Instant download Intelligence driven incident response outwitting the adversary 1st edition scott j.

Page 1


Visit to download the full and correct content document: https://textbookfull.com/product/intelligence-driven-incident-response-outwitting-the-a dversary-1st-edition-scott-j-roberts/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Eric C. Thompson

https://textbookfull.com/product/cybersecurity-incident-responsehow-to-contain-eradicate-and-recover-from-incidents-eric-cthompson/

Data Driven Treatment Response Assessment and Preterm Perinatal and Paediatric Image Analysis Andrew Melbourne

https://textbookfull.com/product/data-driven-treatment-responseassessment-and-preterm-perinatal-and-paediatric-image-analysisandrew-melbourne/

Working with Christian Servant Leadership Spiritual Intelligence: The Foundation of Vocational Success 1st Edition Gary E. Roberts (Auth.)

https://textbookfull.com/product/working-with-christian-servantleadership-spiritual-intelligence-the-foundation-of-vocationalsuccess-1st-edition-gary-e-roberts-auth/

The Nature of Human Intelligence Robert J. Sternberg

https://textbookfull.com/product/the-nature-of-humanintelligence-robert-j-sternberg/

A Lynching in Little Dixie The Life and Death of James

T Scott ca 1885 1923 Patricia L Roberts

https://textbookfull.com/product/a-lynching-in-little-dixie-thelife-and-death-of-james-t-scott-ca-1885-1923-patricia-l-roberts/

Beginning Artificial Intelligence with the Raspberry Pi 1st Edition Donald J. Norris

https://textbookfull.com/product/beginning-artificialintelligence-with-the-raspberry-pi-1st-edition-donald-j-norris/

The Cambridge Handbook of Intelligence 2nd Edition

Robert J. Sternberg

https://textbookfull.com/product/the-cambridge-handbook-ofintelligence-2nd-edition-robert-j-sternberg/

The Cambridge Handbook of Intelligence 2nd Edition

Robert J. Sternberg

https://textbookfull.com/product/the-cambridge-handbook-ofintelligence-2nd-edition-robert-j-sternberg-2/

Crooked Outwitting the Back Pain Industry and Getting on the Road to Recovery 1st Edition Cathryn Jakobson Ramin

https://textbookfull.com/product/crooked-outwitting-the-backpain-industry-and-getting-on-the-road-to-recovery-1st-editioncathryn-jakobson-ramin/

IntelligenceDriven Incident Response

OUTWITTING THE ADVERSARY

Scott J. Roberts & Rebekah Brown

Intelligence-Driven Incident Response

Outwitting the Adversary

Scott J. Roberts and Rebekah Brown

Boston Farnham
Sebastopol
Tokyo
Beijing

Intelligence-Driven Incident Response

Copyright © 2017 Scott J. Roberts and Rebekah Brown. All rights reserved.

Printed in the United States of America.

Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472.

O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com/safari). For more information, contact our corporate/insti‐tutional sales department: 800-998-9938 or corporate@oreilly.com

Editors: Courtney Allen and Virginia Wilson

ProductionEditor: Shiny Kalapurakkel

Copyeditor: Sharon Wilkey

Proofreader: Amanda Kersey

August 2017: First Edition

RevisionHistoryfortheFirstEdition 2017-08-21: First Release

Indexer: Judith McConville

InteriorDesigner: David Futato

CoverDesigner: Karen Montgomery

Illustrator: Rebecca Demarest

The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Intelligence-Driven Incident Response, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc.

While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.

978-1-491-93494-4

[LSI]

5.

6.

7. Exploit.

8. Analyze.

Foreword

Over 20 years ago, I was involved in my first large scale intrusion by a nation state actor from Russia called Moonlight Maze. My job for the Air Force Office of Special Investigations was to aid in data collection, interception, and analysis of adversary activity that occurred on the network and compromised systems. We learned through analyzing multiple attacks across many targets that this adversary was not going away by only “pulling the plug” from the back of the hacked systems. The enemy was extremely patient. Once they detected our response measures, they would persist in not reaccessing the same target for weeks. The attackers would ensure survival by hit‐ting more than one target across the network and leave back doors on many systems. Across multiple intrusions by the same attackers, the task force started to put together a playbook on who this adversary was, how they operated, and what they were after. This playbook helped inform the defenses of many DoD locations world‐wide. What was one of the outcomes of the Moonlight Maze intrusion? The scope and urgency of the attacks led to the formation of the Joint Task Force–Computer Network Defense (JTF-CND) that later became the gestation of U.S. Cyber Com‐mand.

We learned a lot from these advanced attacks in the late ’90s. First and foremost, we learned that to detect the adversary, we had to learn from the enemy. Early on we dis‐covered tools and practices that would allow us to pinpoint the same adversary on other networks. The information that helped inform our defenses and detect specific attackers became the formation of, likely, the most significant information security development since the intrusion detection system and the firewall: cyber-threat intel‐ligence.

Having responded to hundreds of incidents through my career in the DoD, US Gov‐ernment, Mandiant, and my own company, the one thing we always rely on is that incident responders’ primary objective is to use the opportunity to learn about the adversaries attacking you. With this information, we can observe another network and assess if the same enemy compromised them. This intelligence lays the bedrock for our approach to proper information security and defensive posturing against

these specific threats. Organizations aren’t likely to be hit by any hacker, they are likely part of a group, and they have your organization’s name on a hit list. Without cyber-threat intelligence as the primary consumer of incident-response data, the security defenses could never improve and reduce the dwell time for the adversaries inside the networks they’re compromising.

Threat intelligence was vital to intrusions over 20 years ago, starting with the story told in the Cuckoo’s Egg, written by Cliff Stoll, and has been ever since. But somehow, most organizations are still learning to adopt the same principles. Part of the reason is the failure of proper resources that groups can follow. Another factor is bad advice from security vendors. Lucky for us, this book now exists and steps the reader through proper threat-intelligence concepts, strategy, and capabilities that an organi‐zation can adopt to evolve their security practice. After reading this book, your oper‐ations can grow to become an intelligence-driven operation that is much more efficient than ever in detecting and reducing the possible impact of breaches that will occur.

As the SANS Institute’s Digital Forensics and Incident Response Curriculum Director and Lead, I have been discussing the importance of proper threat assessment and intelligence for many years. Many argued that it was a “nice to have” and “not as important” as stopping the adversary until analysts started to learn there was little they could do to eliminate an adversary without it.

I have advised many executives over the years that money would be better spent on developing proper threat intelligence than on vendor hardware that will likely not detect the next intrusion without being fed indicators learned and extracted as a part of the threat-intelligence analytical process. Part of that advice came from listening to conversations with the authors of this book, Scott and Rebekah.

Scott and I worked together at Mandiant and have remained friends ever since. I reg‐ularly follow up with him over the years and am an avid reader of his papers and arti‐cles. Scott is currently one of our instructors for the SANS Institute’s Cyber Threat Intelligence course (FOR578). Listening to Scott present on this topic for many years is always a breath of wisdom that is equivalent to hearing Warren Buffet give financial advice. I can hear Scott’s voice in my head as I read his thoughts pouring off the pages in this book.

