacker can use the
routing to the destination. If the attacker is successful in
                                                 same mechanism to strike multiple targets. Civilian
breaching a network’s perimeter, the attacker can move
                                                 “casualties” and collateral damage are very likely. For
quickly, slowly, or lie dormant, depending on the nature
                                                 example, attacks on critical infrastructure, like electricity,
of the victim’s network and intruder’s intent. Additionally,
                                                 can have second and third order effects on hospitals,
                                                                         emergency services, and other
                                                                         unintended victims. Cyber threats
                                                                         can breach touch-points between
Cyber science, engineering, and domain are in their
                                                                         government unclassified and
infancy, and all are being driven at the speed of                        classified systems. In the absence
continuous technological development. Little is designed                 of a completely new Internet
                                                                         architecture, the public and
with the strategic vision to systematically mitigate threats.            private sectors are intrinsically
                                                                         linked, interdependent, and must
                                                                         collectively devise and adopt
                                                                         solutions to be effective.




                                                                                               InSA CyBER InTEllIgEnCE wHITE PAPER | 9
II. IMPACT oF CyBER ATTACkS
    AnD CoST oF CyBER SECuRITy:                                                         THE EConoMICS



T
      he two overarching costs from the cyber threat dynamic are the losses due
      to an intrusion and the expense of providing and maintaining security. In the                                We are not
      cyber environment the low cost of entry and easy access creates an asymmetric                                effectively or
environment for “piracy and plunder.” Anyone with a computer can be a pirate
whether he or she is working for a state government or out of his/her garage. In
                                                                                                                   comprehensively
2003 estimates of losses due to cyber attacks ranged from $13 billion to $226                                      collecting and
billion.2 while these estimates are often challenged, the impact is certainly                                      assessing key
significant, and the key risks and costs we incur by not effectively addressing the
breadth of threats to the cyber domain must be addressed.                                                          data points to tell
                                                                                                                   us the cumulative
aMBiGuOus EsTiMaTEs OF ECOnOMiC COsTs.                                                                             impact and
The first challenge we face is determining the quantifiable effects of cyber attacks
                                                                                                                   cost of all of
and security. The absence of accurate damage assessments is a critical shortcoming.
Many researchers have published diverse estimates of the actual and potential                                      our respective
economic costs. kshetri (2010) quotes an FBI/McAfee study as estimating uS costs                                   government and
of cybercrime at $400 billion annually.3 Anderson (2010) estimates the potential
losses from a successful cyber attack on the uk’s petroleum infrastructure to be on
                                                                                                                   industry losses
the order of hundreds of billions of dollars.4                                                                     of intellectual
The impact on business, government, and individuals from cyber attacks has
                                                                                                                   property and
progressed significantly from distraction and moderate disruption to an inability to                               personal data.
operate or communicate for days. Typically in commerce, the potential for dishonest
interactions and financial losses has been coupled with the recognition that this
could be quantified, managed, and included as a business cost. However, cyber
disruptions are not always correlated to IP losses, financial theft, or IT sabotage.
This clouds the impact and increases risk to businesses and governments. we
have advanced beyond mere “acceptable levels of loss” to levels where effective
ownership of an individual’s, company’s, or country’s finances, operations and
intellectual property may be at stake. The impact has increased in magnitude, and
the potential for catastrophic collapse of a company has grown. However, it is not
yet clear that the business community understands or accepts this increase in risk.
The bottom line is that we are not effectively or comprehensively collecting and
assessing key data points to tell us this important story – the cumulative impact and
cost of all of our respective government and industry losses of intellectual property
and personal data.




2
    www.cisco.com/warp/public/779/govtaffairs/images/CRS_Cyber_Attacks.pdf. 3 Kshetri 2010.   4
                                                                                                  Anderson 2010.

10 | Intelligence and national Security Alliance | www.insaonline.org
CRiTiCaL inFRasTRuCTuRE:
a sECuRiTY iMpERaTiVE.
Critical infrastructure is at significant risk        Today’s cyber threat dynamic is a shared threat
to this form of warfare. Much of the
world’s critical infrastructure, including in
                                                      among public, private, and government entities.
the energy, finance, and transportation
sectors, was created and netted
before the security imperative became
                                                                in space, worst case attack or warfare scenarios at the
apparent. Even if the infrastructure has modernized
                                                                high end of conflict can mean the complete breakdown
security features, it remains vulnerable to attackers who
                                                                of daily life as we know it. Simulations of a weaponized
find entry via legacy software that provides trap doors
                                                                cyber attack against our global telecommunications
into the larger, modernized network.
                                                                executed against military and government systems,
                                                                industry, and critical infrastructure portend the significant
RisKs TO iDEnTiTY anD inFORMaTiOn sECuRiTY.                     risk associated with our dependency on information age
legitimate IT users must constantly question whether the        systems. At the mid-point of the threat spectrum, there
equipment is leaking their information. Average users are       are potential losses of trust in the decision, control, and
becoming more aware that the first time they may know           execution functionality we have come to associate with
of exfiltration of their data is when they read it in the news  modern precision engagement warfare. At the lower
or when an adversary uses it against them. Today, users         end of threat, ideas, data, and resources are stolen;
must choose either to keep their information “off the grid”     functionality is hacked; service is denied; and privacy
or to take an unquantifiable risk that it will end up in the    and civil liberties are violated. our lives and institutions
wrong hands. The cost of losing proprietary or personal         can generally be disrupted, probed, and exposed.
information must be constantly considered alongside the
opportunity cost of sequestering information from our           Impacts and risks our society faces based upon today’s
networked IT infrastructure. likely, it is the most innovative, incoming cyber threats include:
sensitive, or insightful (and thus useful) information that has •	Theft	Resulting	in	Loss	of	Federal	Resources. This
the greatest need for legitimate, but controlled, sharing.         could result in “the release of sensitive or classified
unfortunately, this information is often either over-controlled    government information; the disruption of critical
or too easily accessible. This continuous set of choices           information; and the undermining of agency
is very real and costly in time, technology, management,           missions.”5 This fundamentally threatens our
and bureaucracy.                                                   national security.

                                                                 •	Disruption	of	Our	Nation’s	Telecommunications. our
THE THREaT sTaKEs aRE HiGH anD EVER inCREasinG in                  nation’s prosperity depends on assured and highly
THE CYBER DOMain.                                                  performing information systems. The reliance of stock
At the high end of the threat spectrum, national survival          markets and financial institutions on the Internet and
could potentially be at stake in the most extreme                  associated networks, as well as the operational
circumstances. our dependencies on net-centricity, IT              requirements for command and control by our
and telecommunications, and the related microelectronics           diplomatic, military, and intelligence organizations
and paths that facilitate information age processes have           identify our digital infrastructure as a critical national
become vulnerabilities for virtually all modern states. using      security asset. The President has pledged to make
the broadest definition of “cyber” as part of information          this infrastructure “secure, trustworthy, and resilient.”6
operations, including both the kinetic (e.g. EMP) and              Cyber threats expose this infrastructure to
                                                                   significant risk.
non-kinetic threats to our modern decision and control
processes, and by adding our increasing vulnerabilities




5
    Montalbano 2010.   6
                           Goldsmith 2010.

                                                                                            InSA CyBER InTEllIgEnCE wHITE PAPER | 11
•	Increased vulnerability to our Critical
  Infrastructure. we continue to push initiatives
                                                                            The reliance of stock markets and financial
  for deeper integration of information systems                             institutions on the Internet and associated
  of all sorts (e.g., energy “smart grid,”                                  networks... identify our digital infrastructure
  medical records, and air-traffic control)
  with the Internet.7 This integration is driven                            as a critical national security asset.
  by powerful economic incentives on the
  part of both business and government.8
  This integration creates the possibility of a
                                                                                         approaches cannot keep up. Examples include distributing
  multiplier effect of cyber attacks.
                                                                                         “up-to-date” malware signatures when much of today’s
•	Short-Term goals versus long-Term vision of Cyber                                      malware presents a unique signature for every infection;
  Security. In the early days of the Information Age,                                    searching for an “optimal” operating system security
  government and industry reaped the benefits of                                         configuration and then replicating it in a monoculture
  productivity and economic gain associated with IT                                      across a large network; conducting thousands of hours
  and the Internet. However, they have probably not                                      of “extensive” testing that covers only a small fraction of
  sufficiently invested in properly securing these critical                              a system’s total space; and imposing new programming
  infrastructures. we will experience long-term costs if                                 paradigms in the mistaken belief that they can eradicate
  these systems are disrupted or incapacitated. Security                                 vulnerabilities from software.
  vulnerabilities in information technology represent a
  market externality because the costs from insecurity
                                                                                         inEFFiCiEnCiEs OF THE CYBER aRMs RaCE.
  are either not borne by the party best able to address
  them (PC industry, cell phones) or do not fully represent                              Attempting to secure our systems under current cyber
  the cost to society (critical infrastructure)9. Economic                               practices is a costly, ineffective, and never-ending
  incentives of industry are aligned against sharing of                                  struggle. we must avoid an offensive-defensive cyber
  information about security threats and actual security                                 “arms race” which consumes extensive resources, yet fails
  incidents.10 As an example of one kind of disincentive,                                to produce an enduring or definitive outcome. At best,
  the share price of companies reporting a significant                                   adversaries struggle for strategic parity, with one ending
  cyber breach fell an average of 1 - 5 percent.11                                       up bankrupt and all having little to show for it. At worst,
                                                                                         an adversary conceives of the problem from a different
a REaCTiVE anD COsT inTEnsiVE appROaCH.                                                  perspective (unbeknownst to us), and we are blindsided
                                                                                         through technological surprise.
Significant time and resources are spent in cumulative
attempts to address the latest threat vector and to improve                              we need to systematically collect key metrics on all of
cyber security. Federal Information Security Market,                                     the above activity levels from government and industry so
2010-2015, indicates that demand for vendor-furnished                                    that the real impact is known and the top risks identified
information security products and services by the u.S.                                   can become the priority for resolution. The irony of
federal government will increase from $8.6 billion in                                    reporting the impact of a cyber breach is that reporting
2010 to $13.3 billion in 2015 at a compound annual                                       also puts the company or government agency “on report”
growth rate (CAgR) of 9.1 percent.                                                       to all. Therefore, this key data should be collected by a
                                                                                         not-for-profit, trusted third party, and the trends and the
These huge government expenditures result in only
                                                                                         cumulative impacts should be shared with all in a non-
momentary benefit because the threat vectors are moving
                                                                                         attributable manner.
at the speed of technology, and our current, reactive

7
    Goldsmith 2010. 8 Anderson 2010.   9
                                           Anderson 2010.   10
                                                                 Anderson 2010.   11
                                                                                       Cashell 2004.

