SlideShare une entreprise Scribd logo
1  sur  18
Roman Romachev
                                                             Founder & CEO
                                          the private intelligence company
                                                                  R-Techno

                                                            Dec. 14, 2012

                        LEAKINT – Leaks Intelligence
Use of leak files by intelligence companies.
                      R-Techno Experience

                                                            MESI
                                Conference “Information struggle
                                    in the business environment”
                                                               Revision 1




47, Volgogradskiy pr., Moscow, 109316
Tel./fax: +7 (495) 723-01-19
e-mail: r-techno@it2b.ru, www.r-
techno.com
Roman V. Romachev
   Founder & CEO of R-Techno Group
   Director of the web project – Intelligence 2 Business

   Membership in professional associations, unions:
   •member of the Council of International Investigators (CII)
   • member of the Institute of Internal Auditors
   • expert of the International Counter Terror Training
   Association




47, Volgogradskiy pr., Moscow, 109316
Tel./fax: +7 (495) 723-01-19
e-mail: r-techno@it2b.ru, www.r-
techno.com
Company profile
R-Techno is a group of companies specializing in mitigation of business risks.


                                                                                      Group structure

R-Techno is a parent company in charge of business intelligence and risk mitigation projects.
R-Techno North Caucasus is a regional subdivision overseeing operations in the Southern Federal District.
Antago Strategy is a company specializing in business conflict management.
Duemarx is a company specializing in marketing and analytical studies.


                                                                                          Geography

R-Techno is an international agency with experts all over the world. This network of professionals allows our
company to carry out projects of any complexity regardless of their geography.




                                              47, Volgogradskiy pr., Moscow, 109316
                                              Tel./fax: +7 (495) 723-01-19
                                              e-mail: r-techno@it2b.ru, www.r-
                                              techno.com
Trade secret stealing is industrial espionage!

Former US Army PFC Bradley Manning arrested for disclosure of
confidential information in May 2010.




                          47, Volgogradskiy pr., Moscow, 109316
                          Tel./fax: +7 (495) 723-01-19
                          e-mail: r-techno@it2b.ru, www.r-
                          techno.com
Hacking is a crime!

Cyber crime (a computer-assisted crime) is any unlawful, unethical or
unauthorized behavior affecting automated data processing or
transmission. Computer information is an object or instrumentality.




                             47, Volgogradskiy pr., Moscow, 109316
                             Tel./fax: +7 (495) 723-01-19
                             e-mail: r-techno@it2b.ru, www.r-
                             techno.com
Trade Secret

  Proprietary information, such as research and development, technological,
  manufacturing, financial and economic or other information (including
  information containing secret processes (know-how) having actual or
  potential commercial value because it is unknown to the third
  persons, because the third persons have no free access to it on lawful
  grounds and with respect to which the possessor of such information has
  introduced the trade secret treatment…

                                  Federal Law on the Russian Federation as of July 29, 2004 #98-FZ
                                                                               On the Trade Secret


              Hacking   hacker     Disclosure                              Mass media
company       Crime!                 Crime!          Internet               analysis    analyst
                        insider

                                   47, Volgogradskiy pr., Moscow, 109316
                                   Tel./fax: +7 (495) 723-01-19
                                   e-mail: r-techno@it2b.ru, www.r-
                                   techno.com
Leak and LeakINT. FAQ

Leak is uncontrolled leaking of information outside the company (territory,
building, premises) or scope of persons who are entrusted with such
information.

                                 LeakINT – terminology of R-Techno

LeakINT – Leaks Intelligence – leak file based intelligence, being an
integral part of OSINT – Open Search Intelligence – open source based
intelligence. Like OSINT, LeakINT is a part of business intelligence, i.e.
legal collection and analysis of information!



