cyber intelligence, cybersecurity, Uncategorized

Forecasting Heightened Malicious Cyber Activity with Event Data

By Dr. Andrea Little Limbago, Chief Social Scientist at Endgame


The recent revelation of Russian government hackers infiltrating the DNC’s network and stealing opposition research should not come as a surprise. Nor should the DNS attack on various .gov sites claimed by the Turk Hack Team, which started on July 17 as Turkey responded to the coup. The connection between geopolitics and heightened malicious cyber activity is a global phenomenon. Despite widespread global variation in information technology infrastructure, the use of the digital domain as the modus operandi to achieve various political, social and economic objectives is universal. INSA’s Strategic Cyber Intelligence White Paper articulates well the necessity of geopolitical insights as part of strategic cyber intelligence. The political and economic conditions inform more dynamic and relevant risk-based, strategic decisions when coupled with the more traditional INFOSEC data. Nevertheless, many organizations still focus solely on the technical aspects of cyber indicators and warnings (I&W) frameworks and fail
to consider how geopolitical events impact their cyber risk – both at home and abroad. There is a wide range of events that can trigger malicious cyber activity – and thus an organization’s probability of increased targeting. Some key events that should receive additional Strategic_clockprecautions include elections, sporting events, global summits, disasters, domestic unrest, and demonstrations of geopolitical tension.



Cyber criminals tampering with elections is not merely a concern in the United States, but is a global phenomenon and is likely only going to grow as elections increasingly become digitized. For example, prior to elections, the Ukraine election system was attacked with a virus intended to delete the election results. The Miami-Dade Elections Department in Florida similarly experienced increased malicious activity, but instead was the target of ‘phantom absentee ballot’ requests. The targets do extend beyond organizations associated with the election. The hack on the Philippines Commission on Elections exposed the personally identifiable information of 55 million citizens. In Africa, countries as diverse as Ghana, Ethiopia, and Republic of Congo have started censoring social media during the election season, but in many cases it expanded to also blocking mobile money transfer sites, thus having both an impact on freedom of speech as well as economic well-being.


Sporting Events

International sporting events from the Olympics to the World Cup tend to see spikes in malicious digital activity.  This ranges from an increase in phishing scams for fraudulent tickets or sports packages to more targeted attacks on the financial or government sectors. For instance, the 2014 World Cup in Brazil was a major target, leading to data theft and website jamming. Following, the India-Pakistan cricket match in the Asia Cup, a university was hacked following student celebrations of the match. Both the Copa Americana and UEFA Euro 2016 are targets of widespread financial scams, especially through adware and fraudulent aps. The Olympics have seen an increased spike, with a rise in phishing attacks and adware linked to the games.


Global Summits

Gatherings of global leaders have always been a prime target for activism and dissent, as well as espionage, so it’s no surprise that this translates now into the digital domain. Almost twenty years ago, over 10,000 multinational, coordinated attacks targeted companies protesting the Cologne G8 summit. More recently, the 2014 G20 summit in Brisbane placed the city on heightened security alert, including cybersecurity. As one CERT expert noted, “Where we sit, and what threats are coming through, the G20 is as big as it gets, and everything could be at risk’’. Similarly, July’s NATO meeting coincided with disruption of their websites, with many placing the blame on cyberattacks from Russia.



Both natural and man-made disasters may instigate a spike in malicious activity of many different forms. Following Hurricane Sandy, there was an increase in phishing scams claiming to assist victims. Criminals similarly exploited the Nepalese earthquake with an onslaught of scams and malware pretending to support victims. The exploitation of catastrophes for financial gain is increasingly common, but is not the only kind of natural disaster-driven malicious digital activity. Depending on the country, natural disasters may also prompt government-directed activity to conceal domestic discontent. For instance, in 2014, the Serbian government heightened online censorship due to public outrage over the government’s handling of the disaster. This is not limited to only natural disasters, but man-made ones as well. Following the 2011 train crash in China, the government tightened censorship controls to squash the very vocal opposition to the government over its handling of the crash. In fact, the anniversary of the crash also triggered a spike in censorship.