12 | Intelligence and national Security Alliance | www.insaonline.org
III. THE RolE oF InTEllIgEnCE In THE CyBER AREnA

T
      he previous two sections have addressed the cyber threat dynamic and the
      impact of cyber attacks and security. As in any form of security, intelligence               Effective cyber
      is a key component of tactical and strategic decision-making. Effective cyber
                                                                                                   intelligence will
intelligence will enhance our ability to assess the effects of cyber attacks (a critical
shortcoming identified in the previous section), mitigate risks associated with the                enhance our
threat, and streamline cyber security into an efficient and cost-effective process                 ability to assess
based on well informed decisions.
                                                                                                   the effects of
DEFininG THE THREaT inTELLiGEnCE MissiOn (a pHiLOsOpHiCaL TuTORiaL).                               cyber attacks,
The role of intelligence in any capacity is to collect, analyze, and produce                       mitigate risks
information to provide complete, accurate, timely, and relevant threat assessments to              associated with
inform decision makers who act on the information. It is usually most effective when
it is disseminated at the lowest possible classification level for the maximum number              the threat, and
of relevant users facing these threats. In performing this mission, the intelligence               streamline cyber
agencies seek to penetrate actual or potential threat targets consistent with national             security into an
strategic, operational, and tactical priorities. These agencies then seek to produce
intelligence on adversary or threat capabilities and intentions in a manner that                   efficient and
“connects” with the maximum number of relevant customers.                                          cost effective
                                                                                                   process based
THE ROLE OF THREaT inTELLiGEnCE pROCEssEs TO DRiVE aCTiOns.
Intelligence and threat analysis does not exist for its own purposes. when threat
                                                                                                   on well informed
details are suppressed or ignored, national security incurs significant consequences.              decisions.
It is important to sustain a high level of performance in the dynamic cyber
arena. This environment is where threats develop rapidly and are fueled by new
concepts for the use of pervasive IT. new waves of innovative capabilities seem
to break over users in tsunami fashion, be it the coming cloud architectures or the
continuing revolution in personal devices connected to the networks. given this
relentless and constantly unfolding environment, intelligence might be successful
in keeping pace with technological innovation. Conversely, it might be slow,
or even wrong in its assessments of the threat dynamic. It is therefore important
to evaluate public and private cyber intelligence activities that support these
security missions in a strategic manner.

THE “CYBER inTELLiGEnCE COMMuniTY.”
This unique, currently ad hoc, community is made up of government, telecommunication
and internet providers, CERTs, and other formal information security entities, specialty
companies, and vendors. The members of this community engage in a myriad of
activities that could be the potential victim of a cyber threat. This “Cyber Intelligence
Community” is currently an informal coalition of the willing that collects and analyzes
unclassified and classified cyber intelligence data and trends. There is no formal
mechanism across industry and government cyber intelligence entities that successfully
collects, processes, and analyzes all identifiable key cyber threat behavior and reports
it at an unclassified or reasonable classification level to all appropriate customers. An
effective connection between intelligence provider and the customer means that the
customer has understood and internalized the intelligence resulting in action to work
the intelligence and mitigate the threat. good intelligence professionals relentlessly
                                                                                            InSA CyBER InTEllIgEnCE wHITE PAPER | 13
pursue interactions with              The “Cyber Intelligence Community” is currently an informal
customers to ensure that:
the data is collected,
                                      coalition of the willing that collects and analyzes unclassified
analyzed, and conveyed;               and classified cyber intelligence data and trends.
the intelligence serves
customers’       purposes;
and some action is being
                                                                Human Intelligence (HuMInT), open Source Intelligence
taken (or deliberately
                                                                (oSInT), geospatial and Measurement Intelligence
not taken). This cycle can be referred to as a constant
                                                                (gEoInT), and the volumes of unclassified network data
process of story-finding, story-telling, story-updating, story-
                                                                and behavior being watched by global CERTs. Continuous
listening, and story-heeding. A concept to institutionalize
                                                                liaison among all related parties is critical so that sharing
this ad hoc community is currently missing.
                                                                is seamless. This ensures an evolving, improved level of
                                                                insight and reporting to an increasingly secure and highly
CYBER COnFLiCT DOEs nOT ExisT in a VaCuuM.                      performing cyber environment for all.
The Joint Chiefs of Staff Pub 1 (unclassified) definition of
Information warfare integrates Electronic warfare/Attack,       This evolving cyber intelligence tradecraft requires deep
Computer network operations (for offense, Defense,              and powerful technical and analytic expertise at all levels.
and Exploit), Military Information Support operations           Such technical talent and related capabilities remain
(MISo) (previously psychological operations), operational       ill-defined and in short supply across government and
deception, and operational security. These operations           industry. An institution that has made some headway in
can be kinetic and/or non-kinetic. There are adjacent           this regard is the Information Assurance Directorate (IAD)
definitions for Strategic Communications, Space-related         at the national Security Agency. IAD is the front line
missions, Covert Action, etc. when these missions are           of the defensive cyber mission. It commands substantial
successfully integrated together by a capable adversary         resources, high performing talent, strong processes,
in time and space to create the maximum effects, the            and informed outreach. It also works hand in hand with
results can be devastating. The cyber arena has these           military, public, and private partners to ensure that our
universal adjacencies and overlapping considerations            cyber capabilities and intellectual property are defended
which intelligence managers must take into account for          and that our defense is informing offense and vice versa.
offensive planning and execution, as well as in building        IAD is a good start, but we must emulate their good
and operating defensive resilience and response.                practices and innovativeness in defining professional
                                                                attributes, associated education, and training goals for
inVEsTinG in CYBER inTELLiGEnCE TRaDECRaFT,                     the unique career fields associated with the cyber realm.
sKiLL sETs, anD CapaBiLiTiEs.                                           The vast majority of the dangerous activity occurs
A substantial and continuing investment in cyber                        within the .com domain (as opposed to the .gov or .mil
intelligence should be a strategic imperative in the                    domains) and over 90 percent of the threat data and
information age. It is also imperative to use that                      analytics are unclassified. Therefore, as a nation, we
intelligence to safe guard our ability to maintain security.            have systematically relegated the identification, tracking,
we must ensure that stable domestic and international                   and reporting of this threat to the network operations
economies are not jeopardized by possible conflict with                 arena and IT professionals without the inclusion of the
rival powers, rogue states, failing or failed states, modern            invaluable expertise and the analytic tradecraft of the
terrorists and thieves, and wMD proliferators. All formal               u.S. Intelligence Community.
and informal intelligence disciplines contribute to these
imperatives, including Signals Intelligence (SIgInT),

14 | Intelligence and national Security Alliance | www.insaonline.org
Iv. AREAS FoR FuRTHER DISCuSSIon AnD REvIEw

o
         ur national ability in the area of cyber intelligence remains unclear. There
         is evidence that we are collecting effectively in this complex area. There is           As a nation,
         sound open source evidence that we are acquiring significant cyber and                  we have
information warfare capabilities. unfortunately, as a nation, we remain exposed
and vulnerable to focused cyber threats. The uncertainty associated with this situation
                                                                                                 systematically
raises many questions including:                                                                 relegated the
Does the rush to play in the capability and profit arenas of Information Age markets
                                                                                                 identification,
simultaneously drive us to a potential abyss, by causing us to ignore, play down,                tracking, and
over-classify, or restrict the inconvenient cyber truths required to have information            reporting of
security and assurance concurrently?
                                                                                                 this threat to
Are our innovative endeavors so focused on markets and functionality that we                     the network
cannot simultaneously innovate to some low, medium, and high levels of information
security and overall hardening in the process?                                                   operations
                                                                                                 arena and IT
Has intelligence done a sufficient job of informing the community and public on
cyber threats writ large?                                                                        professionals
one can infer the answer to these questions is negative since there is a universal
                                                                                                 without the
clamor in many concerned public and private quarters that more needs to be done                  inclusion of
to distribute timely threat data, situational awareness and warning. This needs to               the invaluable
be data that has specific details, not just data at a high level. The u.S. military has
been so overwhelmingly superior globally against niche adversaries who threaten in
                                                                                                 expertise and
certain dimensions that we have not had to face the comprehensive specter of real                the analytic
cyber warfare. literature has been full of stories of looming or developed threats               tradecraft of the
which, under the worst circumstances, can have grave implications for defense and
national critical infrastructure in terms of conflict and crisis functionality.                  U.S. Intelligence
                                                                                                 Community.
virtually the entire u.S. Intelligence Community (working with extended partners) is
involved to one degree or another in cyber threat matters. The means exist, albeit
often at the classified levels, to collect, analyze and produce estimative and fact
based data on both an in-depth research analysis basis or as current intelligence.
Some organizations like nSA, CIA, DIA, DHS and the military services are more
involved than others. However, the actual handling and security classifications of
threat information are pervasive problems in disseminating cyber intelligence. new
ways need to be found to clear those who need to know, quickly sanitize the