Similar to my background, Rebekah is former military and worked across the board in cyber operations. She is formerly the Cyber Unity Operations Chief for the U.S. Marine Corp. She was also a cyber-operation exercise planner in the DoD, a network warfare analyst while at the NSA, and worked to create threat intelligence in Fortune 500 companies and across information security vendors. Rebekah’s knowledge is on point and intuitive. She knows and understands this space like no other, having lived it by working inside and outside the DoD (both Intel and cyber communities) and across many companies. Rebekah has provided cyber-threat intelligence briefs at the

x | Foreword

White House, based on her theories of coordinated defensive and offensive cyber operations. Getting to know Rebekah has been amazing and enlightening, especially as I continue to learn how traditional intelligence methods are applied to cyberoperations analysis. I am also proud to highlight that Rebekah is also a course author and instructor for the SANS Institute’s Course in Cyber Threat Intelligence (FOR578).

Together, Scott and Rebekah have put together their thoughts on paper in one of the most informed cyber-operations strategy guides you could ever pick up. You should consider making this book mandatory reading for all cyber analysts in your organiza‐tion. This book is at the top of my recommended reading list for any cyber security analysts old and new. The ideas expressed in this book don’t solve technical chal‐lenges, hacking tactics, or configuring security defenses, but instead, focuses on con‐cepts, strategy, and approaches that indeed work at improving the posture, detection, and response inside the security operations of your organization.

One of the most important chapters of the book for cyber-security management to read is how to build an intelligence program. Watching Scott and Rebekah go through this with many organizations has been impressive. Organizations that have benefited from their knowledge understand that “threat intelligence” is not a buzz‐word, and their approaches and requirements to step through is worth the read sev‐eral times over.

For those who are security analysts, the book’s main content steps an analyst through the intricacies of proper incident-response approaches, utilizing a threat intelligence mindset. Once exposed to the information contained in this book, it will permanently change the way you approach cyber security in your organization. It will transition you from being an average analyst into one with advanced operational skills that will continue to pay off throughout your career.

I wish I had this book 20 years ago in my first intrusion cases while investigating Rus‐sian hackers during Moonlight Maze. Luckily, we have this book today, and I can now point to it as required reading for my students who want to move beyond tactical response and apply a framework and strategy to it all that works.

Preface

Welcome to the exciting world of intelligence-driven incident response! Intelligence —specifically, cyber threat intelligence—has a huge potential to help network defend‐ers better understand and respond to attackers’ actions against their networks.

The purpose of this book is to demonstrate how intelligence fits into the incidentresponse process, helping responders understand their adversaries in order to reduce the time it takes to detect, respond to, and remediate intrusions. Cyber threat intelli‐gence and incident response have long been closely related, and in fact are inextrica‐bly linked. Not only does threat intelligence support and augment incident response, but incident response generates threat intelligence that can be utilized by incident res‐ponders. The goal of this book is to help readers understand, implement, and benefit from this relationship.

Why We Wrote This Book

In recent years, we have seen a transition from approaching incident response as a standalone activity to viewing it as an integral part of an overall network security pro‐gram. At the same time, cyber threat intelligence is rapidly becoming more and more popular, and more companies and incident responders are trying to understand how to best incorporate threat intelligence into their operations. The struggle is real—both of us have been through these growing pains as we learned how to apply traditional intelligence principles into incident-response practices, and vice versa—but we know that it is worth the effort. We wrote this book to pull together the two worlds, threat intelligence and incident response, to show how they are stronger and more effective together, and to shorten the time it takes practicioners to incorporate them into oper‐ations.

Who This Book Is For

This book is written for people involved in incident response, whether their role is an incident manager, malware analyst, reverse engineer, digital forensics specialist, or intelligence analyst. It is also for those interested in learning more about incident response. Many people who are drawn to cyber threat intelligence want to know about attackers—what motivates them and how they operate—and the best way to learn that is through incident response. But it is only when incident response is approached with an intelligence mindset that we start to truly understand the value of the information we have available to us. You don’t need to be an expert in incident response, or in intelligence, to get a lot out of this book. We step through the basics of both disciplines in order to show how they work together, and give practical advice and scenarios to illustrate the process.

How This Book Is Organized

This book is organized as follows:

• Part 1 includes chapters 1, 2, and 3, and provides an introduction to the concept of intelligence-driven incident response (IDIR) and an overview of the intelli‐gence and incident-response disciplines. We introduce the concept of F3EAD, the primary model for IDIR that will be used in the rest of the book.

• Part 2 includes chapters 4, 5, and 6, which step through the incident-responsefocused portion of F3EAD: Find, Fix, and Finish, as well as chapters 7, 8, and 9, which cover the intelligence-focused steps in the F3EAD process: Exploit, Ana‐lyze, and Disseminate.

• Part 3 includes Chapter 10, an overview of strategic-level intelligence and how it applies to incident response and network security programs, and Chapter 11, which discusses formalized intelligence programs and how to set up an intelligence-driven incident-response programs for success.

• The appendix includes examples of intelligence products that you may create during the dissemination phase (covered in Chapter 9).

Typically, people who are interested in integrating threat intelligence into incident response have a stronger background in one of those disciplines over the other, so it may be appealing to skim through the sections you are more familiar with and focus only on the parts that are new to you. While that is perfectly fine, you may find that we have discussed a new model or approaches to better integrate the two disciplines, so don’t skip through too much, even if you think you know it already!

Conventions Used in This Book

The following typographical conventions are used in this book:

Italic

Indicates new terms, URLs, email addresses, filenames, and file extensions.

Constant width

Used for program listings, as well as within paragraphs to refer to program ele‐ments such as variable or function names, databases, data types, environment variables, statements, and keywords.

Constant width bold

Shows commands or other text that should be typed literally by the user.

Constant width italic

Shows text that should be replaced with user-supplied values or by values deter‐mined by context.

This element signifies a tip or suggestion.

This element signifies a general note.

This element indicates a warning or caution.

Safari (formerly Safari Books Online) is a membership-based training and reference platform for enterprise, government, educators, and individuals. Preface | xv

Members have access to thousands of books, training videos, Learning Paths, interac‐tive tutorials, and curated playlists from over 250 publishers, including O’Reilly Media, Harvard Business Review, Prentice Hall Professional, Addison-Wesley Profes‐sional, Microsoft Press, Sams, Que, Peachpit Press, Adobe, Focal Press, Cisco Press, John Wiley & Sons, Syngress, Morgan Kaufmann, IBM Redbooks, Packt, Adobe Press, FT Press, Apress, Manning, New Riders, McGraw-Hill, Jones & Bartlett, and Course Technology, among others.

For more information, please visit http://oreilly.com/safari.

How to Contact Us

Please address comments and questions concerning this book to the publisher:

O’Reilly Media, Inc.

1005 Gravenstein Highway North Sebastopol, CA 95472

800-998-9938 (in the United States or Canada)

707-829-0515 (international or local)

707-829-0104 (fax)

To comment or ask technical questions about this book, send email to bookques‐tions@oreilly.com.

