nym issa meeting
play

NYM ISSA MEETING Cellular Eavesdropping: an Evidence-based - PowerPoint PPT Presentation

NYM ISSA MEETING Cellular Eavesdropping: an Evidence-based Discussion 12 April 2011 Agenda Information Paths & The IA Security Gap Cellular & Security Eavesdropping Attack Vectors Protection Methods Information Paths On


  1. NYM ISSA MEETING Cellular Eavesdropping: an Evidence-based Discussion 12 April 2011

  2. Agenda • Information Paths & The IA Security Gap • Cellular & Security • Eavesdropping Attack Vectors • Protection Methods

  3. Information Paths On a transaction, from each party… • Executives 3 Primary • Boards Information Paths • Bankers • Lawyers • Consultants • Auditors

  4. Information Paths On a transaction, from each party… Physical • Executives • Boards • Bankers • Lawyers • Consultants $ • Face-to-face meetings • Auditors • Overnight couriers

  5. Information Paths On a transaction, from each party… Physical • Executives • Boards Data • Bankers • Lawyers • Consultants Equipment protection $$$ • Network protection • Auditors •

  6. Information Paths On a transaction, from each party… Physical • Executives • Boards Data • Bankers Voice • Lawyers • Consultants Landline protection ??? • Mobile protection • Auditors •

  7. Cellular & Security

  8. Typical Cell Call

  9. “Gates, guards and guns” Cellular Security Air link authentication and encryption

  10. Do You Need Additional Security? • How sensitive is your information shared on mobile calls? • As with any communications system, information value/confidentiality dictates the level of security solution required • AT&T Mobility and leading carriers around globe can support any level of mobile security – from normal use to the most sensitive information anywhere

  11. Eavesdropping Attack Vectors

  12. Eavesdropping Attack Vectors

  13. Tower Spoofing DefCon August 2010 – Las Vegas • Phone automatically connects to strongest signal rogue tower • “IMSI catcher” exploits authentication framework • Cost of attack reportedly $1,500, primarily RF equipment • “Bases station” code downloadable open source

  14. Voice Intercept Becoming Cheap and Easy Barriers/Costs to Attack Today Hackers Organized Any State Ethical or Otherwise Sponsored Crime Criminal Attacker Sophistication

  15. Phishing, Bots, Etc… Already Cheap and Easy Barriers/Costs to Attack Today Hackers Organized Any State Ethical or Otherwise Sponsored Crime Criminal Attacker Sophistication

  16. Tower Spoofing “Meganet's Dominator I snoops on four GSM convos at once, fits in your overnight bag” ~ Engaget http://www.youtube.com/meganetcorp#p/u/1/1eJ-WGpNQko

  17. Eavesdropping Attack Vectors

  18. Illegal Monitoring • Passive systems • Similar to analogue scanners

  19. What do they have in common?

  20. Eavesdropping Attack Vectors

  21. Unwanted Foreign Government Surveillance The Telegraph “Wiretapping is a widespread practice in Italy. Just this week it emerged that both Pope Benedict XVI and Hillary Clinton, the US secretary of state, had been inadvertently taped by Italian investigators.” 10 June 2010

  22. Eavesdropping Attack Vectors

  23. Hacker Exploits Vodafone, Ericsson Get Hung Up In Greece's Phone-Tap Scandal June 2006 The Athens Affair How some extremely smart hackers pulled off the most audacious cell-network break-in ever July 2007

  24. Hacker Exploits Chaos Computer Club December 2010 - Berlin • Exploit involves device targeting via Internet service and ‘broken’ SMS messaging technique • Cost of attack reportedly 10 Euros for each of 4 phones • Firmware downloadable open source

  25. Eavesdropping Attack Vectors

  26. 3 rd -Party App Exploits “KSL 5 Investigation: How your cell phone can be used against you”

  27. Eavesdropping Attack Vectors

  28. Access at Network Facility “The 2009 CSI Computer Crime Survey , probably one of the most respected reports covering insider threats, says insiders are responsible for 43 percent of malicious attacks. Twenty-five percent of respondents said that over 60 percent of their losses were due to nonmalicious actions by insiders. I've read many damage assessment reports stating that although insiders are responsible for fewer incidents than are outsiders, insider incidents usually result in more damage. Thus, the CSI data seems credible.” ~ InfoWorld

  29. Protection

  30. Encrypted Mobile Voice Fully integrated hardware, software and service solution from AT&T, SRA and KoolSpan

  31. Ideal For • Incident response • Investigations • Sensitive transactions • Physical safety • International travel • Untraceable information leaks MERK Includes • 10, 20 and 50 units kits • Fully configured • Security chip and app • Hosted infrastructure

  32. THANK YOU

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend