SlideShare a Scribd company logo
1 of 35
Social Engineering
Human aspects of industrial and economic espionage
Marin Ivezic
Cyber Agency
www.cyberagency.com
October, 2001
Johnson & Johnson vs. Bristol-Myers
Johnson Controls vs. Honeywell
Boeing vs. Airbus
SOME KNOWN CASES
Cyber Agency | www.cyberagency.com2
1. Industrial and economic espionage using Social Engineering
2. Industrial and economic espionage countermeasures
SUBJECTS OF TODAY’S DISCUSSION…
It’s not just smart business!
Cyber Agency | www.cyberagency.com3
SOME KNOWN CASES
DEFINITION OF SOCIAL ENGINEERING
“Successful or unsuccessful attempts to
influence a person(s) into either revealing
information or acting in a manner that would
result in; unauthorized access, unauthorized
use, or unauthorized disclosure, to an
information system, network or data.”
(Rogers & Berti, 2001)
Cyber Agency | www.cyberagency.com4
EXTENDED DEFINITION OF SOCIAL ENGINEERING
Any kind of psychological
manipulation used to obtain
private or sensitive information
or to force target to perform
some action in target’s
disadvantage.
(Ivezic, 1998)
Cyber Agency | www.cyberagency.com5
Context for Social Engineering
“Competitive intelligence (CI) is the process of monitoring the
competitive environment. CI enables senior managers in
companies of all sizes to make informed decisions about
everything from marketing, R&D, and investing tactics to long-
term business strategies. Effective CI is a continuous process
involving the legal and ethical collection of information, analysis
that doesn't avoid unwelcome conclusions, and controlled
dissemination of actionable intelligence to decision makers.”
Source: Society of Competitive Intelligence Professionals
“Competitive intelligence is a systematic program for
gathering and analyzing information about your competitors’
activities and general business trends to further your own
company’s goal.”
Source: Larry Kahaner, “Competitive Intelligence”
DEFINITION OF COMPETITIVE INTELLIGENCE
Cyber Agency | www.cyberagency.com6
Context for Social Engineering
Cyber Agency | www.cyberagency.com7
White - company publications,
public records, commercial
reporting sources
Gray - Not readily available,
but can be obtained without
civil/criminal liability
Black - Obtained through unethical
or illegal means. Can result in civil
and/or criminal sanctions.
Black = Espionage
DEFINITION OF COMPETITIVE INTELLIGENCE
Cyber Agency | www.cyberagency.com8
Context for Social Engineering
Espionage: Information collection operations performed in unethical
and/or unlawful manner
Economic Espionage: Government intelligence operation aimed at
acquiring the economic secrets of foreign country, including information
about trade policies and the trade secrets for its companies.
Industrial Espionage: Intelligence operations conducted by one corporation
against another for the purpose of acquiring a competitive advantage in
domestic and global markets.
DEFINITION OF ESPIONAGE
COUNTRIES INFAMOUS FOR ECONOMIC ESPIONAGE
• USA
• Japan
• China
• Russia
• Germany
• France
UK
• Israel
South Korea, India, Pakistan, Argentina and others…
Cyber Agency | www.cyberagency.com9
Machinery
(1940s)
Capital / Labor
(1950-60s)
Information
(1980-90s)
Knowledge
(Intelligence)
2000s
WHY NOW?
Cyber Agency | www.cyberagency.com10
Mechanical
Technology
• The pace of business has and will increase.
• Most businesses are now in information overload.
• Increased global competition.
• Economic competition has become war.
• Political changes ripple more quickly than in the past.
• Technology changes are more rapid.
• Availability of ex cold-war spies.
Investment Computers Intelligence
Modern Business Drivers
Modern Business Eras
Disgruntled Employees
Independent Hackers
Competitors
Foreign Corp.
Foreign Gov.
90%
70%
50%
30%
20%
SECURITY THREATS
Cyber Agency | www.cyberagency.com11
TerroristInsider Foreign AgentCompetitor Activist
Most Likely
(annoyance)
Least Likely
(strategic impact)
Adversary Motivation
Visibility, Publicity, Chaos, Political Change
Information for Political, Military, Economic Advantage
Military Advantage, Chaos, Target Damage
Competitive Advantage, Revenge
Monetary Gain, Revenge
Thrill, Challenge, Prestige
Revenge, Financial Gain, Institutional Change
Who thinks we are important? Or interesting?
Competitors, Suppliers, Customers, Investors, Critics, Regulators, Hackers
SECURITY THREATS
National Intelligence
Information Warfare
Terrorists
Industrial Espionage
Organized Crime
Insider
Hacker
Cyber Agency | www.cyberagency.com12
• “Spies” are putzes that do nothing
brilliant
• They take advantage of what they
have access to
• They abuse human nature
• They luck into it, because there are
no or minimal countermeasures
HOW IS IT DONE?
Cyber Agency | www.cyberagency.com13
Reality
• Industrial spies are well trained
James Bonds that can get anything
they want
• Hackers are geniuses that can look
at a computer and take it over
• It takes super advanced methods
and a billion dollars in new
research to figure out how to stop
them
Myths
Technical
People
Physical
WHY IS SE SO EFFECTIVE?
• The Security Field has focused primarily on technical security and
protection of physical assets
• Security is only as strong as the weakest link - People are the weakest link
• Why spend time attacking the technology when a person will give you
access or information
• Extremely hard to detect as there is no ID’S for “lack of common sense” or
more appropriately ignorance
Cyber Agency | www.cyberagency.com14
Cyber Agency | www.cyberagency.com15
Two Primary Factors: Business Environment and Human Nature
Business Environment
