Académique Documents
Professionnel Documents
Culture Documents
UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO
SECRET//NOFORN
UNCLASSIFIED
UNCLASSIFIED
HACTIVISTS
Although the term hactivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from individual hackers seeking thrills and bragging rights to hacker groups conducting distributed denial of service (DDoS) attacks and website defacements against government and
UNCLASSIFIED
Hawthorne PD
UNCLASSIFIED
CRIMINAL
Organized criminal groups have easily adapted to todays technology in exploiting the cyber arena. These groups continually attack systems for monetary gain through identify theft, online fraud, computer extortion, phishing, and spyware/malware.
UNCLASSIFIED
A credential stealing malware created by Eastern European cyber actors Use Malware to carry out online bank account takeovers and steal information Multiple versions available on the cyber underground making it easy to obtain Evolving variants make it hard for anti-virus to detect
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
Hill/W.H. Notification
Draft JIB
UNCLASSIFIED
UNCLASSIFIED
INDUSTRIAL ESPIONAGE
Every year, billions of dollars are lost to foreign and domestic competitors who deliberately target economic intelligence in U.S. industries and technologies. Through cyber intrusions, these intruders search for intellectual property, prototypes, and company trade secrets to gain an illegitimate advantage
UNCLASSIFIED
UNCLASSIFIED
STATE ESPIONAGE
Foreign adversaries use cyber tools as part of traditional intelligence-gathering and espionage activities. These adversaries conduct computer network operations that target military and governmental organizations intellectual property and insider information.
UNCLASSIFIED
Intrusion Phases
Exfiltration
Harvest data
Persistence
Escalate Privileges Install Utilities
Infiltration
Reconnaissance Infection
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
CYBERTERRORISM
Cyberterrorism is disruptive or destructive acts perpetrated against noncombatant targets at the direction, on behalf, or in support of a terrorist group or their ideology, through the use of computer network attack or exploitation. Such intrusions/attacks are intended to intimidate or coerce a government or population in furtherance of a social, political, ideological, or religious agenda by causing
UNCLASSIFIED
UNCLASSIFIED//FOUO
Control and Data Acquisition Systems (SCADA): Controlling the nations critical infrastructure.
UNCLASSIFIED//FOUO
UNCLASSIFIED
STATE-SPONSORED DISRUPTIONS/WAR
Several nations are aggressively working to develop cyber warfare doctrine, programs, and capabilities. Cyber warfare enables a single entity to have a significant and serious impact by disrupting the supply, communications, and economic infrastructures that support military power impacts that could affect the lives of citizens across the country.
UNCLASSIFIED
UNCLASSIFIED
Individuals
Hacktivist Groups
Individuals
Industry
Infrastructure
UNCLASSIFIED
UNCLASSIFIED//FOUO
UNCLASSIFIED
Partnerships
No one country, company, or agency can stop cyber crime We must start at the source; we must find those responsible. And the only way to do that is by standing together.
UNCLASSIFIED//FOUO
NCIJTF Members
22
UNCLASSIFIED//FOUO
Each CTF synchronizes domestic cyber threat investigations in the local community through information sharing, incident response, and joint enforcement and intelligence actions.
UNCLASSIFIED//FOUO
InfraGard National Cyber-Forensics Training Alliance and Cyber Initiative and Resource Fusion Unit Information Sharing Analysis Centers Internet Crime Complaint Center
UNCLASSIFIED//FOUO
Conclusion Questions?
UNCLASSIFIED//FOUO