78
Security Lessons from Dictators #44Con September 12 th 2013

44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

  • Upload
    44con

  • View
    280

  • Download
    2

Embed Size (px)

DESCRIPTION

What do the Grand Ayatollah Seyyed Ali Hosseini Khamenei, Kim Jong-un, Julius Caesar, Abraham Lincoln, Napoleon Bonaparte and Adolph Hitler have to do with network security? Come and discover the mistakes these dictators made and what they can teach us about network security and how to apply them to our companies and coworkers.

Citation preview

Page 1: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Security Lessons from Dictators

#44Con September 12 th 2013

Page 2: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

About me

Jerry GamblinSecurity SpecialistMissouri House Of Representatives

Contact Information:[email protected] @jgamblinwww.jerrygamblin.com

Page 3: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 4: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 5: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 6: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

About this talk

History does not repeat itself, but it does rhyme.

- Mark Twain

Page 7: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Security Lessons from Dictators

Page 8: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Insider Threats

Et tu, Brute?

Page 9: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

GaiusJuliusCaesarDictator Perpetuo of The Roman Empire

Page 10: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Marcus Junius Brutus49 BC: Fought with Pompey to Greece during the civil war against Caesar.

48 BC: Pardoned by Caesar.

46 BC: Made governor of Gaul.

45 BC: Made Praetor.

44 BC: Murdered Caesar

Page 11: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 12: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

How does your company defend against insider threats?

Page 13: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Insider Threats

You can not detect and defend from insider threats from behind your keyboard.

Page 14: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Insider Threats

Insider threats are not a technical issue alone.

Page 15: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Insider Threats

People who steal your unprotected information are not hackers.

Page 16: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Edward Snowden2004: Enlisted in the United States Army as a Special Forces recruit.

2005: Security Guard for the National Security Agency

2007: Network Administrator for the State Department

2011: Worked for NSA in Japan.

2012: Contractor for Booze Allen Hamilton.

2013: Leaked NSA surveillance programs to the press.

Page 17: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Could you have identified and stopped Edward Snowden on your network?

Page 18: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Incident Response

Executing of the Duke of Enghien.

Page 19: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Napoleon BonaparteEmperor of France

Page 20: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Louis AntoineDuke of Enghien• Only son of Louis Henri de Bourbon.

• Given the title Duke of Enghien at birth.

• Military school at Commodore de Vinieux.

• Fought in the French Revolutionary Wars against France.

• Married Charlotte de Rohan.

• Arrested for allegedly being part of the Cadoudal–Pichegru conspiracy

Page 21: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 22: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 23: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Incident Response

C'est pire qu'un crime, c'est une faute

Page 24: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

How does your incident response plan look in real life?

Page 25: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 26: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 27: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

How can security professionals handle investigations better?

Page 28: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Hacking Back

Suspending habeas corpus.

Page 29: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Abraham Lincoln 16th President of the United States of America

Page 30: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 31: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 32: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Hacking Back

You are engaged in repressing an insurrection against the laws of the United States. If at any point on or in the vicinity of any military line which is now or which shall be used between the city of Philadelphia and the city of Washington you find [resistance] which renders it necessary to suspend the writ of habeas corpus for the public safety, you personally or through the officer in command at the point where resistance occurs are authorized to suspend that writ.

Lincoln to General Winfield Scott on April 27, 1861

Page 33: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Article 1. Section 9.of the United States Constitution

The privilege of the writ of habeas corpus shall not be suspended (by congress), unless when in cases of rebellion or invasion the public safety may require it.

Page 34: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Ex parte Merryman

Such is the case now before me, and I can only say that if the authority which the constitution has confided to the judiciary can be usurped by the President the people of the United States are no longer living under a government of laws.

Page 35: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Jon HuntsmanCommission onTheft of American Intellectual Property

Without damaging the intruder’s own network, companies that experience cyber theft ought to be able to retrieve their electronic files or prevent the exploitation of their stolen information.

Page 36: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 37: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 38: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

We'd politely remind them there's a federal criminal statute barring that.

Justice Department's Computer Crime and Intellectual Property Section.

Page 39: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 40: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

What do you think the future of hacking back (active defense) is?