 Service Oriented
 Time Crunch
 Distributed
 Outsourcing
 Virtual Offices
Human Nature
 Helpful
 Trusting
 Naive
WHY IS SE SO EFFECTIVE?
Very similar to how intelligence agencies infiltrate their targets. Usually a vey
methodical approach. 3-phased approach:
Cyber Agency | www.cyberagency.com16
Intelligence gathering
The attack
Step 2
Step 1
Step 3
• Primarily Open Source Information such as: Dumpster diving,
Web pages, Ex-employees, Contractors, Vendors, Partners
• Looking for weaknesses in the organization’s personnel: Help
desk, Tech support, Reception, Admin. support, Etc.
• Commonly known as the con
• Three broad categories of attack: Ego attacks, Sympathy attacks,
Intimidation attacks.
• Other elicitation techniques …
Target selection
ANATOMY OF AN SE ATTACK
COMMON SE ATTACKS
1. Ego attacks
Cyber Agency | www.cyberagency.com17
 Attacker appeals to the vanity, or ego of the victim
 Usually targets someone they sense is frustrated with their
current job position
 The victim wants to prove how smart or knowledgeable they
are and provides sensitive information or even access to the
systems or data
 Attacker may pretend to be law enforcement, the victim feels
honored to be helping
 Victim usually never realizes
COMMON SE ATTACKS
2. Sympathy attacks
Cyber Agency | www.cyberagency.com18
 Attack pretends to be a fellow employee (new hire), contractor,
employee or a vendor, etc.
 There is some urgency to complete some task or obtain some
information
 Needs assistance or they will be in trouble or lose their job etc.
 Plays on the empathy & sympathy of the victim
 Attackers “shop around” until they find someone who will help
 Very successful attack
COMMON SE ATTACKS
3. Intimidation attacks
Cyber Agency | www.cyberagency.com19
 Attacker pretends to be someone influential, authority figure,
and in some cases law enforcement
 Attempts to use their authority to coerce the victim into
cooperation
 If there is resistance they use intimidation, and threats (e.g.,
job sanctions, criminal charges etc.)
 If they pretend to be Law Enforcement they will claim the
investigation is hush hush and not to be discussed etc.
OTHER ELICITATION TECHNIQUES
• Elicitation
• Interview process which avoids direct
questions and employ a conversational style
to reduce concerns and suspicions…
• Collecting information without asking
questions.
Cyber Agency | www.cyberagency.com20
ELICITATION - CONVERSATIONAL HOURGLASS
• People remember questions more clearly and longer
• People remember the beginning and end of a conversation
• Concentration is on the “muddle in the middle”
Style
• Innocuous and non-threatening
• Testing of generalizations and presumptions
about human factors in elicitation
• Reading signals from source
• Pleasant and non-confrontational
Elements
• Pre-selected introductory questions about general topics
• Stacking of elicitation techniques
• Attention to details of information being provided
• Additional “cool down’ questions about other general topic
What you already know
• personal/professional background
• techniques that have worked well before
• areas of expertise or knowledge
Macro topics
Macro topics
Micro topics
Cyber Agency | www.cyberagency.com21
WHY DOES IT HAPPEN?
A natural tendency
• to need recognition (as an expert)
• toward self-effacement
• to correct, advise, challenge others
• to prove others wrong
• to discuss things that are not their concern
• to gossip
• not to be able to keep secrets
• to underestimate the value of information
• toward indiscretion when not in control of one’s
emotions
• to show off (professionally)
• to complain
Nolan 2000Cyber Agency | www.cyberagency.com22
TYPICAL ELICITATION TOOLS
1. Provocative statements evoking:
– quid pro quo
– naïveté
– disbelief
– criticism
2. quid pro quo
3. Simple flattery
4. Exploiting the instinct to complain
5. Word repetition vs. “emphatic loading”
6. Quotation of reported facts(?)
7. Naïveté
8. Oblique reference
9. Criticism
10. Bracketing
11. Feigned or real disbelief
12. Purposely erroneous statement
Nolan 2000Cyber Agency | www.cyberagency.com23
DEFENSE FRAMEWORK
Attacks
Critical Project
Situational Awareness
Nolan 2000Cyber Agency | www.cyberagency.com24
Survive
Protect
Detect / RespondDesign Features
Physical
Personnel
Procedures
DEFENSE FRAMEWORK
Nolan 2000Cyber Agency | www.cyberagency.com25
People
Process
Technology Organization
Effective Policies
• Enforcement of effective policies
• Staff knowledge and skill development
Secure Systems
Technology implementation
for end-to-end security
Effective support structure
Managed Processes
Security is not about products -
it is the effective management of
processes between Policy, Technology
and Support Structure
THERE ARE MANY WAYS TO “BUG” A ROOM
Find professionals!
Nolan 2000Cyber Agency | www.cyberagency.com26
COUNTERINTELLIGENCE
Measures to prevent a competitor from gaining data or knowledge
that could give them competitive advantage over your company.
• What assets, resources & information should be protected?
(e.g., new technologies, new products/services)
• How can you safeguard what might be penetrated?
Nolan 2000Cyber Agency | www.cyberagency.com27
PROTECTION - DON’T OVERDO IT
Nolan 2000Cyber Agency | www.cyberagency.com28
▪ What is the cost vs. benefit?
▪ Are you creating another vulnerability?
▪ How long is the countermeasure needed?
PROTECTION – COST vs. BENEFITS
Nolan 2000Cyber Agency | www.cyberagency.com29
Cost of
Loses
Cost of
Security
Non-Systematic
ThreatsRisk
Investment
USER
HACKER
Sound
Security
Policy
Implementation
Enforcement
Auditing
Total Systematic Risk
Threat Level

