1 / 19

TRI-SAC Council Meeting

TRI-SAC Council Meeting. Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012. Topics. Introduce you to NCIS Discuss our Challenges Outline CI in Cyberspace Methods. The Rapid Evolution of Information Technology.

irina
Download Presentation

TRI-SAC Council Meeting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TRI-SAC CouncilMeeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

  2. Topics Introduce you to NCIS Discuss our Challenges Outline CI in Cyberspace Methods

  3. The Rapid Evolution of Information Technology • “The sharing of information, using technology as an enabler, is a culture change that has been fully embraced by political, military, and the business communities.” • “If we do not develop robust capabilities to detect, expose, and hold accountable individuals and organizations who use technology to conduct their dubious trade, we will lose mission, relevance, and respect. …it is a human problem” Quote from a Cyber Crime Investigator in 1998

  4. Fighting Computer Crime in 1998 • Value/Volume of Open Source Data • Foreign Exploitation • Computer Fraud • The Insider Threat • Security of our networks • Training of personnel to secure networks

  5. CRITICAL INFRASTRUCTURE SCADA Transportation Public Safety Cyber Threats in 2012

  6. Legislative Initiatives • Comprehensive National Cybersecurity Initiative of 2008 • Cybersecurity Act of 2012 • Leiberman Bill S.2105 • Cybersecurity Information Sharing Act of 2012 • Feinstein/Mikulski Bill S.2102 • Strengthening and Enhancing Cybersecurity by Using Research, Education, Information, and Technology Act of 2012 (SECURE IT) • McCain Bill S.2151

  7. Basic Approach to Cybersecurity • Understand what programs/technologies are critical to customers • Identify foreign interest in these focus areas • Locate information and personnel at high risk to collection/exploitation • Work with personnel responsible for information/ networks to protect critical information

  8. Best Practices in Identifying Threat • Understanding Open Source Data • Queries of public-facing websites • Biography searches of company officials • Cross-discipline Collaboration • Computer Network Personnel • Marketing Personnel • Program-Cyber-CI/Security Collaboration • Collaboration with DoD LE/CI/Cyber agencies

  9. CYBERSPACE: THE NEW FRONTIER FOR FIE Adversaries use Internet and social networking sites (SNS) to obtain information on DON personnel for exploitation through elicitation, inducements, and coercion. Frequently monitored and exploited SNS: Online dating Virtual gaming Twitter LinkedIn Facebook Google + YouTube Blogs

  10. Insider Threat FORT HOODArmy MAJ Nidal Malik Hasan WIKILEAKSArmy PFC Bradley Manning Accused of leaking 250,000 classified documents Charged with 13 counts of premeditated murder and 32 counts of attempted murder

  11. GUESS WHO IS THE INSIDER THREAT

  12. Insider Threat • Cyberspace contacts with Foreign Nationals • Business relationship • Management of the interaction • Unwitting victim of targeting • Attribution of contact • Outbound Network Activity • Large e-mail enclosures • Network data flow activity at irregular times • Challenges with Audit tools

  13. ESPIONAGE STATISTICS civilian and military members are about even Motives: #1 divided loyalties #2 disgruntlement #3 money/debt 83% are 30 years old or older 67% volunteer More naturalized citizens, foreign attachments, foreign business connections, or cultural ties Increased reliance on the Internet 37% no clearance 26% Secret 20% Top Secret 17% TS/SCI

  14. Divorce • Death of a loved one • Money problems/debt • Physical relocation/PCS • New significant relationship • Medical problems • Work problems WHAT ARE THE CAUSES? • Divided loyalties • Disgruntlement • Money • Thrills • Ego/Recognition • Coercion • Ideology • Anti-social • Narcissistic • Entitled • Vindictive • Paranoid • Impulsive • Risk-seeking

  15. Where Do we go from here? • Issues • Cross-trained analysts that understand networks and counterintelligence threats • Dialogue with owners of the data targeted for exfiltration • Proactive approach to understanding network anomalies • Generates investigative leads to anticipate threats • Management of Data in Aggregate • Understanding threats across contractor teams • Building CI in Cyberspace requirements into contracts • Maintaining relationships with DoD LE/CI agencies

  16. Questions Michael T. Monroe Deputy Assistant Director (571)305-9830 michael.t.monroe@navy.mil TITLE HERE

More Related