SlideShare a Scribd company logo
1 of 78
Security Lessons from Dictators
#44Con

September 12th 2013
About me

Jerry Gamblin

Security Specialist
Missouri House Of Representatives
Contact Information:
Jerry.Gamblin@gmail.com
@jgamblin
www.jerrygamblin.com
About this talk

History does not repeat itself, but it
does rhyme.
- Mark Twain
Security Lessons from Dictators
Insider Threats
Et tu, Brute?
Gaius
Julius
Caesar
Dictator Perpetuo of The Roman Empire
Marcus Junius Brutus
49 BC: Fought with Pompey to Greece
during the civil war against Caesar.
48 BC: Pardoned by Caesar.
46 BC: Made governor of Gaul.
45 BC: Made Praetor.
44 BC: Murdered Caesar
How does your company defend
against insider threats?
Insider Threats

You can not detect and defend from insider threats from
behind your keyboard.
Insider Threats

Insider threats are not a technical issue alone.
Insider Threats

People who steal your unprotected information are not
hackers.
Edward Snowden
2004: Enlisted in the United States Army as a
Special Forces recruit.

2005: Security Guard for the National Security
Agency
2007: Network Administrator for the State
Department
2011: Worked for NSA in Japan.

2012: Contractor for Booze Allen Hamilton.
2013: Leaked NSA surveillance programs to
the press.
Could you have identified and
stopped Edward Snowden on your
network?
Incident Response
Executing of the Duke of Enghien.
Napoleon Bonaparte
Emperor of France
Louis Antoine
Duke of Enghien
•

Only son of Louis Henri de Bourbon.

•

Given the title Duke of Enghien at birth.

•

Military school at Commodore de Vinieux.

•

Fought in the French Revolutionary Wars
against France.

•

Married Charlotte de Rohan.

•

Arrested for allegedly being part of the
Cadoudal–Pichegru conspiracy
Incident Response

C'est pire qu'un crime, c'est une faute
How does your incident response
plan look in real life?
How can security professionals
handle investigations better?
Hacking Back
Suspending habeas corpus.
Abraham Lincoln
16th President of the United States of America
Hacking Back
You are engaged in repressing an insurrection against the laws
of the United States. If at any point on or in the vicinity of any
military line which is now or which shall be used between the
city of Philadelphia and the city of Washington you find
[resistance] which renders it necessary to suspend the writ of
habeas corpus for the public safety, you personally or through
the officer in command at the point where resistance occurs are
authorized to suspend that writ.
Lincoln to General Winfield Scott on April 27, 1861
Article 1. Section 9.
of the United States Constitution

The privilege of the writ of
habeas corpus shall not be
suspended (by congress),
unless when in cases of
rebellion or invasion the
public safety may require
it.
Ex parte Merryman
Such is the case now before
me, and I can only say that if
the authority which the
constitution has confided to
the judiciary can be usurped
by the President the people of
the United States are no longer
living under a government of
laws.
Jon Huntsman

Commission on
Theft of American Intellectual Property

Without damaging the
intruder’s own network,
companies that experience
cyber theft ought to be able to
retrieve their electronic files or
prevent the exploitation of their
stolen information.
We'd politely remind
them there's a federal
criminal statute
barring that.
Justice Department's Computer Crime and
Intellectual Property Section.
What do you think the future of
hacking back (active defense) is?
Advanced Tools Over Proven Techniques
Next Generation Everything!!!!!
I am getting ready to use Adolf Hitler and WWII to make a point
about network security. I am not trying to be flippant or
disrespectful in the slightest and I understand the extreme cost
of war.
Adolf
Hitler
Führer of Germany
Wunderwaffe
Sturmgewehr 44 - The first assault rifle

Horten Ho 229 - A turbojet flying wing stealth
jet fighter/bomber
Flettner Fl 265 - The world's earliest known
airworthy synchropter
Schwerer Gustav - An 800mm railway gun
V2 - First human-made object to achieve
sub-orbital spaceflight
It has been argued that Germany lost
WWII by picking advanced tools over
proven techniques…
… just like IT security.

 Highly Trained Staff
 Everyone has a CISSP!

 No End User Training
 Unless mandated

 Patch Management System

 End Users Have Admin Rights.

