PresentationRaoulChiesa.pdf

(2557 KB) Pobierz
Auditing the Hacker’s mind:
the Hacker’s Profiling Project 2.0
Raoul Chiesa, Senior Advisor on Cybercrime at ECU – Emerging Crimes Unit, UNICRI
United N ti
U it d Nations Interregional Crime and Justice Research Institute (UNICRI)
I t
i
lC i
d J ti R
h I tit t
Disclaimer
The information contained i thi presentation
d
Th i f
ti
t i d in this
t ti
does not
b k any
t
break
intellectual property, nor does it provide detailed information that
may be in conflict with
actual known laws.
Registered brands and logos belong to
their legitimate owners.
Public release
of this talk may eventually not include some pictures,
g p
graphs and images.
g
The opinion here represented are our
personal ones
and
do not
necessary
reflect th
U it d N ti
fl t the
United Nations
nor
UNICRI
views.
i
Agenda Part II
Introduction and Key Concepts
Yesterday’s hacking VS today’s crime + IEEE Hacking Matrix
Cybercrime’s drivers
Hacking eras and Hacker’s generations
Profiling the enemy: the Hackers Profiling Project (HPP: 2004-2010)
The 9 emerged profiles
Hackers as a National resource? (From Hacktivity 2010 HP Hungary)
2010,
HPP-NG (HPP V2.0: 2012-2015)
Hacking & Cybercrime: the “Dark Links”
Conclusions
C
l i
Books references
Q&A, Contacts
Extra Material
#whois
Raoul “Nobody” Chiesa
Old-school Hacker from
1986 to 1995
Infosec Professional since
1997 @ Mediaservice.net
Supporting UNICRI
since
2004; Cybercrime Advisor
since
2005
OSSTMM
Key Contributor;
HPP
Project Manager;
ISECOM
International Trainer
Member of
CLUSIT, AIP/OPSI, TSTF.net
(Telecom Security Task
Force),
APWG, ICANN, CyberDefcon, HostExploit, WINS,
etc;
o ce),
G, C
,
Cybe e co
,
ost p o t,
S,
e c;
ENISA PSG,
Advisor;
Italian MoD OSN/CASD “CyberWorld”
WG: Group Leader.
I work
worldwide
(so I don’t get bored ;)
My
areas of interest:
Pentesting, SCADA/DCS/PLC, National
Critical Infrastructures Security R&D+Exploiting weird stuff ,
Infrastructures,
stuff,
Security People, X.25, PSTN/ISDN,
Hackers Profiling,
Cybercrime, Information Warfare
& “CyberWar”,
Security
methodologies, vertical “hard-core” Trainings.
g
g
Zgłoś jeśli naruszono regulamin