                                                                                          InSA CyBER InTEllIgEnCE wHITE PAPER | 15
data, or not classify information
to maximize the widespread
and       detailed    effectiveness.
                                                   We must consider a national intelligence consortium
Classification should only be                      or federation and defined public-private partnership
used when there is a requirement                   concepts, which could implement an effective continuous
to protect sources and methods
or as it relates to our own attack
                                                   capability of collecting, organizing, analyzing,
or exploit means. we need to                       disseminating and leveraging threat intelligence.
develop sharing concepts on both
threats and solutions, so that every
effort is expended to disseminate
the details to federal, state,
local, tribal, private, and key                                  intelligence. This cannot be left to the formal u.S. defense
foreign partners.                                                and intelligence communities alone because their equities
                                                                 exist on narrower national security lines. Additionally, the
DEaLinG WiTH LaRGE-sCaLE, COMpLEx naTiOn-sTaTE OR                u.S. government has only a limited role in developing
                                                                 the current family of digital age software, hardware,
MaRKETpLaCE pROBLEMs.
                                                                 and global telecommunication networks being used or
organizing for success is the key, and it should be
                                                                 designed for the future.
underpinned with strong governance to drive and/
or track results. overall, we must consider a national
intelligence consortium or federation and defined public-        iDEnTiFYinG THE CusTOMERs.
                                                  Assuming we will optimize the creation and dissemination
private partnership concepts, which could implement an
                                                  of cyber intelligence at every appropriate level, we need
effective continuous capability of collecting, organizing,
analyzing, disseminating and leveraging threat    to understand the customer set for threat intelligence. This is
                                                                         a key question because if there are
                                                                         to be strong connections between
                                                                         government and industry partners,
                                                                         we must define, understand, and
We need to develop sharing concepts on both threats                      establish their respective roles
and solutions, so that every effort is expended to                       and alignments to create a cyber
disseminate the details to federal, state, local, tribal,                intelligence consortium analyzing
                                                                         and reporting current threats and
private, and key foreign partners.                                       serving customers.




16 | Intelligence and national Security Alliance
COnCLusiOns.
In response to the preceding                  Overall, we must consider a national intelligence
paragraphs, we make the following             consortium or federation and defined public-private
suggestions    across    industry,            partnership concepts, which could implement
academia and government.
                                              an effective continuous capability of collecting,
1. Continue to promote discussion,
                                              organizing, analyzing, disseminating and
   debate, and action on
   systematically defining and                leveraging threat intelligence.
   establishing effective cyber
   intelligence approaches,
   enduring professions, needed
   skill-sets/training/education and
   technologies:                                             •	Identify the specific technical means utilized or
                                                               planned for cyber attack operations in deep
   •	Development of strategies (beyond current “patch          technical detail to include supply chain issues,
     and pray” processes), policies, doctrines, legal          paths to be exploited, nature and character of
     frameworks, and overall global context for cyber          deployed infections, systems/product weakness,
     intelligence matters                                      effects, and anticipated planned or ongoing
                                                               adjacent activities
   •	Increase global business, diplomatic and other
     forms of engagement, which should discuss               •	Maintain detailed cyber situational awareness
     potential ways to create more stability and mutual        writ large
     security in the cyber arena in order to reduce the
     potential for cyber conflict, theft, sabotage, and      •	Participate in the rapid control and release
     espionage                                                 of cyber means in order to ensure a viable
                                                               intelligence gain and loss awareness
   •	Support development of deterrence, dissuasion,
     and other high level concepts and measures for          •	Identify what criminal activities are ongoing or
     maintaining peace and stability at all levels of          have already happened in cyber networks, do
     conflict and crisis                                       formal damage assessments in these areas, and
                                                               support development of improved defenses
   •	Define cyber intelligence professions, needed
     skillsets, training, and education for both industry    •	Partner on research and development in the
     and government needs                                      challenging areas of attack attribution, warning,
                                                               damage assessment, and space related threat
2. Enable the creation of cyber intelligence related           collection and analysis
   polices, approaches, and pilot efforts across
                                                             •	organize and support counter-intelligence and
   industry, academia/non-profits, and government
                                                               counter-espionage (CI/CE) activities, with special
   that provide unclassified situational awareness and
                                                               focus on identifying/using auditing tools and
   indications and warning data, analytics and 24/7            processes to deal with the insider threats
   unclassified and classified (as appropriate) reporting
   to government agencies, trusted industry, and global      •	Create a consistent and meaningful approach for
   partners:                                                   the cyber equivalent of Battle Damage Assessment
                                                               (BDA)/Combat Effectiveness Assessment
   •	Corporately define specific activities, plans, and
     intentions of adversaries; continuously identify
     current and emerging threat vectors, and support
     our plans and intentions




                                                                                   InSA CyBER InTEllIgEnCE wHITE PAPER | 17
3. Establish public-private
   partnership cyber outreach
   forums that address these areas                         We believe there is an urgent need to better define and
   in a comprehensive, practical,
   and executable fashion. These
                                                           develop cyber intelligence as a new discipline in the
   forums can take the form of                             IC. Such a discipline will also demand discussion of
   commissions that study the                              the unique training, education, skill sets, and tradecraft
   demand for cyber intelligence
   and value added to                                      that will be required to successfully conduct meaningful
   cyber security.                                         collection and analysis in the cyber domain.
4. The dilemma that exists in
   the current cyber intelligence
   apparatus is that DHS has
   the authority but lacks the                                          we believe there is an urgent need to better define
   experience and capabilities to orchestrate a                         and develop cyber intelligence as a new discipline in
   comprehensive approach to cyber intelligence.                        the IC. Such a discipline will also demand discussion of
   DoD has much of the actual cyber intelligence                        the unique training, education, skill sets, and tradecraft
   capabilities, and private industry owns most of the                  that will be required to successfully conduct meaningful
   infrastructure. ultimately, InSA’s Cyber Council                     collection and analysis in the cyber domain. These and
   would like to see a meaningful partnership among all                 related topics, such as the role of cyber intelligence in
   relevant government agencies and the private sector                  other aspects of cyber operations and who is best suited
   to ensure seamless sharing of threat information,                    to develop this discipline, will be the subject of further
   timely analytical judgments, and reasoned,                           discussion and white papers by the InSA Cyber Council.
   measured responses to clear threats.

As stated earlier, there is clearly a great deal of focus
on cyber security issues. Hardly a day goes by without
some news of a major hacker attack on government
and industry information infrastructure or reports of a
significant security breach. The economic and national
security ramifications are apparent. our ability to truly
define, explore and analyze this cyber threat environment
in a thoughtful, methodical manner at a reasonable level
of classification is not yet well developed.




18 | Intelligence and national Security Alliance | www.insaonline.org
aBOuT insa
   InSA is the premier intelligence       and
   national security organization         that
   brings together the public, private    and
   academic sectors to collaborate         on
   the most challenging policy issues     and
   solutions.

   As a non-profit, non-partisan, public-
   private organization, InSA’s ultimate goal
   is to promote and recognize the highest
   standards within the national security and
   intelligence communities.

   InSA has over 150 corporate members
   and several hundred individual members
   who are leaders and senior executives
   throughout government, the private sector
   and academia.




To	learn	more	about	INSA	visit	www.insaonline.org.
INTeLLIgeNce	AND	NATIONAL	SecuRITy	ALLIANce
Supporting advanceS in the national Security agenda

901 north Stuart Street, Suite 205, arlington, va 22203
(703) 224-4672 | www.insaonline.org

Weitere ähnliche Inhalte

Was ist angesagt?

Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence WorkshopPriyanka Aash
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in securityOsama Ellahi
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightDeep Shankar Yadav
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsRahul Neel Mani
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat IntelligenceSirius
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Puneet Kukreja
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceSyed Peer
 
Cyber intelligence for corporate security
Cyber intelligence for corporate securityCyber intelligence for corporate security
Cyber intelligence for corporate securityG3 intelligence Ltd
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixFrode Hommedal
 
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering SystemThe Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering SystemNiran Seriki, CCISO, CISM
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghOWASP Delhi
 

Was ist angesagt? (20)

Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in security
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber intelligence for corporate security
Cyber intelligence for corporate securityCyber intelligence for corporate security
Cyber intelligence for corporate security
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence Matrix
 
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering SystemThe Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
 
TiC
TiCTiC
TiC
 

Andere mochten auch

The anatomy of russian information warfare
The anatomy of russian information warfareThe anatomy of russian information warfare
The anatomy of russian information warfareMousselmal Tarik
 
Fox news vs. anonymous (Propaganda made in USA)
Fox news vs. anonymous (Propaganda made in USA)Fox news vs. anonymous (Propaganda made in USA)
Fox news vs. anonymous (Propaganda made in USA)Mousselmal Tarik
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operationsClifford Stone
 
NSA Journal of Information Warfare
NSA Journal of Information WarfareNSA Journal of Information Warfare
NSA Journal of Information WarfareDavid Sweigert
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)Valeriu Margescu
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Jorge Sebastiao
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015AFCEA International
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins ResumePaul Mullins
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502Bill Hagestad II
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsMikko Jakonen
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...AFCEA International
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Jorge Sebastiao
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Ulrich Janßen
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)TBSS Group
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015AFCEA International
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015AFCEA International
 

Andere mochten auch (20)

The anatomy of russian information warfare
The anatomy of russian information warfareThe anatomy of russian information warfare
The anatomy of russian information warfare
 