Domestic unrest

While the Arab Spring is more well-known for the role social media played in supporting the protests, domestic instability also prompts authoritarian governments to turn entire countries dark. Both Egypt and Libya went completely offline for hours as the instability increased and the governments sought to maintain control. In Syria, the causality between unrest and internet outages is bi-directional. The Assad government employs outages as a form of repression, which is followed by an increase in conflict. In each of these cases, internet outages contribute to state repression, and impact people and organizations throughout the country.

This current status quo of treating geopolitics and cyberthreats as two separate issues is a losing strategy that cannot persist.

Geopolitical tensions

While domestic unrest has more widespread impact on anyone within the country, geopolitical tensions tend to produce more targeted, and escalatory, malicious digital activity. For instance, the Syrian Electronic Army has targeted media and social media sites, instigating DDoS and phishing attacks, targeting the New York Times, Twitter, and The Washington Post, among many organizations. Iran also targets companies for their geopolitical stance, including the attack on the Las Vegas Sands Corporation, whose CEO has been an ardent supporter of Israel. The destructive cyberattacks on the Ukraine power grid and the German steel mill also are linked to international tensions, and specifically are indicative of Russia’s unimpeded and expansive targeting of Western organizations. Finally, as regional tensions rise, so too do tensions in the digital domain. The South China Seas disputes between China, the Philippines and Vietnam continue to prompt an increase in cyberattacks. In this regard, “Whenever you see island-dispute issues flare up you also see cyber activities spike as well.” Finally, a shift in foreign policy linked to these tensions similarly can elevate the occurrence of cyber incidents. Following US sanctions against Russia, there has been a strong spike in targeted activity against US corporations. Iran similarly has been linked to spikes in cyber incidents – ranging from US banks to the NY dam – in response to sanctions.


I&W as More than an IT Framework

Despite geopolitical uncertainty and cyberthreats being a top concern for CEOs (as a recent PWC survey revealed), many still fail to see the interconnected nature of geopolitics and cyber activity. As a result, organizations too often fail to understand why they are targeted or how world events impact the risk calculus of nation-state and non-state adversaries.
This current status quo of treating geopolitics and cyberthreats as two separate issues is a losing strategy that cannot persist. As digital mechanisms are increasingly integrated as a tool of statecraft, their deployment is only going to expand in depth and scope as state and non-state actors use them to achieve their various political, economic, and social objectives. Thus, leaders of public and private organizations must analyze cyber risk as more than an IT issue, by implementing preemptive strategies that integrate the global and domestic landscape into their cyber risk assessments. These strategies should not just focus on targeted attacks on data and infrastructure, but also factor in business disruption thanks to more widespread censorship, outages, or DDoS campaigns.  At the strategic level, incorporating these event data, and framing them along with the range of malicious actors – such as nation states, criminal organizations, and terrorist groups – and their objectives could be a first step at a more holistic strategic I&W framework. By linking the events, along with actors and objectives, decision makers will receive greater insight into the timing and potential targets of the range of digital attacks. Political, economic, and social events provide another valuable stream of very visible and intuitive intelligence and must complement any approach to cyber I&W and risk assessments.


Previously posted here:


cybersecurity, Uncategorized

POTUS gives FBI the Nod to Lead ALL Private Sector Cybercrime Investigations

With the recent hack of the Democratic National Committee (DNC) emails, it is clear that cyber threats pose a significant concern to US political organizations, but which agency out of the “alphabet soup” should be responsible for the investigation? New guidance issued by the Obama Administration puts the Federal Bureau of Investigation (FBI) as the lead agency for cyber threat response. This codifies an already important role the FBI has undertaken for quite some time. The FBI has been the lead agency on cases ranging from ransomware to dark web marketplaces. The FBI arguably has the most resources and experience in cybercrime investigations, which gives them the expertise and know-how to be the lead agency in cyber incident response.





