260 likes | 567 Views
Cybercrime, Cyber Intelligence, Web 2.0. Agenda . Rapid Look at cyber intel exercise - web 2.0 and beyond. Looking for Cyber Jihadists Like Cybercriminals Look for Your. Cyber Intel – CC Market. Looking at HCC. Closing. Cybercrime – Intelligence Gathering.
E N D
Agenda Rapid Look at cyber intelexercise - web 2.0 and beyond Looking for Cyber Jihadists Like Cybercriminals Look for Your Cyber Intel – CC Market Looking at HCC Closing
Cybercrime – Intelligence Gathering • Normally clandestine means to consistently gather • intelligence Opportunistic Only as sophisticated as it needs to be Sophistication determined and dictated by aggressors after intelligence gathering Exploits technological vulnerabilities
Infiltration Looking at Cyber Jihadists Like Cybercriminals look for you
How do you find the sites Maltego Touchgraph (Demo) Silobreaker www.onstrat.com/osint
OSINT http://www.onstrat.com/osint/ http://www.touchgraph.com/ http://www.paterva.com/
كافر Infidel Salafi Liberation دار الحرب دار الاسلام السلفيه House of War House of Islam التحرير Historical Aspects Five Pillars of Islam (Arabic: أركان الإسلام) is the term given to the five duties incumbent on every Muslim. These duties are: 1) Shahadah (profession of faith)2) Salat (ritual prayer five times each day)3) Sawm (fasting during Ramadan)4) Zakat (Islamic tax or tithing)5) Hajj (Pilgrimage to Mecca at least once during life). Economic Jihad Political Jihad Intelligence Jihad Subversive Jihad Diplomatic Jihad الجهاد الاقتصادي الجهاد السياسي الاستخبارات الجهاد التخريبيه الجهاد الجهاد الدبلوماسية جهاد 6) Jihad
Personas www.fakenamegenerator.com
What it takes to get started - Infiltration • Create Personas • Create email addresses • Document personas • Acquire pre-paid phones • Establish Twitter and Facebook accounts to match personas • Setup IRC accounts to match personas – unique nic • Human Intel • Cyber Intel • Open Source Intel • Need historical understanding • Need religious understanding • Need cultural understanding • Need linguistic understanding
Snuggling Disrupt and confuse Command, Control, COmmunications
Cyber Intelligence Rapid Look at cyber intel exerciseweb 2.0 and beyond
Methods • Web searches and sites • Bing • Silobreaker • Public Records (free sites, and those available from ancestry.com) • Social Networking sites: LinkedIn, Classmates.com, Facebook, YouTube • Special OSINT tools • MaltegoCE • Web Data Extractor • TouchGraph SEO Browser • FOCA • HUMINT • Phone calls and emails to known associates and/or relatives • Tools • Google.com (maps and search engine) • Spokeo.com • Intellius.com • Yahoo.com • Paterva • Facebook.com • Myspace.com • LinkedIn.com • VisualCV.com • Treadstone71.com • Methods • Social Engineering Attempts • Online Search Engines • Government Records Search
An example – 27 minutes work Looking at HCC
Maltego Touchgraph (Demo) Silobreaker Ancestry.com www.onstrat.com/osint Closing