Fox news vs. anonymous (Propaganda made in USA)
Fox news vs. anonymous (Propaganda made in USA)Fox news vs. anonymous (Propaganda made in USA)
Fox news vs. anonymous (Propaganda made in USA)
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
NSA Journal of Information Warfare
NSA Journal of Information WarfareNSA Journal of Information Warfare
NSA Journal of Information Warfare
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
HA10 – Task 1
HA10 – Task 1HA10 – Task 1
HA10 – Task 1
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015
 

Ähnlich wie Insa cyber intelligence 2011

Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmapAjay Ohri
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...DaveNjoga1
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASCDavid Sweigert
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
D20110714cyber
D20110714cyberD20110714cyber
D20110714cybernitay123
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Silvia Cardona
 
Narus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperNarus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperTrobough
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryWilliam Beer
 

Ähnlich wie Insa cyber intelligence 2011 (20)

Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmap
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 
DoD Cyber Strategy
DoD Cyber StrategyDoD Cyber Strategy
DoD Cyber Strategy
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
D20110714cyber
D20110714cyberD20110714cyber
D20110714cyber
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014
 
Narus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperNarus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position Paper
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec Summary
 

Mehr von Mousselmal Tarik

Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »
Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »
Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »Mousselmal Tarik
 
09 06-11-eotm-european-minifigure-union
09 06-11-eotm-european-minifigure-union09 06-11-eotm-european-minifigure-union
09 06-11-eotm-european-minifigure-unionMousselmal Tarik
 
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...Mousselmal Tarik
 
Cia culture-intelligence-berrett-cultural topography
Cia culture-intelligence-berrett-cultural topographyCia culture-intelligence-berrett-cultural topography
Cia culture-intelligence-berrett-cultural topographyMousselmal Tarik
 
Night For Life Dossier De Presse
Night For Life   Dossier De PresseNight For Life   Dossier De Presse
Night For Life Dossier De PresseMousselmal Tarik
 
Les Echos 051009 Total Mauvaise Image
Les Echos 051009 Total Mauvaise ImageLes Echos 051009 Total Mauvaise Image
Les Echos 051009 Total Mauvaise ImageMousselmal Tarik
 
Les Echos 2009 Alvin Toffler
Les Echos 2009 Alvin TofflerLes Echos 2009 Alvin Toffler
Les Echos 2009 Alvin TofflerMousselmal Tarik
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperMousselmal Tarik
 
Eiaa Marketers Internet Ad Barometer 2009 Pr Presentation
Eiaa Marketers Internet Ad Barometer 2009 Pr PresentationEiaa Marketers Internet Ad Barometer 2009 Pr Presentation
Eiaa Marketers Internet Ad Barometer 2009 Pr PresentationMousselmal Tarik
 

Mehr von Mousselmal Tarik (20)

Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »
Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »
Baromètre des Valeurs des Français 2014 : « Moi, beau et méchant ! »
 
China’s Three Warfares
China’s Three WarfaresChina’s Three Warfares
China’s Three Warfares
 
09 06-11-eotm-european-minifigure-union
09 06-11-eotm-european-minifigure-union09 06-11-eotm-european-minifigure-union
09 06-11-eotm-european-minifigure-union
 
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...
Hii the convergence_of_google_and_bots_-_searching_for_security_vulnerabiliti...
 
Information as power
Information as power  Information as power
Information as power
 
Cia culture-intelligence-berrett-cultural topography
Cia culture-intelligence-berrett-cultural topographyCia culture-intelligence-berrett-cultural topography
Cia culture-intelligence-berrett-cultural topography
 
Stolen iPad CNN
Stolen iPad CNN Stolen iPad CNN
Stolen iPad CNN
 
Night For Life Dossier De Presse
Night For Life   Dossier De PresseNight For Life   Dossier De Presse
Night For Life Dossier De Presse
 
Les Echos 051009 Total Mauvaise Image
Les Echos 051009 Total Mauvaise ImageLes Echos 051009 Total Mauvaise Image
Les Echos 051009 Total Mauvaise Image
 
99 Tips E Version
99 Tips E Version99 Tips E Version
99 Tips E Version
 
Les Echos 2009 Alvin Toffler
Les Echos 2009 Alvin TofflerLes Echos 2009 Alvin Toffler
Les Echos 2009 Alvin Toffler
 
Right Ear
Right EarRight Ear
Right Ear
 
Twitter- Cyxymu
Twitter- CyxymuTwitter- Cyxymu
Twitter- Cyxymu
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone Paper
 
Eiaa Marketers Internet Ad Barometer 2009 Pr Presentation
Eiaa Marketers Internet Ad Barometer 2009 Pr PresentationEiaa Marketers Internet Ad Barometer 2009 Pr Presentation
Eiaa Marketers Internet Ad Barometer 2009 Pr Presentation
 
health is a new health
health is a new healthhealth is a new health
health is a new health
 
Pharell Vs Mcdonald's
Pharell Vs Mcdonald'sPharell Vs Mcdonald's
Pharell Vs Mcdonald's
 
Pharell Vs Mcdonald's
Pharell Vs Mcdonald'sPharell Vs Mcdonald's
Pharell Vs Mcdonald's
 
La Plaquette Des Restos
La Plaquette Des RestosLa Plaquette Des Restos
La Plaquette Des Restos
 
Pepsi Gravitational Field
Pepsi Gravitational FieldPepsi Gravitational Field
Pepsi Gravitational Field
 

Kürzlich hochgeladen

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 

Kürzlich hochgeladen (20)