For more information about our books, courses, conferences, and news, see our web‐site at http://www.oreilly.com

Find us on Facebook: http://facebook.com/oreilly

Follow us on Twitter: http://twitter.com/oreillymedia

Watch us on YouTube: http://www.youtube.com/oreillymedia

Acknowledgments

Rebekah would like to thank the following people (and places):

My wonderful kiddos: Emma, Caitlyn, and Colin, for encouraging me to write and for offering up helpful suggestions on how to catch hackers (the bad ones).

My parents, brothers, sisters, and extended family for supporting me throughout this undertaking.

My work family: Jen, Wade, Rachel, Jordan, Bob, Derek (and many more!) for always believing in me and not saying (out loud) how crazy I was to write a book.

xvi | Preface

My partner in crime and partner in life, for keeping me hydrated, caffeinated, and happy, and reassuring me that deadlines were made to be missed.

My coauthor, Scott, for being the best BFFFG a girl could ask for.

And finally, to the staff of 23 Hoyt in Portland, the Trademark in Alexandria, and countless flights in between, where the majority of my writing took place.

Scott would like to thank the following people (and places):

My amazing wife, Kessa: I wouldn’t have gotten this done without your encourage‐ment and insight, and I wouldn’t have bothered to try without your inspiration. Thanks for supporting me during the early mornings, late nights, and all the times in between. I’m hopeful I can be half as supportive in all your endeavors. JTMC

My parents, Steve and Janet: from another epic writing project and my first computer to now, you’ve constantly supported my curiosity and have made getting to this place possible. I can’t thank you enough and wouldn’t be here without my basecamp.

The GitHub Security team: you have given me the freedom to learn, to write, to share, and to build in a way I didn’t know I could.

Kyle: your fingerprints are still all over this thing. I appreciate you telling me when I am crazy and when I am just ambitious and telling me to go for it either way.

My many friends and mentors throughout the years: my guess is most of you don’t know how much impact you’ve had or how much I appreciate the conversations, the experiences, and the willingness to listen to me sharing my passions.

To my excellent coauthor Rebekah, you’re the gunny we need, not the gunny we deserve. I couldn’t have done it alone, and it wouldn’t be excellent without you.

The staff at O’Reilly for being the best in the business and for helping make our ideas a reality.

Lastly, the fine folks at Mission Coffee Company in Columbus for the espresso and bagels that fueled many of my words. Preface | xvii

PART I

The Fundamentals

When you begin implementing intelligence-driven incident response, it is important to have a solid understanding of both intelligence and incident-response processes. Part 1 provides an introduction to cyber-threat intelligence, the intelligence pro‐cess, the incident-response process, and how they all work together.

CHAPTER 1 Introduction

“But I think the real tension lies in the relationship between what you might call the pursuer and his quarry, whether it’s the writer or the spy.”

Before diving into the application of intelligence-driven incident response, it is important to understand the reasons that cyber threat intelligence is so important to incident response. This chapter covers the basics of cyber threat intelligence, includ‐ing its history and the way forward, and sets the stage for the concepts discussed in the rest of this book.

Intelligence as Part of Incident Response

As long as there has been conflict, there have been those who studied, analyzed, and strove to understand the enemy. Wars have been won and lost based on an ability to understand the way the enemy thinks and operates, to comprehend their motivations and identify their tactics, and to make decisions—large and small—based on this understanding. Regardless of the type of conflict, whether a war between nations or a stealthy intrusion against a sensitive network, threat intelligence guides both sides. The side that masters the art and science of threat intelligence, analyzing information about the intent, capability, and opportunities of adversaries, will almost always be the side that wins.

History of Cyber Threat Intelligence

In 1986, Cliff Stoll was a PhD student managing the computer lab at Lawrence Berk‐ley National Laboratory in California when he noticed a billing discrepancy in the amount of 75 cents, indicating that someone was using the laboratory’s computer sys‐tems without paying for it. Our modern-day, network-security-focused brains see this

and scream, “Unauthorized access!” but in 1986 it was hardly cause for concern. Net‐work intrusions were not something that made the news daily, with claims of millions or even billions of dollars stolen; the majority of computers connected to the “inter‐net” belonged to government and research institutes, not casual users. The network defense staple tool tcpdump was a year from being started. Common network discov‐ery tools such as Nmap would not be created for another decade, and exploitation frameworks such as Metasploit would not appear for another 15 years. The discrep‐ancy was just as likely to have been a software bug or bookkeeping error as it was that someone had simply not paid for their time.

Except that it wasn’t. As Stoll would discover, he was not dealing with a computer glitch or a cheap mooch of a user. He was stalking a “wily hacker” who was using Ber‐kley’s network as a jumping-off point to gain access to sensitive government comput‐ers, such as the White Sands Missile Range and the National Security Agency (NSA). Stoll used printers to monitor incoming network traffic and began to profile the intruder responsible for the first documented case of cyber espionage. He learned the typical hours the attacker was active, the commands he ran to move through the interconnected networks, and other patterns of activity. He learned how the attacker was able to gain access to Berkley’s network in the first place by exploiting a vulnera‐bility in the movemail function in GNU Emacs, a tactic that Stoll likened to a cuckoo bird leaving its egg in another bird’s nest to hatch and which inspired the name of the book on the intrusion, The Cuckoo’s Egg. Understanding the attacker meant that it was possible to protect the network from further exploitation, identify where he may tar‐get next, and allowed a response, both on the micro level (identifying the individual carrying out the attacks) and on the macro level (realizing that nations were employ‐ing new tactics in their traditional intelligence-gathering arsenal and changing poli‐cies to respond to this change).

Modern Cyber Threat Intelligence

Over the decades, the threat has grown and morphed. Adversaries use an everexpanding set of tools and tactics to attack their victims, and their motivations range from intelligence collection to financial gain to destruction to attention. Understand‐ing the attacker has gotten much more complicated, but no less important.

Understanding the attacker has been a critical component of incident response from the beginning, and knowing how to identify and understand the attacker as well as how to use that information to protect networks is the fundamental concept behind a more recent addition to the incident responder’s toolkit: cyber threat intelligence. Threat intelligence is the analysis of adversaries—their capabilities, motivations, and goals; and cyber threat intelligence (CTI) is the analysis of how adversaries use the cyber domain to accomplish their goals. See Figure 1-1 on how these levels of attacks play into one another.

2 | Chapter1:Introduction

Figure 1-1. From intelligence to cyber threat intelligence

In information security, we traditionally focus on scientific concepts; we like things that are testable and reproducible. But there is both an art and a science behind cyber threat intelligence, and it is the art that most often eludes us. This art includes the analysis and interpretation of data about attackers, as well as how to convey that information to the audience in a way that makes sense and enables them to act. This is what will truly help us understand a thinking, reacting, and evolving adversary.

Security analysts love few things more than identifying malicious activity on their networks and tracing that maliciousness back to a known attacker, but in many cases early implementation of intelligence was ad hoc and largely intuitive. Over the years, new technologies were developed with the goal of better detecting and understanding malicious activity on networks: Network Access Control, Deep Packet Inspection firewalls, and network security intelligence appliances are all based on familiar con‐cepts with new applications.

