Não é preciso ter olhos abertos para ver o sol, nem é preciso ter ouvidos afiados para ouvir o trovão



Documentos relacionados
Consultoria em Direito do Trabalho

hdd enclosure caixa externa para disco rígido

Lesson 6 Notes. Eu tenho um irmão e uma irmã Talking about your job. Language Notes

2 Categorias Categories Todas as categorias de actividade são apresentadas neste espaço All activity categories are presented in this space

Criando diferenciais competitivos e minimizando riscos com uma boa. Claudio Yamashita Country Manager Intralinks Brasil

User Guide Manual de Utilizador

ÍNDICE PORTUGUÊS INDEX ENGLISH

Erasmus Student Work Placement

Tipos de Redes. Dois tipos fundamentais de redes

egovernment The Endless Frontier

ESTRUTURA DE CAPITAL: UMA ANÁLISE EM EMPRESAS SEGURADORAS

Guião A. Descrição das actividades

Tipos de Redes. Redes de Dados. Comunicação em Rede Local. Redes Alargadas. Dois tipos fundamentais de redes

Desenvolvimento Ágil 1

Addition of Fields in Line Item Display Report Output for TCode FBL1N/FBL5N

PROGRAMA DE POLÍTICAS PÚBLICAS E MODELOS DE ATENÇÃO E GESTÃO À SAÚDE

Serviços: API REST. URL - Recurso

MT BOOKING SYSTEM BACKOFFICE. manual for management

Aqui pode escolher o Sistema operativo, e o software. Para falar, faça download do Cliente 2.

DRIVING BOOK Back Offi ce Front Offi ce Online System

Guião M. Descrição das actividades

Participatory Map of Rio de Janeiro

Vendors Enquiries for RFP 003/2015

SATA 3.5. hd:basic. hdd enclosure caixa externa para disco rígido

Welcome to Lesson A of Story Time for Portuguese

What is Bullying? Bullying is the intimidation or mistreating of weaker people. This definition includes three important components:1.

Searching for Employees Precisa-se de Empregados

Instructions. Instruções

Mundo das Sombras: O Grande Irmão no Vale da Vigilância

Tendências das ameaças. Baldwin, Alan, Palfreyman, John, Cyber Defense: Understanding and combating the threat, IBM Corporation, January 2010

SISTEMAS DISTRIBUÍDOS 1º EXAME

Vantagem de Adesão AMERICAN SOCIETY OF PLASTIC SURGEONS Como se Tornar um Membro Internacional:

Easy Linux! FUNAMBOL FOR IPBRICK MANUAL. IPortalMais: a «brainware» company Manual


Fr A Lógica Da Resolução Das Questões Usando Apenas Multiplicação E Divisão (Portuguese Edition)

Um olhar que cura: Terapia das doenças espirituais (Portuguese Edition)

Caracterização dos servidores de

Planejamento de comunicação integrada (Portuguese Edition)

Solicitação de Mudança 01

Meditacao da Luz: O Caminho da Simplicidade

Session 8 The Economy of Information and Information Strategy for e-business

UNIVERSIDADE CATÓLICA PORTUGUESA. A Reputação e a Responsabilidade Social na BP Portugal: A importância da Comunicação. Por. Ana Margarida Nisa Vintém

PROTOCOLOS DE COMUNICAÇÃO

quarta-feira, 21 de novembro de 12

Uma solução possível para garantir, em ambiente APEX, a consistência duma estrutura ISA total e disjuntiva.

Princípios de Direito Previdenciário (Portuguese Edition)

As Novas Formas de Financiamento da Economia

01-A GRAMMAR / VERB CLASSIFICATION / VERB FORMS

NÚCLEO DE TECNOLOGIA EDUCACIONAL PARA A SAÚDE UNIVERSIDADE FEDERAL DO RIO DE JANEIRO

UBIQUITOUS COLLABORATION.

