SlideShare a Scribd company logo
1 of 10
Download to read offline
U.S.Department Justice
               of
Federal
      Bureauof Investi




Psychological
            Profiles
of
AnonymousLeadership




                  Law Enforcement Sensitive
                           (LES)



                                 August 2011


  BSU Quantico           LES (Law EnforcementSensitive)   USDOJ
I. OVERWEWFOR THE FEDERAL BAREAA OF INWSTIGATION              ..............
                                                                          /
  A. Introduction
il. PSYCHOLOGICALPROFILING APPROACH.                          ..............
                                                                           1
III. ANONYMOUSCOLLECTIW BACKGROUND......                             ......2
IV PROFTLE^S............                                            .......3

    3               (Status
         UNSUBTopiary     captured)......                     ...................5




ANNEX: A TwitterLogs.........



REDACTED SeeEnclosureB,




   BSU Quantico             LES (Law Enforcement Sensitive)       USDOJ
I. OVERVIEW FOR THE FEDERAL BUREAU OF INVESTIGATION

A. Introduction

The Anonymous 'collective'has risen from an amorphousgroup of individuals on the intemet to
the current stateof a potential threat to national security. Due to the nature of anonymous,they
believe that they are a leaderless collective. However, it has beenshown that there is a defined
leadershipgroup. The goal of this report is to better understand   that leadershipsstructureand its
memberspsychological statesin order to better assess     who they really may be as well as define
meansto effectively track them down for arrest.

By using the techniquesand resources the BSU at Quantico,we hope to enlightenthe
                                       of
investigatorsto cuesthat could help in manipulating and apprehending leadershipof
                                                                       the
Anonymous. This will have a profound effect on the collective itself as the arrestof the core
would demoralizethe whole.

II. PSYCHOLOGICAL PROFILING APPROACH

Due to the nature of Anonymous and the intemet, the leadersof the collective have attemptedto
cloak their identities within screennamesand technological obfuscationmethods. Since the
intemet has many ways to hide a person'strue identity, the Behavioral SciencesUnit was
contacted assess individual's online personae
          to         the                          throughonline dialogs.

Working this casewas approached the samemanner as any other UNSUB (Unknown Subject)
                                    in
that the BSU handles,however, the context from this particular casehas been augmentedby
technical servicesbranch members.The upshot of this is that the network technical and forensics
teamsprovided not only the content from which we at the BSU would audit, but also context as
to how the LINSUB's attemptedto hide their identities. The marrying of all of the technical as
well as the contextual data has resultedin this report.

A thorough assessment eachUNSUB's online activities, speechpatterns,and generalwritings
                        of
was collectedby the FBI. EachUNSUB was individually assessed membersof the SBU and a
                                                                  by
psychologicalprofile createdfrom thesedatasets.  Someof this datawas also collectedfrom
sourcessuch as CI's in the field. One such CI (Marotte) has been quite effective in engagingthe
Anonymous leadershipand thus gatheringintelligence that was helpful to the SBU in gauging
their psychological makeup under differing circumstances.

The following report is to be used as a guide not only to perhapslocate the individuals by region,
sex and age,but also to give insight to the agentsin the field canying out operationsto capture
theseactors.By knowing the traits of theseleaders,one can extrapolatethe larger motivations
and perhapseven anticipateactions on the part of Anonymous and its splinter cells.




   BSU Quantico                 LES Oaw EnforcementSensitive)                               USDOJ
III. ANONYMOUS COLLECTIVE BACKGROUND

From Wikipedia:

Anonymous (used as a massnoun) is a group initiating active civil disobedience     and spread
through the Internet while staying hidden, originating in 2003 on the imageboard4chan,
representingthe concept of many online community userssimultaneouslyexisting as an
anarchic,digitized global brain.[2] It is also generally consideredto be a blanket term for
membersof certain Internet subcultures,away to refer to the actionsof people in an
environment where their actual identities are not known.[3]

