Anonymous 20*20. Director of Security Intelligence for Akamai Technologies  Former Research Director, Enterprise Security [The 451 Group]  Former Principal.

Slides:



Advertisements
Similar presentations
Certification Industry Against Counterfeiting
Advertisements

Ethical Hacking: New Web 2.0 Attacks and Defenses HI-TEC 2011.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
David A. Brown Chief Information Security Officer State of Ohio
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Computer Crimes Chapter 9. Definition  Illegal act that involves a computer system or computer-related system  Telephone, microwave, satellite telecommunications.
Lloyds 360 Risk Insight Dec 2010 Malcolm Harkins Malcolm Harkins Chief Information and Security Officer General Manager Intel Information Risk and Security.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
The Way to Protect The Smartest Way to Protect Websites and Web Apps from Attacks.
Vs The Illusion of Security. Aaron Barr : “Security Expert” CEO of security company HBGary Federal Provide Security Training Create Malicious Software.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
What Is Computer Ethics?
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cybercrime & Breach Impact Questions American Bar Association Criminal Justice Section June 6, 2014.
Submitted by: Abhashree Pradhan CA (1)
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Anonymous By Kendra Kennedy, Benjamin Fleshman, and Hassan Alsuleiman.
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
Question: Future Sessions AI and Military (UAS) Virtual Worlds Privacy and NSA Free Software Movement.
Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©
Information Warfare Playgrounds to Battlegrounds.
Cyber Security Nevada Businesses Overview June, 2014.
Threat Modeling and Risk Management John R Durrett January 2003 Primarily from Building Secure Linux Servers ( ) and Secrets and Lies ( )
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Scott Charney Cybercrime and Risk Management PwC.
Information Warfare Playgrounds to Battlegrounds.
FFIEC Cyber Security Assessment Tool
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
For Innovation. ‘Counterfeiting and Piracy’ What has this to do with the UK Patent Office? We are not enforcers, but we have had a role for sometime Seat.
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
15 years of Web Security © 2015 WhiteHat Security, Inc. Jeremiah Grossman Founder WhiteHat Security, Inc. The Rebellious Teenage Years.
Security Mindset Lesson Introduction Why is cyber security important?
Provided by OSPA ( Operations Security (OPSEC)
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
The Current State of Cyber Security and How to Defend Your Data.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
Computer & Info Security Instructor: David Wilkeson, CISSP Class Website: Grades.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Information Security Program
Liberty International Underwriters
Gift Card Risk Mitigation – Presentation A
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Andy Hall – Cyber & Tech INSURANCE Specialist
Hackers and Hacking George Pearson rev. 05/29/2018.
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
CRITICAL INFRASTRUCTURE CYBERSECURITY
Cybersecurity Threats and Opportunities in Latin America
Strategic threat assessment
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Cybersecurity and its Relevance to CIT
Presentation transcript:

Anonymous 20*20

Director of Security Intelligence for Akamai Technologies  Former Research Director, Enterprise Security [The 451 Group]  Former Principal Security Strategist [IBM ISS] Industry Experience  Faculty: The Institute for Applied Network Security (IANS)  2012 Vanity Fair Hero  Co-Founder of “Rugged Software” Things I’ve been researching  Compliance vs Security  Disruptive Security for Disruptive Innovations  Chaotic Actors  Espionage  Security Metrics 2 Chief Curmudgeon for attrition.org President/COO of Open Security Foundation (OSF) Director of Non-profit Activity at Risk Based Security Industry Experience Faculty: Honorary University of Dayton School of Law , CyberCrime Curriculum 2000 Vanity Fair Villain President / COO of Open Security Foundation (OSF) Things I’ve been researching The Myth of Compliance & Certification Disruptive Rants and Twitter Replies InfoSec Industry Errata Squirrels Vulnerability Databases & Metrics Jericho Joshua Corman

Consequences: Replaceability 3

Anon “Good Guys” Analysts CiviliansLEO

=

 Endgame Ethics

 Chaotic Actor

12

13

“Anonymous is God’s gift to the Chinese” – Government Agency CISO False Flag: Criminal & State Actors

Cyber-Neo-McCarthyism

 Mastercard / Visa – Denying payments to Wikileaks  PayPal – Suspended Wikileaks account  Sony – Lawsuit against PlayStation 3 hacker George Hotz  HBGary – Threat of outing Anonymous leaders Retaliation

Operation Payback

Beyond Operation Payback

Data on Anonymous

Name: Anonymous Hacktivism Denial of Service Defacements Use of Iconography Decentralized Group What is really new?

A Mirror to Our Neglect…

Modern Pantheon of Adversary Classes Targets Credit Card #s Web Presence Connectivity Intellectual Property PII / Identity Cyber Infrastructure Core Business Processes Impacts ReputationalPersonalConfidentialityIntegrityAvailability Motivations FinancialIndustrialMilitaryIdeologicalPoliticalPrestige Actors Sta tes Competitor s Organized Crime Script Kiddies TerroristsHacktivistsInsiders Au ditors

Anonymous & the Law

Anonymous Activity

Law Enforcement Activity

The Face of Anonymous*

The Unknowns of Anonymous ~270

Crossroads

Chaotic Good Legislation Watchdog Chaotic Good Free Speech Chaotic Good Moral Outrage Anonymous Identity/Meme “General Population” MalSec? Chaotic Good? or Evil? Leave LulzSec Chaotic Evil

“If you believe something…”

Finger on the Pulse

Vigilantism?

 Predictions about Anonymous are [interesting|amusing|ridiculous]  “Will this mean the end of Anonymous? No. It will mean the end of LulzSec, but Anonymous existed before LulzSec and will continue existing. However we probably won't see any more hacks as the ones LulzSec had been perpetrating, and Anonymous will only use their known childish tactic of DDoS using their LOIC tool.” -- Luis Corrons, Panda Security.

Anonymous as an Industry

Control and Chaos ”World War 3.0” by Michael Joseph Gross Vanity Fair - May 2012

Does not one cause the other? ”World War 3.0” by Michael Joseph Gross Vanity Fair - May 2012 “It’s a Trap” on shirt.woot.com

1914

With Great Power? "When you don't have centralized leadership, it doesn't matter what most will do, it matters what one of them will do," Corman said.

Back to Anonymous 2020

The Future of Anonymous

Thank You & Contact  sudux.com  “anonymous” contributors  “unspecified” contributors 