                                47, Volgogradskiy pr., Moscow, 109316
                                Tel./fax: +7 (495) 723-01-19
                                e-mail: r-techno@it2b.ru, www.r-
                                techno.com
Some leaks
• Personal data of CIA employees leaked online                                   • Personal data of at least 30,000 Tallinn residents leaked online
• Personal data of the Swedish intelligence agency leaked online                 • Personal data on the clients of the Pension Fund leaked online
• Top secret data on UK submarines leaked online                                 • Personal data of RZD passengers leaked online
• Secret data on US submarines leaked online                                     • Data on traffic accidents of the clients of RESO-Garantia leaked online
• US secret data on Iraq leaked online                                           • Personal data on the clients of MT-Bank leaked online
• Passwords of US intelligence officers and politicians leaked online            • Data on the clients of Cili pica leaked online
• List of intelligence officers (Czech republic) accidentally published online   • Data of Deutsche Bahn passengers leaked online
• Secret counter terror documents leaked online                                  • Personal data of Shell employees leaked online
• Secret data of the Japanese police might have leaked online                    • Personal data on thousands of Finns leaked online
• Secret data on Japanese nuclear power plants leaked online due to virus        • Database of the Kazakhstani traffic police leaked online
• Map of US nuclear facilities leaked online                                     • Secret data of FAS, FMS and Audit Chamber leaked online
• Data on 9 mln. Israeli citizens leaked online                                  • Secret data on US development of non-lethal weapons leaked online
• Classified personal data of the German unemployed leaked online                • Data on customers of online shops leaked online
• Medical reports of 300,000 Californians leaked online                          • Data on people accused of driving while impaired leaked online
• Personal data of 6 mln. Chileans leaked online                                 • Database of Sverdlovsk traffic police leaked online
• Data of over 5,000 British leaked online                                       • Passport data of Ukrainians leaked online
• Data of MTS subscribers leaked online                                          • SMS of the Big Four subscribers leaked online
                                                                                 • Personal data of hundreds of porn lovers leaked online
                                                                                 • Data on sex shop customers leaked online
                                                                                 • Data on 11,000 Israeli credit cards leaked online




                                                                         47, Volgogradskiy pr., Moscow, 109316
                                                                         Tel./fax: +7 (495) 723-01-19
                                                                         e-mail: r-techno@it2b.ru, www.r-
                                                                         techno.com
Files published by hackers
• Hackers from Team Ghostshell published data on 1.6 mln. users they retrieved after hacking
several companies operating mostly in the aerospace industry
• Hackers stole personal data of clients of the insurance company Nationwide
• Hackers stole sensitive information from the newspaper Zerkalo nedeli
• A hacker made available data of 120,000 iPad users
• Hackers published NASA data
• Anonymous stole documents from OSCE
• Anonymous gained access to mail servers of BP, Shell, Exxon, Gazprom and Rosneft
• Hackers hacked Stratfor and stole data on 50,000 users
• A hacker published data on the US military bases in Senegal




                                        47, Volgogradskiy pr., Moscow, 109316
                                        Tel./fax: +7 (495) 723-01-19
                                        e-mail: r-techno@it2b.ru, www.r-
                                        techno.com
Trustworthy information in leaks

Attention! Leak files could be used to spread false and damaging
information!




                           47, Volgogradskiy pr., Moscow, 109316
                           Tel./fax: +7 (495) 723-01-19
                           e-mail: r-techno@it2b.ru, www.r-
                           techno.com
Major objective of LeakINT

      To build a file archive for further information
                   analysis by an analyst.

