Sunday, January 28, 2018

Cyber Threat Intelligence


There have been some interesting discussions on TWITTER based upon a comment made by Robert M. Lee, the Founder and CEO of Dragos. I have added my abbreviated 2-cents worth where appropriate, but I think we have been talking around a definition problem; the term ‘cyber threat intelligence’ is either being misused or poorly defined.

Information Quality


I spent some of my time in the Army working in a Battalion S-2 (intelligence) shop. As part of my on-the-job training (and some military correspondence courses) I learned the importance of the difference between information and intelligence. Information is something that someone has seen or heard. Intelligence, on the other hand, is the result of analysis based upon information,  earlier intelligence, and the knowledge and skills of the analyst. From a military point of view, the purpose of intelligence is to provide the Commander with the current best guess about the enemy’s intentions and capabilities so that the current battle plan can be adjusted accordingly.

Now the military intelligence analyst is reminded constantly about two constraints placed upon the quality of the information available. First, and foremost, the enemy is going to do their absolute best to try to deny the analyst access to high-quality, accurate information. Part of this involves hiding the enemy’s activities as long as possible, but another part frequently involves actively providing ‘access’ to inaccurate or misleading information.

The second is that information is provided to the analyst by human beings and that information is affected by any number of human foibles and failings. This is best exemplified in the five categories of ‘reliability’ assigned to human intelligence sources (the names have probably changed since I left the military, but the concept remains):

• Usually reliable;
• Somewhat reliable;
• Unknown reliability;
• Frequently unreliable; and
Usually unreliable
For this discussion, the first and last categories are the most important. The military has long recognized that human information sources are never 100% reliable; even the best source can provide incorrect (or incomplete) information for any number of reasons. And even the worst data resource is going to provide good information every once in a while.

Thus, the intelligence analyst has to take into account both the quantity and quality of the information available when providing the commander with intelligence on the enemy’s intentions and capabilities.

Analyst Training


When the military trains an intelligence analyst, they train them about the tools of the trade and how to go about the analysis process. They also receive some training about the history of their expected adversary. That includes information about adversary equipment and training as well as training on the enemy’s social and political system which affects how the adversary will make decisions. Where possible this includes developing dossiers on the main players about which the analyst expects to be making operational decisions.

During conventional operations, the analyst has the advantage that most modern militaries have schooling on military arts that includes professional publications that discuss tactics and equipment. This provides the analyst with both information on tactics and equipment, but also with some insight into the thinking of the individuals writing the articles and the milieu in which they operate.

With the advent of technical collection means the military was forced to add an intermediate layer of intelligence analysis. It started with photo analysis, where people developed the skills and techniques to pull information from aerial (and later satellite) photos. With the increasing use of electromagnetic systems for communications and other military technologies, a whole new class of signals intercept and analysis technicians became an integral part of intelligence analysis.

Cyber Intelligence


In recent years the whole area of cyber intelligence has become an increasingly important part of military intelligence. From a military point of view, it is just another system of data collection, processing and analysis. It is just another means of providing the Commander with the best guess about another enemy capability on the modern battlefield.

Cyber Threat Intelligence


What has become a phenomenon of the later portion of the information age is the rise of cyber threat intelligence. While it is similar to the cyber intelligence used by the military, it is distinguishable from cyber intelligence by two very important characteristics. First it is being produced by private companies that are driven by profit motives and are responsible to shareholders. Second, the intelligence product is designed to be used by corporate entities that have not been trained to understand the limitations of the intelligence product and are ill-equipped to modify their business plans to respond to the potential consequences of the capabilities and intentions of poorly identified adversaries.

The commercial nature of the organizations that produce CTI has an inevitable, if variable, effect on the product offered to their customers. Because there are multiple competing players in the production of CTI there is frequently an increased urgency in producing and moving an analysis product to market to beat the competition. This can result in shortcuts being taken in information collection, data analysis and quality control. While the military has a different cause for urgency in their intelligence reporting needs, their relatively uncompetitive market allows them the luxury of putting out frequent updates of their analysis. Commercial CTI firms, on the other hand are expected to provide their customers with finished, comprehensive reports.

Most players in the CTI field have no formal training in the data collection and analysis process, the field is just too new. Even organizations where the founder has such training (Dragos comes quickly to mind) find it difficult to push that background down to the personnel actually doing the collection and analysis without a formal educational system to provide the necessary foundation. As more military cyber analysts begin to move to the private sector, this will begin to change. Even these personnel, however, will need some fundamental retraining in the differences between military and commercial operations. Hopefully, we will see the CTI field begin to be addressed in an academic setting.

Use of Cyber Threat Intelligence


The biggest difference between cyber intelligence and CTI is the user of the end-product. In the military each level of command in the hierarchy has their own information collection and analysis capability. Thus, commanders have been taught about the limitations of the collection and analysis process as they rise through the ranks. While cyber information collection and analysis has not yet been pushed down the chain of command to the tactical level, this background makes the commanders at all levels much more effective users of all sorts of intelligence.

One of the ways that military commanders increase the effectiveness of intelligence is that they are responsible for intelligence preparation of their portion of the battlefield. They provide their data collection and analysis assets with specific requirements for types of intelligence that will be expected to affect their operations. They also request similar types of information from higher (and frequently adjacent) headquarters. This makes the commander an active participant in the intelligence process.

The users of CTI typically have little or no background in either the use or production of CTI. This means that there is little likelihood that they will be effective users of the product or that they will be able to influence the production of useful CTI. It seems unlikely that many corporate entities will develop in-house cyber-information data-collection and analysis capabilities at multiple levels in the organization. Thus, there will be little or no in-house training of managers in the use of CTI as they rise thru the ranks.

Increasing CTI Effectiveness


If CTI is going to be a useful tool for corporate users, training is going to have to be an increasing portion of the CTI product. Not only are CTI producers going to have to be responsible for the bulk of the training of their collection and analysis personnel (academia is way too slow to respond to new areas of study), but they are going to have to be able to provide training to their customers in the utilization of their product.

While much of the training is going to have to (initially at least) be focused on the upper management of an organization, the truly successful CTI provider is going to be able to push training down to the operational level in organizations. Not only are they going to have to provide training on the use of CTI, but they are also going to have to push data collection and analysis training down to the lowest levels of the organization to increase the targeted effectiveness of their products.

The CTI production industry is a relatively new part of the cyber landscape. We can expect to see significant changes in the CTI landscape. Successful companies are going to be those that have active programs in place to increase the effectiveness and professionalism of their work force while making it easier for their customers to effectively utilize their products. The successful companies are going to be those that realize that training is going to be as large a part of their operation as is the collection and analysis of cyber information.

No comments:

 
/* Use this with templates/template-twocol.html */