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 

Insa cyber intelligence 2011

  • 1. ...setting the landscape for an emerging discipline... inTELLiGEnCE anD naTiOnaL sECuRiTY aLLianCE cyBer intelligence: Setting the landScape For an eMerging diScipline SEPTEMBER 2011
  • 2. ACknowlEDgEMEnTS insa CHaiRWOMan Frances Fragos Townsend insa sTaFF Ellen McCarthy, INSA President Chuck Alsup, INSA Vice President for Policy Jay Fox, INSA Senior Research Intern CYBER inTELLiGEnCE TasK FORCE EDiTinG TEaM Terry Roberts, Executive Director, Interagency & Cyber, CMU/SEI Bill Studeman, Independent Consultant CYBER inTELLiGEnCE TasK FORCE WRiTinG TEaM Barbara Fast, Vice President, CGI Michael Johnson, Senior Scientist/Computer Security Researcher, Sandia National Laboratories Dick Schaeffer, Riverbank Associates, LLC EDiTORiaL REViEW Joseph M. Mazzafro, Oracle National Security Group insa suppORTs a HEaLTHY pLanET InSA white Papers are printed on recycled paper that is 50% recycled content including 25% post consumer waste.
  • 3. ExECuTIvE SuMMARy E volving information systems technology has turned the cyber arena into a multi-dimensional attack space that extends the conventional landscape to a virtual domain where key economic and national security assets are exposed to significant threats. Individual, commercial, national, and international activities interact in this domain, increasing the space for offensive and defensive operations. Cyberspace is a haven for a broad range of disruptive operations, including reconnaissance, theft, sabotage, and espionage. It serves as an environment that allows threats to target hardware, software, financial assets, intellectual property, and individual identities. This paper is the first in a series developed by the Intelligence This paper assesses the cyber threat dynamic, economic and national Security Alliance’s (InSA) Cyber Council. It costs of cyber attacks and security, as well as the current is intended to broaden the vision of senior decision makers uS approach to cyber intelligence. Based on these in government and industry. our goal with this paper is assessments, we believe further discussion on the following to set the landscape for cyber intelligence by discussing topics across industry, academia and government would why it is necessary and providing thoughts on how to be a prudent investment in the future security and reliability approach the development of this function in the cyber of the increasingly important cyber domain. These topics domain. while there is a great deal of focus on current include the need to: cyber security issues, there is little focus on defining and 1. Systematically define and establish effective cyber exploring the cyber threat environment at a higher level. intelligence approaches, enduring professions, and Its unique dynamics and impact on our economy and needed skill-sets/training/education and technologies national security are understudied. In this paper, we will focus primarily on defensive cyber activities. There is a 2. Enable the creation of cyber intelligence related rapidly increasing need to fully leverage cyber intelligence policies, approaches, and pilot efforts across industry, assets and capabilities on a national and global scale academia/non-profits, and government that provide to address this ubiquitous, diverse, and evolving group unclassified situational awareness, indications, of adversaries. There is also a need to clearly define an warning data, analytics, and 24/7 unclassified and emerging cyber intelligence discipline that can be quickly classified (as appropriate) reporting to government and transparently shared with appropriate private and agencies, trusted industry, and global partners. The Cyber Council believes these pilot efforts are the most foreign partners. relevant value–added recommendations for setting The Cyber Threat Dynamic can be broken into three the landscape for cyber intelligence provided by this components: paper. • The Cyberspace Environment 3. Establish public-private partnership cyber outreach forums that address these issues/concerns in a • The Cyber Threat comprehensive, practical, and executable fashion • The Convergence of the Effects of the Cyberspace 4. Build a meaningful virtual partnership among all Environment and the Threat relevant agencies and the private sector to ensure The two overarching costs from the cyber threat dynamic seamless sharing of threat information, timely are losses due to adversarial activities and the expense analytical judgments, and reasoned, measured of providing and maintaining security. In cyberspace, responses to clear threats the low cost of entry and easy access creates an ultimately, effective cyber intelligence will begin to asymmetric environment in which public and private enable predictive, strategic warning regarding cyber sector organizations incur a disproportionate cost to threat activities, mitigate risks associated with the threat, defend compared to the consequence of attack. while enhance our ability to assess the effects of cyber intrusion, quantifiable assessments of the net impact of cyber attacks and streamline cyber security into a more efficient and cost are difficult to discern, the cost is great enough to warrant effective process based on well informed decisions. the need for a cyber security apparatus supported by sophisticated cyber intelligence. InSA CyBER InTEllIgEnCE wHITE PAPER | 3
  • 4. InTRoDuCTIon: ToDAy’S CyBER EnvIRonMEnT D uring the 20th Century, the united States experienced tremendous economic and industrial growth as inventors, entrepreneurs, and The United States policy makers partnered to turn ideas into labor saving and life as a whole has enhancing technology. During this time period, government and industry yet to put in needed to collaborate in unprecedented ways in order to serve national interests and meet security requirements. place systemic approaches, Advances in information systems technology enabled collaboration among individuals and states regardless of location. Innovation accelerated, and tradecraft, benefits to the united States overshadowed concerns about how these technologies, new capabilities might be used for malicious purposes. These same breakthroughs gave unprincipled individuals, organizations, and nations and end-to-end a new range of tools with which to perpetrate theft, fraud, sabotage, solutions across and espionage. government, A reactive patchwork of technology and processes with the purpose of academia, developing a preplanned comprehensive approach to constructing and and industry. using the global network emerged to address the deficiencies created by what was viewed as a temporary fad by these “hackers” and other unsavory interlopers. Historically, government and industry often collaborated on key technological innovations, like nuclear power, to utilize efforts for the common good. Today, government agencies and industry often seem to pursue separate (perhaps counter-productive) policies, in lieu of cooperating effectively to address incoming threats to our local and global network domains. The government, as in other areas, has unique insights into the threat space but cannot seamlessly share these insights with the very industries that own and operate over 90 percent of the telecommunications’ infrastructure and operations. This is further exacerbated by the common misperception that these threats are technical and tactical level attacks best handled at the unit or individual domain level. This bifurcated approach has resulted in the loss of precious years while the cyber threat vectors and activity levels have grown exponentially. Furthermore, the united States as a whole has yet to put in place systemic approaches, tradecraft, technologies, and end-to-end solutions across government, academia, and industry. while there is a great deal of focus on current cyber security issues, there is very little focus on truly defining and exploring the cyber threat environment at a higher level, its unique dynamics, and the potential impact on our economy and national security. we need to fully leverage cyber intelligence assets and capabilities to address this ubiquitous, diverse and ever evolving category of adversaries. This white paper addresses the following dimensions of the cyber threat environment: I. The new Dimension: Cyber Threat Dynamics III. The Role of Intelligence in the Cyber Arena II. Impact of Current levels of Cyber Attacks: Iv. Areas for Further Discussion and Review The Economics 4 | Intelligence and national Security Alliance | www.insaonline.org
  • 5. I. THE nEw DIMEnSIon: CyBER THREAT DynAMICS E merging information systems technology enables the cyber arena to extend the conventional landscape to a virtual domain where key economic and national There is a rapidly security assets are subject to threats. The convergence of the cyberspace increasing need environment and threat vectors creates a complicated dynamic. to fully leverage The Cyber Threat Dynamic can be broken into three components: cyber intelligence 1. The Cyberspace Environment assets and 2. The Cyber Threat capabilities on 3. The Convergence of the Effects of the Cyberspace Environment and the Threat a national and global scale to 1. THE CYBERspaCE EnViROnMEnT clearly define Cyberspace has become a global commons that has enhanced interaction, information exchange, and productivity. However, it is also a haven for a broad the emerging range of disruptive operations, including sabotage, reconnaissance, theft, and cyber intelligence espionage. It serves as an environment that allows threats to deny, disrupt, degrade, discipline. or destroy hardware, software, and intellectual property. The Relevance of the “information super-Highway.” Although the Internet and highway system analogy may be a bit of a cliché, commerce is instructive when examining the cyberspace environment and the economic impact of cyber intrusions. Imagine if businesses in the united States could not use the interstate system to reliably transport goods. Similarly, in the early days of overseas commerce, ships would often be captured by pirates and bandits who would rob merchants with impunity and little penalty. During world war II, merchant convoys relied on military escorts, which in turn, relied on industry for supplies and innovations. This symbiotic partnership between industry and government was foundational to the economic growth of this nation and the world economy. Today 90 percent of all commerce takes place on the seas, mostly without incident. The Internet has assumed an analogous stature in its role in financial transactions and the exchange of information. Protecting this “super-highway” is a global imperative for the public, private, and academic sectors. a Multi-Dimensional attack space. The cyber environment, coupled with technology, has created a new multi-dimensional attack space. There is an interconnection between the spatial, physical, logical, and social layers through which the adversary moves with impunity. The complexity of this attack space means that investigators must understand the relationship between these layers and pinpoint the perpetrator’s origin and intent in order to gain attribution. with the convergence of computers and telecommunications networks, the defenders must look at this problem as a whole and then disaggregate into its parts. There is a merging of wired, wireless, and optical technologies (networks and RF). whereas before enterprise networks might be viewed distinctly from hand- held devices or tactical radios, now the cyber network stretches from the enterprise network and its infrastructure to wireless devices being used at the tactical edge by the military, law enforcement, shoppers, or drivers using gPS-enabled devices. InSA CyBER InTEllIgEnCE wHITE PAPER | 5
  • 6. with each other. In most cases, laws have not kept pace with the technical ability of an adversary Ultimately, effective cyber intelligence will begin to move rapidly through national, to enable predictive, strategic warning regarding academic, commercial, and private internet service providers. cyber threat activities, mitigate risks associated The lexicon is especially confusing with the threat, enhance our ability to assess the because it remains immature. For example, there is no agreed effects of cyber attacks, and streamline cyber definition of what constitutes an security into a more efficient and cost effective attack on a nation or a breach process based on well informed decisions. of sovereignty. often theft, espionage, reconnaissance, or even simple hacking is described as an attack. Contrary to physical domains and sciences, this The Consequences of Outsourcing. environment is truly a complex and dynamic cyber- The u.S. government has significantly outsourced ecosystem that demonstrates unexpected emergent significant portions of the design, implementation, behaviors every day. Similar to physics in the early and maintenance of Information Technology (IT) to 1800s, we are still in the early stages of understanding other countries, where our potential adversaries can cyber as a domain and its implications. Cyber easily insert themselves into our logistical chains. science, engineering, and domain are in their infancy, The united States and other developed countries and all are being driven at the speed of continuous have outsourced their IT development for economic technological development. little is designed with the reasons, but the market is failing to account for the strategic vision to systematically mitigate threats; much reality of the increased security risk. The present is evolved in a tactical, reactive way. new versions situation is as dangerous as if the united States of exploits are launched globally every day, resulting decided to outsource the design of bridges, electrical in new vulnerabilities. given this flaw of software and systems, there is no end in sight to the repetitive iterations of tactical attack and defense. The government has unique insights into the threat space but cannot seamlessly share these The Gap Between Law and the Threat. insights with the very industries that own and national and international laws, operate over 90% of the telecommunications’ regulations, and enforcement are still struggling to catch up to infrastructure and operations. cyber activities worldwide. Rules, protocols, and standards are few and disconnected, often conflicting 6 | Intelligence and national Security Alliance | www.insaonline.org
