An Underground education

73
An Underground An Underground Education Education Lessons in Counterintelligences Lessons in Counterintelligences from History’s Underworld from History’s Underworld @thegrugq

description

Some basic counterintelligence lessons and a look at how hackers can improve their CI posture.

Transcript of An Underground education

Page 1: An Underground education

An Underground An Underground EducationEducation

An Underground An Underground EducationEducation

Lessons in Counterintelligences Lessons in Counterintelligences from History’s Underworldfrom History’s Underworld

Lessons in Counterintelligences Lessons in Counterintelligences from History’s Underworldfrom History’s Underworld

@thegrugq

Page 2: An Underground education

AgendaAgendaAgendaAgenda

Counterintelligence

Processes

Threats

Contributing Factors

Professional Thieves: CI

Hackers: CI

Counterintelligence

Processes

Threats

Contributing Factors

Professional Thieves: CI

Hackers: CI

Page 3: An Underground education

CounterintelligenceCounterintelligenceCounterintelligenceCounterintelligence

Page 4: An Underground education

Processes of CIProcesses of CIProcesses of CIProcesses of CI

Basic Denial

Adaptive Denial/Insight

Covert Manipulation

Basic Denial

Adaptive Denial/Insight

Covert Manipulation

Page 5: An Underground education

Basic DenialBasic DenialBasic DenialBasic Denial

Page 6: An Underground education

Prevent the transfer of information to the adversary

Primarily proscriptive

Don’t engage in some behavior

Enough for basic survival

Prevent the transfer of information to the adversary

Primarily proscriptive

Don’t engage in some behavior

Enough for basic survival

Page 7: An Underground education

OPSEC

STFU

COMSEC

Vetting members to prevent penetrations

OPSEC

STFU

COMSEC

Vetting members to prevent penetrations

Page 8: An Underground education

The first breach of security occurs when the opposition becomes aware that information worthy of targeting exists.

Page 9: An Underground education

Adaptive DenialAdaptive DenialAdaptive DenialAdaptive Denial

Page 10: An Underground education

Insight into oppositions techniques/processes

Develop countering tactics

Analyze security posture for weaknesses

Develop remediations

Ongoing process

Insight into oppositions techniques/processes

Develop countering tactics

Analyze security posture for weaknesses

Develop remediations

Ongoing process

Page 11: An Underground education

Adjust to remedy unique vulnerabilities and/or adversarial strengths

Greatly benefits from access to adversarial know-how

Active penetrations of the adversary are very useful here

Adjust to remedy unique vulnerabilities and/or adversarial strengths

Greatly benefits from access to adversarial know-how

Active penetrations of the adversary are very useful here

Page 12: An Underground education

Covert ManipulationCovert Manipulation Covert ManipulationCovert Manipulation

Page 13: An Underground education

Provide the adversary with false information

Deceive the adversary into taking futile action

Deceive the adversary into not taking action

Mostly irrelevant for hackers

Misdirection could be valuable, maybe.

Provide the adversary with false information

Deceive the adversary into taking futile action

Deceive the adversary into not taking action

Mostly irrelevant for hackers

Misdirection could be valuable, maybe.