Security Engineering and
Intelligence Function
COMPETITION
FOREIGN THREATS
Mitigation
for specific
threats
Acceptable Risk
Region
PROTECTION – COST vs. BENEFITS
Nolan 2000Cyber Agency | www.cyberagency.com30
OPERATIONS VULNERABILITIES
Procedures in Practice
• Sales & Marketing
• Public Relations
• Help Wanted Ads
• Internet Usage
• Credit Cards and other travel records
• Telephone records and conversations
• Casual conversations
• Supplier records
• Personal aggrandizement
• Taking work home
• Poor incident-reporting procedures
• Human weaknesses
Nolan 2000Cyber Agency | www.cyberagency.com31
OPERATIONS COUNTERMEASURES
1. Awareness Training
2. Classifying Information
3. Security Alert System
4. Reward Programs
5. Callbacks before Disclosing Sensitive Info
– Verifying the Need for Information Access
– Verifying Identities and Purposes
6. Removing Personal Identifiers from Access Badges
7. Nondisclosure/Non-compete Employee Agreements and business
partners
8. Prepublication Reviews for Employees
9. Review of Corporate Releases
10. Strict Guidelines for Marketers and Salespeople
Nolan 2000Cyber Agency | www.cyberagency.com32
It takes only one… Are You The Weakest Link?
Questions? Experiences?
34
Particular expertise
in counter HUMINT
Provides training,
consulting,
metoring, testing
and regulasr
assessments
100% focused on
information
protection, counter
intelligence, counter
espionage
No conflict of interest
We also cover:
Penetration testing
Cyber security
Physical security
Technical security
Penetration Testing and Counter Espionage Consulting
WHO ARE WE?
Thank you for
your attention!
Any Questions?