The FBI has not been alone in its efforts to combat cyber threats. The Department of Homeland Security US-CERT and Carnegie Mellon University’s CERT have been the cornerstone of computer incident response for over a decade. The US Secret Service and IRS have also played an important role in the investigation of financial crimes committed online and the Bureau of Alcohol, Tobacco, Firearm, and Explosives (ATF) has the responsibility to combat the illegal sale of firearms online. The common tie amongst all these agencies is FBI’s long-standing partnership with them and also FBI’s partnerships with the private sector.

The Presidential Directive also gives new responsibilities to DHS and Office of the Director of National Intelligence:

  1. The Department of Homeland Security, acting through the National Cybersecurity and Communications Integration Center, shall be the Federal lead agency for asset response activities.
  2. The Office of the Director of National Intelligence, through the Cyber Threat Intelligence Integration Center, shall be the Federal lead agency for intelligence support and related activities.[i]

The Directive specifically notes FBI’s lead role due to the possibility of nation-states being involved in cyber incidents, as well as the national security implications these cyber threats pose. As the FBI wears the hat of both criminal investigators and a member of the intelligence community they are uniquely qualified for this leadership role. The importance of the directive is it gives clear guidance on the “rules of the road,” which is often an issue in federal investigations. As cyber is
an emerging realm, it is important for federal agencies to understand who will take the lead in cyber investigations. It is clear there are many capable agencies with long-standing contributions in the area of cyber threat response. The Presidential Directive allows for clearer lines of communication and the ability to efficiently assign leadership and subordinate roles. The next step is to put this directive into action and this is where the rubber will meet the road in the ever-evolving realm of cyber threats.


cyber intelligence, cybersecurity

INSA Cyber Intel Task Force Launches Cyber Indications and Warnings Project

Date: 28 July 2016

Author: Blake Moore

I am excited to work with Andrea Limbago and other members of the Cyber Intelligence Task Force at INSA on a fledgling research effort looking at cyber threat indications and warning (I&W).

The development of sound strategic warning capabilities in cyberspace is essential to U.S. national security and the security of our allies; I&W plays a significant role in that. Unfortunately, at the present time there is not a comprehensive understanding of how organizations approach I&W in the cyber domain. Through surveys and interviews with practitioners as well as executive leadership, we hope to understand how I&W processes and procedures compare and contrast across government, industry, and academia. By identifying key trends, best practices, and foremost challenges related to I&W, we hope this effort will result in insights that will empower organizations to enhance their cyber strategic warning capabilities and implement more proactive cybersecurity approaches. We will post updates here as the project progresses.

If you would like to learn more about the I&W project and/or want to participate in the survey, please contact us here!

About INSA: INSA is the premier intelligence and national security organization that brings together the public, private and academic sectors to collaborate on the most challenging policy issues and solutions.

About the INSA Cyber intelligence task force: The INSA Cyber Intelligence Task Force was created to set the landscape for cyber intelligence by discussing why cyber intelligence is necessary and providing thoughts on how to develop this function in the cyber domain.



Social Media Threats – Part 2: Using CTI to Identify and Neutralize Social Media Threats

Date: 8 July, 2016

Author: Lincoln Kaffenberger


Picture Attribution:

In Part 1, we discussed how social media based threats can impact organizations in ways many do not yet fully appreciate. The reputation and cybersecurity risks exist today and many organizations have little to no detection or prevention capability. In Part 2, we will discuss what organizations should do about this threat and how Cyber Threat Intelligence (CTI) can help identify and neutralize the social media based threats.


The CTI has an important role to play here. CTI teams should actively and passively monitor for impersonations, account hijackings, URLs in posts or comments that lead to malware, and reconnaissance activity as these can be indicators of adversary intent and capabilities. CTI teams should partner with anyone in the organization that is working with social media such as the communications or public affairs departments. Chances are, they are already aware of a number of impersonations and/or threats.


CTI teams need the right people, processes, and technology to effectively monitor social media for threats. CTI analysts responsible for this mission need to understand their organization very well, have a strong ability to understand other languages and cultures to understand the context of statements in social media, and have strong familiarity with various social media. Outside of the CTI team, there need to be identified stakeholders who support this effort and will take action when notified of a threat. To that end, there need to be established processes for all pertinent threat scenarios. For technology, many companies offer solutions that have the ability to continuously scan and monitor social media for various threat scenarios. Any tool that fulfills this mission must be able to handle the massive amount of data that is available on social media, possess the ability to search and do analysis in the tool, store data points for later analysis, share with other analysts, and, ideally, facilitate takedowns of certain social media sites or content that are clearly impersonating an organization’s brand and personnel.