Page 14: An Underground education

Intelligence ThreatsIntelligence ThreatsIntelligence ThreatsIntelligence Threats

Page 15: An Underground education

Penetrations

Technical Penetrations

Passive Surveillance

Media Exposure

Penetrations

Technical Penetrations

Passive Surveillance

Media Exposure

Page 16: An Underground education

InformantsInformantsInformantsInformants

Page 17: An Underground education

Intel Lingo: penetrations

Recruited

Inserted

Most serious threat

Intel Lingo: penetrations

Recruited

Inserted

Most serious threat

Page 18: An Underground education

Technical MonitoringTechnical MonitoringTechnical MonitoringTechnical Monitoring

Page 19: An Underground education

Wiretaps, etc

Trojans and monitoring software

Video / audio surveillance

An increasing threat

See: media reports of legal trojans

Wiretaps, etc

Trojans and monitoring software

Video / audio surveillance

An increasing threat

See: media reports of legal trojans

Page 20: An Underground education

SurveillanceSurveillanceSurveillanceSurveillance

Page 21: An Underground education

Passive observation from local population

Dedicated active surveillance teams

Not really a threat for hackers or professional thieves

Passive observation from local population

Dedicated active surveillance teams

Not really a threat for hackers or professional thieves

Page 22: An Underground education

Media ExposureMedia ExposureMedia ExposureMedia Exposure

Page 23: An Underground education

Media coverage creates an OSINT footprint

Can be dangerous for hackers

Raises profile which draws adversarial attention

Media coverage creates an OSINT footprint

Can be dangerous for hackers

Raises profile which draws adversarial attention

Page 24: An Underground education

Contributing FactorsContributing FactorsContributing FactorsContributing Factors

Page 25: An Underground education

Organizational structure

Controlled territory

Popular support

Adversarial capabilities

Resources

Organizational structure

Controlled territory

Popular support

Adversarial capabilities

Resources

Page 26: An Underground education

Organizational Organizational StructureStructure

Organizational Organizational StructureStructure

Page 27: An Underground education

Hierarchical vs. Flat

Flat can react faster

Hierarchical can enforce good practices

Flat leads to poor compartmentation

Hierarchical increase value of high level penetrations

Hierarchical vs. Flat

Flat can react faster

Hierarchical can enforce good practices

Flat leads to poor compartmentation

Hierarchical increase value of high level penetrations

Page 28: An Underground education

Tight vs. Loose

Loose, each node has a unique CI signature, harder to attack efficiently

Tight, can enforce CI discipline better

Loose, can have poor practices and CI resources

Tight can be rigid, introducing systemic CI vulnerabilities

Tight vs. Loose

Loose, each node has a unique CI signature, harder to attack efficiently

Tight, can enforce CI discipline better

Loose, can have poor practices and CI resources

Tight can be rigid, introducing systemic CI vulnerabilities

Page 29: An Underground education

Controlled TerritoryControlled TerritoryControlled TerritoryControlled Territory

Page 30: An Underground education

Area safe from adversarial intelligence gathering

Reduces incentives to develop robust CI posture

Area safe from adversarial intelligence gathering

Reduces incentives to develop robust CI posture

Page 31: An Underground education

Popular SupportPopular SupportPopular SupportPopular Support

Page 32: An Underground education

Active support from the population

Housing, food, etc

Passive support from the population

Don’t report activity to the adversary

Active support from the population

Housing, food, etc

Passive support from the population

Don’t report activity to the adversary

Page 33: An Underground education

Adversary’s Adversary’s CapabilitiesCapabilitiesAdversary’s Adversary’s CapabilitiesCapabilities

Page 34: An Underground education

Highly capable adversary

Strong intelligence capabilities

Experienced and knowledgeable

Low capability adversary

Floundering reactionary moves that are ineffective and make people angry

Highly capable adversary

Strong intelligence capabilities

Experienced and knowledgeable

Low capability adversary

Floundering reactionary moves that are ineffective and make people angry

Page 35: An Underground education

ResourcesResourcesResourcesResources

Page 36: An Underground education

Adversarial resources available for

Performing intelligence gathering

Analysis

Follow up actions

Agency resources for counterintelligence

Dedicated CI team(s)

Adversarial resources available for

Performing intelligence gathering

Analysis

Follow up actions

Agency resources for counterintelligence

Dedicated CI team(s)

Page 37: An Underground education

Organizational Organizational LearningLearning

Organizational Organizational LearningLearning

Page 38: An Underground education

Competitive Competitive AdaptationAdaptation

Competitive Competitive AdaptationAdaptation

Page 39: An Underground education

Adverse Adverse environments breed environments breed

stronger actorsstronger actors

Adverse Adverse environments breed environments breed

stronger actorsstronger actors

Page 40: An Underground education

Competitive AdaptationCompetitive AdaptationCompetitive AdaptationCompetitive Adaptation

Organizations are superior to individuals

Can afford some losses and still recover

Deeper experience base to draw from (more metis)

Organizations are superior to individuals

Can afford some losses and still recover

Deeper experience base to draw from (more metis)