Accessing the contents of the Moodle Acessando o conteúdo do Moodle

Tool. Initial Change Description. (English and Brazilian Portuguese) 2012 Changefirst Limited

ESCOLA SUPERIOR DE ENFERMAGEM DE COIMBRA Coimbra, May Carlos Souza & Cristina Silva

Pesquisa Qualitativa do Início ao Fim (Métodos de Pesquisa) (Portuguese Edition)

How UMA Contributes to Solving the IDESG Healthcare Relationship Location Service Use tinyurl.com/umawg 19 Jan 2014

Análise Probabilística de Semântica Latente aplicada a sistemas de recomendação

GUIÃO A. Ano: 9º Domínio de Referência: O Mundo do Trabalho. 1º Momento. Intervenientes e Tempos. Descrição das actividades

manualdepsiquiatriainfant il manual de psiquiatria infantil

Interoperability through Web Services: Evaluating OGC Standards in Client Development for Spatial Data Infrastructures

Eventos Internacional

Introdução A Delphi Com Banco De Dados Firebird (Portuguese Edition)

GERENCIAMENTO DA ROTINA DO TRABALHO DO DIA-A-DIA (EM PORTUGUESE DO BRASIL) BY VICENTE FALCONI

Farmacologia na Pratica de Enfermagem (Em Portuguese do Brasil)

A Direção-Geral do Território disponibiliza aos seus clientes diversas modalidades de pagamento:

Visitor, is this is very important contact with you. WATH DO WE HERE?

INFORMATION SECURITY IN ORGANIZATIONS

Livro do Desassossego

// gaiato private label

Gestão da comunicação - Epistemologia e pesquisa teórica (Portuguese Edition)

A Aviação no Comércio Europeu de Licenças de Emissão Especificidades para pequenos emissores

INSTRUÇÕES DE INSTALAÇÃO. Rede sem Fios - Windows servico.rede@ips.pt

ESCREVER MELHOR: GUIA PARA PASSAR OS TEXTOS A LIMPO (PORTUGUESE EDITION) BY ARLETE SALVADOR, DAD SQUARISI

O PRíNCIPE FELIZ E OUTRAS HISTóRIAS (EDIçãO BILíNGUE) (PORTUGUESE EDITION) BY OSCAR WILDE

Laureate Discover Visão Geral do Projeto - Informação detalhada. Nina Myers Program Manager

Vaporpunk - A fazenda-relógio (Portuguese Edition)

Direito Processual Civil (Coleção Sucesso Concursos Públicos e OAB) (Portuguese Edition)

Índice. Instalação de driver no Windows Vista

Prova Oral de Inglês Duração da Prova: 20 a 25 minutos 2013/ º Momento. 4 (A), are you a health-conscious person?

SmartLPR. SmartLPR Placa Reconhecimento da Matrícula

User interface evaluation experiences: A brief comparison between usability and communicability testing

Câmbio MONEY CHANGER. I d like to exchange some money. Gostaria de cambiar um pouco de dinheiro. Where can I find a money changer?

Poder sem limites - o caminho do sucesso pessoal pela programação neurolinguística

75, 8.º DTO LISBOA

Diálogos da MEI III. Albert T. Keyack Cônsul de Propriedade Intelectual pela América do Sul

Churrasco - Dando nome aos bois (Portuguese Edition)

Doing Business in Brazil : Pathways to success, Innovation and Access under the Legal Framework

Labrador: Guia prático ilustrado (Coleção Pet Criador) (Portuguese Edition)

Universidade do Minho. Escola de Engenharia. UC transversais Programas Doutorais 1º semestre de outubro 2012

Software Testing with Visual Studio 2013 (20497)

A dança do corpo vestido: Um estudo do desenvolvimento do figurino de balé clássico até o século XIX (Portuguese Edition)

Como testar componentes eletrônicos - volume 1 (Portuguese Edition)

PROGRAMA DE PARCEIROS. Dress2us

Gabinete de Promoção dos Programa Quadro ID&I. The Portuguese NCP System. Mafalda Dourado CCDR-LVT. Gabinete de Promoção dos Programa Quadro ID&I

Sistemas Operativos - Mooshak. 1 Mooshak. in fct.ualg.pt/. mooshak.deei.fct.ualg.pt/.