In its early form, the concepthas beenadoptedby a decentralizedonline community acting
anonymously in a coordinatedmanner,usually toward a loosely self-agreedgoal, and primarily
focused on entertainment.Beginning with 2008, the Anonymous collective has become
increasingly associated  with collaborative,internationalhacktivism, undertakingprotestsand
other actions, often with the goal of promoting internet freedom and freedom of speech.Actions
credited to "Anonymous" are undertakenby unidentified individuals who apply the Anonymous
label to themselvesas attribution.[4]

Although not necessarilytied to a single online entity, many websitesare strongly associated
with Anonymous. This includes notable imageboardssuch as 4chan,Futaba,their associated
wikis, EncycloprediaDramatica, and a number of forums.[5] After a seriesof controversial,
widely-publicized protestsand distributed denial of service(DDoS) attacksby Anonymous in
2008, incidentslinked to its cadremembershave increased.[6] consideration its
                                                              In               of
capabilities, Anonymous has beenpositedby CNN to be one of the three major successors    to
Wikileaks.[7]




   BSU Quantico                LES (Law EnforcementSensitive)                             USDOJ
IV. PROFILES

        UNSUB Sabu
        Approximate age: 29-35
        Sex: Male
        Location: USA
        Probable Nationality: American
        Language Indicators: Slangand diction (American)

        Profile: Sabuis the overall leaderof the LulzSec group and since the arrestof
        Topiary, has taken over the spokesperson  role for Anonymous. Sabu's character
        strongestof the namedgroup and is definitely in charge.Sabuis technically
        competentwithin the realm of computertechnologiesand is the elder of the group of
        AnonymousIINSUB's

        Sabuhas charactertraits of a professionaladult individual who puts on the guise of a
        "script kiddie"
                          in language(netspeak)but functions within his normal day to day life
        within the businesscommunity without casting any clues to his other online activities.
        It is likely that Sabuworks in the information security sectorand has been doing so
        since the early days of the internet and hacking activities. His use of net speakis
        interspersed   with proper American English diction and grammar that implies he is an
        American citizen and has beeneducated.

        Varying logs from online IRC (Internet Relay Chat) sessions   have borne out the
        possibility however,that the userID "Sabu" is sometimes    alsousedby othersto
        confuse authorities and others as to who the real personis behind the keyboard.
        However, through an amalgamof transcriptsthe tell tale signs of a consistent
        individual can be clearly seenand assessed.

       overall, a picture emerges  from thesesessions can lend to a psychological
                                                    that
       assessment the individual who calls himself "Sabu" The followins bulletized
                    of
       points are the key findings.

       PsychologicalMakeup and Personal Details:

           o   Likely married and employed in the technology sector
           o   Has amoraltendencies    and see'sthe world from a nihilistic perspective
           .   Spellingcorrectionon chat logs showscompulsivebehaviors
           o   Showsnarcissistic   tendencies
           o   Likely to be living in North America (EastCoast)Perhaps    NYC
           o   Prideful and likely easily prone to reaction through manipulation
           .   Ver) conformist in everydaylife
           o   Lives out rich fantasylife online (feeling important and empowered)
           o   Perceiveshimself as a martyr for the cause(his own cause)




  BSU Quantico              LES (Law EnforcementSensitive)                           USDOJ
4


      Assessment: Sabuis skilled and capableaccordingto the technical group, however,
      the tendencies toward attention seekingpathologiesand his ego driven desireswill be
      the most likely way to attemptto apprehend him. It is recommended  that the
      investigationuse CI's and operativesonline to continueto engagehim online in chats.
      Manipulation of languageand emotionsthrough thesechatswill indeed lead to
      further information to be disclosedby him or others.

      It is recommended  that the BSU insert a team member into the LulzSec/Anonymous
      investigationto interfaceonline with the subject(s)and further the social and
      psychological investigationof the group and its leadershipin an attemptto flesh out
      further information.


      UNSUB Kayla
      Approximate age22-27
      Sex:Male
      Probable Location: USA (Middle America)
      Probable Nationality: American
      Profile: Kayla is the online personafor this individual who ran the botnet's
      (compromisedzombie computers)to run attacksagainstsites and userswith DDOS
      (DistributedDenial of Service)attacks.  Kayla claimsto be a girl but the intelligence
      gatheredplacesthe sex of the UNSUB as male.