Why?
1. Leaks, which went public online, will eventually be deleted.
2. Leak-based search is impossible




                                 47, Volgogradskiy pr., Moscow, 109316
                                 Tel./fax: +7 (495) 723-01-19
                                 e-mail: r-techno@it2b.ru, www.r-
                                 techno.com
Handling leak files – building a file archive




     47, Volgogradskiy pr., Moscow, 109316
     Tel./fax: +7 (495) 723-01-19
     e-mail: r-techno@it2b.ru, www.r-
     techno.com
Leak monitoring

1. Yandex and Google tools
2. Special software, such as SiteSputnik


Examples of keywords/key phrases for leak monitoring:
•   hackers stole
•   hackers published
•   Anonymous stole
•   data leaked online
•   personal data




                              47, Volgogradskiy pr., Moscow, 109316
                              Tel./fax: +7 (495) 723-01-19
                              e-mail: r-techno@it2b.ru, www.r-
                              techno.com
Information search and data uploads onto server

1. Online search by means of search systems
2. File downloads: torrent, special software


         File processing and checking for viruses and malicious code

1. Unpacking
2. Checking for viruses and malicious code

    Attention! In order to keep information intact and corporate IT
    systems available, we recommend that you do it on a standalone
                                    PC!

                              47, Volgogradskiy pr., Moscow, 109316
                              Tel./fax: +7 (495) 723-01-19
                              e-mail: r-techno@it2b.ru, www.r-
                              techno.com
Connection of files to the search engine

1. File indexation
2. Distribution of permissions

     R-Techno recommends using the search engine Archivarius 3000. For
                               more details, check
            http://www.likasoft.com/ru/document-search/index.shtml
                                 Advantages:

1.   Simple installation and administration
2.   Windows compatible
3.   Remote access to search
4.   Available permissions
5.   Cheap
                                 47, Volgogradskiy pr., Moscow, 109316
                                 Tel./fax: +7 (495) 723-01-19
                                 e-mail: r-techno@it2b.ru, www.r-
                                 techno.com
Russian leak file operational aspects. Presumption of guilt.

                                                   “we have to bring our laws in order
                                                   and get rid of presumption of guilt for
                                                   good. We should forget about
                                                   accusatory bias in law enforcement
                                                   and court practice. We should
                                                   eliminate all catches in the system of
                                                   law that transform business disputes
                                                   into settling of scores by means of
                                                   paid prosecution,” Putin said in his
                                                   speech to the Federal Assembly held
                                                   on Wednesday.




Do not keep leak archives in the office! User remote access to archives!
                               47, Volgogradskiy pr., Moscow, 109316
                               Tel./fax: +7 (495) 723-01-19
                               e-mail: r-techno@it2b.ru, www.r-
                               techno.com
Our presentations

                http://ru.scribd.com/rromachev/documents

• Riskograph ERM-System
• i2g – private intelligence for the government
• Children’s safety in social networks
• Children’s safety in social networks evidenced by Odnoklassniki.ru for children of the 5th and 6th
forms

• Aspects of the Russian business intelligence market
• Secret files of the invisible Internet
• Search for and identification of beneficial owners and beneficiaries
• Combatting laundering of proceeds of crime
• Innovative and technology intelligence system




                                           47, Volgogradskiy pr., Moscow, 109316
                                           Tel./fax: +7 (495) 723-01-19
                                           e-mail: r-techno@it2b.ru, www.r-
                                           techno.com
Contacts

Roman V.Romachev
Founder & CEO of R-Techno
Mobile: +7 (903) 213-02-87
mail: roman [at] romachev [dot] ru

My SocialNet Profile:
http://www.linkedin.com/in/romachev




                                47, Volgogradskiy pr., Moscow, 109316
                                Tel./fax: +7 (495) 723-01-19
                                e-mail: r-techno@it2b.ru, www.r-
                                techno.com

Contenu connexe

Similaire à [Eng] LEAKINT – Leaks Intelligence Use of leak files by intelligence companies. R-Techno Experience

Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpFabio Ghioni
 
Bear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence OperationsBear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence OperationsCrowdStrike
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...Lior Rotkovitch
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33Felipe Prado
 
Operation Hangover - Black Hat 2013
Operation Hangover - Black Hat 2013Operation Hangover - Black Hat 2013
Operation Hangover - Black Hat 2013jonathancamp
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the UnexpectedCharles Mok
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014Bill Hagestad II
 