What is the minimum?

For CTI, the following are the very minimum things that a CTI section should do regarding social media threats:

  1. Know what your organization’s social media assets are and who owns them. This means doing an assessment early on to know what official social media assets exist that officially represent the organization. It’s important also to know if the communications, marketing, public affairs, or HR departments own these profiles and how they are being secured. Who has access to alter the profile? Who can post content? Who is monitoring traffic? Similarly, the profiles for the organization’s VIPs – the C-suite / Secretary level personnel are very important to track as they are high value targets for impersonations.
  2. Know what other uncontrolled social media assets exist. In addition to the official and high value profiles, the other profiles that either do or could be considered as ‘officially representing the organization’ should also be tracked and monitored by the CTI team as their hijacking or impersonation can cause increased damage since it rarely (if ever) gets official attention.
  3. Establish a baseline for activity to detect account hijacking. What is the average traffic like from and to this profile? What content is normal and what is anomalous? Knowing these are important to quickly identifying a hijacked or impersonated account.
  4. Review (or establish) the appropriate use policy. Many organizations have an appropriate use policy in place that states what is acceptable and unacceptable use on social media. Few however find the right balance between being user-friendly and draconian. CTI can help organizations assess the organization specific threats and likelihood of the potential threat scenarios which help craft sound policy.
  5. Monitor for changes. CTI teams should monitor their social media assets of interest.  Monitoring is best done by establishing automated searches and then alerts that result from changes or spikes in activity. It is important for a CTI team to, at this point, have a good list of contacts in the event or a hijacking or impersonation. Additionally, it is important for the CTI team to know how to execute a take down on all the various social media providers. While all the major providers have an advertised method for requesting a takedown of an imposter account, this process is not always timely or easy. CTI can show real value here if they have contacts within the various social media providers to assist when possible and speed up the process.


Social media is a powerful medium for communication but organizations must be aware of the threats and risk inherent in social media to fully take advantage of the communication opportunities.

What are your experiences with CTI and social media threats? Let us know on Twitter and social media with the hashtag #INSAblog.


About the Author: Lincoln works as an information technology professional in the financial sector. He has over a decade of experience helping organizations understand the threats they face and make informed, risk based decisions.

INSA is the premier intelligence and national security organization that brings together the public, private and academic sectors to collaborate on the most challenging policy issues and solutions.

About the INSA Cyber intelligence task force: The INSA Cyber Intelligence Task Force was created to set the landscape for cyber intelligence by discussing why cyber intelligence is necessary and providing thoughts on how to develop this function in the cyber domain.

cyber intelligence, cybersecurity, Uncategorized

Activity Based Intelligence (ABI), Geolocation, and the Cyber Domain

Date: 29 June, 2016
Author: E. R. “Mike” Anders, M.A., CCIP, CCII, CEH, C|HFI
© Copyright, 25 June, 2016, All Rights Reserved

Argyle Threat Research (TheBrain: Mind Mapping Software:

Georegistration and geolocation play a significant role in Activity Based Intelligence (ABI) analyzes and investigations. The dictionary defines “Geolocation” as both the process for finding a location and the actual “real-world” geographic location of a computer, a cell-phone, or a satellite, as determined by the process. (Geolocation, 2016) ABI’s Georegistration for discovery includes all categories of georeferenced information and may indeed offer the ABI analyst the best chance of closing the gap between where one is and where one wishes to be with respect to entity resolution and attribution.

Georegistration for discovery is one of the “Four Pillars” of Activity Based Intelligence (ABI). The other three being “Data Neutrality,” “Sequence Neutrality,” and “Integration before Exploitation” are fully explained in Patrick Biltgen and Stephan Ryan’s book, “Activity Based Intelligence: Principles and Applications” available on with Geo-registration for discovery being the first to be addressed. (Biltgen & Ryan, 2016) The authors go into some detail in describing first degree, direct/indirect, georeference, and second degree georeference and why they are important in context. Geolocation plays a not-so-insignificant role when countering threats in the cyber domain.

