1 / 23

Cybercrime, Cyber Intelligence, Web 2.0

Cybercrime, Cyber Intelligence, Web 2.0. Agenda . Rapid Look at cyber intel exercise - web 2.0 and beyond. Looking for Cyber Jihadists Like Cybercriminals Look for Your. Cyber Intel – CC Market. Looking at HCC. Closing. Cybercrime – Intelligence Gathering.

clove
Télécharger la présentation

Cybercrime, Cyber Intelligence, Web 2.0

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybercrime, Cyber Intelligence, Web 2.0

  2. Agenda Rapid Look at cyber intelexercise - web 2.0 and beyond Looking for Cyber Jihadists Like Cybercriminals Look for Your Cyber Intel – CC Market Looking at HCC Closing

  3. Cybercrime – Intelligence Gathering • Normally clandestine means to consistently gather • intelligence Opportunistic Only as sophisticated as it needs to be Sophistication determined and dictated by aggressors after intelligence gathering Exploits technological vulnerabilities

  4. Infiltration Looking at Cyber Jihadists Like Cybercriminals look for you

  5. How do you find the sites Maltego Touchgraph (Demo) Silobreaker www.onstrat.com/osint

  6. OSINT http://www.onstrat.com/osint/ http://www.touchgraph.com/ http://www.paterva.com/

  7. كافر Infidel Salafi Liberation دار الحرب دار الاسلام السلفيه House of War House of Islam التحرير Historical Aspects Five Pillars of Islam (Arabic: أركان الإسلام) is the term given to the five duties incumbent on every Muslim. These duties are: 1) Shahadah (profession of faith)2) Salat (ritual prayer five times each day)3) Sawm (fasting during Ramadan)4) Zakat (Islamic tax or tithing)5) Hajj (Pilgrimage to Mecca at least once during life). Economic Jihad Political Jihad Intelligence Jihad Subversive Jihad Diplomatic Jihad الجهاد الاقتصادي الجهاد السياسي الاستخبارات الجهاد التخريبيه الجهاد الجهاد الدبلوماسية جهاد 6) Jihad

  8. Personas www.fakenamegenerator.com

  9. Persona examples

  10. Sample desktop configuration

  11. Minhaj – Answers to Questions

  12. Social / Cultural Values

  13. Islam

  14. Muhammad (PBUH)

  15. What it takes to get started - Infiltration • Create Personas • Create email addresses • Document personas • Acquire pre-paid phones • Establish Twitter and Facebook accounts to match personas • Setup IRC accounts to match personas – unique nic • Human Intel • Cyber Intel • Open Source Intel • Need historical understanding • Need religious understanding • Need cultural understanding • Need linguistic understanding

  16. Snuggling Disrupt and confuse Command, Control, COmmunications

  17. Friend Them Using Personas

  18. Cyber Intelligence Rapid Look at cyber intel exerciseweb 2.0 and beyond

  19. Methods • Web searches and sites • Bing • Silobreaker • Public Records (free sites, and those available from ancestry.com) • Social Networking sites: LinkedIn, Classmates.com, Facebook, YouTube • Special OSINT tools • MaltegoCE • Web Data Extractor • TouchGraph SEO Browser • FOCA • HUMINT • Phone calls and emails to known associates and/or relatives • Tools • Google.com (maps and search engine) • Spokeo.com • Intellius.com • Yahoo.com • Paterva • Facebook.com • Myspace.com • LinkedIn.com • VisualCV.com • Treadstone71.com • Methods • Social Engineering Attempts • Online Search Engines • Government Records Search

  20. An example – 27 minutes work Looking at HCC

  21. One final piece

  22. Maltego Touchgraph (Demo) Silobreaker Ancestry.com www.onstrat.com/osint Closing

More Related