ISE331: Snowden Attack
1
ISE331: Snowden Attack 1 Ou Outline of f Topics Covered Snowdens - - PowerPoint PPT Presentation
ISE331: Snowden Attack 1 Ou Outline of f Topics Covered Snowdens background and how he got to the position of being able to leak confidential information from the CIA How Snowden planned and performed the attack The method used
1
leak confidential information from the CIA
happened to Snowden afterwards
parts of the world such as the European Union
2
University of Maryland’s Center of Advanced Language Study which is sponsored by the NSA
3
Central Intelligence Agency (CIA) in the department of global communications
school for technology specialists in march of 2007
Switzerland to investigate their banking system
4
terrorism in the United States was having abroad
point Obama would be the next president
was being gathered never came true
5
that presidents could openly lie to secure the office and then break public promises without consequence”
Switzerland he witnessed some terrible things the CIA would do to acquire sources
6
7
to expose the methods that the government was using
at Booz Allen Hamilton
information
that the NSA does “not wittingly” collect information on millions of Americans
8
their logins as it was “required” for his position
“fabricated digital keys” to gain access
method of access
9
○ Snowden had a Common Access Card (CAC) ○ Snowden used Secure Shell (SSH) keys in his work as a systems administrator ○ Snowden had access to NSA servers using a thin client or basic terminal
breached NSA
○ At least partially revealed correct from declassified documents
10
11
by NSA to find out what information was being stored and where
persuade some of his colleagues to give up their credentials
○ Systems Admin ○ Keylogger
12
keys to gain access to information
for this type of activity
○ Time difference ○ Too many privileged access users (least privilege) ○ Access to both NSAnet and British GCWiki
13
Insider Threat Management software
and Control servers to encrypt his data transfer sessions to other networks which kept the transfer hidden from the NSA
14
○ NSA collected telephone records of millions of Verizon customers ○ NSA Prism program accessed and collected data through back doors into Google and Facebook ○ NSA EvilOlive program collected and stored large quantities of Americans' internet metadata ○ NSA scoops up personal data mined from smartphone apps such as Angry Birds ○ NSA strategy document revealed the agency's goal to acquire data from "anyone, anytime, anywhere"
15
steal sensitive information
summits in Toronto in 2010
political leaders
16
promising unprecedented scoop
filmmaker Laura Poitras who brings the three together
media outlets worldwide
○
The Guardian (Britain),
○
Der Spiegel (Germany),
○
The Washington Post, The New York Times (U.S.)
persona “Verax”
○
Verax in Latin stands for “truth teller”
17
documents were published, Snowden took a leave of absence from the NSA and flew to Hong Kong
18
authorities
traitor
○
38% Support Snowden
○
33% Disapprove of Snowden
○
29 % Unsure
at younger and older generations
mass surveillance to light
19
information from leaks
Clapper, Director of National Intelligence
○
Alleged NSA’s phone record program was unconstitutional
○
Ruled that NSA’s phone recordings were legal
20
compliant
○
Google, Facebook, YouTube, Apple, Microsoft, etc.
○
50/50 say it is acceptable in certain circumstances or unacceptable in all circumstances
21
https://www.wired.com/2014/08/edward-snowden/ https://www.washingtonpost.com/world/national-security/investigators-looking-at-how-snowden-gained-access-at- nsa/2013/06/10/83b4841a-d209-11e2-8cbe-1bcbee06f8f8_story.html?noredirect=on&utm_term=.5777c3eab301 https://abcnews.go.com/US/americas-top-spy-james-clapper-made-mistake-lie/story?id=37003608 https://www.darkreading.com/attacks-breaches/how-did-snowden-do-it/d/d-id/1140877 https://www.venafi.com/blog/deciphering-how-edward-snowden-breached-the-nsa http://investigations.nbcnews.com/_news/2013/08/26/20197183-how-snowden-did-it https://www.venafi.com/blog/venafi-analysis-of-snowden-nsa-breach-confirmed-2-years-later https://www.nytimes.com/2017/06/16/us/politics/nsa-data-edward-snowden.html https://www.businessinsider.com/snowden-leaks-timeline-2016-9 https://www.huffpost.com/entry/edward-snowden-poll_n_3542931
22
https://fas.org/irp/news/2014/02/nsa-021014.pdf https://www.documentcloud.org/documents/3863426-Savage-NYT-FOIA-DOD-IG-Report-Post-Snowden-NSA.html https://arstechnica.com/tech-policy/2013/10/snowdens-nsa-post-in-hawaii-failed-to-install-anti-leak-software/ https://searchsecurity.techtarget.com/feature/Command-and-control-servers-The-puppet-masters-that-govern-malware
23
Slide 3- https://www.biography.com/activist/edward-snowden Slide 8 - https://www.flickr.com/photos/medilldc/6797228431
https://commons.wikimedia.org/wiki/File:Defense.gov_photo_essay_110604-D-XH843-007.jpg
Slide 9 - https://fcw.com/~/media/GIG/FCWNow/People/A/Alexander_Keith_370.jpg Slide 11 - https://en.wikipedia.org/wiki/Kill_chain#/media/File:Intrusion_Kill_Chain_-_v2.png Slide 12- https://federalnewsnetwork.com/wp-content/uploads/2019/02/navy-common-access-card.jpg Slide 14- https://en.wikipedia.org/wiki/USB_flash_drive#/media/File:SanDisk-Cruzer-USB-4GB-ThumbDrive.jpg Slide 15- https://images-na.ssl-images-amazon.com/images/I/61EJ9r17ZkL.png Slide 18 - https://www.telegraph.co.uk/news/worldnews/europe/russia/10218767/Edward-Snowden-begins-life-in-secret-
Russian-location.html
24