Bad Actors and Hackers often spoof IP or MAC addresses to cover their activities and mask their whereabouts. Using TOR, (the Onion Router) is another method, but even with TOR, one can be tracked using the proper tools, employing the most effective techniques, and accessing expertise based on years of cyber experience. (Amores, 2016) However, relying purely on technical means is often insufficient, and sometimes impossible when attempting to develop evidence needed for clear “attribution” to justify offensive cyber operations. (Greenemeier, 2011) The ABI approach improves the odds in the cyber counterintelligence fight by its focus on entity resolution.

Transactions, Activity and Correlations (TAC) make up much of the “stuff” of ABI analysis. TAC is like the water in which ABI analysts swim and like the air they breathe. Solid location data is highly prized in the context of TAC.


TAC Relationships (Source: Various)

Object Based Production (OBP) is a new way of organizing data around objects of Interest. (Johnston, 2013) In the context of Object Based Production (OBP), geolocation data is the metadata about objects/entities/proxies of interest. In other words, geolocation data characterize objects in OBP. (Cuddyer, 2016) In a recent conversation, Cyber Security Science Director, Shawn Riley, reminded it is important to remember, “Object-Based Production is the enabler for Activity-Based Intelligence (ABI) and provides the foundation for the correlation of data around objects that then can be observed for activity.” Furthermore, “Object-Based Production also automates analytic pivoting in cyber which is the analytic technique of hypothesis testing.” (Riley, 2016) These two observations, OBP as enabler and automated analysis are crucial to understanding the profound relationship between and among Geolocation, TAC, ABI, and cyber. One is not additive to the other. They are more than their aggregate. To say they are “. . . more than the sum of their parts” is the wrong analogy. It would be better to speak in “Quantum” terms. When an analytical “critical-mass” is achieved, under ABI analysis conditions, the impact is quantum, continuous, and far reaching in scope. Entities are resolved and “Unknown, Unknowns” discovered to provide further direction for additional collection, processing, and analysis. For geolocation to be of most value, context is a critical consideration. For example, NGA’s Ruth Cuddyer says, “And the location information or analysis that will be useful for foreign policy is also different that what might be useful or relevant for net defenders or law enforcement.”(Cuddyer, 2016) ABI methods and techniques manage and inform understanding and “sense-making” with respect to context through the continuous processing of data related to Transactions, Activity, and Correlations (TAC).

Concluding, geolocation and georeference for discovery play an important role in countering cyber threats despite the difficulty of capturing data that can lead to reliable entity resolution. The prospect of being able to do so is increasing as advances in “machine-learning” and data mining continue. Research conducted using DARPA sponsored data sets by Illumina Consulting Group (ICG) to process insider threat data is but one recent example. The study proved successful in finding a malicious actor based on analysis of 18 months and 17GB of network data that included “. . . logon/logoff records, emails, HTTP traffic, USB device use records, LDAP data, file transfers, and employee psychometric data.” ICG utilized the TAC concept in correlating abnormal activity analytics with other observations over time using their LUX software platform. (Gourley, 2015) Further research and experimentation is anticipated using additional data sources.

What are your experiences with ABI and Geolocation? Let us know on Twitter and social media with the hashtag #INSAblog.”


About the Author: Mr. Anders is a Certified Cyber Intelligence Professional with an Intelligence/Counterintelligence skill-set developed over 30+ years of experience. He is also an award winning broadcast journalist for the 1984 radio series, “The KGB and the Washington Target!” that focused on the Kremlin’s campaign to collect intelligence on High-tech firms in the D.C. area.

INSA is the premier intelligence and national security organization that brings together the public, private and academic sectors to collaborate on the most challenging policy issues and solutions.

About the INSA Cyber intelligence task force: The INSA Cyber Intelligence Task Force was created to set the landscape for cyber intelligence by discussing why cyber

Intelligence is necessary and providing thoughts on how to develop this function in the cyber domain.