Similaire à [Eng] LEAKINT – Leaks Intelligence Use of leak files by intelligence companies. R-Techno Experience (20)

Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs CorpBy Roberto Preatoni Fabio Ghioni Corp Vs Corp
By Roberto Preatoni Fabio Ghioni Corp Vs Corp
 
Bear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence OperationsBear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence Operations
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33
 
ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism Analysis
 
Operation Hangover - Black Hat 2013
Operation Hangover - Black Hat 2013Operation Hangover - Black Hat 2013
Operation Hangover - Black Hat 2013
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
 

Dernier

Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 

Dernier (20)

Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 

[Eng] LEAKINT – Leaks Intelligence Use of leak files by intelligence companies. R-Techno Experience

  • 1. Roman Romachev Founder & CEO the private intelligence company R-Techno Dec. 14, 2012 LEAKINT – Leaks Intelligence Use of leak files by intelligence companies. R-Techno Experience MESI Conference “Information struggle in the business environment” Revision 1 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 2. Roman V. Romachev Founder & CEO of R-Techno Group Director of the web project – Intelligence 2 Business Membership in professional associations, unions: •member of the Council of International Investigators (CII) • member of the Institute of Internal Auditors • expert of the International Counter Terror Training Association 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 3. Company profile R-Techno is a group of companies specializing in mitigation of business risks. Group structure R-Techno is a parent company in charge of business intelligence and risk mitigation projects. R-Techno North Caucasus is a regional subdivision overseeing operations in the Southern Federal District. Antago Strategy is a company specializing in business conflict management. Duemarx is a company specializing in marketing and analytical studies. Geography R-Techno is an international agency with experts all over the world. This network of professionals allows our company to carry out projects of any complexity regardless of their geography. 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 4. Trade secret stealing is industrial espionage! Former US Army PFC Bradley Manning arrested for disclosure of confidential information in May 2010. 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 5. Hacking is a crime! Cyber crime (a computer-assisted crime) is any unlawful, unethical or unauthorized behavior affecting automated data processing or transmission. Computer information is an object or instrumentality. 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 6. Trade Secret Proprietary information, such as research and development, technological, manufacturing, financial and economic or other information (including information containing secret processes (know-how) having actual or potential commercial value because it is unknown to the third persons, because the third persons have no free access to it on lawful grounds and with respect to which the possessor of such information has introduced the trade secret treatment… Federal Law on the Russian Federation as of July 29, 2004 #98-FZ On the Trade Secret Hacking hacker Disclosure Mass media company Crime! Crime! Internet analysis analyst insider 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 7. Leak and LeakINT. FAQ Leak is uncontrolled leaking of information outside the company (territory, building, premises) or scope of persons who are entrusted with such information. LeakINT – terminology of R-Techno LeakINT – Leaks Intelligence – leak file based intelligence, being an integral part of OSINT – Open Search Intelligence – open source based intelligence. Like OSINT, LeakINT is a part of business intelligence, i.e. legal collection and analysis of information! 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 8. Some leaks • Personal data of CIA employees leaked online • Personal data of at least 30,000 Tallinn residents leaked online • Personal data of the Swedish intelligence agency leaked online • Personal data on the clients of the Pension Fund leaked online • Top secret data on UK submarines leaked online • Personal data of RZD passengers leaked online • Secret data on US submarines leaked online • Data on traffic accidents of the clients of RESO-Garantia leaked online • US secret data on Iraq leaked online • Personal data on the clients of MT-Bank leaked online • Passwords of US intelligence officers and politicians leaked online • Data on the clients of Cili pica leaked online • List of intelligence officers (Czech republic) accidentally published online • Data of Deutsche Bahn passengers leaked online • Secret counter terror documents leaked online • Personal data of Shell employees leaked online • Secret data of the Japanese police might have leaked online • Personal data