The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Are you being a safe and successful digital citizen? E-safety
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
ICT Curriculum Evening – an introduction to Wizkid.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Are you being a safe and successful digital citizen?
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Viruses & Destructive Programs
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Social impacts of the use of it By: Mohamed Abdalla.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CPS Acceptable Use Policy Day 2 – Technology Session.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Features of mobile apps. Introduction of mobile apps  FACEBOOK  Facebook is an online social networking service. Its name comes from a colloquialism.
Specialist communication channel. Sarah-Jane king.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Computer Security By Duncan Hall.
Crime Stoppers now uses the most up to date, encrypted mobile reporting system available – P3 Tips. Tipsters can send crime information and engage in.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
WHAT'S THE DIFFERENCE BETWEEN A WEB APPLICATION STREAMING NETWORK AND A CDN? INSTART LOGIC.
Remote Control System 7 Cyber intelligence made easy.
Standard Demo 1 © Hacking Team All Rights Reserved.
Ian McGraw Education Safeguarding Team Surrey County Council.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
E-SAFETY (USING THE INTERNET AND MOBILES SENSIBLY AND SAFELY)
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
Kelsey Bretz. FBI history Authorization Apple UDIDs Acceptable use of information? Conclusion References.
Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.
The Hacking Suite For Governmental Interception.
Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Surveillance around the world
Privacy and Social Media
DATA SECURITY FOR MEDICAL RESEARCH
Cyber intelligence made easy.
Information Security.
How to Protect Yourself from ID Theft and Social Engineering
The Hacking Suite for Governmental Interception
Cyber intelligence made easy.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
Using eSignature for Signing IBM Contracts
The Hacking Suite for Governmental Interception
CompTIA Security+ Study Guide (SY0-401)
The Hacking Suite For Governmental Interception
Presentation transcript:

The Hacking Suite For Governmental Interception

Which are todays challenges? Encryption Cloud Mobility

The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the House Oversight The evolution of technology is creating new challenges for law enforcement and our ability to access communications. We call it “Going Dark,” and it means that those charged with protecting the American people aren’t always able to access the information necessary to prosecute criminals and prevent terrorism even though we have lawful authority to do so. To be clear, we obtain the proper legal authority to intercept and access communications and information, but we increasingly lack the technical ability to do so. This problem is broader and more extensive than just encryption. But, for purposes of my testimony today, I will focus on the challenges we face based on the evolving use of encryption Amy Hess, FBI, April 29, 2015 Federal Bureau of Investigation

Obama: Police and spies should not be locked out of encrypted smartphones and messaging apps.... Jan 16, 2015 Cameron: We should try to avoid the safe havens that could otherwise be created for terrorists to talk to each other.

“We have to focus on the Internet and social networks, which are more than ever used to recruit, organize and disseminate technical knowhow to commit terrorist acts.... We must go further.” PM Manuel Valls, Address to French Parliament, Jan. 13, 2014

The pendulum has “swung too far” against the government. FBI Director James Comey, Oct. 16, 2014

“We shouldn't give in to scare-mongering or to people who fundamentally don’t understand the details...” CEO Tim Cook, Nov. 3, 2014

“None of us should accept that the government or a company or anybody should have access to all of our private information. This is a basic human right. We all have a right to privacy. We shouldn't give it up. The Telegraph, Feb. 28, 2015 “I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services. We have also never allowed access to our servers. And we never will.” Letter to Customers

...protected by end-to-end encryption across all your devices...

“We continue our ongoing efforts to encrypt all Google products and services.” The Intercept

Encryption. Noise. Mobility. Make Law Enforcement and Security Agency blind.

How can we solve this? From the device.

RCS infrastructure

You work on the device. Bypass encryption See what the suspect sees Follow your suspect

Which data can you collect?

Microphone Messaging Documents Passwords Calls Location Camera snapshots Keystrokes Visited websites Screenshots And more …

Where can you run it?

How can you deploy it?

When the target opens a document While the target browses the web Exploit Delivery Service Secure and always up to date

Inject into downloaded applications Inject into video streaming websites Bob’s laptop Web site Internet Network Injector

Send your target a SMS QR Code Web link

Different vectors for different scenarios

Don’t forget social engineering

You get more than just plain evidence.

Target-centric solution (Evidences collection)

Target-centric Intelligence

Intelligence (Correlations between targets)

Skype and Voice Recording Evidences

Chats and Messages App Evidences

Social Media Evidences

Bitcoins Evidences

Webcam and Camera Evidences

Screenshots Evidences

Mouse Clicks Evidences

Easy configuration of Agents

Event / Action configuration

Master-Slave (Master Nodes, Collectors, Anonimyzers)