Remuneração, Benefícios e Relações de Trabalho: Como Reter Talentos na Organização (Série Recursos Humanos) (Portuguese Edition)

:: FERRAMENTAS MRP APLICADAS PDF ::

Transcrição:

Não é preciso ter olhos abertos para ver o sol, nem é preciso ter ouvidos afiados para ouvir o trovão

ATENÇÃO As informações e idéias contidas na apresentação são pessoais e podem não refletir a opinião de instituições, empresas ou grupos que o autor participa ou pertence. Os textos em língua inglesa são cópias de documentos ou sites estrangeiros, para não modificar o sentido foram mantidos em sua língua original

Porque a NSA faz espionagem cibernética? Porque ela foi criada para fazer Coleta de Informaçoes de Inteligência HUMINT Fontes humanas IMINT Imagens SIGINT Comunicações, radar, telemetria, redes de computadores MASINT tudo o que não for imagem ou dados e for derivado da eletrônica assinaturas de radar...

Definição Espionagem cibernética - é uma operação ofensiva cibernética : Tempo Utilizada para obter informações residentes ou em trânsito De adversários ou parceiros Sobre sistemas ou redes Que não deve ser percebida Cyberexploitation refers to the use of cyber offensive actions perhaps over an extended period of time to support the goals and missions of the party conducting the exploitation, usually for the purpose of obtaining information resident on or transiting through an adversary s or partners computer systems or networks. Cyberexploitations do not seek to disturb the normal functioning of a computer system or network from the user s point of view indeed, the best cyberexploitation is one that such a user never notices

Objetivos da Espionagem Cibernética Obter informações disponíveis nas redes Ser um observador passivo das topologias das redes e do tráfego Obter informações técnicas da rede de uma empresa ou de uma nação para obter vantagem.

Você acha que uma ação de espionagem cibernética vai ser dirigida para sua empresa ou governo?

Na sua casa At home A hypothetical example of cyberexploitation based on remote access might involve pharming against an unprotected DNS server, such as the one resident in wireless routers. Because wireless routers at home tend to be less well protected than institutional routers,, they are easier to compromise. Successful pharming would mean that web traffic originating at the home of the targeted individual (who might be a senior official in an adversary s political leadership) could be redirected to websites controlled by the exploiter. With access to the target s home computer thus provided, vulnerabilities in that computer could be used to insert a payload that would exfiltrate the contents of the individual s hard disk,, possibly providing the exploiter with information useful for blackmailing the target.

No seu parceiro de logística A hypothetical example of cyberexploitation based on close access might involve intercepting desktop computers in their original shipping cartons while they are awaiting delivery to the victim, and substituting for the original video card a modified one that performs all of the original functions and also monitors the data being displayed for subsequent transmission to the exploiter

ATENÇÃO Os cenários a seguir são uma obra de ficção, qualquer semelhança com nomes, pessoas, fatos, situações ou nações terá sido mera coincidência Zendia e Ruritania não existem Fonte - E-book Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities http://www.nap.edu/catalog/12651.html

E se? The director of the Zendian intelligence service is known to be a strong supporter of the Zendian national soccer team.. The soccer team maintains a website on which it provides team statistics, video highlights from recent games, and other content of interest to fans. An intelligence collection operation is launched to exploit a flaw in the operating system of the server that handles the soccer team s website, and installs a Trojan horse program as a modification of an existing videoclip. When the director views the clip, the clip is downloaded to his hard drive, and when his desktop search program indexes the file, the Trojan horse is launched. The collection payload then searches the local hard drive for evidence suggesting that the user is in fact the director. If none is found, the program erases itself. If the program finds evidence that the user is the director of intelligence (or perhaps the minister of defense, also known to be a soccer fan), it retrieves all plaintext files within reach and e-mails encrypted compressed versions of them to an e-mail address set up specifically as a dead-drop location.

O meu sistema não esta na Internet The Zendian Secret Internet Protocol Router Network (Z-SIPRNet) carries classified information and messages for the Zendian ministry of defense, and supports the Zendian command and control system for managing troop deployments, the Zendian defense message system, and many other classified warfighting and planning applications. Although no connections between Z- SIPRNet and the public Internet are allowed,, it is known that Gorga,, a system administrator, has connected his computer at work to a password-protected mobile modem.. Through a manipulation of the telephone switching center, phone calls from Gorga s phone number to the modem are secretly redirected to a login simulator that captures his login name and password. Using Gorga s administrator privileges,, the intelligence collection operation installs a sniffer on the network that examines all passing traffic, and forwards interesting communications to a file that is saved in a temporary work area on Gorga s computer. At night, while Gorga is sleep, notebook go on, connect Internet and and send the collection operation.

