Published on


Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Rise of social media and the uses for defense and offensive operations. This presentation will discuss up front some of the statistics surrounding social media, the environment today, some of the technologies that are important to social media. Then we will talk about the vulnerabilities of social media to people and organizations, and some reconnaissance and exploitation examples.
  • It’s the things you sell, the places you go, the questions you ask, the things you say, the people you associate with. This also means the democratization of intelligence. As social media usage increases, organizations that provide the content have an immense amount of valuable intelligence information.
  • Lots of different opinions about social media in this room and the direction of social media, positive and negative. One thing in my mind is certain, its positive or negative effect on society aside, the direction is certain.
  • So what are the driving factors of the social media revolution? Connectivity. Efficiency. On Demand. Soap Box. Connections. I want to have access to information immediately. Where should I eat? Is this a good product? What are my friends doing? In order to provide this capability I need to know something about you. The more the service knows the more it can provide. You need to be connected all the time. The more it knows, the more you are connected, the better the information, and the more you are exposed.
  • So this is one representation of what social media looks like, broken down into categories of social media. We will touch of each of these categories to some degree. There are obvious leaders for usage but they all are significant in what they are providing technologically to the movement.
  • In 2006, Facebook was barely known Baidu started in 2004.
  • In those countries where Facebook is not the most popular it is usually second.
  • Web comprises 52% of all internet traffic. The rest is email and internal network traffic. P2P down form 40% to 18% of all internet traffic.
  • This trend will continue. Individual websites will start to fall off and pop back up within SNS and location based platforms.
  • Switched from Tier1 Backbone providers connecting to thousands of Tier2 providers to connect you to millions of websites. Now it is about a small number of content providers and companies that make the web more efficient by aggregate and caching content, figuring out ways to deliver content faster geographically.
  • Business accept the benefit of social networks to their organizations.
  • Facebook drives itself on this model. Facebook – trust my friends Youtube – chooice
  • Solutions/Challenges.aspx
  • video and file sharing traffic represents almost 79% of all consumer traffic; and by 2013, that number should reach 85%.
  • tag/social-games/
  • Apple has filed patents for face and object recognition on the iPhone. Others have also filed object and face recognition patents.
  • Email to Gray concerning something lost at a location.

    1. 1. Social Media, Exploitation, and Persistent Internet Operations <ul><li>Aaron Barr </li></ul><ul><li>CEO </li></ul>
    2. 2. What is Social Media Social media are media for social interaction, using highly accessible and scalable publishing techniques. Social media use web-based technologies to transform and broadcast media monologues into social media dialogues . They support the democratization of knowledge and information and transform people from content consumers to content producers .
    3. 3. What is Social Media Eventually everything is...
    4. 4. Social Media Revolution <ul><li>Collection and correlation of information to drive content in real-time. </li></ul><ul><li>Everyone has a voice. Desire to connect and collaborate in real-time. Platforms are adapting. </li></ul><ul><li>Mobile access of information and services will continue to increase dramatically. </li></ul>
    5. 5. SNS Breakdown
    6. 6. Top 10 Destinations <ul><li>The top 20 sites are social networking platforms, with the exception of Amazon at #18. </li></ul>
    7. 7. Global SNS by Country
    8. 8. Social Media Statistics <ul><li>Social Networks and Blogs are the most popular online category. </li></ul><ul><li>In 2009, Twitter grew 577% to 100M visits a day and Facebook grew 187% to 490M visits a day. </li></ul><ul><li>Mobile Social Networking grew 240% in 2009. </li></ul>
    9. 9. Migration of the Web <ul><li>150 Networks control 50% of network traffic. </li></ul><ul><li>30 Companies account for 30% of all internet traffic. Google alone accounts for 6%. </li></ul><ul><li>Web is concentrating to large content providers. </li></ul><ul><li>Localization and Personalization of information is becoming more prominent. </li></ul><ul><li>Internet is shifting from an information medium to an entertainment and social medium. </li></ul>
    10. 10. Hyper Giants Yesterday Today Tier1 Networks Content Providers Content Aggregators
    11. 11. SNS in Business <ul><li>6.8% of Business Internet traffic goes to Facebook, 10% goes to YouTube </li></ul><ul><li>Who is doing the monitoring of in service content and applications? </li></ul><ul><li>Linkedin considered a significant resource in the business community, especially small businesses. </li></ul><ul><li>Twitter and Facebook also commonly used as a marketing tool. </li></ul>
    12. 12. SNS in Government <ul><li>DoD DTM 09-026 – Responsible and Effective Use of Internet-based Capabilities. </li></ul><ul><li>DNI Directive for responsibility to share classified information amongst those with a need to know. </li></ul><ul><ul><li>Analytic Transformation </li></ul></ul><ul><li>Internal Collaboration: Intellipiedia, A-space </li></ul>