Page 41: An Underground education

Setbacks lead to sense-making and recovery

Damage Assessments

Adaptive Denial

Setbacks lead to sense-making and recovery

Damage Assessments

Adaptive Denial

Page 42: An Underground education

Professional ThievesProfessional ThievesProfessional ThievesProfessional Thieves

Page 43: An Underground education

Professional ThievesProfessional ThievesProfessional ThievesProfessional Thieves

Historical class of professional grifters

From 1890s to 1940s in America

Self identify as thieves (honorific)

Thieve argot used to demonstrate membership

A large community of practice

Historical class of professional grifters

From 1890s to 1940s in America

Self identify as thieves (honorific)

Thieve argot used to demonstrate membership

A large community of practice

Page 44: An Underground education

ThievesThievesThievesThieves

Con men

Long con, short con

Cannons (pickpockets)

Boosters (shoplifters)

Con men

Long con, short con

Cannons (pickpockets)

Boosters (shoplifters)

Page 45: An Underground education

Organizational StructureOrganizational StructureOrganizational StructureOrganizational Structure

Flat

Loose

Small “mobs” with great indivudual variation

Flat

Loose

Small “mobs” with great indivudual variation

Page 46: An Underground education

Controlled TerritoryControlled TerritoryControlled TerritoryControlled Territory

Operating inside “fixed” towns

Small meeting rooms

Operating inside “fixed” towns

Small meeting rooms

Page 47: An Underground education

Popular supportPopular supportPopular supportPopular support

None

Relied on high level penetrations of law enforcement apparatus

None

Relied on high level penetrations of law enforcement apparatus

Page 48: An Underground education

Professional Thief AssetsProfessional Thief AssetsProfessional Thief AssetsProfessional Thief Assets

Core skill was “larceny sense”

Experience derived cunning

Access to fixers and fences

Social network with memory for vetting members

Core skill was “larceny sense”

Experience derived cunning

Access to fixers and fences

Social network with memory for vetting members

Page 49: An Underground education

Rules for effective thieveryRules for effective thieveryRules for effective thieveryRules for effective thievery

Steal an item at a time

Stash it at a drugstore or restaurant

Mail it back home to a friend

Never keep it at home / in car

Never grift on the way out

Steal an item at a time

Stash it at a drugstore or restaurant

Mail it back home to a friend

Never keep it at home / in car

Never grift on the way out

Page 50: An Underground education

Rules, cont.Rules, cont.Rules, cont.Rules, cont.

Never draw attention to a working thief

Never fail to draw attention to an adversarial threat

Failsafe triggers to indicate problems, i.e. arrest

Never draw attention to a working thief

Never fail to draw attention to an adversarial threat

Failsafe triggers to indicate problems, i.e. arrest

Page 51: An Underground education

Strict rules against informants (“rats”)

Violent retaliation against “rats” was sanctioned

Strict rules against informants (“rats”)

Violent retaliation against “rats” was sanctioned

Page 52: An Underground education

Heavy investment in fixers to limit handle problems

Little/No adaptive denial capabilities

Adversary maintained fixed capabilities

No competitive adaptation

Heavy investment in fixers to limit handle problems

Little/No adaptive denial capabilities

Adversary maintained fixed capabilities

No competitive adaptation

Page 53: An Underground education

HackersHackersHackersHackers

Page 54: An Underground education

Organizational StructureOrganizational StructureOrganizational StructureOrganizational Structure

Flat hierarchy

No commanders

Loose group structure

Individuals pool resources, but act on their own

Flat hierarchy

No commanders

Loose group structure

Individuals pool resources, but act on their own

Page 55: An Underground education

Controlled TerritoryControlled TerritoryControlled TerritoryControlled Territory

Nation state protected hackers

Russia, China, etc.

Political protection: e.g. USA hacking Iran

Secure private servers and channels

Unmonitored information transfer

Nation state protected hackers

Russia, China, etc.

Political protection: e.g. USA hacking Iran

Secure private servers and channels

Unmonitored information transfer

Page 56: An Underground education

Popular SupportPopular SupportPopular SupportPopular Support

Not relevant

Cyberspace is not a “space”

Support requires knowledge

Who, what, etc.

Not relevant

Cyberspace is not a “space”

Support requires knowledge

Who, what, etc.