More Related Content

What's hot

Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptxSanthosh Prabhu
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarRaghunath G
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 

What's hot (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 

Viewers also liked

Customer Human Engineering jmg
Customer Human Engineering jmgCustomer Human Engineering jmg
Customer Human Engineering jmgJose Garcia
 
Human Engineering workshop by Eternal Power Foundation Team v1.1_28Feb16 PDF ...
Human Engineering workshop by Eternal Power Foundation Team v1.1_28Feb16 PDF ...Human Engineering workshop by Eternal Power Foundation Team v1.1_28Feb16 PDF ...
Human Engineering workshop by Eternal Power Foundation Team v1.1_28Feb16 PDF ...Eternal Power Foundation
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkJahangirnagar University
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Catheynwrecruit
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesPraetorian
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 

Viewers also liked (8)

Customer Human Engineering jmg
Customer Human Engineering jmgCustomer Human Engineering jmg
Customer Human Engineering jmg
 
Human Engineering workshop by Eternal Power Foundation Team v1.1_28Feb16 PDF ...
Human Engineering workshop by Eternal Power Foundation Team v1.1_28Feb16 PDF ...Human Engineering workshop by Eternal Power Foundation Team v1.1_28Feb16 PDF ...
Human Engineering workshop by Eternal Power Foundation Team v1.1_28Feb16 PDF ...
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 
Develop your competitive intelligence skills
Develop your competitive intelligence skillsDevelop your competitive intelligence skills
Develop your competitive intelligence skills
 
Interviewing & Elicitation Techniques
Interviewing & Elicitation TechniquesInterviewing & Elicitation Techniques
Interviewing & Elicitation Techniques
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

Similar to Social Engineering - Human aspects of industrial and economic espionage

Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015Numaan Huq
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2Nickkisha Farrell
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxZakiAhmed70
 
The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptxBertrandRussell6
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking peopleTudor Damian
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
BYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi MaruBYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi MaruMichele Chubirka
 
Symantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec Website Security
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringPrem Lamsal
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 

Similar to Social Engineering - Human aspects of industrial and economic espionage (20)

Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
E commerce
E commerce E commerce
E commerce
 
The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptx
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking people
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
BYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi MaruBYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi Maru
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
Symantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threats
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 

Recently uploaded

Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 

Recently uploaded (20)

Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 

Social Engineering - Human aspects of industrial and economic espionage

  • 1. Social Engineering Human aspects of industrial and economic espionage Marin Ivezic Cyber Agency www.cyberagency.com October, 2001
  • 2. Johnson & Johnson vs. Bristol-Myers Johnson Controls vs. Honeywell Boeing vs. Airbus SOME KNOWN CASES Cyber Agency | www.cyberagency.com2
  • 3. 1. Industrial and economic espionage using Social Engineering 2. Industrial and economic espionage countermeasures SUBJECTS OF TODAY’S DISCUSSION… It’s not just smart business! Cyber Agency | www.cyberagency.com3 SOME KNOWN CASES
  • 4. DEFINITION OF SOCIAL ENGINEERING “Successful or unsuccessful attempts to influence a person(s) into either revealing information or acting in a manner that would result in; unauthorized access, unauthorized use, or unauthorized disclosure, to an information system, network or data.” (Rogers & Berti, 2001) Cyber Agency | www.cyberagency.com4
  • 5. EXTENDED DEFINITION OF SOCIAL ENGINEERING Any kind of psychological manipulation used to obtain private or sensitive information or to force target to perform some action in target’s disadvantage. (Ivezic, 1998) Cyber Agency | www.cyberagency.com5
  • 6. Context for Social Engineering “Competitive intelligence (CI) is the process of monitoring the competitive environment. CI enables senior managers in companies of all sizes to make informed decisions about everything from marketing, R&D, and investing tactics to long- term business strategies. Effective CI is a continuous process involving the legal and ethical collection of information, analysis that doesn't avoid unwelcome conclusions, and controlled dissemination of actionable intelligence to decision makers.” Source: Society of Competitive Intelligence Professionals “Competitive intelligence is a systematic program for gathering and analyzing information about your competitors’ activities and general business trends to further your own company’s goal.” Source: Larry Kahaner, “Competitive Intelligence” DEFINITION OF COMPETITIVE INTELLIGENCE Cyber Agency | www.cyberagency.com6
  • 7. Context for Social Engineering Cyber Agency | www.cyberagency.com7 White - company publications, public records, commercial reporting sources Gray - Not readily available, but can be obtained without civil/criminal liability Black - Obtained through unethical or illegal means. Can result in civil and/or criminal sanctions. Black = Espionage DEFINITION OF COMPETITIVE INTELLIGENCE
  • 8. Cyber Agency | www.cyberagency.com8 Context for Social Engineering Espionage: Information collection operations performed in unethical and/or unlawful manner Economic Espionage: Government intelligence operation aimed at acquiring the economic secrets of foreign country, including information about trade policies and the trade secrets for its companies. Industrial Espionage: Intelligence operations conducted by one corporation against another for the purpose of acquiring a competitive advantage in domestic and global markets. DEFINITION OF ESPIONAGE
  • 9. COUNTRIES INFAMOUS FOR ECONOMIC ESPIONAGE • USA • Japan • China • Russia • Germany • France UK • Israel South Korea, India, Pakistan, Argentina and others… Cyber Agency | www.cyberagency.com9
  • 10. Machinery (1940s) Capital / Labor (1950-60s) Information (1980-90s) Knowledge (Intelligence) 2000s WHY NOW? Cyber Agency | www.cyberagency.com10 Mechanical Technology • The pace of business has and will increase. • Most businesses are now in information overload. • Increased global competition. • Economic competition has become war. • Political changes ripple more quickly than in the past. • Technology changes are more rapid. • Availability of ex cold-war spies. Investment Computers Intelligence Modern Business Drivers Modern Business Eras
  • 11. Disgruntled Employees Independent Hackers Competitors Foreign Corp. Foreign Gov. 90% 70% 50% 30% 20% SECURITY THREATS Cyber Agency | www.cyberagency.com11 TerroristInsider Foreign AgentCompetitor Activist Most Likely (annoyance) Least Likely (strategic impact)
