SlideShare una empresa de Scribd logo
1 de 52
Descargar para leer sin conexión
Gohsuke Takama /          , Meta Associates, 2011   11



                                       http://www.slideshare.net/gohsuket
Friday, November 4, 2011
about…

                 ✴ Gohsuke Takama
                       ✴ Meta Associates (http://www.meta-associates.com/)
                           ✴founder & president, connector, analyst, planner
                           ✴ local organizer of security conferences: BlackHat Japan, PacSec
                           ✴ liaison of security businesses: Patch Advisor, SecWest
                           ✴ security news: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/
                           ✴ organizer of tech entrepreneur / startup support events
                           ✴ independent tech journalist for over 10 years
                       ✴ Privacy International (London, UK http://www.privacyinternational.org/)
                           ✴advisory board member
                       ✴ Computer Professionals for Social Responsibility (http://cpsr.org/)
                           ✴Japan chapter founding supporter




Friday, November 4, 2011
A
                           Attacks




Friday, November 4, 2011
"what happened in the last 2 years"

                    •      OperationAurora, ShadyRAT,     ,      ...

                    •      Stuxnet, Duqu

                    •      Sony PSN

                    •      Wikileaks *new

                    •      Anonymous *new

                    •                       (MENA) *new

                    •      Indira Gandhi

Friday, November 4, 2011
"what happened in the last 2 years"

                    •      OperationAurora, ShadyRAT,             ,            ...
                           =                    = APT (Advanced Persistent Threat)

                    •      Stuxnet = SCADA

                    •      Sony PSN:        3       , DDoS,           ,

                    •      Wikileaks *new =                   :

                    •      Anonymous *new =                       +

                    •                           *new=

                    •      Indira Gandhi        =
Friday, November 4, 2011
"whom targeted, why"




                      http://paulsparrows.wordpress.com/category/security/cyber-attacks-timeline/
Friday, November 4, 2011
"whom targeted, why"

                    •                   ,

                    •      Sony PSN, Sony

                    •              ,

                    •
                    •              :




Friday, November 4, 2011
"Stuxnet"




Friday, November 4, 2011
"Anonymous"




                            http://www.youtube.com/watch?v=2Tm7UKo4IBc
                           http://www.youtube.com/watch?v=kZNDV4hGUGw
Friday, November 4, 2011
"know your enemy: techniques"

                    •      phishing            •   website spoofing
                    •      targeted phishing   •   content altering
                    •      trojan              •   XSRF
                    •      spyware             •   XSS
                    •      keylogger           •   code injection
                    •      rootkit             •   IP hijacking
                    •      botnet DDoS         •   rogue WiFi AP
                                               •   sniffer



Friday, November 4, 2011
"emerging attack techniques"

                    •      malware:                                 ,


                    •      VM                       , bios
                    •                         : VNC, Spycam,

                    •                     : keylogger, GPS logger
                    •                         : Stuxnet

                    •       DDoS:
                           JavaScript    (LOIC)
                                                                    ($8/h~),



Friday, November 4, 2011
"know your enemy: techniques"




                              http://www.ipa.go.jp/security/vuln/newattack.html
Friday, November 4, 2011
"layer approach"




                                •examle: OSI model




Friday, November 4, 2011
"a security layer model "

                                 7 Psychological       ,
                                 6 Custom (Habit)      ,
                                 5 Operation
                                 4 Content
                                 3 OS/Application
                                 2 Hardware
                                 1 Physical
Friday, November 4, 2011
"a security layer model "

                                 7 Psychological       ,
       Human Factor              6 Custom (Habit)      ,
                                 5 Operation
                                 4 Content
            Intangibles
                                 3 OS/Application
                                 2 Hardware
               Tangibles
                                 1 Physical
Friday, November 4, 2011
"attacks vs. counter measures "

                             APT, espionage, phishing,
   Psychological
                                social engineering                   ?
                                spoofing, pharming,    accustomed best practice,
            Custom           phishing spam, XSS, XSRF,   awareness, CIRT, PKI,
                              spyware, ID spoof/theft digital ID, SSL certificate
                             DoS, spam, ransom-ware,     routing, filtering, policy,
        Operation
                                  sabotage-ware                  audit, CIRT