 Next Generation Firewall

 No Auditing of Web Apps.

 Shiny SIEM

 No one actually checks logs.

 New Security Policy Guidelines

 Shadow IT has taken over.
Why do security professionals have
such a hard time getting the basics
right?
Poor Security Awareness Training
USB Drives Don’t Grown In The Desert
Grand Ayatollah Seyed
Ali Hosseini Khamenei
Supreme Leader of Iran
Nuclear Program of Iran
• 1957: The United States and Iran sign a civil nuclear co-operation agreement as part of the
U.S. Atoms for Peace program.

• 1968: Iran signs the Nuclear Non-Proliferation Treaty and ratifies it.
• 1979: Iran's Islamic revolution puts a freeze on the existing nuclear program.
• 1982: Iranian officials announced that they planned to build a reactor powered by their
own uranium at the Isfahan Nuclear Technology Centre.

• 1995: Iran signs an $800 million contract with the Russian Ministry of Atomic Energy in Busheh.
• 2002: The United States accuses Iran of attempting to make nuclear weapons.
• 2004: Iran removes seals placed upon uranium centrifuges by the International Atomic
Energy Agency and resumes construction of the centrifuges at Natanz.
Iranian Nuclear Scientist Killed
• Masoud Alimohammadi
• January 12, 2010
• Majid Shahriari
• November 29, 2010
• Fereydoon Abbasi
• November 29, 2010

• Darioush Rezaeinejad
• July 23, 2011
• Mostafa Ahmadi-Roshan
• January 11, 2012
Stuxnet
• Computer worm discovered in June 2010
• Written by the US and Israel to attack Iran's
nuclear facilities
• Stuxnet infects PLCs by subverting the Step-7
software application that is used to
reprogram these devices.
• It is initially spread using USB flash drives.
Bruce Schneier

I personally believe that
training users in security is
generally a waste of time, and
that the money can be spent
better elsewhere.
What are your thoughts on security
awareness programs?
Misplaced Priorities
Kim
Jong-un
• First Secretary of the Workers' Party of Korea
• First Chairman of the National Defense
Commission of North Korea
• Commander of the Korean People's Army
North Korean Nuclear Program
Phase I (1956–80) Start of North Korea’s
domestic plutonium production program.
Phase II (1980–94) Growth of North
Korea’s domestic plutonium production
program.
Phase III (1994–2002) covers the period of
the "nuclear freeze".
Phase IV (2002–present) Renewed
nuclear activities and tests.
What does your priority list look like
for your security program?
Questions?
Contact Info

Jerry Gamblin

Security Specialist
Missouri House Of Representatives
Contact Information:
Jerry.Gamblin@gmail.com
@jgamblin
www.jerrygamblin.com
Thank You
Richard Clarke

“If you spend more on printer
ink than on IT security, you will
be hacked. What's more, you
deserve to be hacked."

More Related Content

What's hot

Endless War in the Drone Age
Endless War in the Drone AgeEndless War in the Drone Age
Endless War in the Drone Agemedbenjamin
 
Bradley manning
Bradley manningBradley manning
Bradley manningTy171
 
Crj 117 global war of terror.b
Crj 117 global war of terror.bCrj 117 global war of terror.b
Crj 117 global war of terror.bJames Atkinson
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
Defense force3 6
Defense force3 6Defense force3 6
Defense force3 6Joortman
 
The Ford Adminstration
The Ford AdminstrationThe Ford Adminstration
The Ford Adminstrationkbeacom
 
The korean war
The korean warThe korean war
The korean warslittrell1
 
Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2pergam
 
5 Honorable Mention American Presidents
5 Honorable Mention American Presidents5 Honorable Mention American Presidents
5 Honorable Mention American PresidentsHistoryExpert006
 
introduction to international politics... terrorism
introduction to international politics... terrorismintroduction to international politics... terrorism
introduction to international politics... terrorismAbdulAzeez938159
 
MilSatom USA latest confirmed speakers 130116
MilSatom USA latest confirmed speakers 130116MilSatom USA latest confirmed speakers 130116
MilSatom USA latest confirmed speakers 130116Dale Butler
 
Ch.12 early years of the cold war
Ch.12  early years of the cold warCh.12  early years of the cold war
Ch.12 early years of the cold wardhtaylor3
 