     PsychologicalMakeup and Personal Details:
     Kayla is one of the more introverted membersof the group and is a close lieutenantto
     Sabu.Kayla is submissiveand has a tendencyto be aggressive   toward anyone who he
     feels has slighted him in any way. Chat logs show a penchantfor entendreand use of
     netspeakthat denotesa younger person as well as perhapsa stuntedemotional age
     that doesnot connectwith his real ase.

         o   Possiblybisexual
         o   Likely abused a child
                            as
         .   Likely inferiority complex due to childhood trauma
         o   Potentially violent behavior possible offline in real world activities
         o   Amoral personality traits
         o   Attention seekingpersonality seekingfather figure approval
         o   Possiblepersistent  drug use
         .   Likely from a broken home

     AssessmentzKayla aka Lolspoon (twitter) is a likely target for an attempt to correlate
     his online personawith othersin the alternativelifestyle intemet underground.SA's
     attempting to interfacewith Kayla should keep in mind that he is easily pushedto
     anger and this can be used.It is recommended  that the investigatorspush this
     individual as frequently as possibleto make him react and thus potentially slip up in
     anger.




BSU Quantico              LES (Law EnforcementSensitive)                              USDOJ
UNSUB Topiary (Status captured)
      Age: 18
      Sex: Male
      Location: Shetland  IslandsUK, Scotland
      Profile: Topiary aka JakeDavis has been apprehended as suchthis profile is only
                                                          and
      for backstoppingpurposes.An ongoing evaluationof his personality and his life is
      being carried out by the Met and ScotlandYard presently.Topiary was the de facto
      spokesman Anonymous and LulzSec and is very outspoken.
                  for

      Toipiary/Davis, is a young individual with a defined ethosof counter culture
      behaviors.At the time of his arraignmentDavis carried a book on revolutionary
      scientistsand made surethat the presscould seethis as a meansto show his point of
      view and defianceof the common laws.

      PsychologicalMakeup and Personal Details:
      Out of the group Topiary is the altruist who believesin what he is doing on the
      outside of it. Internally, his senseif right and wrong are skewedtoward self fulfilling
      outcomes.Davis it is believedhas beenused and co opted by the others within the
      anonymousleadershipas cannonfodder.

         o   A true believer in his world view that society has failed
         o   Youthfully idealistic
         o   Ego driven in his convictions
         o   Obsessivepersonalitytraits including possibleAspergerssyndrome
         o   Socially inept and withdrawn


     UNSUB JoePie9l
     Approximate age2l-26
     Sex: Male
     Location: EU
     Profile: JoePieis a technical individual who is third in command.His skill are in the
     coding areaand also has partakenin the actual hacking carried out by LulzSec and
     Anonymous. Joepie'spolitical views on performing hacking againsttargets only
     extendsto the point of actually breaking the law. JoePiehas allegedthat his is a
     support role only, and as such,not breaking the law.

     PsychologicalMakeup and PersonalDetails:
     JoePieis intelligent and well spoken.He tendsto not use as much netspeakas the
     others and makesrelevant argumentsin correct grammatical syntax. There are times
     when the syntax and grammar infer that JoePieis not an American and may in fact be
     in the EU.

     It is recommendedthat the approachto be taken with JoePieis to align the agent's
     commentaryto JoePie's.Use common ideals stemmingfrom commentary in the HB
     Gary and other IRC chatscapturedto gaugethe approach.