The Way Forward

These new technologies give us more information about the actions that attackers take as well as additional ways to act on that information. However, we have found that with each new technology or concept implemented, the enemy adapted; worms and viruses with an alphabet soup of names changed faster than our appliances could identify them, and sophisticated, well-funded attackers were more organized and motivated than many network defenders. Ad hoc and intuitive intelligence work would no longer suffice to keep defenders ahead of the threat. Analysis would need to evolve as well and become formal and structured. The scope would have to expand, and the goals would have to become more ambitious.

In addition to detecting threats against an organization’s often nebulous and ephem‐eral perimeter, analysts would need to look deeper within their networks for the

attacks that got through the lines, down to individual user systems and servers them‐selves, as well as look outward into third-party services and to better understand the attackers who may be targeting them. The information would need to be analyzed and its implications understood, and then action would have to be taken to better prevent, detect, and eradicate threats. The actions taken to better understand adversa‐ries would need to become a formal process and a critical part of information security operations: threat intelligence.

Incident Response as a Part of Intelligence

Intelligence is often defined as information that has been refined and analyzed to make it actionable. Intelligence, therefore, requires information. In intelligencedriven incident response, there are multiple ways to gather information that will be analyzed and used to support incident response. However, it is important to note that incident response will also generate cyber threat intelligence. The traditional intelli‐gence cycle—which we cover in depth in Chapter 2—involves direction, collection, processing, analysis, dissemination, and feedback. Intelligence-driven incident response involves all of these components and helps inform direction, collection, and analysis in other applications of threat intelligence as well, such as network defense and user awareness training. Intelligence-driven incident response doesn’t end when the intrusion is understood and remediated; it actually generates information that will continue to feed the intelligence cycle.

Analysis of an intrusion, either successful or failed, can provide a variety of informa‐tion that can be used to better understand the overall threat to an environment. The root cause of the intrusion and the initial access vector can be analyzed to inform an organization of weaknesses in network defenses or of policies that attackers may be abusing. The malware that is identified on a system can help identify the tactics that attackers are using to evade traditional security measures, such as antivirus or hostbased intrusion-detection tools, and the capabilities they have available to them. The way an attacker moves laterally through a network can be analyzed and used to create new ways to monitor for attacker activity in the network. The final actions that an attacker performed (such as stealing information or changing how systems function), whether they were successful or not, can help analysts understand the enemy’s moti‐vations and goals, which can be used to guide overall security efforts. There is essen‐tially no part of an incident-response engagement that cannot be used to better understand the threats facing an organization.

For this reason, the various processes and cycles outlined in this book are aimed at ensuring that intelligence-driven incident response supports overall intelligence oper‐ations. Although they provide specific guidance for utilizing cyber threat intelligence in incident response, keep in mind that wider applications can be used as intelligence capabilities expand.

4 | Chapter1:Introduction

What Is Intelligence-Driven Incident Response?

Cyber-threat intelligence isn’t a new concept, simply a new name for an old approach: applying a structured analytical process to understand an attack and the adversary behind it. The application of threat intelligence to network security is more recent, but the basics haven’t changed. Cyber threat intelligence involves applying intelli‐gence processes and concepts—some of the oldest concepts that exist—and making them a part of the overall information security process. Threat intelligence has many applications, but one of the fundamental ways it can be utilized is as an integral part of the intrusion-detection and incident-response process. We call this intelligencedriven incident response and think it is something every security team can do, with or without a major capital investment. It’s less about tools, although they certainly help sometimes, and more about a shift in the way we approach the incident-response process. Intelligence-driven incident response will help not only to identify, under‐stand, and eradicate threats within a network, but also to strengthen the entire infor‐mation security process to improve those responses in the future.

Why Intelligence-Driven Incident Response?

Over the past few decades, our world has become increasingly interconnected, both literally and figuratively, allowing attackers to carry out complex campaigns and intrusions against multiple organizations with the same effort that it used to take to target a single entity. We are long past the point where we can automatically assume that an intrusion is an isolated incident. When we better understand the adversary, we can more easily pick up on the patterns that show commonalities between intru‐sions. Intelligence-driven incident response ensures that we are gathering, analyzing, and sharing intelligence in a way that will help us identify and respond to these pat‐terns more quickly.

Operation SMN

A good example of this is the analysis of the Axiom Group, which was identified and released as a part of a Coordinated Malware Eradication (CME) campaign in 2014 called Operation SMN.

What’s in a Name?

The “SMN” in “Operation SMN” stands for “some marketing name,” a not-so-subtle but amusing jab indicating how widespread the belief is that marketing often takes over intelligence products. For better or worse, threat intelligence has been eagerly embraced by marketing forces all touting the best threat-intelligence products, feeds, and tools. The first time many people are exposed to threat intelligence is through

marketing material, making it difficult for many to fully understand what threat intel‐ligence actually is.

It is important that intelligence work is done with the end goal of better understand‐ing and defending against adversaries. Sometimes marketing gets in the way of that, but ideally marketing can help with messaging and ensuring that the “story” behind threat intelligence reaches the right audience in the right way.

For more than six years, a group of attackers known as the Axiom Group stealthily targeted, infiltrated, and stole information from Fortune 500 companies, journalists, nongovernmental organizations, and a variety of other organizations. The group used sophisticated tools, and the attackers went to great lengths to maintain and expand access within the victims’ networks. As malware was detected and the incidentresponse process began within various victim organizations, coordinated research on one of the malware families used by this group identified that the issue was far more complex than originally thought. As more industry partners became involved and exchanged information, patterns began to emerge that showed not just malware behavior, but the behaviors of a threat actor group working with clear guidance. Stra‐tegic intelligence was identified, including regions and industries targeted.

This was an excellent example of the intelligence cycle at work in an incidentresponse scenario. Not only was information collected, processed, and analyzed, but it was disseminated in such as way as to generate new requirements and feedback, starting the process over again until the analysts had reached a solid conclusion and could act with decisiveness, eradicating 43,000 malware installations at the time that the report was published. The published report, also part of the dissemination phase, allowed incident responders to better understand the tactics and motivations of this actor group.

Operation Aurora

Several years before the Axiom Group was identified, another (possibly related) group carried out a similarly complex operation named Operation Aurora, which successfully targeted approximately 30 companies. This operation impacted companies in the high-tech sector as well as defense contractors, the chemical sector, and Chinese political dissidents. The patterns and motivations of the operation were similar to those in Operation SMN. Looking at these two examples of elaborate and widespread attacks, it becomes clear that these weren’t random but rather were coor‐dinated with strategic objectives by a determined adversary willing to expend a great deal of time and effort to ensure that the objectives were met. If we tackle the prob‐lem by jumping from incident to incident without stopping to capture lessons learned and to look at the big picture, then the attackers will always be several steps ahead of us.

6 | Chapter1:Introduction

Both the Axiom Group attacks and Operation Aurora were information-seeking, espionage-related attacks, but nation-state sponsored attackers aren’t the only thing that incident responders have to worry about. Financially motivated criminal activity is also evolving, and those actors are also working hard to stay ahead of defenders and incident responders.

