• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Adapting To The Age Of Anonymous
 

Adapting To The Age Of Anonymous

on

  • 1,680 views

SOURCE Barcelona 2011 - Joshua Corman

SOURCE Barcelona 2011 - Joshua Corman

Statistics

Views

Total Views
1,680
Views on SlideShare
1,661
Embed Views
19

Actions

Likes
0
Downloads
32
Comments
0

1 Embed 19

http://www.secdocs.org 19

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Rorschach Test: http://en.wikipedia.org/wiki/Rorschach_testWe see in Anonymous what we WANT to see.. We project. Our perceptions say more about us than they do about the multitude of subgroups/causes in Anonymous.
  • There isn’t AN anonymous either… there are dozens.It is more of a franchise than an Organization.
  • http://www.csoonline.com/article/682511/the-rise-of-the-chaotic-actor-understanding-anonymous-and-ourselves
  • Family Tree IMG SOURCE: http://2.bp.blogspot.com/-XS0av6GQlIE/TheLlBBprTI/AAAAAAAAAIU/f6aABTtPyVE/s1600/tree.jpg
  • Operation Payback – LOIC-ers
  • IMG Source: http://eandres.glogster.com/Whitchhunt-/
  • IMG SOURCE: http://www.toonpool.com/cartoons/Leviathan_41513#img9Two logical outcomes…A Hobbes-ian Leviathan will rise… to police the brand – borne of necessity and convenienceThe Brand will be contaminated and the MoralAnons will fleeThis is Social Contract Theory 101 stuff…Hobbes: The State of Nature is a State of War…Locke: The State of Nature is a State of Inconvenience…
  • IMG SOURCE: http://www.toonpool.com/cartoons/Leviathan_41513#img9Two logical outcomes…A Hobbes-ian Leviathan will rise… to police the brand – borne of necessity and convenienceThe Brand will be contaminated and the MoralAnons will fleeThis is Social Contract Theory 101 stuff…Hobbes: The State of Nature is a State of War…Locke: The State of Nature is a State of Inconvenience…

Adapting To The Age Of Anonymous Adapting To The Age Of Anonymous Presentation Transcript