Page 41: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Advanced Tools Over Proven Techniques

Next Generation Everything!!!!!

Page 42: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

I am getting ready to use Adolf Hitler and WWII to make a point about network security. I am not trying to be flippant or disrespectful in the slightest and I understand the extreme cost of war.

Page 43: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Adolf HitlerFührer of Germany

Page 44: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

WunderwaffeSturmgewehr 44 - The first assault rifle

Horten Ho 229 - A turbojet flying wing stealth jet fighter/bomber

Flettner Fl 265 - The world's earliest known airworthy synchropter

Schwerer Gustav - An 800mm railway gun

V2 - First human-made object to achieve sub-orbital spaceflight

Page 45: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 46: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 47: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 48: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 49: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 50: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

It has been argued that Germany lost WWII by picking advanced tools over proven techniques…

Page 51: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

… just like IT security.

Highly Trained Staff Everyone has a CISSP!

Patch Management System

Next Generation Firewall

Shiny SIEM

New Security Policy Guidelines

No End User Training Unless mandated

End Users Have Admin Rights.

No Auditing of Web Apps.

No one actually checks logs.

Shadow IT has taken over.

Page 52: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 53: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Why do security professionals have such a hard time getting the basics right?

Page 54: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Poor Security Awareness Training

USB Drives Don’t Grown In The Desert

Page 55: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Grand Ayatollah SeyedAli Hosseini KhameneiSupreme Leader of Iran

Page 56: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Nuclear Program of Iran

• 1957: The United States and Iran sign a civil nuclear co-operation agreement as part of the U.S. Atoms for Peace program.

• 1968: Iran signs the Nuclear Non-Proliferation Treaty and ratifies it.

• 1979: Iran's Islamic revolution puts a freeze on the existing nuclear program.

• 1982: Iranian officials announced that they planned to build a reactor powered by their own uranium at the Isfahan Nuclear Technology Centre.

• 1995: Iran signs an $800 million contract with the Russian Ministry of Atomic Energy in Busheh.

• 2002: The United States accuses Iran of attempting to make nuclear weapons.

• 2004: Iran removes seals placed upon uranium centrifuges by the International Atomic Energy Agency and resumes construction of the centrifuges at Natanz.

Page 57: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 58: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Iranian Nuclear Scientist Killed• Masoud Alimohammadi

• January 12, 2010

• Majid Shahriari

• November 29, 2010

• Fereydoon Abbasi

• November 29, 2010

• Darioush Rezaeinejad

• July 23, 2011

• Mostafa Ahmadi-Roshan

• January 11, 2012

Page 59: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 60: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Stuxnet• Computer worm discovered in June 2010

• Written by the US and Israel to attack Iran's nuclear facilities

• Stuxnet infects PLCs by subverting the Step-7 software application that is used to reprogram these devices.

• It is initially spread using USB flash drives.

Page 61: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Bruce Schneier

I personally believe that training users in security is generally a waste of time, and that the money can be spent better elsewhere.

Page 62: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 63: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 64: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

What are your thoughts on security awareness programs?

Page 65: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Misplaced Priorities

Page 66: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Kim Jong-un• First Secretary of the Workers' Party of

Korea

• First Chairman of the National Defense Commission of North Korea

• Commander of the Korean People's Army

Page 67: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

North Korean Nuclear ProgramPhase I (1956–80) Start of North Korea’s domestic plutonium production program.

Phase II (1980–94) Growth of North Korea’s domestic plutonium production program.

Phase III (1994–2002) covers the period of the "nuclear freeze".

Phase IV (2002–present) Renewed nuclear activities and tests.

Page 68: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 69: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 70: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 71: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 72: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 73: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Page 74: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

What does your priority list look like for your security program?

Page 75: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Questions?

Page 76: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Contact Info

Jerry GamblinSecurity SpecialistMissouri House Of Representatives

Contact Information:[email protected] @jgamblinwww.jerrygamblin.com

Page 77: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Thank You

Page 78: 44CON 2013 - Security Lessons from Dictators - Jerry Gamblin

Richard Clarke

“If you spend more on printer ink than on IT security, you will be hacked. What's more, you deserve to be hacked."