Conclusion

Despite the many advances in the computer security field, attackers continue to adapt. We are often surprised to hear about breaches where the attackers were loiter‐ing in a network for years before they were identified, or even worse, where the attackers are able to get back in undetected and reinfected a target after the incidentresponse process is complete. Intelligence-driven incident response allows us to learn from attackers; to identify their motivations, processes, and behaviors; to identify their activities even as they seek to outwit our defenses and detection methods. The more we know about attackers, the better we can detect and respond to their actions.

We have reached the point where a structured and repeatable process for implement‐ing intelligence in the incident-response process is necessary, and this book aims to provide insight into that process. Throughout this book, we provide various models and methods that can be viewed as the tools of intelligence-driven incident response, as well as the background as to why these models are beneficial in incident response. There is no one-size-fits-all approach. In many cases, the incident or the organization will dictate which specific combination of models and approaches fits best. Understanding the foundational principles of intelligence and incident response as well as the specific methods for integrating them will allow you to build a process for intelligence-driven incident response that will work for you and to develop that process to meet the needs of your organization.

Another random document with no related content on Scribd:

"Hear, hear!"

"Our object in life is to persuade the councillors to dole us out an extra dose of the ratepayers' money."

"I admit the correctness of the conclusion."

"Then let us, with all circumspection, smile on the councillors and their wives and daughters, particularly the daughters."

"Nothing would please me more, provided the daughters reciprocate the smile."

"They'll do that alright, old chap, if you only do it the right way. The most potent force in nature is the love of women; it behoves us as engineers to utilize this force. There is nothing much that a woman in love won't do, and there is even less that she won't make the poor fool, who imagines she is in love with him, do."

"It's supposed to be specially dangerous to run two girls in parallel."

"You may take it as proved that, 'In the same town and on the same side of it, there cannot be two girls in love with the same man, etc.' All the same, the idea of it is rather fascinating." Darwen's eyes sparkled.

"We are wandering from the point."

"Quite so. Are you going to get your guv'nor down?"

"Look here. Have you got any money?"

"Well, I'm not absolutely stony."

"Then lend me two quid and I'll go home for a week-end and bring him back."

Darwen fished out his purse with a smile. "The seeds of wisdom are in you, I perceive," he said.

Suddenly the strains of music were wafted in to them through the open window. "What in thunder is that?" Darwen asked, getting up with a puzzled look and gazing out into the street. "By Jove, it's a kid with a mouth organ, looks like a gipsy kid."

With a serious face Carstairs got up and looked out of the window too. The boy was looking directly up at the window; as soon as he caught sight of Carstairs, he changed his tune abruptly.

"What's that tune, Darwen? I seem to know it."

"That's 'The Gipsy's Warning.' The kid plays very well, too, for an instrument like that. I thought it was a violin for a minute."

They stood up at the window and watched. The boy played the same thing twice over, then he played a Scotch tune. Then he opened the gate and walking across the little lawn stood under the window and touched his cap.

Carstairs put his hand in his pocket and pulled out sixpence. "Wait a minute," he said to the boy. He went downstairs and spoke to him. "Do you come from Scotland?"

"Yes, sir; I seen you there. Sam's down here and he's after you." He turned and went out into the road again and disappeared.

Carstairs looked after him with a troubled frown, then he returned to the sitting-room.

Darwen looked at him with observant, surprised eyes. "Did you know that kid?" he asked.

"No, but he knew me. I once had a row with a gipsy in Scotland; flattened him out, broke his leg; he's been after me ever since. That kid came to tell me he's in this town now. Next pay day I shall invest in a young bull dog."

Carstairs sat down again in the big easy chair and gazed at nothing. His thoughts were far away; he had no doubt who had sent the gipsy boy to

warn him. "The most potent force, the love of women." Good God! and what of the love of men? A gipsy girl. It was quite impossible.

Then Darwen played—pleading, soothing music—and Carstairs told him the whole story.

"You'll have to remove that gipsy, that Sam—in self-defence, mind, of course. And the girl—you couldn't marry a gipsy, of course, but it's not necessary."

And Carstairs listened in silence.

CHAPTER IX

Time passed, and although Carstairs kept a good look out, he saw nothing of Sam, the gipsy; he bought a substantial ash walking stick which he kept constantly by him. On the night shift he tackled Bounce, the exsailor. "Can you fence?"

"Yes, sir, I'm very good at fencing."

Carstairs smiled, but he knew all the same that it was a simple statement of the truth without any affected modesty or blatant boasting. "I'll bring down a couple of sticks, and you can give me a little instruction if you will."

"I shall be very pleased, sir."

He had a manner all his own of making even this simple statement; it suggested an equality of manhood while admitting an inferiority of station; every word and action showed a confident, self-contained, self-respecting man.

So in the wee sma' hours of the morning, when everyone else was in bed, Carstairs and Bounce fenced with single sticks in a clear space in the engine room. They got very chummy over these contests. Carstairs had frequently had long yarns with Bounce before in the quietness of the night watch, but now as they smote each other good and hard (for they wore neither helmets, jackets, nor aprons) and Carstairs smiled and Bounce grinned like a merry imp, and occasionally apologized for an "extra stiff un," they seemed to draw very close together, so much so, that one night Carstairs told him the tale of Sam the gipsy.

Bounce shook his head seriously. "Gipsies is nasty blokes," he observed, pondering deeply. "Some good fighting men amongst 'em, too." He pondered again. "I should think now that a bit of boxing would be more useful to you than fencing. Or—have you got a pistol?"

"Yes, and a set of gloves. I'll bring them both down to-morrow."

Next night Bounce's eyes scintillated light as he fingered the well-made brown leather boxing gloves, and examined the beautiful little American target revolver. "This is fancy," he said, in regard to the latter. "It wouldn't stop a man, though."

"Depends where you hit him," suggested Carstairs.

"That's true, sir."

They retired to a secluded corner of the boiler house, and Bounce fastened a piece of board on the wall and stuck three tin tacks in it, then he drew back as far as the dimensions of the place would admit, which was about fifteen yards. "Shall I have first shot, sir?" he asked.

Carstairs handed him the revolver, and then a box of cartridges. He loaded, then raised his arm, and, taking a fairly long sight at the board, fired. "That's a miss," he observed. "I'll get a bit of chalk."

Stepping up to the board, Carstairs saw that he had missed the head of a tin tack by about a sixteenth of an inch.

Bounce returned from the engine room with a piece of chalk and whitened over the heads of the tin tacks. "I ain't had a shot with a revolver for two years, or more," he observed, apologetically. Then he took another shot and burst the head of one tin tack; his next shot bent the second tin tack over on one side. The third shot drove the remaining tack right home. "There you are, sir," he said, with some pride, handing Carstairs the revolver.

"Look here, Bounce! Is there anything much in the way of offence and defence that you can't do?" Carstairs asked with open admiration.

"Well, I don't think there is very much, sir. I've fired everything up to a six-inch gun, over that I ain't quite sure. Mind, I have afired a twelve-inch, but I ain't quite sure. A twelve-inch takes some handling, see." He stood up very straight, looking Carstairs steadily in the eyes as he made this simple statement.

Then they boxed, and the applicability of his surname struck Carstairs more than ever; he seemed literally to bounce out of the way, just when Carstairs was going to hit him, and he bounced in again with singular directness and precision immediately Carstairs had missed him. Every night for the rest of the week they boxed for half an hour at a time, and Carstairs, with his clear head and steady nerves, soon began to make progress.