  • 7. grids, and other physical infrastructure Attack Sophistication vs. Intruder Technical Knowledge g to the Soviet union during the ounterfeit malicious counterfeit hardware High persistent malware infiltration email propagation of & persistent surveillance Cold war. In tandem with the “stealth”/advanced scanning malicious code adaptive, high-impact, techniques outsourcing of IT development, the sophisticated targeted attacks on command control systems critical infrastructures Average Intruder Knowledge targeted & control IT systems themselves are becoming widespread attacks using NNTP to distribute attack increase in supply-chain compromises coordinated increasingly complex. Increased worms cyber-physical attacks Attack Sophistication widespread attacks on system complexity means that there DNS infrastructure DDoS attacks massive botnets increase in targeted phishing & vishing are more exploitable vulnerabilities executable code attacks (against widespread attacks on automated browsers) anti-forensic techniques that arise by accident and more client-side software widespread attacks opportunities to hide deliberately GUI intruder home users targeted widespread attacks on web applications introduced vulnerabilities, while it tools distributed attack tools hijacking sessions becomes harder for the finite number increase in wide-scale Trojan horse distribution of trusted experts to check systems for Internet social engineering attacks widespread denial-of-service integrity. attacks techniques to analyze code for vulnerabilities Windows-based remote automated without source code controllable Trojans packet spoofing probes/scans (Back Orifice) 2. CYBER THREaT 1990 2010 Low The threats to our national security and economic interests in the cyber © 2011 Carnegie Mellon University 1 arena vary in identity, objectives, Figure 1: The Evolution of Attack Techniques/Technologies1 assets, and capabilities. Their range can stretch from disruption, to simple theft, to taking down critical property is not an uncommon practice among some infrastructure, to disrupting government functions. The national governments and state industries. Some advantage almost always lies with the threat. Ability and states use the Internet to conduct offensive operations intent of these actors become important distinctions to the as part of their doctrine. These operations include defender’s action. disrupting lines of communication and the target’s communications medium. This should be viewed as a Varying profiles. new tool in the warfare toolbox—not unlike the advent Attackers do not need to be well educated nor well of armored or aerial warfare. resourced. They can come from any social cross section. They simply need to have intent and the ability to use no Boundaries to Geographic Location or Objectives. technology to perpetrate their activity. Below are a few There are no geographic boundaries in cyberspace. illustrations: Individual, group, and/or nation-state attackers can reside • Age is irrelevant. young teenagers in various countries anywhere. objectives are similarly boundless. Attack have used the Internet to hack into Pentagon sites. motives vary from simple curiosity, personal vendettas, financial or intellectual property gain, and/or a desire to • Criminals have created international gang activity harm an institution or state. Targets include individuals, using the Internet as their medium with drugs, groups, commercial interests, infrastructure, and nations. pornography, human trafficking, and financial gain among their activities. Criminals also sell capabilities assets and Capabilities. and services to other criminals, groups, and even offensive techniques and technologies have rapidly states. evolved over the past twenty years. Figure 1 illustrates the • Terrorist groups are using the Internet to conduct their emergence of new and more sophisticated threat assets operations, recruit, and coordinate on a larger scale. and capabilities since 1990. This emergence is based on an improvement in attacker skill sets and more advanced • nation-states are using the Internet to conduct technology at their disposal. reconnaissance and espionage. Stealing intellectual InSA CyBER InTEllIgEnCE wHITE PAPER | 7
  • 8. 3. THE COnVERGEnCE OF THE EFFECTs OF THE Fostering an asymmetric Cyber Threat. CYBERspaCE EnViROnMEnT anD THE THREaT The cyber domain encompasses a new and profound The heart of the cyber threat dynamic is where the effects dimension of asymmetric warfare. Historically, adversaries of the cyberspace environment and the threat meet. This of all types have chosen to take advantage of an opponent convergence has a multiplying effect on the vulnerabilities where and when he or she is weakest, especially if of cyber targets. the attacker is outmatched. Because of the attacker’s familiarity with the infrastructure, cyberspace offers an opportunity to extend the landscape to a virtual While there is a great deal of focus on current domain where both key economic and national security dynamics are cyber security issues, there is very little focus on truly at play. Individual, commercial, defining and exploring the cyber threat environment at national, and international activities a higher level, its unique dynamics, and the potential all work and socialize in this domain, increasing the space to impact on our economy and national security. attack and defend. In this domain, it is not necessary for a peer-on-peer relationship to be present, nor is it necessary for the attacker’s Familiarity with the Cyber infrastructure. attacker to be victorious. The lone individual, the criminal Attackers derive an advantage in preparing and executing group, or a developing country can be just as dangerous an attack from their familiarity with the hardware and as the well resourced and situated advanced player. The software the victim uses. The attacker can experiment and disadvantage lies with states and global commercial interests perfect an attack on the same commodity infrastructure his whose equities rely on the Internet and interconnectivity victim is likely to have. Part of the cost of using a cookie for national security and economic trade. while every cutter computing platform has been to give attackers nation is vulnerable, there are places that offer particularly the blueprints to our infrastructure. These blueprints, lucrative launch points for the hacker. Failed states enable combined with the complexity of the infrastructure that opportunities for hackers, as they do for criminals and gives them a place to hide, are all they need. The terrorists. These states are simply not resourced, or they software architecture is both intricately complex and are too corrupt to bring governance, law, or order to relatively inexpensive, resulting in economies of scale bear on the issue. There are other nations that tolerate that complicate cost metrics. we have taken advantage hackers within their borders so long as they are not the of this economic leverage to such a degree that virtually victim themselves. everyone has a clone of everyone else’s infrastructure. A cyber threat retains an advantage due to the inscrutable complexity of IT infrastructure but also to its ubiquity as an inexpensive commodity. Terry Roberts. Executive Director Interagency and Cyber, Carnegie Mellon, SEI Cyber Intelligence - Foundational to Cyber Mission Assurance. February 8, 2011 1 8 | Intelligence and national Security Alliance | www.insaonline.org
  • 9. Exploiting the Current Defense paradigm. As in other forms of asymmetric warfare, a perimeter defense is not effective. In Because of the attacker’s familiarity with the cyberspace, it is all the more challenging infrastructure, cyberspace offers an opportunity with the extra obstacles of time, technology, to extend the landscape to a virtual domain laws, and attribution, among others. Attackers continue to migrate from less where both key economic and national security sophisticated denial of service operations dynamics are at play. to very complex attacks. The Stuxnet attack on select networks that operate centrifuges in nuclear facilities provides an example. Attackers now assume legitimate identities as the speed of networks increases, it allows the to illegally procure intellectual property and conduct perpetrator to maintain the initiative. The hacker can other operations. Attackers also insert command and take full advantage of the speed of hardware, software, control code that lies in wait inside a victim’s network and communications technology upgrades to expedite until activated to conduct a pre-designated activity. his/her attack vectors. The defender is continuously in a They are increasingly able to manipulate the content game of catch-up. As the defender identifies new attacks of information in order to meet their objective and and implements new security measures under ever tighter influence the actions of the victim. All of these actions timelines, the attacker simply continues to outrun these can be easily perpetrated from locations thousands of measures. For example, some criminals now sell an instant miles away at a time of the perpetrator’s choosing with identification service of ongoing on-line transactions to chilling effect. customers who then are able to steal money in that same time space. Time Favors the attacker. The dimension of time has changed the threat environment, shared Threat and shared Responsibility. favoring the attacker. Attacks from around the globe Today’s cyber threat dynamic is a shared threat among happen in seconds, transiting through multiple waypoints public, private, and government entities. This common that often mask their movement to the victim. The lack threat creates additional and unprecedented risks, of geographic boundaries permits optimized, virtual realities, and vulnerabilities. The attacker can use the routing to the destination. If the attacker is successful in same mechanism to strike multiple targets. Civilian breaching a network’s perimeter, the attacker can move “casualties” and collateral damage are very likely. For quickly, slowly, or lie dormant, depending on the nature example, attacks on critical infrastructure, like electricity, of the victim’s network and intruder’s intent. Additionally, can have second and third order effects on hospitals, emergency services, and other unintended victims. Cyber threats can breach touch-points between Cyber science, engineering, and domain are in their government unclassified and infancy, and all are being driven at the speed of classified systems. In the absence continuous technological development. Little is designed of a completely new Internet architecture, the public and with the strategic vision to systematically mitigate threats. private sectors are intrinsically linked, interdependent, and must collectively devise and adopt solutions to be effective. InSA CyBER InTEllIgEnCE wHITE PAPER | 9
  • 10. II. IMPACT oF CyBER ATTACkS AnD CoST oF CyBER SECuRITy: THE EConoMICS T he two overarching costs from the cyber threat dynamic are the losses due to an intrusion and the expense of providing and maintaining security. In the We are not cyber environment the low cost of entry and easy access creates an asymmetric effectively or environment for “piracy and plunder.” Anyone with a computer can be a pirate whether he or she is working for a state government or out of his/her garage. In comprehensively 2003 estimates of losses due to cyber attacks ranged from $13 billion to $226 collecting and billion.2 while these estimates are often challenged, the impact is certainly assessing key significant, and the key risks and costs we incur by not effectively addressing the breadth of threats to the cyber domain must be addressed. data points to tell us the cumulative aMBiGuOus EsTiMaTEs OF ECOnOMiC COsTs. impact and The first challenge we face is determining the quantifiable effects of cyber attacks cost of all of and security. The absence of accurate damage assessments is a critical shortcoming. Many researchers have published diverse estimates of the actual and potential our respective economic costs. kshetri (2010) quotes an FBI/McAfee study as estimating uS costs government and of cybercrime at $400 billion annually.3 Anderson (2010) estimates the potential losses from a successful cyber attack on the uk’s petroleum infrastructure to be on industry losses the order of hundreds of billions of dollars.4 of intellectual The impact on business, government, and individuals from cyber attacks has property and progressed significantly from distraction and moderate disruption to an inability to personal data. operate or communicate for days. Typically in commerce, the potential for dishonest interactions and financial losses has been coupled with the recognition that this could be quantified, managed, and included as a business cost. However, cyber disruptions are not always correlated to IP losses, financial theft, or IT sabotage. This clouds the impact and increases risk to businesses and governments. we have advanced beyond mere “acceptable levels of loss” to levels where effective ownership of an individual’s, company’s, or country’s finances, operations and intellectual property may be at stake. The impact has increased in magnitude, and the potential for catastrophic collapse of a company has grown. However, it is not yet clear that the business community understands or accepts this increase in risk. The bottom line is that we are not effectively or comprehensively collecting and assessing key data points to tell us this important story – the cumulative impact and cost of all of our respective government and industry losses of intellectual property and personal data. 2 www.cisco.com/warp/public/779/govtaffairs/images/CRS_Cyber_Attacks.pdf. 3 Kshetri 2010. 4 Anderson 2010. 10 | Intelligence and national Security Alliance | www.insaonline.org
