OPSEC KRAV MAGA
Dani Creus, Vicente Díaz
Security Analysts, Global Research and Analysis Team, Kaspersky Lab
OPSEC AGAIN! WHY?
2
•  Unsolved questions.
•  Non technical stuff.
•  Unrealistic advices.
•  The “Jordan Rules”
Security Analyst Summit 2015
ADVERSARIES
3
•  Adversary != Enemy
Resources vs No Resources
Agencies The rest
*.Mil
Big Bad Boys
Security Analyst Summit 2015
ProTip:
Don´t let your PR feed
these guys for free
MASS SURVEILLANCE
4
•  Good ROI for Agencies!
•  They don´t like encryption
•  PGP, ZRTP, OTR, TrueCrypt
Security Analyst Summit 2015
MASS SURVEILLANCE
5
•  Some inherent problems
•  And some non-technical problems
Security Analyst Summit 2015
RECRUITMENT
6Security Analyst Summit 2015
•  Neglected approach ?
•  Approaches and interaction.
•  Move to termination.
TERMINATION
7Security Analyst Summit 2015
•  Deterrence is your best option.
•  Plan alternatives.
•  Prepare an escalation strategy.
SUSPICIOUS MEETINGS
8
•  Don´t go alone.
•  Go on your own, plan how to get out.
•  Dead man switch.
•  Tell them you are ready.
•  The trap might NOT be the meeting!
Security Analyst Summit 2015
UNPLEASANT COMPANY
9
•  Suspicious patterns.
•  You are not James Bond.
•  Go to a safe place, protect contacts.
•  Ask yourself what they want.
•  Option: direct approach.
•  Better: inform your people
Security Analyst Summit 2015
BORDERS
10
•  If you consent a search, no warrant
needed.
•  Police can search your computer at the
border without a warrant.
•  Warrant limitations are ignored if they
see something illegal while searching.
•  You don´t have to help or answer
questions.
•  You cannot interfere or lie to an officer.
Security Analyst Summit 2015
BORDERS – OUR ADVICE
11
•  Be collaborative.
•  Don´t make things worse.
•  Have your story ready and back it up.
•  Don´t bring anything with you.
Security Analyst Summit 2015
EXTENDING OPSEC
12
Your company should provide you:
•  Single POC for when in trouble.
•  International legal support.
•  Small briefing on the country you are
going to.
Security Analyst Summit 2015
13Security Analyst Summit 2015
Do your homework.
CONCLUSION
14
•  STFU.
•  Discipline over tools.
•  Preparation and alternatives.
•  Don´t forget your role.
Security Analyst Summit 2015
THANK YOU
Dani Creus Vicente Díaz
@them0ux @trompi

More Related Content

PDF
Opsec for security researchers
PDF
Click and Dragger: Denial and Deception on Android mobile
PDF
An Underground education
PPTX
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
PPTX
Ed McCabe - Putting the Intelligence back in Threat Intelligence
PPT
Developing Software with Security in Mind
PDF
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
PDF
It's Okay To Touch Yourself - DerbyCon 2013
Opsec for security researchers
Click and Dragger: Denial and Deception on Android mobile
An Underground education
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Developing Software with Security in Mind
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
It's Okay To Touch Yourself - DerbyCon 2013

What's hot (20)

PDF
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary ...
PDF
Enabling effective hunt teaming and incident response
PDF
The Internet is on fire – don't just stand there, grab a bucket!
PPTX
Jason Samide - State of Security & 2016 Predictions
PDF
A Journey Into Pen-tester land: Myths or Facts!
PDF
Security for Human Beings
PPTX
Machine learning cyphort_malware_most_wanted
PPTX
Janitor vs cleaner
PDF
Internet security lessons for IoT
PPTX
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
PPTX
Управление рисками: как перестать верить в иллюзии
PPTX
Jim Wojno: Incident Response - No Pain, No Gain!
PPT
HIMSS Summit of the Southeast: Compliance and Controls
PDF
MITRE ATT&CKcon 2.0: Keynote Address - The Friends We Made Along the Way; Ton...
PDF
Threat Intelligence Victory Garden
PPTX
Database Security Risks You Might Not Have Considered, but Need To
PPTX
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
PPT
Anton Chuvakin on What is NOT Working in Security 2004
PDF
Purple View
PPT
Will there be an IT Risk Management 2.0?
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary ...
Enabling effective hunt teaming and incident response
The Internet is on fire – don't just stand there, grab a bucket!
Jason Samide - State of Security & 2016 Predictions
A Journey Into Pen-tester land: Myths or Facts!
Security for Human Beings
Machine learning cyphort_malware_most_wanted
Janitor vs cleaner
Internet security lessons for IoT
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Управление рисками: как перестать верить в иллюзии
Jim Wojno: Incident Response - No Pain, No Gain!
HIMSS Summit of the Southeast: Compliance and Controls
MITRE ATT&CKcon 2.0: Keynote Address - The Friends We Made Along the Way; Ton...
Threat Intelligence Victory Garden
Database Security Risks You Might Not Have Considered, but Need To
Alerting, Reminding, Reminding, Reminding And Releasing Vulnerabilities
Anton Chuvakin on What is NOT Working in Security 2004
Purple View
Will there be an IT Risk Management 2.0?
Ad

Viewers also liked (11)