"What you wants, principally, is to hit hard, an' quick an' straight." Bounce laid it down as a law, and suiting his own actions accordingly, he bounced in and hit Carstairs in the eye, so that it afterwards turned a lively shade of deep, blue-black.

Bounce apologized, then he grinned like a healthy fiend. "It do show up," he observed, "but a black eye ain't near so painful as a good un on the nose."

Carstairs smiled too. "Oh! it doesn't matter in the least," he said. "It's part of the game. Unfortunately I'm going home to see my people tomorrow." He gazed at it thoughtfully in the looking-glass in the lavatory. "The guv'nor'll understand, but the mater——"

"I knows, sir."

Next day Carstairs went home to the little vicarage of Chilcombe, and on his way to the station he caught sight of a rough-looking man in wellworn gaiters, a fur cap and a heavy coat with big poacher's pockets, limping down a side street. Carstairs felt angry. "That's the swine," he said, to himself. Then a sudden surge of pity overwhelmed him. "Poor devil! he does limp."

He got a seat in the corner of an empty third-class carriage and opened a paper he had purchased, but he did not read, he thought of the roughlooking man with the limp, of the beautiful girl in Scotland and Darwen— the three seemed inextricably mixed up, somehow. "Darwen's a skunk," he said, but that was the only definite conclusion at which he could arrive.

Meanwhile the train hurried him homewards, and very soon he arrived at the main line junction, and changed into the crawling local. He had written to say which train he would arrive by, and as the train drew up at the pretty country station, he saw the tall, black-garbed figure of his father on the platform. They shook hands solemnly, and eyes so much like his own beamed approval and pleasure as the strong brown cricketer's hand gripped his. Suddenly they sobered down into a look half amusement, half pain, as they rested on the discoloured skin (by careful doctoring reduced to a bright yellow) round his eye.

"What's the matter with the eye, Jack?"

"Oh, that's boxing."

"Ah!" It was a sigh of relief and distinct approval.

"Yes; a man at the works, engine driver, you know, ex-sailor, lightweight champion of the Mediterranean Fleet, he's coaching me."

"Ah, very good, excellent sport. Suppose you don't lose your temper?"

"Oh, no! Not with Bounce." He laughed. "How's the mater and all the rest of them?"

"Your mother's very well, very well indeed. Phillip is going on very well in India."

"Got a rise yet?"

"Rise?—er—no. In fact, you're doing the best of any, so far. Mrs Bevengton was inquiring about you; she and Bessie are coming over to tea to-morrow." He shot a sudden, keen glance at his son. "Very nice girl, Bessie, extremely nice."

"That's so," Jack admitted.

"Have you seen anything more of your gipsy maiden?" There was a note of anxiety in his father's voice.

"Yes; seen her once for a few minutes."

"Ah!" It seemed as if Jack had explained something, some obscure point.

"Her fancy man flattened me out."

"Flattened you out?"

"Hit me on the back of the head with a stick."

"Nothing very serious, I suppose; still it's a pity you got mixed up with those people."

"Yes; the girl came down next night with another stick to flatten out her fancy man." Unconsciously there was a note of pride in Jack's voice.

"Dear me, what terrible people! It's a very great pity you got mixed up with them at all—a very great pity."

"Yes, it is a pity," Jack agreed. He seemed so pensive that his father regarded him in some concern.

"Many young men entirely wreck their lives by these youthful entanglements," he said. "Those sort of girls, who appear beautiful and fascinating at your age, usually strike one as coarse and outré a few years later."

"That's very possible," Jack admitted, and he smiled as though a weight had been lifted off his mind.

They turned in at the big double gates.

"By the way, there is—er—no necessity to mention that little affair to your mother. Women brood over these things, and build up all sorts of vague horrors and possibilities of their own."

"Quite so," Jack admitted, very soberly, so that his father glanced quickly at him again. But they were at the house and there was no time for further questioning.

Jack's mother noticed his discoloured eye at once. "Oh, Jack, whatever have you been doing?"

"Only boxing, mother."

"I wish you'd be more careful; you're so violent. I'm sure cricket and lawn tennis are much nicer."

"They're nice enough, mater, but not nearly so useful."

There was a seriousness in the way he said it that made both father and mother look at him sharply. "Useful?"

He smiled, his calm, easy smile. "I mean to say, stokers and so on sometimes get abusive, you know, and in the interests of real peace it is best to know how to flatten 'em out if necessary."

"I wish Jack, you wouldn't use such slangy expressions."

"Very sorry, mater."

But his father's keen, blue eyes continued to watch him steadily, and after Mrs Carstairs had gone to bed, he stayed down for half an hour chatting with his son. "I suppose," he said, "there is no possibility of those gipsies molesting you further?"

Jack shrugged his shoulders. "Can't say," he drawled. "I left them in Scotland."

"They wander, these people, you know."

"That's true; however, there is always the police, you know." Jack was very unconcerned. "By the way, guv'nor, could you come back and stay with me for a few days? Another fellow and myself are digging together, you know. He's a jolly decent sort; opens his mouth rather wide at times, says more than he means, you know, but he's a good sort. Got me my job, as a matter of fact. He wants you to come too. Wants to get to know some decent people; he's a dancing man and that sort of thing. Thinks you'll probably bump up against some one you know, give us a lift in our jobs besides making things more pleasant. You understand."

The Reverend Carstairs' shrewd eyes twinkled merrily. "You want to utilize your old father, eh? What about this young man's father?"

"He hasn't got one; drowned at sea when he was a kid."

"Ah!" The grey eyes softened into sympathy at once. "Of course I'll come. It's quite the right view to take; young men cast adrift in a strange town usually get acquainted with quite the wrong people. Southville? Southville? Ah, yes. I think the vicar of St James' there is an old Christ Church man. Let me see." He got up and reached down a book of reference. "Here we are. Southville, St James. Yes! Moorhouse. Ah! I thought so. He was not exactly a chum, but a friend. I've no doubt he'll be pleased to see me. What is your friend like?"

"Oh, about the same as myself, but exceedingly handsome, striking, you know. Sort of chap you turn round to look at. Very dark, almost Italian looking."

"Ah! You ought to be able to make things very pleasant for yourselves down there. I'll go back with you on Monday." His father stood up.

"Thanks very much. Shall I turn out the light?"

"Thanks, if you will. Good night."

So Jack turned in once more in the old familiar bed in the old familiar room at the corner of the house, with windows overlooking a wide sweep of the rolling Cotswold Hills.

Next morning after church he met Mrs Bevengton and Bessie; she coloured slightly as she shook hands with him, and her dimples sprang into prominent evidence in a smile that expressed more than pleasure.

Jack regarded her thoughtfully, with very great pleasure too. She seemed the personification of beauty, not so much in the physical as the moral sense; as he walked by her side slowly down the brown-gravel path in the warm light of an autumn sun, countless little incidents of his childhood's days returned to him, bearing a fuller and a newer meaning; this girl had always been clean, clean as it is understood in England, honest and unspiteful, she never cheated. When he parted at the gate it was with a distinct sense of pleasure that he was to meet her again in the afternoon. She laughed, a jolly, happy laugh, when he explained the discolouration of his eye.