BSU Quantico              LES (Law EnforcementSensitive)                              USDOJ
o   Likely a college studentbut may be just out of college
               o   Technically capableand versed(mention of coding and technical measures)
               a   More autonomous    member of the group
               o   Amoral charactertraits and personalbeliefs




           UNSUB Tflow
           Approximate age 22-26
           Sex: Male
           Location: USA
           Profile: Tflow shows a more mercenaryapproachto the LulzSec and Anonymous
           campaigns.His motivations seemto be monetarily basedand may in fact be a paid
           assetfor the group as a freelancehacker. Tflow is a key player in the command and
           control of their domain registration and management. essence,
                                                                 In          Tflow is a key
           target for taking down the infrastructural underpinningsof the group.

              a    Pseudo-intellectualthat lacks true educationalbacksround
              a    Monetarily driven
              o    Likely has a criminal history
              o    Has cosnitive dissonance  over hacktivism and activism

          PsychologicalMakeup and PersonalDetails:
          The psychological makeup as glimpsed from the IRC chatsleadsthe investigatorsto
          believe that Tflow may be the linchpin to affack as he runs the technology side of
          their internet space.As suchhe is intimately familiar with all of the players and may
          in fact know personaldetails that would be helpful in prosecutionof the other key
          members.

          It is also recommended    that Tflow may be easily turned againstthe group due to his
          cognitive dissonance   over hacktivism as well as he desiresfor monetary gain. This
          also flows into his likely attitudesthat he is not willing to go down for the group
          should his identity be compromised.BSU recommends          that Tflow be a key target for
          agentsin the field to approach.

V. CONCLUSION
In conclusion, the BSU recommendsmore investigation be carried out online to investigatethese
usersby inserting agentsinto their chat rooms as well as gathermore CI's who can do the same.
Becauseof the nature of Anonymous and the internet, it is harderto get areal idea of where
usersare if they know how to hide their tracks online. The use of the social aspects(what
hackers  would call 'social engineering')will be key to gainingaccess datathat will eventually
                                                                       to
lead to capture.

Theseprofiles are solely basedon intemet chatsand as such,may also be somewhatincorrect as
the usersknow that they are being monitored in certain areasof the internet. However, as an
aggregate, data presentedand assessed
             the                           gives the BSU someconfidencein the data presented
here. It is the recommendationof the BSU that this report be re-assessed more data comes
                                                                         as
from assetsin the field and through interviews carried out with Topiary (Davis) by the Met and

   BSU Quantico                LES (Law EnforcementSensitive)                              USDOJ
7


the FBI field agentstaskedto the UK for interviews. Overall, the assessment here is that we have
a group of younger individuals being lead by an older, more experienced  one in an effort that
seemsto have conflicted ideals.Additionally, because   there are many personalitiesinvolved and
Anonymousclaimsto be a larger'collective' group without leaders, is easierto assume
                                                                    it                     that
there are other cells and other leaders.Theseleadersand groupsmay not be chatting in the open
areasof the IRC, but in fact have learnedfrom the experiences this group to be more discreet
                                                               of
about their activities and planning.

The overall assessment the movement however is the following:
                     for

   1.   The movement is out of control and there seemsto be no real coherentmotivation
   2.   The leadershave begun to hide themselvesa bit more due to arreststhat have beenmade
   3.   Their reliance on technologywill eventually be their downfall
   4.   Their interpersonalrelationshipsare weak points, as suchthey should be leveraged
   5.   Their increasingattackson infrastructurewill eventually lead to seriousresults that could
        in fact lead to deaths

It is after the first real attributabledeathsthat there may be a tapering off of their ranks as the
membersrealize that by outing individuals, actualphysical actionscan occur that causegreat
damage.Until such time though, the movementwill continue with the massesused as fodder and
the command structureurging them on to carry out their commands.




   BSU Quantico                LES Gaw EnforcementSensitive)                              USDOJ
AIINEX: A Twitter Logs
REDACTED SeeEnclosureA


AIINEX: B Chat Logs
REDACTED SeeEnclosureB




 BSU Quantico        LES (Law Enforcement Sensitive)

More Related Content

Similar to Fbi anonymous

Human Intelligence Source Analysis
Human Intelligence Source AnalysisHuman Intelligence Source Analysis
Human Intelligence Source AnalysisLaura Torres
 
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docx
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docxEmma Perez, Queering the Borderlandsfrom her novel, Forg.docx
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docxgidmanmary
 
Essay About Obama.pdf
Essay About Obama.pdfEssay About Obama.pdf
Essay About Obama.pdfDawn Romero
 
