SlideShare a Scribd company logo
1 of 47
RIP …
In Memory of
Fred Tomlinson
(1927 - 2016)
AND In Memory of
Ray Tomlinson
(1941 - 2016)
RIP …
01 Email and spam through the
ages
QWERTYUIOP
— Text of
the first
email ever
sent, 1971
The computers
which sent(and
received)the
first email.
Cambridge MA,USA
The first spam?
Telegram Spam,1871
100 years
before email!
Traditional
Cost Model
Spam:
Recipient pays
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Table
of
Contents
Today
next
• Spam is down!
• Spam comes in
many forms
35
Table
of
Contents
Email is
dead
The
Future is
now …
• Nation-
state
• Botnets as
DDoS
• Cloudbots
• IoTbots
ioT Vancouver [Autosaved]
ioT Vancouver [Autosaved]
ioT Vancouver [Autosaved]
ioT Vancouver [Autosaved]
ioT Vancouver [Autosaved]
ioT Vancouver [Autosaved]

More Related Content

Viewers also liked

VaibhavJain_ Testing (1)
VaibhavJain_ Testing (1)VaibhavJain_ Testing (1)
VaibhavJain_ Testing (1)
vaibhav jain
 

Viewers also liked (12)

VaibhavJain_ Testing (1)
VaibhavJain_ Testing (1)VaibhavJain_ Testing (1)
VaibhavJain_ Testing (1)
 
December - The Conference Call Awakens
December - The Conference Call AwakensDecember - The Conference Call Awakens
December - The Conference Call Awakens
 
Keychain gps tracker
Keychain gps trackerKeychain gps tracker
Keychain gps tracker
 
Nathaly guanuchee origen de la internet
Nathaly guanuchee origen de la internetNathaly guanuchee origen de la internet
Nathaly guanuchee origen de la internet
 
Teoria de ofimatica
Teoria de ofimaticaTeoria de ofimatica
Teoria de ofimatica
 
Participant observation
Participant observationParticipant observation
Participant observation
 
KingNeed GPS Logger plus Speedometer C61
KingNeed GPS Logger plus Speedometer C61KingNeed GPS Logger plus Speedometer C61
KingNeed GPS Logger plus Speedometer C61
 
Actividad de aprendizaje semana 2
Actividad de aprendizaje   semana 2Actividad de aprendizaje   semana 2
Actividad de aprendizaje semana 2
 
Relazione dello stage presso PAP srl
Relazione dello stage presso PAP srlRelazione dello stage presso PAP srl
Relazione dello stage presso PAP srl
 
Touring Malaysia
Touring MalaysiaTouring Malaysia
Touring Malaysia
 
Laporan Aminuddin Baki 1964
Laporan Aminuddin Baki 1964Laporan Aminuddin Baki 1964
Laporan Aminuddin Baki 1964
 
Spatial planning india
Spatial planning indiaSpatial planning india
Spatial planning india
 

ioT Vancouver [Autosaved]