KEY
OPSEC for hackers
PDF
Smr week 23 opsec and safe social networking
PDF
Conley Group Opsec Presentation
PPTX
OPSEC for OMBUDSMEN
PDF
Cyber opsec protecting_yourself_online
PDF
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
PDF
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
PDF
VoIP Wars: Attack of the Cisco Phones
PDF
VoIP Wars : Return of the SIP
PPTX
Try harder or go home
PDF
The Art of VoIP Hacking - Defcon 23 Workshop
OPSEC for hackers
Smr week 23 opsec and safe social networking
Conley Group Opsec Presentation
OPSEC for OMBUDSMEN
Cyber opsec protecting_yourself_online
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
VoIP Wars: Attack of the Cisco Phones
VoIP Wars : Return of the SIP
Try harder or go home
The Art of VoIP Hacking - Defcon 23 Workshop
Ad

Similar to Analogic Opsec 101 (13)

PPT
OPSEC Vulnerabilities And Indicators
PDF
London oil and gas security summit 2013 neah ges
PDF
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
PPTX
Operational Security For All OPSEC_for_ALL_221026.pptx
PPT
Conley Group Operational Security Presentation
PPTX
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
PPTX
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
PPT
Security Overview - Updates and Trends In Detail
PDF
Web Application Security.pdf
PPTX
ATAGTR2017 Security Testing for Healthcare applications
PPTX
2015: The year-ahead-in-cyber-security
PPTX
Infosec is Broken “did you bring a knife to a gun fight?"
PDF
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
OPSEC Vulnerabilities And Indicators
London oil and gas security summit 2013 neah ges
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
Operational Security For All OPSEC_for_ALL_221026.pptx
Conley Group Operational Security Presentation
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
Security Overview - Updates and Trends In Detail
Web Application Security.pdf
ATAGTR2017 Security Testing for Healthcare applications
2015: The year-ahead-in-cyber-security
Infosec is Broken “did you bring a knife to a gun fight?"
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...

Recently uploaded (20)

PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PDF
Complications of Minimal Access-Surgery.pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
International_Financial_Reporting_Standa.pdf
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PDF
IP : I ; Unit I : Preformulation Studies
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
semiconductor packaging in vlsi design fab
PPTX
Climate Change and Its Global Impact.pptx
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
A powerpoint presentation on the Revised K-10 Science Shaping Paper
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
What’s under the hood: Parsing standardized learning content for AI
CRP102_SAGALASSOS_Final_Projects_2025.pdf
Complications of Minimal Access-Surgery.pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
International_Financial_Reporting_Standa.pdf
Literature_Review_methods_ BRACU_MKT426 course material
IP : I ; Unit I : Preformulation Studies
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
semiconductor packaging in vlsi design fab
Climate Change and Its Global Impact.pptx
Computer Architecture Input Output Memory.pptx
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Unit 4 Computer Architecture Multicore Processor.pptx
Journal of Dental Science - UDMY (2021).pdf
Journal of Dental Science - UDMY (2022).pdf
Race Reva University – Shaping Future Leaders in Artificial Intelligence

Analogic Opsec 101

  • 1. OPSEC KRAV MAGA Dani Creus, Vicente Díaz Security Analysts, Global Research and Analysis Team, Kaspersky Lab
  • 2. OPSEC AGAIN! WHY? 2 •  Unsolved questions. •  Non technical stuff. •  Unrealistic advices. •  The “Jordan Rules” Security Analyst Summit 2015
  • 3. ADVERSARIES 3 •  Adversary != Enemy Resources vs No Resources Agencies The rest *.Mil Big Bad Boys Security Analyst Summit 2015 ProTip: Don´t let your PR feed these guys for free
  • 4. MASS SURVEILLANCE 4 •  Good ROI for Agencies! •  They don´t like encryption •  PGP, ZRTP, OTR, TrueCrypt Security Analyst Summit 2015
  • 5. MASS SURVEILLANCE 5 •  Some inherent problems •  And some non-technical problems Security Analyst Summit 2015
  • 6. RECRUITMENT 6Security Analyst Summit 2015 •  Neglected approach ? •  Approaches and interaction. •  Move to termination.
  • 7. TERMINATION 7Security Analyst Summit 2015 •  Deterrence is your best option. •  Plan alternatives. •  Prepare an escalation strategy.
  • 8. SUSPICIOUS MEETINGS 8 •  Don´t go alone. •  Go on your own, plan how to get out. •  Dead man switch. •  Tell them you are ready. •  The trap might NOT be the meeting! Security Analyst Summit 2015
  • 9. UNPLEASANT COMPANY 9 •  Suspicious patterns. •  You are not James Bond. •  Go to a safe place, protect contacts. •  Ask yourself what they want. •  Option: direct approach. •  Better: inform your people Security Analyst Summit 2015
  • 10. BORDERS 10 •  If you consent a search, no warrant needed. •  Police can search your computer at the border without a warrant. •  Warrant limitations are ignored if they see something illegal while searching. •  You don´t have to help or answer questions. •  You cannot interfere or lie to an officer. Security Analyst Summit 2015
  • 11. BORDERS – OUR ADVICE 11 •  Be collaborative. •  Don´t make things worse. •  Have your story ready and back it up. •  Don´t bring anything with you. Security Analyst Summit 2015
  • 12. EXTENDING OPSEC 12 Your company should provide you: •  Single POC for when in trouble. •  International legal support. •  Small briefing on the country you are going to. Security Analyst Summit 2015
  • 13. 13Security Analyst Summit 2015 Do your homework.
  • 14. CONCLUSION 14 •  STFU. •  Discipline over tools. •  Preparation and alternatives. •  Don´t forget your role. Security Analyst Summit 2015
  • 15. THANK YOU Dani Creus Vicente Díaz @them0ux @trompi