  • 12. Adversary Motivation Visibility, Publicity, Chaos, Political Change Information for Political, Military, Economic Advantage Military Advantage, Chaos, Target Damage Competitive Advantage, Revenge Monetary Gain, Revenge Thrill, Challenge, Prestige Revenge, Financial Gain, Institutional Change Who thinks we are important? Or interesting? Competitors, Suppliers, Customers, Investors, Critics, Regulators, Hackers SECURITY THREATS National Intelligence Information Warfare Terrorists Industrial Espionage Organized Crime Insider Hacker Cyber Agency | www.cyberagency.com12
  • 13. • “Spies” are putzes that do nothing brilliant • They take advantage of what they have access to • They abuse human nature • They luck into it, because there are no or minimal countermeasures HOW IS IT DONE? Cyber Agency | www.cyberagency.com13 Reality • Industrial spies are well trained James Bonds that can get anything they want • Hackers are geniuses that can look at a computer and take it over • It takes super advanced methods and a billion dollars in new research to figure out how to stop them Myths
  • 14. Technical People Physical WHY IS SE SO EFFECTIVE? • The Security Field has focused primarily on technical security and protection of physical assets • Security is only as strong as the weakest link - People are the weakest link • Why spend time attacking the technology when a person will give you access or information • Extremely hard to detect as there is no ID’S for “lack of common sense” or more appropriately ignorance Cyber Agency | www.cyberagency.com14
  • 15. Cyber Agency | www.cyberagency.com15 Two Primary Factors: Business Environment and Human Nature Business Environment  Service Oriented  Time Crunch  Distributed  Outsourcing  Virtual Offices Human Nature  Helpful  Trusting  Naive WHY IS SE SO EFFECTIVE?
  • 16. Very similar to how intelligence agencies infiltrate their targets. Usually a vey methodical approach. 3-phased approach: Cyber Agency | www.cyberagency.com16 Intelligence gathering The attack Step 2 Step 1 Step 3 • Primarily Open Source Information such as: Dumpster diving, Web pages, Ex-employees, Contractors, Vendors, Partners • Looking for weaknesses in the organization’s personnel: Help desk, Tech support, Reception, Admin. support, Etc. • Commonly known as the con • Three broad categories of attack: Ego attacks, Sympathy attacks, Intimidation attacks. • Other elicitation techniques … Target selection ANATOMY OF AN SE ATTACK
  • 17. COMMON SE ATTACKS 1. Ego attacks Cyber Agency | www.cyberagency.com17  Attacker appeals to the vanity, or ego of the victim  Usually targets someone they sense is frustrated with their current job position  The victim wants to prove how smart or knowledgeable they are and provides sensitive information or even access to the systems or data  Attacker may pretend to be law enforcement, the victim feels honored to be helping  Victim usually never realizes
  • 18. COMMON SE ATTACKS 2. Sympathy attacks Cyber Agency | www.cyberagency.com18  Attack pretends to be a fellow employee (new hire), contractor, employee or a vendor, etc.  There is some urgency to complete some task or obtain some information  Needs assistance or they will be in trouble or lose their job etc.  Plays on the empathy & sympathy of the victim  Attackers “shop around” until they find someone who will help  Very successful attack
  • 19. COMMON SE ATTACKS 3. Intimidation attacks Cyber Agency | www.cyberagency.com19  Attacker pretends to be someone influential, authority figure, and in some cases law enforcement  Attempts to use their authority to coerce the victim into cooperation  If there is resistance they use intimidation, and threats (e.g., job sanctions, criminal charges etc.)  If they pretend to be Law Enforcement they will claim the investigation is hush hush and not to be discussed etc.
  • 20. OTHER ELICITATION TECHNIQUES • Elicitation • Interview process which avoids direct questions and employ a conversational style to reduce concerns and suspicions… • Collecting information without asking questions. Cyber Agency | www.cyberagency.com20
  • 21. ELICITATION - CONVERSATIONAL HOURGLASS • People remember questions more clearly and longer • People remember the beginning and end of a conversation • Concentration is on the “muddle in the middle” Style • Innocuous and non-threatening • Testing of generalizations and presumptions about human factors in elicitation • Reading signals from source • Pleasant and non-confrontational Elements • Pre-selected introductory questions about general topics • Stacking of elicitation techniques • Attention to details of information being provided • Additional “cool down’ questions about other general topic What you already know • personal/professional background • techniques that have worked well before • areas of expertise or knowledge Macro topics Macro topics Micro topics Cyber Agency | www.cyberagency.com21