Editor's Notes

  1. Good afternoon ladies and gentlemen. As our first order of business I’d like to dedicate today’s presentation to two men name Tomlinson. Fred, who wrote the song Spam, for Monty python many years ago, and to
  2. Ray, who made this all possible, the inventor of email, who also passed away this year.
  3. ‘it worked!’ 16 July 1945 Dr. Robert Oppenheimer
  4. This is also, for the keen observer, the first line of text on a computer keyboard.
  5. It is amazing to thing that my phone, or my watch probably have more computing power than these geriatric beasts. That said, the average hosting facility doesn’t look too much different these days …
  6. Would anyone care to guess when the first spam was sent?
  7. Spam has been around a long while
  8. Here’s why spam works from a cost model, and why spammers do it. If you think about how things normally work, if you wanted to put an ad in the New York Times Sunday Magazine, the ad would cost $100,000 US. Plus, of course, the models, writers, graphic artists, the limo for the models, the photographer and her limo, the catering … you get the point.
  9. Or you could send spam, hit millions of people, with almost no cost to yourself, because you steal the resources of others. Someone else’s graphics, another person’s server, and so on. In the end it is the recipient who pays, because the receiver system has to pay for staff, storage, and network protection, which is a cost passed on to the user, one way or another.
  10. Let’s take a very quick run through some notable points in email history
  11. The very first networked virus was in 1971
  12. This was at a time when everyone knew everyone on the network, so Gary’s boss was immediately contacted. He never spammed again.
  13. Email – note the spelling
  14. RFC 822 describes in technical detail, as a standard, how email works. I should note, that no thought was given to security when it was designed, because you could always call someone’s boss if abuse took place.
  15. Open relays and proxies were the first mechanism used to transmit spam illicitly. It took almost ten years to shut them all down. Of course, open relays were a part of being a good neighbour when the Internet first started.
  16. My organization has been doing this for 20 years.
  17. MAPs was the first commercial spam filtering service. Spam backwards, of course.
  18. Followed soon after by Spamhaus who are still around and arguably the biggest anti-spam service on the net.
  19. Botnets replaced open relays. Very effectively, of course, we are still battling them today.
  20. The first U.S. initiative
  21. I’d like to remind you that M3AAWG works with the I2C Internet Infrastructure Coalition on Hosting & Cloud service provider best practices, and you will find an invitation to the next two MAAWG meetings, in Paris in San Francisco in your delegate bag.
  22. CANSPAM, still a contentious law …
  23. How’d that work out for you Bill?
  24. SURBL was the first DOMAIN blocking list.
  25. Canada’s anti-spam law came into being in 2010. My organization, CAUCE had a direct hand in crafting the law. It has some of the highest penalties for spam (up to $10,000,000 per email) and next year, in 2017, individual citizens will have the right to sue spammers under the law.
  26. M3AAWG, Botfrei (Germany), Japan, and many other countries took a concerted effort against botnets in 2012. It had some very good effect in diminishing infected home computers.
  27. So … the criminals turned to hosting companies to support their activities.
  28. Where are we now?
  29. I’m happy to report that email spam took a great downturn last year, dropping by almost 50%
  30. But not so fast!
  31. This is caused in part by Necurs, a hosting service-based botnet, dealing in ransomeware such as Locky. Necurs evolved from Zeus, and Spyeye, then Gameover Zeus. “To help keep the botnet hidden, Necurs will only use a subset of infected nodes at one time. An infected host is used for two to three days, and then not again for two to three weeks. This complicates the job of personnel who respond to attacks, because they believe the offending host was found and cleaned up, and suddenly the spam starts again.” - Jaeson Schultz, CISCO
  32. In the top 20 infections country as seen by the CBL, we find India, Vietnam, China, Pakistan, Indonesia, Japan, Taiwan, Thailand. In total volume, Hong Kong and Singapore are also part of that list. For total % of networks infected, add Laos, Cambodia, Myanmar, Nepal. For per-capita infections, Maldives is one of the worst as are the Seychelles.
  33. Rather, it certainly isn’t the marketing golden goose of the 1990s, and it isn’t the primary communications channel between individuals, SMS, direct message and push notifications have surpassed email in popularity, and will continue to do so. 2-33 messages per day, per person totaling over 6 billion text messages in the U.S. each day; Push notifications are in the same volume range. 90% are responded to in under 3 minutes. You can see why criminals would want to leverage these technologies
  34. Where are we headed? A Bruce Schneier piece recently talked about a nationstate that is trying to figure out how to take down the internet. That is a reality that affects us all, they will be using consumer-facing infrastructure, such as hosting companies to do so. Imagine how little it takes to cause a top-level domain nameserver to cease functioning. We’ve seen DDoS traffic hit 1TB/s, virtually no NS is prepared to withstand such an onslaught Cloudbots – instead of using a single compromised host, what if I were to create hundreds of thousands of accounts on various distributed cloudservices, and use them to attack in a coordinated fashion? IoT – we have already seen where security is secondary, if even a consideration for much of the IoT. What if a Toasterbotnet or LightbulbBotnet were deployed to send spam, or …
  35. Security researcher Brian Krebs writes about the criminal areas of the Internet. The criminals reacted last week taking his site offline. BP38!
  36. Last week’s headline. They attribute this to an un-named state-sponsored actor.