Works Referenced or Reviewed

Amores, R. (2016). CEO, Dark Data Services (DDS). (M. Anders, Interviewer)

Biltgen, P., & Ryan, S. (2016). Activity-Based Intelligence (ABI) Principles and Applications. Boston, MA: ARTECH House.

Cuddyer, S. R. (2016, June 9). NGA College Instructor, GEOINT, Email exchage.

Geolocation. (2016). Retrieved from

Gourley, B. (2015, June 19). Illumina Consulting Group (ICG) R&D Case Study Uses Streaming Analytics Platform LUX in Insider Threat Detection. Retrieved from

Greenemeier, L. (2011, June 11). Seeking Address: Why Cyber Attacks Are So Difficult to Trace Back to Hackers. Retrieved from Scientific American:

Johnston, C. (2013, June 17). (U) Modernizing Defense Intelligence: Object Based Production and Activity Based Intelligence. Retrieved from National Conference Services, Presentations:

Riley, S. P. (2016, June 2). Director of Cyber Security Science at Monsanto. Retrieved from


© Copyright, E. R. Anders

25 June 2016, All Rights Reserved


Activity Based Intelligence (ABI), Geolocation, and the Cyber Domain

cyber intelligence, cybersecurity

Activity Based Intelligence (ABI), TAC, and the Cyber Domain

Date: 26 May, 2016
Author: E. R. “Mike” Anders, M.A., CCIP, CCII, CEH, C|HFI
© Copyright, 26 May 2016, All Rights Reserved


Argyle Threat Research (TheBrain®: Mind Mapping Software:

Activity-based Intelligence (ABI) analyst are deeply immersed in data, as are other Intelligence Analysts. For ABI Analysts engaged in the Cyber fight, Transactions, Activity, and Correlations (TAC) tend to dominate. Former National Geospatial Intelligence Agency (NGA) Director, Letitia Long writes, “Activity-based Intelligence is defined as a discipline of intelligence where the analysis and subsequent collection are focused on the activity and transactions associated with an entity, a population or an area of interest.” Furthermore she says specifically, “These activities and transactions are not solely tied to geospatial actions, but also apply across the cyber, social, financial and commercial domains.”  For ABI Analysts working Cyber incidents TAC has a very purposeful meaning.(Long)

When users communicate over the Internet they are engaging in a “transaction” in the classic sense of ABI. One can argue that the “Three-way-handshake” that takes place between TC/IP devices communicate are themselves a “Transaction.” The “Activity” takes place according to communication protocols, or the “rules” of the Transaction, and the OSI model’s standardization of communication functions. Communication happens because protocols are followed, transactions initiated, data flows, and activity is terminated according to the rules. And everything happens at the speed of Cyber. The ABI analyst’s task is to detect, to identify, and to sort through these transactions and correlate them to activity in a way that makes sense of it all. The “Four Pillars” of ABI provide the foundation for doing precisely that.

Analyst trained in the ABI methodology are familiar with the terms “Geo-registration for Discovery,” “Data Neutrality,” “Sequence Neutrality,” and “Integration before Exploitation” as explained in great detail and with considerable clarity, in Patrick Biltgen and Stephan Ryan’s new book, “Activity Based Intelligence: Principles and Applications”. (Biltgen & Ryan, 2016) Transactions, Activity and Correlations are all given ample treatment, more than this blog can address. For the ABI analyst in the cyber arena, the “Four Pillars” open up the space for wider ranging analysis and offers the prospect of identifying, and even discovering “Unknown, unknowns” that may have significant consequences through the course of an investigation or counter-cyber campaign.