No USB que eu ganhei no evento An intelligence collection operation scatters inexpensive universal serial bus (USB) flash drives in parking lots, smoking areas, and other areas of high traffic near a building associated with the ZendianMinistry of Defense.. In addition to some innocuous images, each drive has alreadyloaded software that collects passwords, login names, and machine- specific information from the user s computer, and then e-mails the findings to the intelligence collectors. Because many systems support an auto-run feature for insertable media (i.e., when the medium is inserted, the system automatically runs a program named autorun.exe on the medium) and the feature is often turned on, the intelligence collectors can receive their findings as notified as soon as the drive is inserted. The program also deletes itself and any trace of the e-mail after sending. The login information can then be used to compromise the security of existing accounts.

Na licitação internacional A Zendian firm and a Ruritanian firm are competitors for a multibillion- dollar contract in a third country.. Working closely with the Zendian firm to understand what it would need to know to compete more effectively, the Zendian intelligence service conducts against the Ruritanian firm a series of cyber offensive actions that install dual-purpose and well-hidden Trojan horses on the firm s network. At first, these Trojan horses are programmed to send back to Zendian intelligence confidential business information about the Ruritanian bid; this information is subsequently shared with the Zendian negotiating team. Later, as the deadline for each side s best and final bid approaches, the second function of the Trojan horses is activated, and they proceed to subtly alter key data files associated with the Ruritanian proposal that will disadvantage the firm when the proposals are compared side by side.

Covert Action - Inclui Influencing an election; Disseminating propaganda; Providing financial support to opposition civil society groups and helping them set up international networks;

ATENÇÃO Os cenários a seguir são uma obra de ficção, qualquer semelhança com nomes, pessoas, fatos, situações ou nações terá sido mera coincidência Zendia e Ruritania não existem Fonte - E-book Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities http://www.nap.edu/catalog/12651.html

Voto eletrônico An election is to be held in Zendia, and the predicted margin of victory between the favored and disfavored parties is relatively small.. This election will be the first Zendian election to use electronic voting,, and the Zendian election authorities have obtained electronic voting machines to administer this election from Ruritania. U.S. intelligence operatives intercept the CD-ROM containing a software update from the Ruritanian vendor en route to Zendia,, and substitute a new CD-ROM in the package containing the original update plus additional functionality that will tilt the election toward the favored party.

Erros no sistema de pagamento A disfavored party is in power in Zendia,, and the U.S. government wishes to weaken it. U.S intelligence operatives conduct a cyberattack against the Zendian Social Services Agency by compromising employees of the agency, using the USB flash drive technique described above. Obtaining access to the Social Services Agency databases, the United States corrupts the pension records of many millions of people in the country. In the next election, the disfavored ruling party is voted out of office because of the scandal that resulted.

Acalmando inimigos Two traditionally adversarial nations are armed with nuclear weapons, and the United States has been conducting intelligence collection operations against these nations for many years. Through a mix of human and technical means, it has been successful in learning about cyber vulnerabilities in the nuclear command and control networks of each nation. During a crisis between the two nations in which both sides have launched conventional kinetic attacks against the other side s territory and armed forces, nuclear confrontation between them is imminent.the U.S. government makes a decision to corrupt the transmission of any nuclear launch orders transmitted through those networks in order to prevent their use.

Ajudando o acesso Zendia is an authoritarian nation that recognizes the value of the Internet to its economy, but as an instrument of political control, it actively censors certain kinds of Internet content (e.g., negative stories about the Zendian government in the foreign press) for its population. Its censor-ship mechanisms are largely automated and operate at one of a few Internet gateways to the country. During a time of tension with Zendia, the United States launches a cyberattack against the automated Zendian censors so that the population can obtain, at least temporarily, a broader range of information than it would otherwise be able to access.

Com o dinheiro alheio... A party favored by the United States is conducting an armed rebellion against the Zendian government.. No funds are currently available to help the favored party. However, the U.S. President wishes to find a way to help the rebels, and authorizes a cyberattack that diverts money from the Zendian national treasury to the rebels.