  • Adapting to the Age of Anonymous SOURCE Barcelona - November 17, 2011 Joshua Corman Director of Security Intelligence @joshcorman http://cognitivedissidents.wordpress.com/ ©2011 Akamai
  • About Joshua Corman Director of Security Intelligence for Akamai Technologies •Former Research Director, Enterprise Security [The 451 Group] •Former Principal Security Strategist [IBM ISS] Industry Experience •Expert Faculty: The Institute for Applied Network Security (IANS) •2009 NetworkWorld Top 10 Tech People to Know •Co-Founder of “Rugged Software” www.ruggedsoftware.org Things I’ve been researching •Compliance vs Security •Disruptive Security for Disruptive Innovations •Chaotic Actors •Espionage •Security Metrics2 ©2011 Akamai
  • Agenda• Understanding Anonymous in under 7 minutes• Deconstructing Anonymous• Adapting to Anonymous• Building a Better Anonymous? ©2011 Akamai
  • Understanding Anonymous:The Rise of the Chaotic Actor Joshua Corman @joshcorman Director of Security Intelligence Akamai Technologies 2011 FlashTalks powered by PechaKucha ©2011 Akamai
  • 5 ©2011 Akamai
  • ©2011 Akamai
  • Paradox Slide/Deliberate Disinformation ©2011 Akamai
  • http://www.csoonline.com/article/682511/the-rise-of-the-chaotic-actor-understanding-anonymous-and-ourselves ©2011 Akamai
  • Some men just want to see the world burn… 9 ©2011 Akamai
  • Lots & Lots of Anonymous Sects 10 ©2011 Akamai
  • Your Headline Here (in Title Caps) 11 ©2011 Akamai
  • You Choose Your Own Level of Involvement 12 ©2011 Akamai
  • Anonymous* Unmasked? [*Alleged] ©2011 Akamai
  • You Choose Your Own Level of Involvement 14 ©2011 Akamai
  • You Choose Your Own Level of Involvement 15 ©2011 Akamai
  • Escalation? 16 ©2011 Akamai
  • Anomalous Anonymous? 17 ©2011 Akamai
  • False Flags: Adaptive Persistent Adversaries “Anonymous is God’s gift to the Chinese” – CISO ©2011 Akamai
  • Cyber-Neo-McCarthyism I am not now……nor have I ever been… …a member of Anonymous. ©2011 Akamai
  • Building a Better Anonymous… 20 ©2011 Akamai
  • Building a Better Anonymous… 21 ©2011 Akamai
  • The easy answers Suggested Background ©2011 Akamai
  • Joshua Corman @joshcorman 23 ©2011 Akamai
  • Agenda• Understanding Anonymous in under 7 minutes• Deconstructing Anonymous• Adapting to Anonymous• Building a Better Anonymous? ©2011 Akamai
  • PANEL: Whoever Fights Monsters… ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • Operation Payback(Anonymous Takes Center Stage)August-December 2010Initial Targets • MPAA • RIAA • Intellectual Property OfficesIn December, switched to WikiLeaks “defense” • Financial services: PayPal, Mastercard, Visa • Public personas: Lieberman, Palin • Others: Lawyers, security researchersStats: • 1k-3k attackers in IRC • 1500 copies of LOIC in Hivemind (# in IRC/2) • 1.5 Gbps peak attack traffic (# in IRC/2) • 750 Mbps sustained traffic (# in IRC/4) ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • Discussion ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • http://cognitivedissidents.wordpress.com/2011/11/11/an-anonymous-ink-blot-rorschach/ “An Anonymous Ink Blot Rorschach” What do you see in the Anonymous Ink Blot ? BRANDPOLLUTION ©2011 Akamai
  • BRANDPOLLUTION ©2011 Akamai
  • BRANDPOLLUTION ©2011 Akamai
  • False Cover: Criminal and State Actors “Anonymous is God’s gift to the Chinese” – CISO ©2011 Akamai
  • ©2011 Akamai
  • Agenda• Understanding Anonymous in under 7 minutes• Deconstructing Anonymous• Adapting to Anonymous• Building a Better Anonymous? ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • DDoS is Legion74% of surveyedcompanies experiencedone or more DDoS attacksin the past year, 31% ofthese attacks resulting inservice disruption.11 Forrester Research ©2011 Akamai
  • Some of my data 600• Typical Attack Size: 3-10 Gbps 500• Large Attack Size: 100-200 Gbps 400 Number of Attacks• Attacks are originating from all geographies and are moving between geographies 300 during the attack 200 100 0 2009 2010 2011 ©2011 Akamai
  • July 4th – 7th 2009 DDoS Attack400,000 Korean Bots Attack Key U.S. Government Web Sites Times Above Agency – PROTECTED Peak Traffic Normal Traffic U.S. Government Customer 1 124 Gbps 598x U.S. Government Customer 2 32 Gbps 369x U.S. Government Customer 3 9 Gbps 39x U.S. Government Customer 4 9 Gbps 19x U.S. Government Customer 5 2 Gbps 9x U.S. Government Customer 6 1.9 Gbps 6x New U.S. Government Customer 0.7 Gbps SITE DOWN before Akamai ©2011 Akamai
  • Agenda• Understanding Anonymous in under 7 minutes• Deconstructing Anonymous• Adapting to Anonymous• Building a Better Anonymous? ©2011 Akamai
  • Agenda ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • ©2011 Akamai
  • Discussion ©2011 Akamai
  • Thank You! Barcelona, November 17, 2011 Joshua Corman @joshcormanhttp://cognitivedissidents.wordpress.com/ ©2011 Akamai