                             sniffing, spyware, spam,      encryption, filtering,
           Content
                                    alteration             content-scan, host IDS

          OS/                DoS, vuln exploit, 0day,    Firewall, network IDS, IPS,
      Application                 rootkit, botnet         anti-virus, OS/app patch

                             direct access, tampering,     perimeter guard, anti-
         Hardware
                                    alteration              tampering, hard seal

                               lock pick, break in,       surveillance, perimeter
         Physical
                                     vandalism               alarm, armed guard
Friday, November 4, 2011
"spoofing, phishing & targeted attack"
                            /                   1




Friday, November 4, 2011
"cybercrime, cyber espionage & identity "

                    ✴ APT,
                     •                   =

                     •
                     •               :           ,   ,

                     •       →   →           →
                    ✴            (                       )
                     •                   =

                     •
                     •
Friday, November 4, 2011
                                     →
"cybercrime, cyber espionage,
                           primary target = individual identity"




Friday, November 4, 2011
B
                           Behavior




Friday, November 4, 2011
"social change on Internet"
                               2000
                    •
                    •
                           •
                           •
                           •
                           •




Friday, November 4, 2011
"social change on Internet"
                               2001
                    •                            •
                    •                            •
                    •                            •
                    •                            •
                           •                     •
                           •                     •
                           •                     •             (Wiki   )

                           •        /            •
                           •                     •   3D

                                                 •
Friday, November 4, 2011
Friday, November 4, 2011
"real world vs. social data world"




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




              $Money



                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money



                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money



                                                   -
                                                   -
                                                   -
                                                   -


                                       Control
Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money                                         Ideology



                                                   -
                                                   -
                                                   -
                                                   -


                                       Control
Friday, November 4, 2011
"disseminate motives"
                           Autocracy, Crime, Extremism, Hacker
                                                 Power

                                                 Autocratic
                                                Government

                                                          Infra
                                              APT      Disruption

                                 Organized                        Extremist
              $Money              Crime                           Hacktivist   Ideology
                                             Theft      Hacktivism
                                             Fraud
                                                      Lulz
                                                                       :
                                                              -
                                                 Hacker       -
                                                 Cracker      -
                                                              -


                                               Control
Friday, November 4, 2011
I
                           Identity




Friday, November 4, 2011
"Identity"


                           entity, identity, relationship

                                   me = entity

                                 me{Attributes}

Friday, November 4, 2011
Identification & Authentication

          Identity             Identification          Authentication   Authorization
                              Credential{Identifier}




                                                                           Validation




     me{Attributes}
       me = entity




Friday, November 4, 2011
Identification & Authentication

          Identity             Identification                     Authentication   Authorization
                              Credential{Identifier}




                                                                                      Validation




     me{Attributes}
       me = entity




                                                      Identity


                                             Identification


Friday, November 4, 2011
"Identity"

                            Erik H. Erikson
                                 1967




                                              Sydney Shoemaker
                                                    1963




Friday, November 4, 2011
"Identity"


                           me{Attributes} * t→




Friday, November 4, 2011
"Identity"


                           me{Attributes} * t→




Friday, November 4, 2011
AxBxI
                            = WTF?




Friday, November 4, 2011
"state of security methodology"

                    ✴                                   (F/W)
                     •(                                 +                    )
                    ✴
                     •=                  (                               )
                    ✴                :       100%
                     • (                                        ?)
                    ✴ PKI                    = DigiNotar
                    ✴                               =

                     •(
Friday, November 4, 2011
                                                                     )
"perspective for counter strategy"
                              set basic security measures:

                    ✴                           ,
                                                    =                    ,


                    ✴                           (APT                )
                           ✴   PET (        )

                    ✴                  prevention, detection, response

                     •
                     •
                     •
Friday, November 4, 2011
"perspective for counter strategy"
                                      be creative:

                    ✴ counter social engineering
                     •
                     •
                    ✴ social intelligence
                    ✴ soft power
                     •
                     •                       PR    deflective PR


Friday, November 4, 2011
"perspective for counter strategy"
                     be creative: Counter Social Engineering

                    •
                    •
                    •
                           •
                           •
                    •
                    •
                           •   (
                                   )
Friday, November 4, 2011
"perspective for counter strategy"
                                be creative: Soft Power