Teaching Essay Writing High School. Online assignment writing service.
Teaching Essay Writing High School. Online assignment writing service.Teaching Essay Writing High School. Online assignment writing service.
Teaching Essay Writing High School. Online assignment writing service.Jasmine Culbreth
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspaceFabrice Epelboin
 
Classification And Division Essay Sample.pdf
Classification And Division Essay Sample.pdfClassification And Division Essay Sample.pdf
Classification And Division Essay Sample.pdfTina Hudson
 
George Washington Page BorderWriting Frame (Narr
George Washington Page BorderWriting Frame (NarrGeorge Washington Page BorderWriting Frame (Narr
George Washington Page BorderWriting Frame (NarrWendy Belieu
 
Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationBruce Forrester
 
How To Write An Abstract Abstract For Research Paper Conference
How To Write An Abstract Abstract For Research Paper ConferenceHow To Write An Abstract Abstract For Research Paper Conference
How To Write An Abstract Abstract For Research Paper ConferenceJessica Huston
 

Similar to Fbi anonymous (9)

Human Intelligence Source Analysis
Human Intelligence Source AnalysisHuman Intelligence Source Analysis
Human Intelligence Source Analysis
 
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docx
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docxEmma Perez, Queering the Borderlandsfrom her novel, Forg.docx
Emma Perez, Queering the Borderlandsfrom her novel, Forg.docx
 
Essay About Obama.pdf
Essay About Obama.pdfEssay About Obama.pdf
Essay About Obama.pdf
 
Teaching Essay Writing High School. Online assignment writing service.
Teaching Essay Writing High School. Online assignment writing service.Teaching Essay Writing High School. Online assignment writing service.
Teaching Essay Writing High School. Online assignment writing service.
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
 
Classification And Division Essay Sample.pdf
Classification And Division Essay Sample.pdfClassification And Division Essay Sample.pdf
Classification And Division Essay Sample.pdf
 
George Washington Page BorderWriting Frame (Narr
George Washington Page BorderWriting Frame (NarrGeorge Washington Page BorderWriting Frame (Narr
George Washington Page BorderWriting Frame (Narr
 
Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 Presentation
 
How To Write An Abstract Abstract For Research Paper Conference
How To Write An Abstract Abstract For Research Paper ConferenceHow To Write An Abstract Abstract For Research Paper Conference
How To Write An Abstract Abstract For Research Paper Conference
 