Cyberspace is a virtual World that resides within the physical World. NSA Director Adm. Rogers has remarked, “Every single cyber component has a physical geographic position on the face of the Earth.” Dual-hatted as commander of U.S. Cyber Command, Rogers says it is not enough to throw down a network schematic on a conference table, but rather “. . . show me where it is because there are lots of ways to try to understand things.” (USGIF, 2015) That is why Rogers has called for a closer relationship between the National Security Agency (NSA) and the National Geospatial-Intelligence Agency (NGA). The “lots of ways” Adm. Rogers suggests is exactly what ABI is all about—even for cyber intelligence analysis, it is not just Log and Security file analysis, Pcap traces, and vulnerability reports. The requirement is all of that and more. Practitioners such as Chandler P. Atwood describe ABI’s Multi-INT approach to data as being “Transformational” in both impact and scope. (Atwood, 2015) Since ABI takes a Multi-INT/All Source approach to data collection, processing, and interpretation, analysts can build upon all “Four” pillars of ABI to solve CYBINT and Counter-CYBINT problems. The interplay of Transactions, Activity, and Correlations form a mosaic revealing the “who,” the “what,” and the “why” of suspicious computer network activity and malicious cyber campaigns

At the center of ABI is correlation—particularly so, with respect to Integration before Exploitation, one of the “Four Pillars” of ABI. (Biltgen & Ryan, 2016, pp. 255-256).  In fact, in the book on ABI, Biltgen and Ryan spend an entire chapter on correlation and data fusion. Both art and science are evident and intricately bound up in making the kind of associations, correlations, and relationships from data collected that lead to estimations and assessments in intelligence analysis. Correlation is key to understanding computer network activity as well.  Because ABI is all-source and multi-INT, cyber investigators benefit at multiple levels to include, but not limited to the physical network layer, the logical layer, and the cyber human persona layer—when it comes to countering targeted threat activity. (DoD, 2013)

ABI does not exist in analytical isolation. Object Based Production (OBP) provides a significant enhancement when combined with ABI techniques, and methods. According to Charlotte Shabarekh, the head of Analytics, Modeling, and Simulation at Aptima, Inc., “In Cyber, OBP is a challenging task due to spoofing or masking of IP addresses.  It’s necessary to perform “co-reference resolution” tasks to associate spoofed packets to the correct source address.” (Shabarekh, 2016) ABI can provide the required context to accurately perform data association in cyber networks.

Concluding, Tractions, Activity, and Correlations are primary drivers of ABI investigations and analysis. That does not, however, exclude other methodologies. Whether it is the “Diamond Model” or the “Cyber Kill-Chain” an ABI analyst has access to all sources and means to prosecute investigations and threat analysis. Being able to do so is a core concept and understanding of Activity Based Intelligence (ABI) in the Cyber Domain.

What are your experiences with ABI and TAC? Let us know on Twitter and social media with the hashtag #INSAblog.”


Works Referenced or Reviewed

Atwood, C. P. (2015, April 1). Activity-Based Intelligence: Revolutionizing Military Intelligence Analysis. Retrieved from Joint Force Quarterly 77:

Biltgen, P., & Ryan, S. (2016). Activity-Based Intelligence (ABI) Principles and Applications. Boston, MA: ARTECH House.

DoD. (2013). DTIC. Retrieved from Joint Publication 3-12 (R):

Long, L. A. (Fall/Winter 2013). Activity Based Intelligence: Understanding the Unknown . The Intelligencer 20, no. 2, 7-15.

Shabarekh, C. (2016, May 26). Director Analytics, Modeling and Simulation Division, Aptima, Inc.,, (M. Anders, Interviewer)

USGIF. (2015, June 24). NSA Eyes Closer Ties to NGA. Retrieved from Trajectory:

About the Author: Mr. Anders is a Certified Cyber Intelligence Professional with an Intelligence/Counterintelligence skill-set developed over 30+ years of experience. He is also an award winning broadcast journalist for the 1984 radio series, “The KGB and the Washington Target!” that focused on the Kremlin’s campaign to collect intelligence on High-tech firms in the D.C. area.


INSA is the premier intelligence and national security organization that brings together the public, private and academic sectors to collaborate on the most challenging policy issues and solutions.


About the INSA Cyber intelligence task force: The INSA Cyber Intelligence Task Force was created to set the landscape for cyber intelligence by discussing why cyber

Intelligence is necessary and providing thoughts on how to develop this function in the cyber domain.


© Copyright, E. R. Anders

26 May 2016, All Rights Reserved