Global Governance: Cyber, Ideological, and Transnational Security
Global Governance: Cyber, Ideological, and Transnational SecurityGlobal Governance: Cyber, Ideological, and Transnational Security
Global Governance: Cyber, Ideological, and Transnational SecurityBobur Nazarmuhamedov
 

What's hot (20)

Endless War in the Drone Age
Endless War in the Drone AgeEndless War in the Drone Age
Endless War in the Drone Age
 
Bradley manning
Bradley manningBradley manning
Bradley manning
 
National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks
 
Crj 117 global war of terror.b
Crj 117 global war of terror.bCrj 117 global war of terror.b
Crj 117 global war of terror.b
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Defense force3 6
Defense force3 6Defense force3 6
Defense force3 6
 
The Ford Adminstration
The Ford AdminstrationThe Ford Adminstration
The Ford Adminstration
 
Nsp brochure
Nsp brochureNsp brochure
Nsp brochure
 
blind to threats
blind to threatsblind to threats
blind to threats
 
Online freedom of expression
Online freedom of expressionOnline freedom of expression
Online freedom of expression
 
The korean war
The korean warThe korean war
The korean war
 
Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2
 
5 Honorable Mention American Presidents
5 Honorable Mention American Presidents5 Honorable Mention American Presidents
5 Honorable Mention American Presidents
 
introduction to international politics... terrorism
introduction to international politics... terrorismintroduction to international politics... terrorism
introduction to international politics... terrorism
 
MilSatom USA latest confirmed speakers 130116
MilSatom USA latest confirmed speakers 130116MilSatom USA latest confirmed speakers 130116
MilSatom USA latest confirmed speakers 130116
 
Terrorism
TerrorismTerrorism
Terrorism
 
Surviving Cyber War
Surviving Cyber WarSurviving Cyber War
Surviving Cyber War
 
Ch.12 early years of the cold war
Ch.12  early years of the cold warCh.12  early years of the cold war
Ch.12 early years of the cold war
 
Cyberwar
CyberwarCyberwar
Cyberwar
 
Global Governance: Cyber, Ideological, and Transnational Security
Global Governance: Cyber, Ideological, and Transnational SecurityGlobal Governance: Cyber, Ideological, and Transnational Security
Global Governance: Cyber, Ideological, and Transnational Security
 

Similar to Security Lessons from Dictators: Focus on Basics Over Shiny Tools

RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxRESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxwilfredoa1
 
Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...stuimrozsm
 
8. Whistle Blowing.pptx By Akshit Jain .
8. Whistle Blowing.pptx By Akshit Jain   .8. Whistle Blowing.pptx By Akshit Jain   .
8. Whistle Blowing.pptx By Akshit Jain .Akshit Jain
 
WHISTLE-BLOWING
WHISTLE-BLOWINGWHISTLE-BLOWING
WHISTLE-BLOWINGAjeesh Mk
 
Can you have liberty while maintaining security
Can you have liberty while maintaining securityCan you have liberty while maintaining security
Can you have liberty while maintaining securityyazet soto
 
Terrorism & Nuclear Prolifeeration
Terrorism &  Nuclear  ProlifeerationTerrorism &  Nuclear  Prolifeeration
Terrorism & Nuclear ProlifeerationAbdelhamied El-Rafie
 
Terrorism & nuclear prolifeeration
Terrorism & nuclear prolifeerationTerrorism & nuclear prolifeeration
Terrorism & nuclear prolifeerationAbdelhamied El-Rafie
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINALNicholas Poole
 
Topic Summary.docx
Topic Summary.docxTopic Summary.docx
Topic Summary.docxwrite5
 

Similar to Security Lessons from Dictators: Focus on Basics Over Shiny Tools (15)

RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxRESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
 
Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...
 