Sua saúde é importante A Zendian cyberattack is launched against the military medical services of Ruritania to obtain the medical records of all active personnel.. In the days before a planned armed attack by Zendia, postings and mailings from anonymous sources appear pointing out that Ruritanian Colonel X is being treated for bipolar disorder, that Captain Y was treated three times for a sexually transmitted disease in the last 2 years, and that Admiral Z is on tranquilizers. Copies of the medical records sometimes secretly and undetectably altered were released to back up the stories. The results led to some family problems for Captain Y, Admiral Z was relieved of field command, and Colonel X resigned his commission.. Others were simply discomfited. The result was a drop in readiness by the command structure when Zendia struck, giving Zendia some advantage. Note that this particular covert action has an element of intelligence collection.

Destruindo reputação The Zendian nuclear weapons program relies on a social network of scientists and engineers. The United States launches cyberattacks against a dozen key scientific leaders in this network to harass and discredit them. These cyberattacks plant false adverse information into their security dossiers, insert driving- under-the-influence-of-drugs/alcohol incidents into their driving records, alter their credit records to show questionable financial statuses, change records of bill payments to show accounts in arrears, and falsify telephone records to show patterns of contact with known Zendian criminals and subversives. Discrediting these individuals throws the program into chaos.

Causando falhas Scientists working on the Zendian biological weapons program use an in-house network to communicate with each other and manage their research and development program. U.S. intelligence agencies penetrate the network to install dual-purpose software agents to exfiltrate the traffic on the network to intelligence analysts. When analysis of the traffic indicates that the Zendian research efforts are reaching a critical stage, the software agents begin to alter key data clandestinely so that critical experiments fail. Further, these software agents are so well hidden that they can maintain their presence over a period of years so that subsequent experiments fail at critical times as well.

Ajudando as empresas The Zendian airplane industry and a major U.S. defense contractor are engaged in a competition to win a lucrative contract from Ruritania for producing fighter aircraft. In order to support a key company in the U.S. defense industrial base, the U.S. government conducts a cyberattack to disrupt and delay the production of the Zendian fighter plane and thereby provides an additional incentive for Ruritania to select the U.S.-produced plane.

Pegadas Testimony of Director of National Intelligence J. Michael McConnell to the Senate Select Committee ON Intelligence in February 2008. McConnell noted a need for the United States to take proactive measures to detect and prevent intrusions from whatever source, as they happen, and before they can do significant damage.

Fonte The US surveillance programmes and their impact on EU citizens' fundamental rights DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS http://www.europarl.europa.eu/studies

É tudo verdade... After the first revelations about the PRISM programme, Gen. Alexander (Director of the NSA) confirmed over two public hearings of Congressional intelligence review committees that the NSA collects (both domestic and international) telephone call metadata from all major carriers and maintains a database of all such calls for five years

Direct Access to data-centres granted for surveillance purposes? Microsoft asserted that they only responded to requests referencing specific account identifiers, and Google and Facebook denied they had black boxes stationed in their networks giving direct access. The companies are constrained by the secrecy provisions of s.702, on pain of contempt or even espionage charges.

Um problema legal 1976-1979 dados que são necessários para uso ou confiados a terceiros não tem expectativa de privacidade não é necessário ordem judicial... - transações de cartão de credito, billing,dados de celular, logs de serviços de internet, redes sociais...

Como proteger? NSA - $10Bi por ano CIA - $15Bi por ano Balck Budget $50bi por ano

Como proteger Mais atenção na informação Escolher o canal adequado Saber que tudo pode ser interceptado O local aonde a informação esta armazenada pode ser o problema Problemas legais podem requerer localização (não resolve segurança) O problema não é cofre para informação

Não se engane Criptografia dados não podem ser processados criptografados A NSA tem condições,recursos financeiros e pessoas para invadir qualquer sistema em qualquer lugar do mundo Seus dados não estão seguros

Maior ensinamento As pessoas são o elo mais fraco da corrente. Treinamento, maturidade, observação continua Se tiver que optar invista nas pessoas

AS PESSOAS EM PRIMEIRO LUGAR Raimundo Colombo Governador do Estado de Santa Catarina

Conclusão Não é preciso ter olhos abertos para ver o sol, nem é preciso ter ouvidos afiados para ouvir o trovão. Para ser vitorioso você precisa ver o que não está visível. Sun Tzu

Obrigado pela sua atenção João Rufino de Sales Presidente do CIASC www.ciasc.sc.gov.br gabinete@ciasc.sc.gov.br www.facebook.com/jrufinos jrsseg.blogspot.com 55-48-36641166