Page 57: An Underground education

CounterintelligenceCounterintelligenceCounterintelligenceCounterintelligence

Page 58: An Underground education

Basic DenialBasic DenialBasic DenialBasic Denial

Vetting of members

Pseudonymity

Limited compartmentation

Internal to a group

But.. gossip spreads far and fast

Vetting of members

Pseudonymity

Limited compartmentation

Internal to a group

But.. gossip spreads far and fast

Page 59: An Underground education

Adaptive DenialAdaptive DenialAdaptive DenialAdaptive Denial

Limited sensemaking from colleagues’ busts

Over reliance on technical protections

No case, ever, of a hacker penetration of LEO

Resulting in actionable intel to adapt

Limited sensemaking from colleagues’ busts

Over reliance on technical protections

No case, ever, of a hacker penetration of LEO

Resulting in actionable intel to adapt

Page 60: An Underground education

Covert ManipulationCovert ManipulationCovert ManipulationCovert Manipulation

Occasional poor attempts at framing others

ProFTP AcidBitches hack

Nation state level, certainly happens

False flag attacks

What is the cost of a VPS in Shanghai?

Occasional poor attempts at framing others

ProFTP AcidBitches hack

Nation state level, certainly happens

False flag attacks

What is the cost of a VPS in Shanghai?

Page 61: An Underground education

Hacker Community of Hacker Community of PracticePractice

Hacker Community of Hacker Community of PracticePractice

Informal community

Social groups connected via social mediums

Sharing of metis via formal and informal means

Zines, papers, blogposts, chats

Informal community

Social groups connected via social mediums

Sharing of metis via formal and informal means

Zines, papers, blogposts, chats

Page 62: An Underground education

Communities of PracticeCommunities of PracticeCommunities of PracticeCommunities of Practice

Three main hacker communities

English

Russian

Chinese

Clustered by language of information exchange

Three main hacker communities

English

Russian

Chinese

Clustered by language of information exchange

Page 63: An Underground education

Communities of PracticeCommunities of PracticeCommunities of PracticeCommunities of Practice

Operate inside controlled territory

Russian

Chinese

Operate in hostile environment

English

Operate inside controlled territory

Russian

Chinese

Operate in hostile environment

English

Page 64: An Underground education

Comm of P. CIComm of P. CIComm of P. CIComm of P. CI

Controlled territory provides protection against adversarial intelligence collection

Discourages robust operational security practices

Hostile environments force adaptation

Darwinian selection

Controlled territory provides protection against adversarial intelligence collection

Discourages robust operational security practices

Hostile environments force adaptation

Darwinian selection

Page 65: An Underground education

Favorable elements in any operational situation should be taken advantage of, but not by relaxing vigilance and security consciousness.

Soviet doctrine on clandestine operations

Page 66: An Underground education

Learning DisabilitiesLearning DisabilitiesLearning DisabilitiesLearning Disabilities

Hacker communities of practice have severe learning disabilities

Incurious about why colleagues got busted

No lessons learned

No damage assessment

Hacker communities of practice have severe learning disabilities

Incurious about why colleagues got busted

No lessons learned

No damage assessment

Page 67: An Underground education

Learning DisabilitiesLearning DisabilitiesLearning DisabilitiesLearning Disabilities

Hacker groups are too compartmented for info sharing

Not compartmented enough to prevent intelligence collection

Hacker groups are too compartmented for info sharing

Not compartmented enough to prevent intelligence collection

Page 68: An Underground education

Lessons LearnedLessons LearnedLessons LearnedLessons Learned

Page 69: An Underground education

Identity

Operational secrets

When

How

Identity

Operational secrets

When

How

Critical SecretsCritical SecretsCritical SecretsCritical Secrets

Page 70: An Underground education

Hacker CIHacker CIHacker CIHacker CI

Focus on Basic Denial

Create virtual controlled territory

Political cover for hacking

Focus on Basic Denial

Create virtual controlled territory

Political cover for hacking

Page 71: An Underground education

ConclusionConclusionConclusionConclusion

Page 72: An Underground education

Adapt or dieAdapt or dieAdapt or dieAdapt or die

Page 73: An Underground education

Thank you.Thank you.Thank you.Thank you.