  • 11. CRiTiCaL inFRasTRuCTuRE: a sECuRiTY iMpERaTiVE. Critical infrastructure is at significant risk Today’s cyber threat dynamic is a shared threat to this form of warfare. Much of the world’s critical infrastructure, including in among public, private, and government entities. the energy, finance, and transportation sectors, was created and netted before the security imperative became in space, worst case attack or warfare scenarios at the apparent. Even if the infrastructure has modernized high end of conflict can mean the complete breakdown security features, it remains vulnerable to attackers who of daily life as we know it. Simulations of a weaponized find entry via legacy software that provides trap doors cyber attack against our global telecommunications into the larger, modernized network. executed against military and government systems, industry, and critical infrastructure portend the significant RisKs TO iDEnTiTY anD inFORMaTiOn sECuRiTY. risk associated with our dependency on information age legitimate IT users must constantly question whether the systems. At the mid-point of the threat spectrum, there equipment is leaking their information. Average users are are potential losses of trust in the decision, control, and becoming more aware that the first time they may know execution functionality we have come to associate with of exfiltration of their data is when they read it in the news modern precision engagement warfare. At the lower or when an adversary uses it against them. Today, users end of threat, ideas, data, and resources are stolen; must choose either to keep their information “off the grid” functionality is hacked; service is denied; and privacy or to take an unquantifiable risk that it will end up in the and civil liberties are violated. our lives and institutions wrong hands. The cost of losing proprietary or personal can generally be disrupted, probed, and exposed. information must be constantly considered alongside the opportunity cost of sequestering information from our Impacts and risks our society faces based upon today’s networked IT infrastructure. likely, it is the most innovative, incoming cyber threats include: sensitive, or insightful (and thus useful) information that has • Theft Resulting in Loss of Federal Resources. This the greatest need for legitimate, but controlled, sharing. could result in “the release of sensitive or classified unfortunately, this information is often either over-controlled government information; the disruption of critical or too easily accessible. This continuous set of choices information; and the undermining of agency is very real and costly in time, technology, management, missions.”5 This fundamentally threatens our and bureaucracy. national security. • Disruption of Our Nation’s Telecommunications. our THE THREaT sTaKEs aRE HiGH anD EVER inCREasinG in nation’s prosperity depends on assured and highly THE CYBER DOMain. performing information systems. The reliance of stock At the high end of the threat spectrum, national survival markets and financial institutions on the Internet and could potentially be at stake in the most extreme associated networks, as well as the operational circumstances. our dependencies on net-centricity, IT requirements for command and control by our and telecommunications, and the related microelectronics diplomatic, military, and intelligence organizations and paths that facilitate information age processes have identify our digital infrastructure as a critical national become vulnerabilities for virtually all modern states. using security asset. The President has pledged to make the broadest definition of “cyber” as part of information this infrastructure “secure, trustworthy, and resilient.”6 operations, including both the kinetic (e.g. EMP) and Cyber threats expose this infrastructure to significant risk. non-kinetic threats to our modern decision and control processes, and by adding our increasing vulnerabilities 5 Montalbano 2010. 6 Goldsmith 2010. InSA CyBER InTEllIgEnCE wHITE PAPER | 11
  • 12. • Increased vulnerability to our Critical Infrastructure. we continue to push initiatives The reliance of stock markets and financial for deeper integration of information systems institutions on the Internet and associated of all sorts (e.g., energy “smart grid,” networks... identify our digital infrastructure medical records, and air-traffic control) with the Internet.7 This integration is driven as a critical national security asset. by powerful economic incentives on the part of both business and government.8 This integration creates the possibility of a approaches cannot keep up. Examples include distributing multiplier effect of cyber attacks. “up-to-date” malware signatures when much of today’s • Short-Term goals versus long-Term vision of Cyber malware presents a unique signature for every infection; Security. In the early days of the Information Age, searching for an “optimal” operating system security government and industry reaped the benefits of configuration and then replicating it in a monoculture productivity and economic gain associated with IT across a large network; conducting thousands of hours and the Internet. However, they have probably not of “extensive” testing that covers only a small fraction of sufficiently invested in properly securing these critical a system’s total space; and imposing new programming infrastructures. we will experience long-term costs if paradigms in the mistaken belief that they can eradicate these systems are disrupted or incapacitated. Security vulnerabilities from software. vulnerabilities in information technology represent a market externality because the costs from insecurity inEFFiCiEnCiEs OF THE CYBER aRMs RaCE. are either not borne by the party best able to address them (PC industry, cell phones) or do not fully represent Attempting to secure our systems under current cyber the cost to society (critical infrastructure)9. Economic practices is a costly, ineffective, and never-ending incentives of industry are aligned against sharing of struggle. we must avoid an offensive-defensive cyber information about security threats and actual security “arms race” which consumes extensive resources, yet fails incidents.10 As an example of one kind of disincentive, to produce an enduring or definitive outcome. At best, the share price of companies reporting a significant adversaries struggle for strategic parity, with one ending cyber breach fell an average of 1 - 5 percent.11 up bankrupt and all having little to show for it. At worst, an adversary conceives of the problem from a different a REaCTiVE anD COsT inTEnsiVE appROaCH. perspective (unbeknownst to us), and we are blindsided through technological surprise. Significant time and resources are spent in cumulative attempts to address the latest threat vector and to improve we need to systematically collect key metrics on all of cyber security. Federal Information Security Market, the above activity levels from government and industry so 2010-2015, indicates that demand for vendor-furnished that the real impact is known and the top risks identified information security products and services by the u.S. can become the priority for resolution. The irony of federal government will increase from $8.6 billion in reporting the impact of a cyber breach is that reporting 2010 to $13.3 billion in 2015 at a compound annual also puts the company or government agency “on report” growth rate (CAgR) of 9.1 percent. to all. Therefore, this key data should be collected by a not-for-profit, trusted third party, and the trends and the These huge government expenditures result in only cumulative impacts should be shared with all in a non- momentary benefit because the threat vectors are moving attributable manner. at the speed of technology, and our current, reactive 7 Goldsmith 2010. 8 Anderson 2010. 9 Anderson 2010. 10 Anderson 2010. 11 Cashell 2004. 12 | Intelligence and national Security Alliance | www.insaonline.org
  • 13. III. THE RolE oF InTEllIgEnCE In THE CyBER AREnA T he previous two sections have addressed the cyber threat dynamic and the impact of cyber attacks and security. As in any form of security, intelligence Effective cyber is a key component of tactical and strategic decision-making. Effective cyber intelligence will intelligence will enhance our ability to assess the effects of cyber attacks (a critical shortcoming identified in the previous section), mitigate risks associated with the enhance our threat, and streamline cyber security into an efficient and cost-effective process ability to assess based on well informed decisions. the effects of DEFininG THE THREaT inTELLiGEnCE MissiOn (a pHiLOsOpHiCaL TuTORiaL). cyber attacks, The role of intelligence in any capacity is to collect, analyze, and produce mitigate risks information to provide complete, accurate, timely, and relevant threat assessments to associated with inform decision makers who act on the information. It is usually most effective when it is disseminated at the lowest possible classification level for the maximum number the threat, and of relevant users facing these threats. In performing this mission, the intelligence streamline cyber agencies seek to penetrate actual or potential threat targets consistent with national security into an strategic, operational, and tactical priorities. These agencies then seek to produce intelligence on adversary or threat capabilities and intentions in a manner that efficient and “connects” with the maximum number of relevant customers. cost effective process based THE ROLE OF THREaT inTELLiGEnCE pROCEssEs TO DRiVE aCTiOns. Intelligence and threat analysis does not exist for its own purposes. when threat on well informed details are suppressed or ignored, national security incurs significant consequences. decisions. It is important to sustain a high level of performance in the dynamic cyber arena. This environment is where threats develop rapidly and are fueled by new concepts for the use of pervasive IT. new waves of innovative capabilities seem to break over users in tsunami fashion, be it the coming cloud architectures or the continuing revolution in personal devices connected to the networks. given this relentless and constantly unfolding environment, intelligence might be successful in keeping pace with technological innovation. Conversely, it might be slow, or even wrong in its assessments of the threat dynamic. It is therefore important to evaluate public and private cyber intelligence activities that support these security missions in a strategic manner. THE “CYBER inTELLiGEnCE COMMuniTY.” This unique, currently ad hoc, community is made up of government, telecommunication and internet providers, CERTs, and other formal information security entities, specialty companies, and vendors. The members of this community engage in a myriad of activities that could be the potential victim of a cyber threat. This “Cyber Intelligence Community” is currently an informal coalition of the willing that collects and analyzes unclassified and classified cyber intelligence data and trends. There is no formal mechanism across industry and government cyber intelligence entities that successfully collects, processes, and analyzes all identifiable key cyber threat behavior and reports it at an unclassified or reasonable classification level to all appropriate customers. An effective connection between intelligence provider and the customer means that the customer has understood and internalized the intelligence resulting in action to work the intelligence and mitigate the threat. good intelligence professionals relentlessly InSA CyBER InTEllIgEnCE wHITE PAPER | 13