Recently uploaded

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Fbi anonymous

  • 1. U.S.Department Justice of Federal Bureauof Investi Psychological Profiles of AnonymousLeadership Law Enforcement Sensitive (LES) August 2011 BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 2. I. OVERWEWFOR THE FEDERAL BAREAA OF INWSTIGATION .............. / A. Introduction il. PSYCHOLOGICALPROFILING APPROACH. .............. 1 III. ANONYMOUSCOLLECTIW BACKGROUND...... ......2 IV PROFTLE^S............ .......3 3 (Status UNSUBTopiary captured)...... ...................5 ANNEX: A TwitterLogs......... REDACTED SeeEnclosureB, BSU Quantico LES (Law Enforcement Sensitive) USDOJ
  • 3. I. OVERVIEW FOR THE FEDERAL BUREAU OF INVESTIGATION A. Introduction The Anonymous 'collective'has risen from an amorphousgroup of individuals on the intemet to the current stateof a potential threat to national security. Due to the nature of anonymous,they believe that they are a leaderless collective. However, it has beenshown that there is a defined leadershipgroup. The goal of this report is to better understand that leadershipsstructureand its memberspsychological statesin order to better assess who they really may be as well as define meansto effectively track them down for arrest. By using the techniquesand resources the BSU at Quantico,we hope to enlightenthe of investigatorsto cuesthat could help in manipulating and apprehending leadershipof the Anonymous. This will have a profound effect on the collective itself as the arrestof the core would demoralizethe whole. II. PSYCHOLOGICAL PROFILING APPROACH Due to the nature of Anonymous and the intemet, the leadersof the collective have attemptedto cloak their identities within screennamesand technological obfuscationmethods. Since the intemet has many ways to hide a person'strue identity, the Behavioral SciencesUnit was contacted assess individual's online personae to the throughonline dialogs. Working this casewas approached the samemanner as any other UNSUB (Unknown Subject) in that the BSU handles,however, the context from this particular casehas been augmentedby technical servicesbranch members.The upshot of this is that the network technical and forensics teamsprovided not only the content from which we at the BSU would audit, but also context as to how the LINSUB's attemptedto hide their identities. The marrying of all of the technical as well as the contextual data has resultedin this report. A thorough assessment eachUNSUB's online activities, speechpatterns,and generalwritings of was collectedby the FBI. EachUNSUB was individually assessed membersof the SBU and a by psychologicalprofile createdfrom thesedatasets. Someof this datawas also collectedfrom sourcessuch as CI's in the field. One such CI (Marotte) has been quite effective in engagingthe Anonymous leadershipand thus gatheringintelligence that was helpful to the SBU in gauging their psychological makeup under differing circumstances. The following report is to be used as a guide not only to perhapslocate the individuals by region, sex and age,but also to give insight to the agentsin the field canying out operationsto capture theseactors.By knowing the traits of theseleaders,one can extrapolatethe larger motivations and perhapseven anticipateactions on the part of Anonymous and its splinter cells. BSU Quantico LES Oaw EnforcementSensitive) USDOJ
  • 4. III. ANONYMOUS COLLECTIVE BACKGROUND From Wikipedia: Anonymous (used as a massnoun) is a group initiating active civil disobedience and spread through the Internet while staying hidden, originating in 2003 on the imageboard4chan, representingthe concept of many online community userssimultaneouslyexisting as an anarchic,digitized global brain.[2] It is also generally consideredto be a blanket term for membersof certain Internet subcultures,away to refer to the actionsof people in an environment where their actual identities are not known.[3] In its early form, the concepthas beenadoptedby a decentralizedonline community acting anonymously in a coordinatedmanner,usually toward a loosely self-agreedgoal, and primarily focused on entertainment.Beginning with 2008, the Anonymous collective has become increasingly associated with collaborative,internationalhacktivism, undertakingprotestsand other actions, often with the goal of promoting internet freedom and freedom of speech.Actions credited to "Anonymous" are undertakenby unidentified individuals who apply the Anonymous label to themselvesas attribution.[4] Although not necessarilytied to a single online entity, many websitesare strongly associated with Anonymous. This includes notable imageboardssuch as 4chan,Futaba,their associated wikis, EncycloprediaDramatica, and a number of forums.[5] After a seriesof controversial, widely-publicized protestsand distributed denial of service(DDoS) attacksby Anonymous in 2008, incidentslinked to its cadremembershave increased.[6] consideration its In of capabilities, Anonymous has beenpositedby CNN to be one of the three major successors to Wikileaks.