Mrs Carstairs and Mrs Bevengton coming behind had observed them with mutual approval: "Don't you think Bessie's improved?" Jack's mother said to him as they walked home together.

"She's better looking if that's what you mean, otherwise she was always a jolly decent girl."

"Yes, there are not many girls like her."

"In that, mater, your opinion should be of considerably more value than mine, I haven't met very many girls."

"You're getting old enough to think about these things now."

"Yes, mater, to think about them."

About three o'clock in the afternoon, Dr and Mrs Bevengton and Bessie arrived. After half an hour's exchange of family greetings, Jack and Bessie went out into the garden, leaving the old people indoors.

"Shall we go for a stroll through Cleeve woods?" Jack asked, presently.

"Yes, I haven't been there for a long time."

Cleeve woods were the private property of Lady Cleeve, but Jack and Bessie were privileged persons, allowed to trespass whenever they liked. They wandered along the well-known paths, going very slowly; every tree and bush held its own secret for them, recalling each its own little tragedy or comedy of their early lives.

Bessie stopped in front of a tall pine tree. "Do you remember when you climbed up there and took the kestrel's eggs?"

"I remember curly-haired 'Fatty,' and Jim down below keeping 'cave,' in case the keeper came."

The dimples burst out anew. "I was a fatty then, wasn't I? You came down all the way without a word. I knew you'd got eggs by the careful way you were watching your pockets. I thought it was only a magpie's, then you glanced round like a burglar and just showed one eye over the top of your pocket, I knew it was a hawk's because it was red."

"A kestrel is a falcon, Bessie, not a hawk. You said, 'O-oh,' under your breath, and Jim whispered 'what is it?' Jim never could tell one egg from another."

"We all felt like desperate poachers and crept out of the wood in breathless haste, and you blew them under the chestnut tree on your lawn."

Jack looked at her with a sudden admiration.

"You were always a pal and full of pluck," he said. "When I was up old Giles' apple tree and he came out with his dog, Jim bolted like a rabbit, but you stayed behind like a brick and waited for me."

"Yes, I remember, my knees were knocking together with fright."

"Oh, you crammer, you threw an apple at the dog."

Bessie laughed. "Old Giles was a good sort. He knew who we were right enough, but he never told father."

Talking thus they strolled on till they came out on the trimmed laurels and well-kept lawn that surrounded Lady Cleeve's house. Jack stopped. "I expect the footman will come out and ask impertinent questions if we go over the lawn, won't he?"

"Oh, no! he knows me very well."

Still they stopped for some time admiring the house and the well-kept grounds. It was just getting dusk and lights were already beginning to appear in some of the windows of the big old house. "I should like to own a place like this some day," Jack said. He stepped on to the lawn. "By Jove! these lawns are grand, aren't they? Do you remember that time I was on holidays from Cheltenham, when they gave a sort of tea fight to the whole village? And the yokels were playing kiss-in-ring on the lawn?"

Bessie coloured a good red and looked down at the smooth carpet-like grass, poking aimlessly with the point of her umbrella. They were fairly close to the house. Suddenly one of the near windows sprang into a glare of light, showing up everything within with great distinctness. A female servant, in cap and apron, was lighting the gas. Her profile showed clear and distinct against the light.

"Oh! there's that new maid who's just come to the Hall. Don't you think she's remarkably handsome, Jack?"

Carstairs looked up, the girl in the room turned, so that the light was full on her face, and every feature was distinct: the blood seemed to bound in

his veins, he was astonished at the thrill he felt.

It was some seconds, perhaps a minute, before he answered, then it was a very slow drawl. "Yes, exceedingly handsome."

Then they went home almost in silence, for Carstairs had recognized in Lady Cleeve's new housemaid, his gipsy girl from Scotland.

CHAPTER X

Early on the Monday morning the Reverend Hugh and his son Jack entrained for Southville. Jack was pre-occupied with some deep thought, and his father noticed it.

"Sorry to leave the old place, Jack?"

"Er—yes. Nothing touches this place for me."

"You must get to know some nice people at Southville."

Jack pulled himself together; he had been gazing earnestly at Lady Cleeve's house nestling in among the pine trees; the slope of a hill suddenly shut out the view, and Jack turned to his father with attention undivided. "You know I'm not so keen on the people as the work, but Darwen seems to think that in municipal work you can't get on at all without friends."

The parson's eyes lighted up with approval as he listened to his son. "Work is the thing that makes life enjoyable, but you must have friends, you know."

Jack was silent for some time. "It seems a rotten state of things," he observed at length, and his father laughed aloud.

Darwen was on shift when they arrived, but Jack took his father to their diggings, and very soon after Darwen came in; his handsome face lighted up with a beaming smile as he shook hands with the Reverend Hugh. "I say," he said, "I should have known you for Jack's father if I had met you in the street alone."

The old parson smiled with approval as his shrewd grey eyes took in a complete impression of face and form and expression. He succumbed at once to the charming manner and charming personality of the tall, cleanlooking young engineer. "Wholesome, athletic, happy-go-lucky, but intelligent," was his mental summing up. Such were the sort of friends he expected his son to make; he looked from one to the other with keen

approval. They pushed forward the easiest chair and plied him with cushions and tobacco. They took him back to his own college days.

"You fellows seem very comfortable here," he said.

"Not bad," they agreed.

He smiled. "It was always 'not bad,'" he said. "Hullo!" he glanced along the backs of the books on the shelf at his side. "Tennyson, Keats, Dante, Shelley, 'Hamlet,' 'Julius Cæsar,' 'Barrack Room Ballads,' 'The Prince'! I didn't know you had a fancy for poetry, Jack."

"Not guilty! Those are Darwen's." Jack was stretched out, six feet of muscularity, full length on a slender-looking couch. He puffed slowly at his pipe. "Those are mine"—he pointed to a shelf on the other side.

His father glanced along the backs of them, reading the names aloud. "'Dynamo, Electric Machinery,' h-m, bulky volume that! 'Manual of the Steam Engine'; 'The Steam Engine,' h-m, three volumes. 'Polyphase Currents,' ah! 'Text Book of Heat,' 'Theoretical Chemistry,' 'Trigonometry,' 'Integral Calculus,' 'Differential Calculus' (Todhunter). That's mine, I think. I thought Edwards was the man on the Calculus nowadays."

"Ye-es, Darwen's got him somewhere. I prefer Todhunter, leaves more to the imagination, you know."

"Ah, the imagination. Quite so."

"Seems to me the limit of a man's possibility in anything is the limit of his imagination."

"And his control of it, Jack."

"Exactly."

Darwen had his chair tilted back wards, blowing clouds of smoke vertically upwards to the ceiling. He spoke slowly between the puffs. "Carstairs—Jack, has got no soul above machines, inanimate lumps of iron; the hum of a smoothly running engine is the only poetry that appeals to

him, so it does to me, but I like a change; little bits of Shelley, little drops of Kipling——"

"I admit that 'M'Andrews' Hymn' is a real poem."