                    •         Soft Power = 1990        Joseph Nye


                    •                Hard Power
                    •
                    •      http://en.wikipedia.org/wiki/Soft_power
                    •                                     /

                    •
Friday, November 4, 2011
Friday, November 4, 2011
references

                    •      CEOs - the new corporate fraudstersds http://www.iol.co.za/
                           sundayindependent/ceos-the-new-corporate-fraudstersds-1.1144649

                    •      PwC Survey Says: Telecoms Are Overconfident About Security http://
                           www.readwriteweb.com/cloud/2011/09/pwc-survey-says-telecoms-are-o.php

                    •      Cyber attack led to IGI shutdown http://www.indianexpress.com/news/
                           cyber-attack-led-to-igi-shutdown/851365/

                    •      Anonymous announces global plans http://www.digitaltrends.com/
                           computing/video-anonymous-announces-global-plans/

                    •      ANONYMOUS - OPERATION PAYBACK - Sony Press Release http://
                           www.youtube.com/watch?v=2Tm7UKo4IBc

                    •      Operation Payback - Anonymous Message About ACTA Laws, Internet
                           Censorship and Copyright http://www.youtube.com/watch?
                           v=kZNDV4hGUGw

                    •      Anonymous: Message to Scientology http://www.youtube.com/watch?
                           v=JCbKv9yiLiQ

                    •                        Anonymous                 http://www.atmarkit.co.jp/
                           fsecurity/special/161dknight/dknight01.html
Friday, November 4, 2011
references

                    •      28 Nation States With Cyber Warfare Capabilities http://
                           jeffreycarr.blogspot.com/2011/09/27-nation-states-with-cyber-warfare.html

                    •                                                                         Far East
                           Research    http://scan.netsecurity.ne.jp/archives/52017036.html

                    •      CVE-2011-0611 : Adobe Flash Player SWF Memory Corruption Vulnerability
                           http://www.youtube.com/watch?v=DP_rRf468_Y

                    •      MYBIOS. Is BIOS infection a reality? http://www.securelist.com/en/analysis/
                           204792193/MYBIOS_Is_BIOS_infection_a_reality

                    •      McAfee Virtual Criminology Report 2007 http://us.mcafee.com/en-us/local/
                           html/identity_theft/NAVirtualCriminologyReport07.pdf

                    •                  Google Zeitgeist                          http://blog.f-secure.jp/
                           archives/50630539.html

                    •       "The Tragedies in Oslo and on Utøya island" Speech held by King Harald V
                           http://www.kongehuset.no/c27262/nyhet/vis.html?tid=92959



Friday, November 4, 2011
references

                    •                                                             -- DEFCON CTF
                                   http://scan.netsecurity.ne.jp/archives/52002536.html

                    •      PET
                                                  http://www.soumu.go.jp/denshijiti/pdf/
                           jyumin_p_s3.pdf

                    •      PIA
                           http://www.soumu.go.jp/denshijiti/pdf/jyumin_p_s2.pdf

                    •                                                                      http://
                           jp.reuters.com/article/topNews/idJPJAPAN-21406320110527

                    •                                         GIE
                           http://d.hatena.ne.jp/ukky3/20110829/1314685819

                    •         Diginotar      Black.Spook
                           http://blog.f-secure.jp/archives/50626009.html


Friday, November 4, 2011
references

                    •       Computer virus hits US Predator and Reaper drone fleet http://
                           arstechnica.com/business/news/2011/10/exclusive-computer-virus-hits-
                           drone-fleet.ars

                    •      F-Secure: Possible Governmental Backdoor found, MD5 hashes ("case
                           R2D2") http://www.f-secure.com/weblog/archives/00002249.html

                    •       State-sponsored spies collaborate with crimeware gang | The Unholy APT-
                           botnet union http://www.theregister.co.uk/2011/09/13/
                           apt_botnet_symbiosis/

                    •       NISC                              10 7     http://www.nisc.go.jp/
                           conference/seisaku/index.html#seisaku27

                    •
                                                 http://news.livedoor.com/article/detail/5685674/




Friday, November 4, 2011
references

                    •                                                       http://
                           www.sakimura.org/2011/06/1124/