on thousands of Finns leaked online • Secret data on Japanese nuclear power plants leaked online due to virus • Database of the Kazakhstani traffic police leaked online • Map of US nuclear facilities leaked online • Secret data of FAS, FMS and Audit Chamber leaked online • Data on 9 mln. Israeli citizens leaked online • Secret data on US development of non-lethal weapons leaked online • Classified personal data of the German unemployed leaked online • Data on customers of online shops leaked online • Medical reports of 300,000 Californians leaked online • Data on people accused of driving while impaired leaked online • Personal data of 6 mln. Chileans leaked online • Database of Sverdlovsk traffic police leaked online • Data of over 5,000 British leaked online • Passport data of Ukrainians leaked online • Data of MTS subscribers leaked online • SMS of the Big Four subscribers leaked online • Personal data of hundreds of porn lovers leaked online • Data on sex shop customers leaked online • Data on 11,000 Israeli credit cards leaked online 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 9. Files published by hackers • Hackers from Team Ghostshell published data on 1.6 mln. users they retrieved after hacking several companies operating mostly in the aerospace industry • Hackers stole personal data of clients of the insurance company Nationwide • Hackers stole sensitive information from the newspaper Zerkalo nedeli • A hacker made available data of 120,000 iPad users • Hackers published NASA data • Anonymous stole documents from OSCE • Anonymous gained access to mail servers of BP, Shell, Exxon, Gazprom and Rosneft • Hackers hacked Stratfor and stole data on 50,000 users • A hacker published data on the US military bases in Senegal 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 10. Trustworthy information in leaks Attention! Leak files could be used to spread false and damaging information! 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 11. Major objective of LeakINT To build a file archive for further information analysis by an analyst. Why? 1. Leaks, which went public online, will eventually be deleted. 2. Leak-based search is impossible 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 12. Handling leak files – building a file archive 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 13. Leak monitoring 1. Yandex and Google tools 2. Special software, such as SiteSputnik Examples of keywords/key phrases for leak monitoring: • hackers stole • hackers published • Anonymous stole • data leaked online • personal data 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 14. Information search and data uploads onto server 1. Online search by means of search systems 2. File downloads: torrent, special software File processing and checking for viruses and malicious code 1. Unpacking 2. Checking for viruses and malicious code Attention! In order to keep information intact and corporate IT systems available, we recommend that you do it on a standalone PC! 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 15. Connection of files to the search engine 1. File indexation 2. Distribution of permissions R-Techno recommends using the search engine Archivarius 3000. For more details, check http://www.likasoft.com/ru/document-search/index.shtml Advantages: 1. Simple installation and administration 2. Windows compatible 3. Remote access to search 4. Available permissions 5. Cheap 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 16. Russian leak file operational aspects. Presumption of guilt. “we have to bring our laws in order and get rid of presumption of guilt for good. We should forget about accusatory bias in law enforcement and court practice. We should eliminate all catches in the system of law that transform business disputes into settling of scores by means of paid prosecution,” Putin said in his speech to the Federal Assembly held on Wednesday. Do not keep leak archives in the office! User remote access to archives! 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 17. Our presentations http://ru.scribd.com/rromachev/documents • Riskograph ERM-System • i2g – private intelligence for the government • Children’s safety in social networks • Children’s safety in social networks evidenced by Odnoklassniki.ru for children of the 5th and 6th forms • Aspects of the Russian business intelligence market • Secret files of the invisible Internet • Search for and identification of beneficial owners and beneficiaries • Combatting laundering of proceeds of crime • Innovative and technology intelligence system 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com
  • 18. Contacts Roman V.Romachev Founder & CEO of R-Techno Mobile: +7 (903) 213-02-87 mail: roman [at] romachev [dot] ru My SocialNet Profile: http://www.linkedin.com/in/romachev 47, Volgogradskiy pr., Moscow, 109316 Tel./fax: +7 (495) 723-01-19 e-mail: r-techno@it2b.ru, www.r- techno.com

Notes de l'éditeur

  1. It is necessary to build a file archive, as all files that were published online will sooner or later be deleted !