• Save
Left Field - Hire a Hacker
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Left Field - Hire a Hacker

on

  • 739 views

Paul C Dwyer President of ICTTF speaks on "food for thought" on the concept of identifying talented hackers before they may become criminals.

Paul C Dwyer President of ICTTF speaks on "food for thought" on the concept of identifying talented hackers before they may become criminals.

Statistics

Views

Total Views
739
Views on SlideShare
713
Embed Views
26

Actions

Likes
0
Downloads
0
Comments
0

2 Embeds 26

http://www.linkedin.com 20
https://www.linkedin.com 6

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Left Field - Hire a Hacker Presentation Transcript

  • 1. Hire a Hacker!Date: 21st September 2012Venue: Cyber Threat Summit 2012Host: ICTTF Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 2. Paul C Dwyer – BIOPaul C Dwyer is an internationally recognised information security expert with over 21 years experience. A certified industry professional by the International Information Systems Security Certification Consortium (ISC2) and the Information System Audit & Control Association (ISACA) and recently selected for the IT Governance Expert Panel. Pauls credentials include: • -Qualified Hacker • -SOX (SAS70) Auditor • -ISO 27001 Lead Auditor • -BS25999 / BCP Expert • -Forensic Investigator • -PCI DSS Specialist • -Prince2He has worked and trained with such organisations as the US Secret Service, Scotland Yard, FBI, National Counter Terrorism Security Office (MI5), is approved by the National Crime Faculty and is a Copyright - Paul C Dwyer Ltd - All Rights Reserved member of the High Tech Crime Network (HTCN).
  • 3. ICTTF.org Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 4. What Are Cyber Threats? Blurred Lines Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 5. Hacktivism? Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 6. Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 7. Lulzsec and More • It’s all for a laugh….. Or is it? Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 8. Anonymous Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 9. Attack Themes • 2006–07 •2010 • Habbo raids •Operation Titstorm • Hal Turner raid •Oregon Tea Party raid • Chris Forcand arrest •Operations Payback, Avenge Assange, • 2008 and Bradical • Project Chanology •Operation Leakspin •Zimbabwe • Epilepsy Foundation forum invasion •Visa, Mastercard, Paypal • Defacement of SOHH and AllHipHop websites • Sarah Palin email hack • 2009 • No Cussing Club • 2009 Iranian Election Protests • Operation Didgeridie Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 10. • 2011 •Operation Orlando• Attack on Fine Gael website •Operation Intifada• Arab Spring activities •Operation Anti-Security• Attack on HBGary Federal •Operation Facebook •Operation BART• Operation Ouraborus •Shooting Sheriffs Saturday• 2011 Wisconsin protests •Support of Occupy Wall Street• 2011-2012 Operation Empire State •Operation Syria Rebellion •Operation DarkNet• Operation Sony •Opposition to Los Zetas• Spanish Police •Operation Brotherhood Takedown •Attack on Stratfor• Supporting 2011 Indian anti-corruption •Operation Pharisee movement in cyber space• Operation Malaysia Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 11. • 2012 •Bureau of Justice leak •Taking down Monsantos Hungarian website• CSLEA hack •Symantec source code leak• Occupy Nigeria •April 2012 Chinese attack• Operation Megaupload •Operation Bahrain and Formula One attacks• Anti-ACTA activism in Europe •Occupy Philippines• Operation Russia •Operation India •Operation Quebec• Boston Police Department attacks •Operation Japan• Syrian Government E-mail Hack •Operation Anaheim• AntiSec Leak and CIA Attack •AAPT attack• Interpol Attack •Operation Myanmar• AIPAC Attack •Uganda LGBT rights• Vatican website DDoS Attacks Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 12. Control of the Internet Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 13. Ideologically Motivated • Providing a Service • Tacking a Conspiracy • Authentic Voice of Resistance • Struggle for Control of the Internet • Battle = Security vs Freedom Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 14. • Nobody Talks to the Hackers• Instead Building Defences Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 15. United Nations Research Project - Italy Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 16. • Characterisation, Socialisation and Abilities• Lack of Human Intelligence• Lots of Technology• Hactivists vs Criminals – Any Difference? Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 17. Cybercrime – Became a Business Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 18. Crimeware Toolkits Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 19. Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 20. Who are these guys? Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 21. Organised Crime Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 22. Hackers are Only One Element • Often Vulnerable ! Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 23. Dimitry Golubov aka SCRIPT Born: 1982 - Odessa, Ukraine Arrested:2005 Released: 2006 Brought gangster capitalism to WWW Never Tried Now a Politician (Fighting Corruption) Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 24. Renukanth Subramaniam aka JiLsi Founder of Darkmarket Born in Sri Lanka Aged 8 Fled – Sinhalese Mobs Killing Tamils Aged 11 Accused of Being a Terrorist Refugee in UK - Political Asylum Aged 13 – Little English, Bullied – Escaped into World Of Internet Seduced by Criminals Convicted of Mortgage Fraud - Wormwood Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 25. Matrix001 Administrator of Dark Market Born: Germany, Middle Class Obsessed with Games, Pirating led to incremental slide into criminality Arrested: 2007 Convicted Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 26. Max Vision aka ICEMAN Mastermind behind Carders Market Born: Idaho •Pen Tester Working in Santa Clara, CA •Voluntary Work for FBI •Discovered Vuln. on all US Gov Nets •Patched, Left Wormhole •Open Prison – Criminals Convinced Him to Work for Them •Serving 13 Year Sentence Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 27. Adewale Taiwo aka FreddyBB Born: Abuja, Nigeria bankfrauds@yahoo.co.uk 2005 – Arrived UK – Masters in Chemical Engineering – Impressed creating solutions for Oil & Gas Industry Simultaneously – World Wide Bank Fraud Operation Arrested: March 2008 Convicted Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 28. Cagatay Evyapan aka Cha0 Turkish Geek + Social Engineer – Super Hacker Arrested: 2008 Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 29. My Point! • Share Characteristics • Different backgrounds • Demonstrated Massive Abilities in Maths and Sciences • Social Skills Only Developed on the Web • Many Hackers Show Characteristics of Aspergers Syndrome – (Autism Spectrum Disorder) Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 30. Gary McKinnon Suffers from Aspergers Hacked Pentagon Looking for Evidence of UFO’s Facing Extradition to the US 60 Year Sentence Experts Say “High risk, take his own life if extradited” Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 31. • Let’s Prevent a Problem! Copyright - Paul C Dwyer Ltd - All Rights Reserved
  • 32. Thank you www.paulcdwyer.com Copyright - Paul C Dwyer Ltd - All Rights Reserved