                    •                  http://ja.wikipedia.org/wiki/

                    •                       http://ja.wikipedia.org/wiki/




Friday, November 4, 2011

Más contenido relacionado

Destacado

Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Gohsuke Takama
 
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナーGohsuke Takama
 
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...Gohsuke Takama
 
A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageA perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageGohsuke Takama
 
データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本Gohsuke Takama
 
Privacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーPrivacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーGohsuke Takama
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Gohsuke Takama
 
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本Gohsuke Takama
 
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Gohsuke Takama
 
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Gohsuke Takama
 
TGC Planning Sheet 1.30
TGC  Planning Sheet 1.30TGC  Planning Sheet 1.30
TGC Planning Sheet 1.30Gohsuke Takama
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationMike Nowakowski
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?Winston & Strawn LLP
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataarx-deidentifier
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymizationarx-deidentifier
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 

Destacado (16)

Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
 
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
 
A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageA perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionage
 
データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本
 
Privacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーPrivacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシー
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
 
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
 
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
 
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
 
TGC Planning Sheet 1.30
TGC  Planning Sheet 1.30TGC  Planning Sheet 1.30
TGC Planning Sheet 1.30
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-Identification
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymization
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 

Similar a サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011

Censorship Detection Techniques
Censorship Detection TechniquesCensorship Detection Techniques
Censorship Detection TechniquesArturo Filastò
 
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith Jones, PhD
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfnetisBin
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoTouhami Kasbaoui
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysisCharles Lim
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting WorkshopSplunk
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application SecurityBruce Abernethy
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.pptDetSersi
 
Guy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeGuy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeDevSecCon
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Preventionrefaeli
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques begmohsin
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012inf8nity
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 

Similar a サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011 (20)

Censorship Detection Techniques
Censorship Detection TechniquesCensorship Detection Techniques
Censorship Detection Techniques
 
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysis
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdf
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Guy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeGuy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node Code
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Osint
OsintOsint
Osint
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011

  • 1. Gohsuke Takama / , Meta Associates, 2011 11 http://www.slideshare.net/gohsuket Friday, November 4, 2011
  • 2. about… ✴ Gohsuke Takama ✴ Meta Associates (http://www.meta-associates.com/) ✴founder & president, connector, analyst, planner ✴ local organizer of security conferences: BlackHat Japan, PacSec ✴ liaison of security businesses: Patch Advisor, SecWest ✴ security news: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/ ✴ organizer of tech entrepreneur / startup support events ✴ independent tech journalist for over 10 years ✴ Privacy International (London, UK http://www.privacyinternational.org/) ✴advisory board member ✴ Computer Professionals for Social Responsibility (http://cpsr.org/) ✴Japan chapter founding supporter Friday, November 4, 2011
  • 3. A Attacks Friday, November 4, 2011
  • 4. "what happened in the last 2 years" • OperationAurora, ShadyRAT, , ... • Stuxnet, Duqu • Sony PSN • Wikileaks *new • Anonymous *new • (MENA) *new • Indira Gandhi Friday, November 4, 2011
  • 5. "what happened in the last 2 years" • OperationAurora, ShadyRAT, , ... = = APT (Advanced Persistent Threat) • Stuxnet = SCADA • Sony PSN: 3 , DDoS, , • Wikileaks *new = : • Anonymous *new = + • *new= • Indira Gandhi = Friday, November 4, 2011
  • 6. "whom targeted, why" http://paulsparrows.wordpress.com/category/security/cyber-attacks-timeline/ Friday, November 4, 2011
  • 7. "whom targeted, why" • , • Sony PSN, Sony • , • • : Friday, November 4, 2011
  • 9. "Anonymous" http://www.youtube.com/watch?v=2Tm7UKo4IBc http://www.youtube.com/watch?v=kZNDV4hGUGw Friday, November 4, 2011
  • 10. "know your enemy: techniques" • phishing • website spoofing • targeted phishing • content altering • trojan • XSRF • spyware • XSS • keylogger • code injection • rootkit • IP hijacking • botnet DDoS • rogue WiFi AP • sniffer Friday, November 4, 2011
  • 11. "emerging attack techniques" • malware: , • VM , bios • : VNC, Spycam, • : keylogger, GPS logger • : Stuxnet • DDoS: JavaScript (LOIC) ($8/h~), Friday, November 4, 2011
  • 12. "know your enemy: techniques" http://www.ipa.go.jp/security/vuln/newattack.html Friday, November 4, 2011
  • 13. "layer approach" •examle: OSI model Friday, November 4, 2011
  • 14. "a security layer model " 7 Psychological , 6 Custom (Habit) , 5 Operation 4 Content 3 OS/Application 2 Hardware 1 Physical Friday, November 4, 2011
  • 15. "a security layer model " 7 Psychological , Human Factor 6 Custom (Habit) , 5 Operation 4 Content Intangibles 3 OS/Application 2 Hardware Tangibles 1 Physical Friday, November 4, 2011
  • 16. "attacks vs. counter measures " APT, espionage, phishing, Psychological social engineering ? spoofing, pharming, accustomed best practice, Custom phishing spam, XSS, XSRF, awareness, CIRT, PKI, spyware, ID spoof/theft digital ID, SSL certificate DoS, spam, ransom-ware, routing, filtering, policy, Operation sabotage-ware audit, CIRT sniffing, spyware, spam, encryption, filtering, Content alteration content-scan, host IDS OS/ DoS, vuln exploit, 0day, Firewall, network IDS, IPS, Application rootkit, botnet anti-virus, OS/app patch direct access, tampering, perimeter guard, anti- Hardware alteration tampering, hard seal lock pick, break in, surveillance, perimeter Physical vandalism alarm, armed guard Friday, November 4, 2011
  • 17. "spoofing, phishing & targeted attack" / 1 Friday, November 4, 2011
  • 18. "cybercrime, cyber espionage & identity " ✴ APT, • = • • : , , • → → → ✴ ( ) • = • • Friday, November 4, 2011 →
  • 19. "cybercrime, cyber espionage, primary target = individual identity" Friday, November 4, 2011
  • 20. B Behavior Friday, November 4, 2011
  • 21. "social change on Internet" 2000 • • • • • • Friday, November 4, 2011
  • 22. "social change on Internet" 2001 • • • • • • • • • • • • • • (Wiki ) • / • • • 3D • Friday, November 4, 2011
  • 24. "real world vs. social data world" Friday, November 4, 2011
  • 25. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 26. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 27. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 28. "disseminate motives" Law, Market, Norm, Architecture - - - - Friday, November 4, 2011
  • 29. "disseminate motives" Law, Market, Norm, Architecture $Money - - - - Friday, November 4, 2011
  • 30. "disseminate motives" Law, Market, Norm, Architecture Power $Money - - - - Friday, November 4, 2011
  • 31. "disseminate motives" Law, Market, Norm, Architecture Power $Money - - - - Control Friday, November 4, 2011
  • 32. "disseminate motives" Law, Market, Norm, Architecture Power $Money Ideology - - - - Control Friday, November 4, 2011