[7] BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 5. IV. PROFILES UNSUB Sabu Approximate age: 29-35 Sex: Male Location: USA Probable Nationality: American Language Indicators: Slangand diction (American) Profile: Sabuis the overall leaderof the LulzSec group and since the arrestof Topiary, has taken over the spokesperson role for Anonymous. Sabu's character strongestof the namedgroup and is definitely in charge.Sabuis technically competentwithin the realm of computertechnologiesand is the elder of the group of AnonymousIINSUB's Sabuhas charactertraits of a professionaladult individual who puts on the guise of a "script kiddie" in language(netspeak)but functions within his normal day to day life within the businesscommunity without casting any clues to his other online activities. It is likely that Sabuworks in the information security sectorand has been doing so since the early days of the internet and hacking activities. His use of net speakis interspersed with proper American English diction and grammar that implies he is an American citizen and has beeneducated. Varying logs from online IRC (Internet Relay Chat) sessions have borne out the possibility however,that the userID "Sabu" is sometimes alsousedby othersto confuse authorities and others as to who the real personis behind the keyboard. However, through an amalgamof transcriptsthe tell tale signs of a consistent individual can be clearly seenand assessed. overall, a picture emerges from thesesessions can lend to a psychological that assessment the individual who calls himself "Sabu" The followins bulletized of points are the key findings. PsychologicalMakeup and Personal Details: o Likely married and employed in the technology sector o Has amoraltendencies and see'sthe world from a nihilistic perspective . Spellingcorrectionon chat logs showscompulsivebehaviors o Showsnarcissistic tendencies o Likely to be living in North America (EastCoast)Perhaps NYC o Prideful and likely easily prone to reaction through manipulation . Ver) conformist in everydaylife o Lives out rich fantasylife online (feeling important and empowered) o Perceiveshimself as a martyr for the cause(his own cause) BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 6. 4 Assessment: Sabuis skilled and capableaccordingto the technical group, however, the tendencies toward attention seekingpathologiesand his ego driven desireswill be the most likely way to attemptto apprehend him. It is recommended that the investigationuse CI's and operativesonline to continueto engagehim online in chats. Manipulation of languageand emotionsthrough thesechatswill indeed lead to further information to be disclosedby him or others. It is recommended that the BSU insert a team member into the LulzSec/Anonymous investigationto interfaceonline with the subject(s)and further the social and psychological investigationof the group and its leadershipin an attemptto flesh out further information. UNSUB Kayla Approximate age22-27 Sex:Male Probable Location: USA (Middle America) Probable Nationality: American Profile: Kayla is the online personafor this individual who ran the botnet's (compromisedzombie computers)to run attacksagainstsites and userswith DDOS (DistributedDenial of Service)attacks. Kayla claimsto be a girl but the intelligence gatheredplacesthe sex of the UNSUB as male. PsychologicalMakeup and Personal Details: Kayla is one of the more introverted membersof the group and is a close lieutenantto Sabu.Kayla is submissiveand has a tendencyto be aggressive toward anyone who he feels has slighted him in any way. Chat logs show a penchantfor entendreand use of netspeakthat denotesa younger person as well as perhapsa stuntedemotional age that doesnot connectwith his real ase. o Possiblybisexual o Likely abused a child as . Likely inferiority complex due to childhood trauma o Potentially violent behavior possible offline in real world activities o Amoral personality traits o Attention seekingpersonality seekingfather figure approval o Possiblepersistent drug use . Likely from a broken home AssessmentzKayla aka Lolspoon (twitter) is a likely target for an attempt to correlate his online personawith othersin the alternativelifestyle intemet underground.SA's attempting to interfacewith Kayla should keep in mind that he is easily pushedto anger and this can be used.It is recommended that the investigatorspush this individual as frequently as possibleto make him react and thus potentially slip up in anger. BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 7. UNSUB Topiary (Status captured) Age: 18 Sex: Male Location: Shetland IslandsUK, Scotland Profile: Topiary aka JakeDavis has been apprehended as suchthis profile is only and for backstoppingpurposes.An ongoing evaluationof his personality and his life is being carried out by the Met and ScotlandYard presently.Topiary was the de facto spokesman Anonymous and LulzSec and is very outspoken. for Toipiary/Davis, is a young individual with a defined ethosof counter culture behaviors.At the time of his arraignmentDavis carried a book on revolutionary scientistsand made surethat the presscould seethis as a meansto show his point of view and defianceof the common laws. PsychologicalMakeup and Personal Details: Out of the group Topiary is the altruist who believesin what he is doing on the outside of it. Internally, his senseif right and wrong are skewedtoward self fulfilling outcomes.Davis it is believedhas beenused and co opted by the others within the anonymousleadershipas cannonfodder. o A true believer in his world view that society has failed o Youthfully idealistic