  • 22. WHY DOES IT HAPPEN? A natural tendency • to need recognition (as an expert) • toward self-effacement • to correct, advise, challenge others • to prove others wrong • to discuss things that are not their concern • to gossip • not to be able to keep secrets • to underestimate the value of information • toward indiscretion when not in control of one’s emotions • to show off (professionally) • to complain Nolan 2000Cyber Agency | www.cyberagency.com22
  • 23. TYPICAL ELICITATION TOOLS 1. Provocative statements evoking: – quid pro quo – naïveté – disbelief – criticism 2. quid pro quo 3. Simple flattery 4. Exploiting the instinct to complain 5. Word repetition vs. “emphatic loading” 6. Quotation of reported facts(?) 7. Naïveté 8. Oblique reference 9. Criticism 10. Bracketing 11. Feigned or real disbelief 12. Purposely erroneous statement Nolan 2000Cyber Agency | www.cyberagency.com23
  • 24. DEFENSE FRAMEWORK Attacks Critical Project Situational Awareness Nolan 2000Cyber Agency | www.cyberagency.com24 Survive Protect Detect / RespondDesign Features Physical Personnel Procedures
  • 25. DEFENSE FRAMEWORK Nolan 2000Cyber Agency | www.cyberagency.com25 People Process Technology Organization Effective Policies • Enforcement of effective policies • Staff knowledge and skill development Secure Systems Technology implementation for end-to-end security Effective support structure Managed Processes Security is not about products - it is the effective management of processes between Policy, Technology and Support Structure
  • 26. THERE ARE MANY WAYS TO “BUG” A ROOM Find professionals! Nolan 2000Cyber Agency | www.cyberagency.com26
  • 27. COUNTERINTELLIGENCE Measures to prevent a competitor from gaining data or knowledge that could give them competitive advantage over your company. • What assets, resources & information should be protected? (e.g., new technologies, new products/services) • How can you safeguard what might be penetrated? Nolan 2000Cyber Agency | www.cyberagency.com27
  • 28. PROTECTION - DON’T OVERDO IT Nolan 2000Cyber Agency | www.cyberagency.com28
  • 29. ▪ What is the cost vs. benefit? ▪ Are you creating another vulnerability? ▪ How long is the countermeasure needed? PROTECTION – COST vs. BENEFITS Nolan 2000Cyber Agency | www.cyberagency.com29 Cost of Loses Cost of Security
  • 30. Non-Systematic ThreatsRisk Investment USER HACKER Sound Security Policy Implementation Enforcement Auditing Total Systematic Risk Threat Level  Security Engineering and Intelligence Function COMPETITION FOREIGN THREATS Mitigation for specific threats Acceptable Risk Region PROTECTION – COST vs. BENEFITS Nolan 2000Cyber Agency | www.cyberagency.com30
  • 31. OPERATIONS VULNERABILITIES Procedures in Practice • Sales & Marketing • Public Relations • Help Wanted Ads • Internet Usage • Credit Cards and other travel records • Telephone records and conversations • Casual conversations • Supplier records • Personal aggrandizement • Taking work home • Poor incident-reporting procedures • Human weaknesses Nolan 2000Cyber Agency | www.cyberagency.com31
  • 32. OPERATIONS COUNTERMEASURES 1. Awareness Training 2. Classifying Information 3. Security Alert System 4. Reward Programs 5. Callbacks before Disclosing Sensitive Info – Verifying the Need for Information Access – Verifying Identities and Purposes 6. Removing Personal Identifiers from Access Badges 7. Nondisclosure/Non-compete Employee Agreements and business partners 8. Prepublication Reviews for Employees 9. Review of Corporate Releases 10. Strict Guidelines for Marketers and Salespeople Nolan 2000Cyber Agency | www.cyberagency.com32
  • 33. It takes only one… Are You The Weakest Link? Questions? Experiences?
  • 34. 34 Particular expertise in counter HUMINT Provides training, consulting, metoring, testing and regulasr assessments 100% focused on information protection, counter intelligence, counter espionage No conflict of interest We also cover: Penetration testing Cyber security Physical security Technical security Penetration Testing and Counter Espionage Consulting WHO ARE WE?
  • 35. Thank you for your attention! Any Questions?