    13. 13. Amateur Content <ul><li>An amateur voice of thousands is more responsive and accurate than the trained voice of one. </li></ul><ul><li>More choices to select the voices of interest. </li></ul><ul><li>Wikipedia is more accurate than encyclopedia Britannica </li></ul>
    14. 14. Video <ul><li>30 Billion videos watched online in the US in April with the majority from Google sites. </li></ul><ul><li>Currently 35% of internet traffic is video. </li></ul><ul><li>Historically video consumption grows at 70% annually. </li></ul><ul><li>Estimates as high as 60% of Internet traffic will be video by 2013. </li></ul>
    15. 15. Video
    16. 16. Gaming <ul><li>In 2008 video game sales surpassed movie sales. </li></ul><ul><li>In 2009 traditional game sales declined, while digitally delivered casual game sales skyrocketed. </li></ul><ul><li>iPhone/iPad/Android and SNS Social Gaming is starting to drive the market. </li></ul><ul><li>Virtual goods sales surpassed $1B in 2009. </li></ul>
    17. 17. Social Gaming
    18. 18. Location Services <ul><li>Driving information and services based on location </li></ul><ul><li>Hyper Targeted advertising </li></ul><ul><li>Checking model: Foursquare, Gowalla </li></ul><ul><li>Location SNS: Google Latitude, Loopt, etc… </li></ul>
    19. 19. Location Based Services
    20. 20. Face Recognition
    21. 21. Object Recognition
    22. 22. Unified Comms. <ul><li>Integration of real-time communications. </li></ul><ul><li>Simplify personal and business communication. </li></ul>
    23. 23. Augmented Reality <ul><li>Augmented Reality: LBS, object recognition, and SNS consolidation </li></ul><ul><li>Real-time, Geo-located web </li></ul>
    24. 24. Privacy vs. Content <ul><li>The amount of exposed personal information will increase dramatically to drive content. </li></ul><ul><li>Privacy is a receding tide. </li></ul><ul><li>Privacy dialogue has focused on single platforms. Ex: Google Buzz and Facebook. </li></ul><ul><li>Google project to derive searchable text from video and audio clips. </li></ul><ul><li>Static Web -> Social Web -> Realtime web -> Geolocated web. Live Location based SN Web </li></ul>
    25. 25. Personal Information <ul><li>SNS and LBS integration with technology; object recognition, video and audio to text conversion. </li></ul><ul><li>Overhear a conversation, take a picture, web will tell me who it is. </li></ul><ul><li>Find a picture of interest. Web will tell me who it is and where they are. </li></ul>
    26. 26. Digital Fingerprints This is me… 2 1 3 4 5
    27. 27. Exploitation of SM <ul><li>Social Media is the single most effective resource when developing targeted attacks. </li></ul><ul><li>There is no firewall, no anti-virus program for the human brain </li></ul><ul><li>No technological capability to protect PII. </li></ul><ul><li>Little capability to monitor and protect against in app content. </li></ul><ul><li>How can you tell the different between a legitimate program collecting information to drive content vs. malware? </li></ul>
    28. 28. SNS Attack Platform <ul><li>Malicious content in ads or apps. </li></ul><ul><li>Reconnaissance and Social Engineering. </li></ul><ul><li>CovCom and Command and Control. </li></ul>
    29. 29. Historical Attacks <ul><li>Spear Fishing </li></ul><ul><li>Attacks on SNS increased 70% from 2008 to 2009. </li></ul><ul><li>C&C Resources </li></ul><ul><li>Aurora good example of effectiveness of using SNS for Reconnaissance and execution. </li></ul>
    30. 30. Facebook Weaknesses <ul><li>Sophos conducted an experiment in late 2009, and started friending random people. </li></ul><ul><ul><li>46% accepted </li></ul></ul><ul><ul><li>89% divulged their full birthdates </li></ul></ul><ul><ul><li>50% town of residence </li></ul></ul><ul><li>LikeJacking </li></ul>
    31. 31. SNS Security <ul><li>Block it </li></ul><ul><li>DLP </li></ul><ul><li>Training </li></ul><ul><li>Protect you PII </li></ul><ul><ul><li>Use platforms specifically. </li></ul></ul><ul><ul><li>Be suspicious of content, even from friends </li></ul></ul>
    32. 32. Operations <ul><li>Persona Management </li></ul><ul><li>Backstopping </li></ul><ul><li>No information is information. Real vs. Alt. </li></ul><ul><li>Government needs to think commercially </li></ul><ul><li>Limited use of SNS for government purposes. </li></ul><ul><li>CovCom </li></ul>
    33. 33. Background Search <ul><li>Gather personal information and information about immediate family </li></ul><ul><li>Do SNS searches for family members. </li></ul>
    34. 34. LinkedIn <ul><li>LinkedIn provides one of the best resources for identifying specific targets </li></ul>
    35. 35. LinkedIn <ul><li>Linkedin provides detailed professional information as well as associates. </li></ul>
    36. 36. Facebook Friends <ul><li>Facebook Privacy defaults to off. </li></ul><ul><li>Most peoples friends lists are exposed. </li></ul>
    37. 37. Foursquare Profile <ul><li>Location information on Gray including spots he frequents most and friends. </li></ul>
    38. 38. Foursquare <ul><li>Information on Location, who frequents, tips, events. </li></ul>
    39. 39. Google Latitude <ul><li>Real-time location based messages using Google Buzz. </li></ul>
    40. 40. Gowalla <ul><li>Gowalla is currently the most informative LBS. </li></ul>
    41. 41. Gowalla Location <ul><li>See Everyone that has checked in at Apple HQ. </li></ul><ul><li>Mondays are Indoc days at Apple. </li></ul>
    42. 42. Gowalla Location <ul><li>Berry is excited to be starting with Apple today. </li></ul><ul><li>And look he has a twitter account too. </li></ul>
    43. 43. Twitter <ul><li>Twitter provides lots of good background information </li></ul><ul><li>Service Integration </li></ul>
    44. 44. Future Suzanna Hamilton Age: 35 Occupation: Trainer Profile History Topics Martin Place Sydney Australia Opened in 1891 History Events Recent Visitors Eric Arthur Blaire Age: 44 Occupation: Author Profile History