Titan Rain
Titan RainTitan Rain
Titan Rain
 
8. Whistle Blowing.pptx By Akshit Jain .
8. Whistle Blowing.pptx By Akshit Jain   .8. Whistle Blowing.pptx By Akshit Jain   .
8. Whistle Blowing.pptx By Akshit Jain .
 
whistleblowing
whistleblowingwhistleblowing
whistleblowing
 
WHISTLE-BLOWING
WHISTLE-BLOWINGWHISTLE-BLOWING
WHISTLE-BLOWING
 
Can you have liberty while maintaining security
Can you have liberty while maintaining securityCan you have liberty while maintaining security
Can you have liberty while maintaining security
 
Terrorism & Nuclear Prolifeeration
Terrorism &  Nuclear  ProlifeerationTerrorism &  Nuclear  Prolifeeration
Terrorism & Nuclear Prolifeeration
 
Terrorism & nuclear prolifeeration
Terrorism & nuclear prolifeerationTerrorism & nuclear prolifeeration
Terrorism & nuclear prolifeeration
 
Exp r35
Exp r35Exp r35
Exp r35
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
Topic Summary.docx
Topic Summary.docxTopic Summary.docx
Topic Summary.docx
 
2009 perhaps we should have shouted
2009 perhaps we should have shouted2009 perhaps we should have shouted
2009 perhaps we should have shouted
 
2009 perhaps we should have shouted
2009 perhaps we should have shouted2009 perhaps we should have shouted
2009 perhaps we should have shouted
 
sample_1
sample_1sample_1
sample_1
 

More from 44CON

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...44CON
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...44CON
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...44CON
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...44CON
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...44CON
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...44CON
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank44CON
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...44CON
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON
 

More from 44CON (20)

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Security Lessons from Dictators: Focus on Basics Over Shiny Tools