o Ego driven in his convictions o Obsessivepersonalitytraits including possibleAspergerssyndrome o Socially inept and withdrawn UNSUB JoePie9l Approximate age2l-26 Sex: Male Location: EU Profile: JoePieis a technical individual who is third in command.His skill are in the coding areaand also has partakenin the actual hacking carried out by LulzSec and Anonymous. Joepie'spolitical views on performing hacking againsttargets only extendsto the point of actually breaking the law. JoePiehas allegedthat his is a support role only, and as such,not breaking the law. PsychologicalMakeup and PersonalDetails: JoePieis intelligent and well spoken.He tendsto not use as much netspeakas the others and makesrelevant argumentsin correct grammatical syntax. There are times when the syntax and grammar infer that JoePieis not an American and may in fact be in the EU. It is recommendedthat the approachto be taken with JoePieis to align the agent's commentaryto JoePie's.Use common ideals stemmingfrom commentary in the HB Gary and other IRC chatscapturedto gaugethe approach. BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 8. o Likely a college studentbut may be just out of college o Technically capableand versed(mention of coding and technical measures) a More autonomous member of the group o Amoral charactertraits and personalbeliefs UNSUB Tflow Approximate age 22-26 Sex: Male Location: USA Profile: Tflow shows a more mercenaryapproachto the LulzSec and Anonymous campaigns.His motivations seemto be monetarily basedand may in fact be a paid assetfor the group as a freelancehacker. Tflow is a key player in the command and control of their domain registration and management. essence, In Tflow is a key target for taking down the infrastructural underpinningsof the group. a Pseudo-intellectualthat lacks true educationalbacksround a Monetarily driven o Likely has a criminal history o Has cosnitive dissonance over hacktivism and activism PsychologicalMakeup and PersonalDetails: The psychological makeup as glimpsed from the IRC chatsleadsthe investigatorsto believe that Tflow may be the linchpin to affack as he runs the technology side of their internet space.As suchhe is intimately familiar with all of the players and may in fact know personaldetails that would be helpful in prosecutionof the other key members. It is also recommended that Tflow may be easily turned againstthe group due to his cognitive dissonance over hacktivism as well as he desiresfor monetary gain. This also flows into his likely attitudesthat he is not willing to go down for the group should his identity be compromised.BSU recommends that Tflow be a key target for agentsin the field to approach. V. CONCLUSION In conclusion, the BSU recommendsmore investigation be carried out online to investigatethese usersby inserting agentsinto their chat rooms as well as gathermore CI's who can do the same. Becauseof the nature of Anonymous and the internet, it is harderto get areal idea of where usersare if they know how to hide their tracks online. The use of the social aspects(what hackers would call 'social engineering')will be key to gainingaccess datathat will eventually to lead to capture. Theseprofiles are solely basedon intemet chatsand as such,may also be somewhatincorrect as the usersknow that they are being monitored in certain areasof the internet. However, as an aggregate, data presentedand assessed the gives the BSU someconfidencein the data presented here. It is the recommendationof the BSU that this report be re-assessed more data comes as from assetsin the field and through interviews carried out with Topiary (Davis) by the Met and BSU Quantico LES (Law EnforcementSensitive) USDOJ
  • 9. 7 the FBI field agentstaskedto the UK for interviews. Overall, the assessment here is that we have a group of younger individuals being lead by an older, more experienced one in an effort that seemsto have conflicted ideals.Additionally, because there are many personalitiesinvolved and Anonymousclaimsto be a larger'collective' group without leaders, is easierto assume it that there are other cells and other leaders.Theseleadersand groupsmay not be chatting in the open areasof the IRC, but in fact have learnedfrom the experiences this group to be more discreet of about their activities and planning. The overall assessment the movement however is the following: for 1. The movement is out of control and there seemsto be no real coherentmotivation 2. The leadershave begun to hide themselvesa bit more due to arreststhat have beenmade 3. Their reliance on technologywill eventually be their downfall 4. Their interpersonalrelationshipsare weak points, as suchthey should be leveraged 5. Their increasingattackson infrastructurewill eventually lead to seriousresults that could in fact lead to deaths It is after the first real attributabledeathsthat there may be a tapering off of their ranks as the membersrealize that by outing individuals, actualphysical actionscan occur that causegreat damage.Until such time though, the movementwill continue with the massesused as fodder and the command structureurging them on to carry out their commands. BSU Quantico LES Gaw EnforcementSensitive) USDOJ
  • 10. AIINEX: A Twitter Logs REDACTED SeeEnclosureA AIINEX: B Chat Logs REDACTED SeeEnclosureB BSU Quantico LES (Law Enforcement Sensitive)