27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

David Rohret and Michael Kraft<br />

by the suspect or an old fashioned stake-out to catch them in the act. Cyber crime investigations are<br />

common place and many are high profile, prompting law enforcement agencies to allocate significant<br />

resources to rapidly solve cases.<br />

4. A paranoid approach to remaining anonymous<br />

Why a paranoid approach to anonymity? Governments, adversaries, corporations, cyber criminals,<br />

even cheating spouses require a repeatable process they can employ to accomplish sensitive activities<br />

across the World Wide Web without detection or retribution. In a recent article prepared for the<br />

North Atlantic Treaty Organization (NATO) Parliamentary Assembly (Myrli, 2010) the cost of cyber<br />

crimes to governments and corporations is reported to be over US $100B annually. In response to<br />

cyber crime, governments and corporations spend billions more on technology and methodologies to<br />

identify, track, and prosecute cyber criminals (Fenwick, 2010). Not only have governments increased<br />

expenditures and resources to combat cyber crime, there is now unprecedented cooperation among<br />

governments and corporations to provide data and information sharing to identify and/or capture offenders<br />

(Golubev, 2005). Therefore, for an adversary or cyber criminal to successfully use the internet<br />

for nefarious reasons and remain anonymous, they must take a holistic view of the security available<br />

to their intended targets; that is to say, they must assume each capability is available and successfully<br />

deployed. Just as a network security officer does not have the luxury of only defending against some<br />

or most of the vulnerabilities on their network, a cyber criminal or cyber warrior cannot depend on a<br />

law enforcement agency to only use some of the methods described in section 3.<br />

This paper is the result of research into adversarial capabilities in cyber warfare, specifically, how a<br />

network-centric red team, acting as the adversary, would prevent positive attribution after conducting<br />

network reconnaissance or an attack. The following case study reflects precautions and actions used<br />

to create the shields in the Praestigiae Cone, described in Figure 1; using combinations of publically<br />

available technology, services, and research. Figure 2 outlines the process of achieving the seven<br />

shields, resulting in complete anonymity. The details are explained using a scenario based on an actual<br />

case study involving a red team assessment on an enterprise network.<br />

Figure 2: A process for remaining anonymous in cyber space<br />

Scenario: The red team’s goal was to emulate a hackers capability to remotely identify and disable an<br />

automated network-controlled surveillance system that included wireless video, fence and ground<br />

sensors, autonomous vehicle sentries, and network security; without being identified as the adver-<br />

216

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!