Transcript
A (0:01)
You know, some of these actors we've tracked for a very long time. We want to look at how things have been working, you know, for a threat actor that we've been monitoring for a long time. Do they look substantially similar today as how they looked, you know, two years ago, three years ago, five years ago? Are they able to successfully complete the same types of operations that they were doing a couple years ago? If so, you know, maybe it is time to try something different. You know, if we're seeing them be successful, it's kind of a status quo business as usual for them. They clock in and they, you know, they compromise users. Maybe it is time to try something new and take on a little, little bit of risk that, that we might lose visibility.
B (0:52)
Welcome back to another episode of Manian's Defenders Advantage podcast. I'm your host, Luke McNamara. Today I have the pleasure of welcoming on Charlie Snyder, who is the head of the disruption operations here within Google's Threat Intelligence Group. Charlie, great to have you here today.
A (1:10)
Thanks so much, Luke, for having me. I'm, I'm honored to be on and looking forward to the conversation.
B (1:15)
I'm excited to be having this conversation. We're talking today about the disruption unit newly announced, I guess formally announced at RSA release recently. But this is not obviously a new group. It's been around here within gtig for a little while. For folks who have read some of our blogs, they'll notice references to some of the activity that this organization that you lead has been a part of. But I thought we could dive a little bit more into sort of the kind of mission and focus and intent behind this group, some of the operations that you've been involved with. And maybe a great place obviously to start is how do you sort of define the mission of the disruption team?
A (1:59)
Yeah, sure. So, you know, we define our mission pretty simply. We exist to degrade and disrupt the capabilities and operations of kind of the most significant threat actors targeting our users and customers at Google. So we are an adversary agnostic team that partners closely with all of the, you know, adversary aligned teams within Google Threat Intelligence Group to identify and execute, you know, opportunities to disrupt malicious activity. It's probably worth explaining a little bit, you know, how we do this, like what are our tools? There's been kind of a lot of information out there, a lot of speculation about, you know, not just what Google's doing to disrupt, but, you know, other industry partners. So I think it's helpful to be a little bit more granular about what specifically we're doing. Versus not doing so. We have kind of four broad categories of action. So the first, the one that kind of drives maybe most of the headlines, is technical takedowns. This is both kind of on our platform and then enabling other partners to take action on their platforms as well. But you know, from a Google perspective, we definitely want to be aggressive when we see threat activity on our platforms and services, targeting our users to be aggressive in kicking them off. So that's one second is using the legal system to our advantage. We want to be, you know, actively using, you know, the laws where we operate to, you know, hold threat actors accountable and using some of these authorities in creative ways. And frankly, there's been a lot of kind of trailblazing from, you know, other teams at Google as well as industry partners here that, that we're seeking to replicate. Third is disclosure. I think, you know, sunlight can be a disinfectant. It's not always disinfectant. I think a lot of threat actors are pretty immune to bad publicity. But there can be cases where selectively sharing kind of the misbehavior of actors can be helpful. And then last, and I think this gets overlooked sometimes in the disruption conversation, we're also very focused on using threat intelligence to drive product hardening and remediation. We do not want to be in a place where we're constantly kicking bad actors off our platform just for them to turn right around and come right back in. So those are the tools we're focused on using. I think importantly, there's been some speculation about hacking back and taking offensive action and we're not doing that. And then I think the last thing I would say about our mission and like kind of our tools is kind of a thread running through all of this is, you know, across all of these, you know, I think partners play a big role here. So that's a big part of our job too. Whether it's, you know, taking technical action, fixing things. You know, we can be more effective and more comprehensive in disrupting adversary behavior when we bring in other partners in the ecosystem who can take action on their end as well.