  • 33. "disseminate motives" Autocracy, Crime, Extremism, Hacker Power Autocratic Government Infra APT Disruption Organized Extremist $Money Crime Hacktivist Ideology Theft Hacktivism Fraud Lulz : - Hacker - Cracker - - Control Friday, November 4, 2011
  • 34. I Identity Friday, November 4, 2011
  • 35. "Identity" entity, identity, relationship me = entity me{Attributes} Friday, November 4, 2011
  • 36. Identification & Authentication Identity Identification Authentication Authorization Credential{Identifier} Validation me{Attributes} me = entity Friday, November 4, 2011
  • 37. Identification & Authentication Identity Identification Authentication Authorization Credential{Identifier} Validation me{Attributes} me = entity Identity Identification Friday, November 4, 2011
  • 38. "Identity" Erik H. Erikson 1967 Sydney Shoemaker 1963 Friday, November 4, 2011
  • 39. "Identity" me{Attributes} * t→ Friday, November 4, 2011
  • 40. "Identity" me{Attributes} * t→ Friday, November 4, 2011
  • 41. AxBxI = WTF? Friday, November 4, 2011
  • 42. "state of security methodology" ✴ (F/W) •( + ) ✴ •= ( ) ✴ : 100% • ( ?) ✴ PKI = DigiNotar ✴ = •( Friday, November 4, 2011 )
  • 43. "perspective for counter strategy" set basic security measures: ✴ , = , ✴ (APT ) ✴ PET ( ) ✴ prevention, detection, response • • • Friday, November 4, 2011
  • 44. "perspective for counter strategy" be creative: ✴ counter social engineering • • ✴ social intelligence ✴ soft power • • PR deflective PR Friday, November 4, 2011
  • 45. "perspective for counter strategy" be creative: Counter Social Engineering • • • • • • • • ( ) Friday, November 4, 2011
  • 46. "perspective for counter strategy" be creative: Soft Power • Soft Power = 1990 Joseph Nye • Hard Power • • http://en.wikipedia.org/wiki/Soft_power • / • Friday, November 4, 2011
  • 48. references • CEOs - the new corporate fraudstersds http://www.iol.co.za/ sundayindependent/ceos-the-new-corporate-fraudstersds-1.1144649 • PwC Survey Says: Telecoms Are Overconfident About Security http:// www.readwriteweb.com/cloud/2011/09/pwc-survey-says-telecoms-are-o.php • Cyber attack led to IGI shutdown http://www.indianexpress.com/news/ cyber-attack-led-to-igi-shutdown/851365/ • Anonymous announces global plans http://www.digitaltrends.com/ computing/video-anonymous-announces-global-plans/ • ANONYMOUS - OPERATION PAYBACK - Sony Press Release http:// www.youtube.com/watch?v=2Tm7UKo4IBc • Operation Payback - Anonymous Message About ACTA Laws, Internet Censorship and Copyright http://www.youtube.com/watch? v=kZNDV4hGUGw • Anonymous: Message to Scientology http://www.youtube.com/watch? v=JCbKv9yiLiQ • Anonymous http://www.atmarkit.co.jp/ fsecurity/special/161dknight/dknight01.html Friday, November 4, 2011
  • 49. references • 28 Nation States With Cyber Warfare Capabilities http:// jeffreycarr.blogspot.com/2011/09/27-nation-states-with-cyber-warfare.html • Far East Research http://scan.netsecurity.ne.jp/archives/52017036.html • CVE-2011-0611 : Adobe Flash Player SWF Memory Corruption Vulnerability http://www.youtube.com/watch?v=DP_rRf468_Y • MYBIOS. Is BIOS infection a reality? http://www.securelist.com/en/analysis/ 204792193/MYBIOS_Is_BIOS_infection_a_reality • McAfee Virtual Criminology Report 2007 http://us.mcafee.com/en-us/local/ html/identity_theft/NAVirtualCriminologyReport07.pdf • Google Zeitgeist http://blog.f-secure.jp/ archives/50630539.html • "The Tragedies in Oslo and on Utøya island" Speech held by King Harald V http://www.kongehuset.no/c27262/nyhet/vis.html?tid=92959 Friday, November 4, 2011
  • 50. references • -- DEFCON CTF http://scan.netsecurity.ne.jp/archives/52002536.html • PET http://www.soumu.go.jp/denshijiti/pdf/ jyumin_p_s3.pdf • PIA http://www.soumu.go.jp/denshijiti/pdf/jyumin_p_s2.pdf • http:// jp.reuters.com/article/topNews/idJPJAPAN-21406320110527 • GIE http://d.hatena.ne.jp/ukky3/20110829/1314685819 • Diginotar Black.Spook http://blog.f-secure.jp/archives/50626009.html Friday, November 4, 2011
  • 51. references • Computer virus hits US Predator and Reaper drone fleet http:// arstechnica.com/business/news/2011/10/exclusive-computer-virus-hits- drone-fleet.ars • F-Secure: Possible Governmental Backdoor found, MD5 hashes ("case R2D2") http://www.f-secure.com/weblog/archives/00002249.html • State-sponsored spies collaborate with crimeware gang | The Unholy APT- botnet union http://www.theregister.co.uk/2011/09/13/ apt_botnet_symbiosis/ • NISC 10 7 http://www.nisc.go.jp/ conference/seisaku/index.html#seisaku27 • http://news.livedoor.com/article/detail/5685674/ Friday, November 4, 2011
  • 52. references • http:// www.sakimura.org/2011/06/1124/ • http://ja.wikipedia.org/wiki/ • http://ja.wikipedia.org/wiki/ Friday, November 4, 2011