"Shut up! You reek of the engine room. I like a change. Variety is the soul of amusement." He dropped his chair on to its front legs again and looked at Jack's father. "Hasn't some one said that?" he asked.

"I really couldn't say, perhaps so." He smiled with amusement.

Darwen looked at him steadily, thoughtfully, for a moment. "Do you know I think there's a touch of the Dago in me—or perhaps it's Celt. Do you think I'm Irish?"

"My dear boy, you should know that best."

"That's so! English, the mater says, pure English, but I don't know. I'm a bit of a rogue, you know; the instinct of dishonesty is very strong at times."

The Reverend Hugh laughed, and Darwen jumped up. "I'll play you a tune, if you'll stand it," he said. He sat down and played, wandering on from one thing to another, ever and anon glancing at the old vicar, then he got up. "Does that bore you?" he asked.

"Bore me? My dear fellow, you are an accomplished musician."

He flushed slightly with pleasure. "I like music. Let's have a trot round the town and show your guv'nor the sights, Carstairs."

"The guv'nor knows the vicar of St James."

"Does he? By Jove! that's good."

So they went avisiting.

The Reverend Moorhouse was short and very broad, he had more the legal than the clerical type of face; an old international Rugby footballer, the impress of the game was still strong on him, vigorous, keen, bluff. It

was evident he was pleased to see his old friend, he said so, and invited all three of them to dinner the next night.

The dinner was good; Mrs Moorhouse was plain, stout, chatty, and exceedingly kind; the Misses Moorhouse, two of them, were tall, athletic, and pretty. They talked about hockey and tennis and swimming; the two young men were charmed. Carstairs was quite vivacious, Darwen seemed to scintillate; Mrs Moorhouse watched him with approving eyes, and later on, when he played and sang with the elder Miss Moorhouse, she took possession of him; crossing the room she sat down beside him. "You must come and help us at the church," she said.

"I shall be delighted," he answered, with real pleasure shining in his eyes.

The vicar's wife was business-like and decisive, she fastened him down by compact and contract at once.

Altogether it was a merry and delightful evening, and when they at length departed it was in a particularly bright and happy mood. They walked back; it was not very far and a beautiful starry night; there was a tinge of frost in the air; Jack Carstairs threw his chest out and took a deep gulp of the fresh, crisp air.

"I believe these little diversions do improve one's form, you know, I feel like a sprint." He looked up and down the long silent street of semidetached, shrubbery-enclosed villas. As he looked back his face suddenly hardened into a fierce look of anger, his mouth shut like a steel trap, and his grey eyes took on a cold, steely glitter; for just as he glanced round, a rough-looking man, carrying a big stick had limped past a lamp light on the other side of the road. Carstairs said no word, but there was an abruptness in his manner that attracted his father's attention.

"What's the matter, Jack?" He glanced round and Darwen followed suit, but the man was now in the shade and hardly noticeable.

"Nothing," he answered, staring straight ahead; but out of the corner of his eye he caught a meaning look from Darwen, and in response jerked his

head ever so slightly backwards and to one side.

Promptly Darwen dropped back to do up his bootlace. A few seconds later, the man with the limp, who had crossed the road and was now directly behind them, quickened his pace and limped past. Carstairs stopped and faced round as the limping step drew near, but the man's face was averted and he went on without a word or sign; some way ahead they saw that he was joined by another man, hitherto unobserved, who, without any word of greeting, stepped out of the shadow and walked along with him; he seemed exceptionally short, but his hands hung down below his knees—probably a hunchback.

"Those men are after no good," the Reverend Hugh observed.

"No. I expect not. There have been several burglaries round here lately."

Darwen held out his walking-stick. "Do you notice the sticks we carry? Guaranteed to kill at one smite." He laughed lightly. Something of the spirit of the party returned to them, and they went home more or less lighthearted.

After the old vicar was safely in bed, Darwen went along to Jack's bedroom. He was half expected; he sat down on a chair while Carstairs stretched himself, half undressed, on the bed.

"That was Sam?" Darwen asked.

"Yes, I'm sure of it! Don't know who the other chap is, seems as if he's rounding up a gang. What do you think of putting the police on it?"

"Don't see how you can! Anyhow the scandal of it, if there was an exposure, would wreck your rosy prospects in this town. A young man with a fancy for spending his nights in the woods with charming gipsy maidens is not the sort that the wife of the vicar of St James can allow to associate with her daughters."

Carstairs swore volubly. "Do you know she's got a slavey's job at Lady Cleeve's, the local big bug's at home."

"Did she know where you lived?"

"Yes, I told her."

"You were a fool."

"I don't know." Carstairs was very thoughtful. "Damn it, she knocks spots off any girl I've seen yet. She's improving, too."

Darwen's eyes glistened. "I like playing with fire myself," he said.

"It's our job," Carstairs answered, cynically. "We're paid to do it."

"It is damn rotten for you, I admit. Have you got a revolver?"

"Yes."

"Oh! but that's no good either, you mustn't attract attention in that way. I tell you what, we'll set a trap and collar the brute. You'll have to be the bait. And—say Bounce and I, we ought to be able to effect a capture."

"That's so, but what then?"

"Oh, anything. Bribery, threats, or we might shanghai the beast off to Australia."

Carstairs was dubious. "They'll give it a rest for a bit now. He's as cunning as a fox, that gipsy, he knows I recognized him. Damn him! I'd have hit him over the head with my stick as he passed if the guv'nor hadn't been there."

"Well, anyway, shall we call in Bounce? You've already told him the story, haven't you?"

"Yes. Bounce's great idea is a heavy right on the jaw. 'Get in close and hit hard,'" he said.

"That's very sound, too. After your guv'nor's gone, we'll hold a council of war. Bounce may have some reliable pals. Good night, old chap, keep

your pecker up."

"Thanks. It's jolly good of you to lend me a hand over a rotten business like this."

"That's alright. As I observed before, I like playing with fire."

"Well, I hope you won't get burnt over this. Good night."

"Good night."

Next day the old vicar went back to his flock again leaving a cordial invitation for Darwen to come and see them. Jack saw him off.

"A very fine young fellow that. I'm glad you've made friends with him."

"Yes! he's a jolly good sort," Jack answered, enthusiastically, having fresh in his memory Darwen's offer of assistance.

The same night, Carstairs, Bounce, and Darwen held a council of war in the shift engineer's office. "What we wants to do," Bounce said, "is to find out what 'e wants. If it's murder 'e's after, we'll shanghai 'im, if it's only a row, we'll give 'im that, but the first thing to do is to capture 'im."

Carstairs sat on the side of the table puffing slowly at his pipe. "Thanks very much for the suggestion and offer of assistance, Bounce, but I don't want to shanghai him, I only want to get a fair show, also I don't mind giving him a fair show if that will satisfy him."

The Quixotic strain of the Englishman was coming out in him. They observed him in wonder. "Giving him a fair show?" they queried in a breath.

He drawled very slowly. "I mean to say," he said, "I broke his leg. I beat him once, but I had some assistance; if he fancies he can give me a licking fair and square, I don't mind giving him a trial, provided, of course, that that is really what is worrying him, you understand."

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.