tri-sac council meeting michael t. monroe deputy assistant director naval criminal investigative...

19
TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

Upload: joanna-shanna-perkins

Post on 17-Dec-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

TRI-SAC CouncilMeeting

Michael T. MonroeDeputy Assistant Director

Naval Criminal Investigative ServiceNational Security Directorate

02 May 2012

Page 2: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

TOPICS

Introduce you to NCIS

Discuss our Challenges

Outline CI in Cyberspace Methods

Page 3: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012
Page 4: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012
Page 5: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

THE RAPID EVOLUTION OF INFORMATION TECHNOLOGY

• “The sharing of information, using technology as an enabler, is a culture change that has been fully embraced by political, military, and the business

communities.”• “If we do not develop robust capabilities to detect,

expose, and hold accountable individuals and organizations who use technology to conduct their dubious trade, we will lose mission, relevance, and respect. …it is a human problem”

Quote from a Cyber Crime Investigator in 1998

Page 6: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

FIGHTING COMPUTER CRIME IN 1998

• Value/Volume of Open Source Data• Foreign Exploitation• Computer Fraud• The Insider Threat• Security of our networks• Training of personnel to secure networks

Page 7: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

Cyber Threats in 2012FOREIGN INTELLIGENCE ENTITIES

Technology Theft

Espionage

Insider Threat

TERRORISM/DISRUPTIVE ACTIVITIES

Denial of Service AttackVenue for communication

Venue for Information Collection

Financial Crimes

Identity Theft419 Scams

Theft of Financial data

WORKPLACE VIOLENCE

StalkingCommunication of Threats

Self RadicalizationCRITICAL

INFRASTRUCTURE

SCADA

Transportation

Public Safety

Page 8: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

LEGISLATIVE INITIATIVES

• Comprehensive National Cybersecurity Initiative of 2008• Cybersecurity Act of 2012

– Leiberman Bill S.2105

• Cybersecurity Information Sharing Act of 2012– Feinstein/Mikulski Bill S.2102

• Strengthening and Enhancing Cybersecurity by Using Research, Education, Information, and Technology Act of 2012 (SECURE IT)

– McCain Bill S.2151

Page 9: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

BASIC APPROACH TO CYBERSECURITY

• Understand what programs/technologies are critical to customers

• Identify foreign interest in these focus areas

• Locate information and personnel at high risk to collection/exploitation

• Work with personnel responsible for information/ networks to protect critical information

Page 10: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

BEST PRACTICES IN IDENTIFYING THREAT

• Understanding Open Source Data– Queries of public-facing websites– Biography searches of company officials

• Cross-discipline Collaboration – Computer Network Personnel– Marketing Personnel

• Program-Cyber-CI/Security Collaboration• Collaboration with DoD LE/CI/Cyber agencies

Page 11: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

CYBERSPACE: THE NEW FRONTIER FOR FIEAdversaries use Internet

and social networking

sites (SNS) to obtain

information on DON

personnel for exploitation

through elicitation,

inducements, and

coercion.

Frequently monitored and exploited SNS: Online datingVirtual gamingTwitterLinkedInFacebookGoogle +YouTubeBlogs

Page 12: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

INSIDER THREATWIKILEAKSArmy PFC Bradley Manning

Accused of leaking 250,000

classified documents Charged with

13 counts of premeditated murder and 32 counts of attempted murder

FORT HOODArmy MAJ Nidal Malik Hasan

Page 13: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

GUESS WHO IS THE INS IDER THREAT

Page 14: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012
Page 15: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

INSIDER THREAT

• Cyberspace contacts with Foreign Nationals– Business relationship

• Management of the interaction• Unwitting victim of targeting

– Attribution of contact

• Outbound Network Activity– Large e-mail enclosures– Network data flow activity at irregular times

• Challenges with Audit tools

Page 16: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

ESPIONAGE STATISTICS

67% volunteer

Motives:#1 divided loyalties#2 disgruntlement

#3 money/debt

37% no clearance26% Secret

20% Top Secret17% TS/SCI

More naturalized citizens, foreign

attachments, foreign business connections,

or cultural ties

83% are 30 years old or

older

civilian and military

members are about

even

Increased reliance on the

Internet

Page 17: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

WHAT ARE THE CAUSES?

• Divided loyalties• Disgruntlement• Money• Thrills• Ego/Recognition• Coercion• Ideology

TRIGGER

CHARACTERISTICSMOTIVATION

• Divorce• Death of a loved one• Money problems/debt• Physical relocation/PCS• New significant

relationship• Medical problems• Work problems

• Anti-social• Narcissistic• Entitled• Vindictive• Paranoid• Impulsive• Risk-seeking

Page 18: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

WHERE DO WE GO FROM HERE?

• Issues– Cross-trained analysts that understand networks and

counterintelligence threats– Dialogue with owners of the data targeted for exfiltration– Proactive approach to understanding network anomalies

• Generates investigative leads to anticipate threats

– Management of Data in Aggregate– Understanding threats across contractor teams– Building CI in Cyberspace requirements into contracts– Maintaining relationships with DoD LE/CI agencies

Page 19: TRI-SAC Council Meeting Michael T. Monroe Deputy Assistant Director Naval Criminal Investigative Service National Security Directorate 02 May 2012

Questions

Michael T. MonroeDeputy Assistant Director

(571)305-9830

[email protected]

UNCLASSIFIED TITLE HERE 19