  • 1. Security Lessons from Dictators #44Con September 12th 2013
  • 2. About me Jerry Gamblin Security Specialist Missouri House Of Representatives Contact Information: Jerry.Gamblin@gmail.com @jgamblin www.jerrygamblin.com
  • 3.
  • 4.
  • 5.
  • 6. About this talk History does not repeat itself, but it does rhyme. - Mark Twain
  • 10. Marcus Junius Brutus 49 BC: Fought with Pompey to Greece during the civil war against Caesar. 48 BC: Pardoned by Caesar. 46 BC: Made governor of Gaul. 45 BC: Made Praetor. 44 BC: Murdered Caesar
  • 11.
  • 12. How does your company defend against insider threats?
  • 13. Insider Threats You can not detect and defend from insider threats from behind your keyboard.
  • 14. Insider Threats Insider threats are not a technical issue alone.
  • 15. Insider Threats People who steal your unprotected information are not hackers.
  • 16. Edward Snowden 2004: Enlisted in the United States Army as a Special Forces recruit. 2005: Security Guard for the National Security Agency 2007: Network Administrator for the State Department 2011: Worked for NSA in Japan. 2012: Contractor for Booze Allen Hamilton. 2013: Leaked NSA surveillance programs to the press.
  • 17. Could you have identified and stopped Edward Snowden on your network?
  • 18. Incident Response Executing of the Duke of Enghien.
  • 20. Louis Antoine Duke of Enghien • Only son of Louis Henri de Bourbon. • Given the title Duke of Enghien at birth. • Military school at Commodore de Vinieux. • Fought in the French Revolutionary Wars against France. • Married Charlotte de Rohan. • Arrested for allegedly being part of the Cadoudal–Pichegru conspiracy
  • 21.
  • 22.
  • 23. Incident Response C'est pire qu'un crime, c'est une faute
  • 24. How does your incident response plan look in real life?
  • 25.
  • 26.
  • 27. How can security professionals handle investigations better?
  • 29. Abraham Lincoln 16th President of the United States of America
  • 30.
  • 31.
  • 32. Hacking Back You are engaged in repressing an insurrection against the laws of the United States. If at any point on or in the vicinity of any military line which is now or which shall be used between the city of Philadelphia and the city of Washington you find [resistance] which renders it necessary to suspend the writ of habeas corpus for the public safety, you personally or through the officer in command at the point where resistance occurs are authorized to suspend that writ. Lincoln to General Winfield Scott on April 27, 1861
  • 33. Article 1. Section 9. of the United States Constitution The privilege of the writ of habeas corpus shall not be suspended (by congress), unless when in cases of rebellion or invasion the public safety may require it.
  • 34. Ex parte Merryman Such is the case now before me, and I can only say that if the authority which the constitution has confided to the judiciary can be usurped by the President the people of the United States are no longer living under a government of laws.
  • 35. Jon Huntsman Commission on Theft of American Intellectual Property Without damaging the intruder’s own network, companies that experience cyber theft ought to be able to retrieve their electronic files or prevent the exploitation of their stolen information.
  • 36.
  • 37.
  • 38. We'd politely remind them there's a federal criminal statute barring that. Justice Department's Computer Crime and Intellectual Property Section.
  • 39.
  • 40. What do you think the future of hacking back (active defense) is?
  • 41. Advanced Tools Over Proven Techniques Next Generation Everything!!!!!
  • 42. I am getting ready to use Adolf Hitler and WWII to make a point about network security. I am not trying to be flippant or disrespectful in the slightest and I understand the extreme cost of war.
  • 44. Wunderwaffe Sturmgewehr 44 - The first assault rifle Horten Ho 229 - A turbojet flying wing stealth jet fighter/bomber Flettner Fl 265 - The world's earliest known airworthy synchropter Schwerer Gustav - An 800mm railway gun V2 - First human-made object to achieve sub-orbital spaceflight
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50. It has been argued that Germany lost WWII by picking advanced tools over proven techniques…
  • 51. … just like IT security.  Highly Trained Staff  Everyone has a CISSP!  No End User Training  Unless mandated  Patch Management System  End Users Have Admin Rights.  Next Generation Firewall  No Auditing of Web Apps.  Shiny SIEM  No one actually checks logs.  New Security Policy Guidelines  Shadow IT has taken over.
  • 52.
  • 53. Why do security professionals have such a hard time getting the basics right?
  • 54. Poor Security Awareness Training USB Drives Don’t Grown In The Desert
  • 55. Grand Ayatollah Seyed Ali Hosseini Khamenei Supreme Leader of Iran
  • 56. Nuclear Program of Iran • 1957: The United States and Iran sign a civil nuclear co-operation agreement as part of the U.S. Atoms for Peace program. • 1968: Iran signs the Nuclear Non-Proliferation Treaty and ratifies it. • 1979: Iran's Islamic revolution puts a freeze on the existing nuclear program. • 1982: Iranian officials announced that they planned to build a reactor powered by their own uranium at the Isfahan Nuclear Technology Centre. • 1995: Iran signs an $800 million contract with the Russian Ministry of Atomic Energy in Busheh. • 2002: The United States accuses Iran of attempting to make nuclear weapons. • 2004: Iran removes seals placed upon uranium centrifuges by the International Atomic Energy Agency and resumes construction of the centrifuges at Natanz.
  • 57.
  • 58. Iranian Nuclear Scientist Killed • Masoud Alimohammadi • January 12, 2010 • Majid Shahriari • November 29, 2010 • Fereydoon Abbasi • November 29, 2010 • Darioush Rezaeinejad • July 23, 2011 • Mostafa Ahmadi-Roshan • January 11, 2012
  • 59.
  • 60. Stuxnet • Computer worm discovered in June 2010 • Written by the US and Israel to attack Iran's nuclear facilities • Stuxnet infects PLCs by subverting the Step-7 software application that is used to reprogram these devices. • It is initially spread using USB flash drives.
  • 61. Bruce Schneier I personally believe that training users in security is generally a waste of time, and that the money can be spent better elsewhere.
  • 62.
  • 63.
  • 64. What are your thoughts on security awareness programs?
  • 66. Kim Jong-un • First Secretary of the Workers' Party of Korea • First Chairman of the National Defense Commission of North Korea • Commander of the Korean People's Army
  • 67. North Korean Nuclear Program Phase I (1956–80) Start of North Korea’s domestic plutonium production program. Phase II (1980–94) Growth of North Korea’s domestic plutonium production program. Phase III (1994–2002) covers the period of the "nuclear freeze". Phase IV (2002–present) Renewed nuclear activities and tests.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74. What does your priority list look like for your security program?
  • 76. Contact Info Jerry Gamblin Security Specialist Missouri House Of Representatives Contact Information: Jerry.Gamblin@gmail.com @jgamblin www.jerrygamblin.com
  • 78. Richard Clarke “If you spend more on printer ink than on IT security, you will be hacked. What's more, you deserve to be hacked."