  • 14. pursue interactions with The “Cyber Intelligence Community” is currently an informal customers to ensure that: the data is collected, coalition of the willing that collects and analyzes unclassified analyzed, and conveyed; and classified cyber intelligence data and trends. the intelligence serves customers’ purposes; and some action is being Human Intelligence (HuMInT), open Source Intelligence taken (or deliberately (oSInT), geospatial and Measurement Intelligence not taken). This cycle can be referred to as a constant (gEoInT), and the volumes of unclassified network data process of story-finding, story-telling, story-updating, story- and behavior being watched by global CERTs. Continuous listening, and story-heeding. A concept to institutionalize liaison among all related parties is critical so that sharing this ad hoc community is currently missing. is seamless. This ensures an evolving, improved level of insight and reporting to an increasingly secure and highly CYBER COnFLiCT DOEs nOT ExisT in a VaCuuM. performing cyber environment for all. The Joint Chiefs of Staff Pub 1 (unclassified) definition of Information warfare integrates Electronic warfare/Attack, This evolving cyber intelligence tradecraft requires deep Computer network operations (for offense, Defense, and powerful technical and analytic expertise at all levels. and Exploit), Military Information Support operations Such technical talent and related capabilities remain (MISo) (previously psychological operations), operational ill-defined and in short supply across government and deception, and operational security. These operations industry. An institution that has made some headway in can be kinetic and/or non-kinetic. There are adjacent this regard is the Information Assurance Directorate (IAD) definitions for Strategic Communications, Space-related at the national Security Agency. IAD is the front line missions, Covert Action, etc. when these missions are of the defensive cyber mission. It commands substantial successfully integrated together by a capable adversary resources, high performing talent, strong processes, in time and space to create the maximum effects, the and informed outreach. It also works hand in hand with results can be devastating. The cyber arena has these military, public, and private partners to ensure that our universal adjacencies and overlapping considerations cyber capabilities and intellectual property are defended which intelligence managers must take into account for and that our defense is informing offense and vice versa. offensive planning and execution, as well as in building IAD is a good start, but we must emulate their good and operating defensive resilience and response. practices and innovativeness in defining professional attributes, associated education, and training goals for inVEsTinG in CYBER inTELLiGEnCE TRaDECRaFT, the unique career fields associated with the cyber realm. sKiLL sETs, anD CapaBiLiTiEs. The vast majority of the dangerous activity occurs A substantial and continuing investment in cyber within the .com domain (as opposed to the .gov or .mil intelligence should be a strategic imperative in the domains) and over 90 percent of the threat data and information age. It is also imperative to use that analytics are unclassified. Therefore, as a nation, we intelligence to safe guard our ability to maintain security. have systematically relegated the identification, tracking, we must ensure that stable domestic and international and reporting of this threat to the network operations economies are not jeopardized by possible conflict with arena and IT professionals without the inclusion of the rival powers, rogue states, failing or failed states, modern invaluable expertise and the analytic tradecraft of the terrorists and thieves, and wMD proliferators. All formal u.S. Intelligence Community. and informal intelligence disciplines contribute to these imperatives, including Signals Intelligence (SIgInT), 14 | Intelligence and national Security Alliance | www.insaonline.org
  • 15. Iv. AREAS FoR FuRTHER DISCuSSIon AnD REvIEw o ur national ability in the area of cyber intelligence remains unclear. There is evidence that we are collecting effectively in this complex area. There is As a nation, sound open source evidence that we are acquiring significant cyber and we have information warfare capabilities. unfortunately, as a nation, we remain exposed and vulnerable to focused cyber threats. The uncertainty associated with this situation systematically raises many questions including: relegated the Does the rush to play in the capability and profit arenas of Information Age markets identification, simultaneously drive us to a potential abyss, by causing us to ignore, play down, tracking, and over-classify, or restrict the inconvenient cyber truths required to have information reporting of security and assurance concurrently? this threat to Are our innovative endeavors so focused on markets and functionality that we the network cannot simultaneously innovate to some low, medium, and high levels of information security and overall hardening in the process? operations arena and IT Has intelligence done a sufficient job of informing the community and public on cyber threats writ large? professionals one can infer the answer to these questions is negative since there is a universal without the clamor in many concerned public and private quarters that more needs to be done inclusion of to distribute timely threat data, situational awareness and warning. This needs to the invaluable be data that has specific details, not just data at a high level. The u.S. military has been so overwhelmingly superior globally against niche adversaries who threaten in expertise and certain dimensions that we have not had to face the comprehensive specter of real the analytic cyber warfare. literature has been full of stories of looming or developed threats tradecraft of the which, under the worst circumstances, can have grave implications for defense and national critical infrastructure in terms of conflict and crisis functionality. U.S. Intelligence Community. virtually the entire u.S. Intelligence Community (working with extended partners) is involved to one degree or another in cyber threat matters. The means exist, albeit often at the classified levels, to collect, analyze and produce estimative and fact based data on both an in-depth research analysis basis or as current intelligence. Some organizations like nSA, CIA, DIA, DHS and the military services are more involved than others. However, the actual handling and security classifications of threat information are pervasive problems in disseminating cyber intelligence. new ways need to be found to clear those who need to know, quickly sanitize the InSA CyBER InTEllIgEnCE wHITE PAPER | 15
  • 16. data, or not classify information to maximize the widespread and detailed effectiveness. We must consider a national intelligence consortium Classification should only be or federation and defined public-private partnership used when there is a requirement concepts, which could implement an effective continuous to protect sources and methods or as it relates to our own attack capability of collecting, organizing, analyzing, or exploit means. we need to disseminating and leveraging threat intelligence. develop sharing concepts on both threats and solutions, so that every effort is expended to disseminate the details to federal, state, local, tribal, private, and key intelligence. This cannot be left to the formal u.S. defense foreign partners. and intelligence communities alone because their equities exist on narrower national security lines. Additionally, the DEaLinG WiTH LaRGE-sCaLE, COMpLEx naTiOn-sTaTE OR u.S. government has only a limited role in developing the current family of digital age software, hardware, MaRKETpLaCE pROBLEMs. and global telecommunication networks being used or organizing for success is the key, and it should be designed for the future. underpinned with strong governance to drive and/ or track results. overall, we must consider a national intelligence consortium or federation and defined public- iDEnTiFYinG THE CusTOMERs. Assuming we will optimize the creation and dissemination private partnership concepts, which could implement an of cyber intelligence at every appropriate level, we need effective continuous capability of collecting, organizing, analyzing, disseminating and leveraging threat to understand the customer set for threat intelligence. This is a key question because if there are to be strong connections between government and industry partners, we must define, understand, and We need to develop sharing concepts on both threats establish their respective roles and solutions, so that every effort is expended to and alignments to create a cyber disseminate the details to federal, state, local, tribal, intelligence consortium analyzing and reporting current threats and private, and key foreign partners. serving customers. 16 | Intelligence and national Security Alliance
  • 17. COnCLusiOns. In response to the preceding Overall, we must consider a national intelligence paragraphs, we make the following consortium or federation and defined public-private suggestions across industry, partnership concepts, which could implement academia and government. an effective continuous capability of collecting, 1. Continue to promote discussion, organizing, analyzing, disseminating and debate, and action on systematically defining and leveraging threat intelligence. establishing effective cyber intelligence approaches, enduring professions, needed skill-sets/training/education and technologies: • Identify the specific technical means utilized or planned for cyber attack operations in deep • Development of strategies (beyond current “patch technical detail to include supply chain issues, and pray” processes), policies, doctrines, legal paths to be exploited, nature and character of frameworks, and overall global context for cyber deployed infections, systems/product weakness, intelligence matters effects, and anticipated planned or ongoing adjacent activities • Increase global business, diplomatic and other forms of engagement, which should discuss • Maintain detailed cyber situational awareness potential ways to create more stability and mutual writ large security in the cyber arena in order to reduce the potential for cyber conflict, theft, sabotage, and • Participate in the rapid control and release espionage of cyber means in order to ensure a viable intelligence gain and loss awareness • Support development of deterrence, dissuasion, and other high level concepts and measures for • Identify what criminal activities are ongoing or maintaining peace and stability at all levels of have already happened in cyber networks, do conflict and crisis formal damage assessments in these areas, and support development of improved defenses • Define cyber intelligence professions, needed skillsets, training, and education for both industry • Partner on research and development in the and government needs challenging areas of attack attribution, warning, damage assessment, and space related threat 2. Enable the creation of cyber intelligence related collection and analysis polices, approaches, and pilot efforts across • organize and support counter-intelligence and industry, academia/non-profits, and government counter-espionage (CI/CE) activities, with special that provide unclassified situational awareness and focus on identifying/using auditing tools and indications and warning data, analytics and 24/7 processes to deal with the insider threats unclassified and classified (as appropriate) reporting to government agencies, trusted industry, and global • Create a consistent and meaningful approach for partners: the cyber equivalent of Battle Damage Assessment (BDA)/Combat Effectiveness Assessment • Corporately define specific activities, plans, and intentions of adversaries; continuously identify current and emerging threat vectors, and support our plans and intentions InSA CyBER InTEllIgEnCE wHITE PAPER | 17
  • 18. 3. Establish public-private partnership cyber outreach forums that address these areas We believe there is an urgent need to better define and in a comprehensive, practical, and executable fashion. These develop cyber intelligence as a new discipline in the forums can take the form of IC. Such a discipline will also demand discussion of commissions that study the the unique training, education, skill sets, and tradecraft demand for cyber intelligence and value added to that will be required to successfully conduct meaningful cyber security. collection and analysis in the cyber domain. 4. The dilemma that exists in the current cyber intelligence apparatus is that DHS has the authority but lacks the we believe there is an urgent need to better define experience and capabilities to orchestrate a and develop cyber intelligence as a new discipline in comprehensive approach to cyber intelligence. the IC. Such a discipline will also demand discussion of DoD has much of the actual cyber intelligence the unique training, education, skill sets, and tradecraft capabilities, and private industry owns most of the that will be required to successfully conduct meaningful infrastructure. ultimately, InSA’s Cyber Council collection and analysis in the cyber domain. These and would like to see a meaningful partnership among all related topics, such as the role of cyber intelligence in relevant government agencies and the private sector other aspects of cyber operations and who is best suited to ensure seamless sharing of threat information, to develop this discipline, will be the subject of further timely analytical judgments, and reasoned, discussion and white papers by the InSA Cyber Council. measured responses to clear threats. As stated earlier, there is clearly a great deal of focus on cyber security issues. Hardly a day goes by without some news of a major hacker attack on government and industry information infrastructure or reports of a significant security breach. The economic and national security ramifications are apparent. our ability to truly define, explore and analyze this cyber threat environment in a thoughtful, methodical manner at a reasonable level of classification is not yet well developed. 18 | Intelligence and national Security Alliance | www.insaonline.org
  • 19. aBOuT insa InSA is the premier intelligence and national security organization that brings together the public, private and academic sectors to collaborate on the most challenging policy issues and solutions. As a non-profit, non-partisan, public- private organization, InSA’s ultimate goal is to promote and recognize the highest standards within the national security and intelligence communities. InSA has over 150 corporate members and several hundred individual members who are leaders and senior executives throughout government, the private sector and academia. To learn more about INSA visit www.insaonline.org.
  • 20. INTeLLIgeNce AND NATIONAL SecuRITy ALLIANce Supporting advanceS in the national Security agenda 901 north Stuart Street, Suite 205, arlington, va 22203 (703) 224-4672 | www.insaonline.org