SlideShare a Scribd company logo
Gohsuke Takama /          , Meta Associates, 2011   11



                                       http://www.slideshare.net/gohsuket
Friday, November 4, 2011
about…

                 ✴ Gohsuke Takama
                       ✴ Meta Associates (http://www.meta-associates.com/)
                           ✴founder & president, connector, analyst, planner
                           ✴ local organizer of security conferences: BlackHat Japan, PacSec
                           ✴ liaison of security businesses: Patch Advisor, SecWest
                           ✴ security news: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/
                           ✴ organizer of tech entrepreneur / startup support events
                           ✴ independent tech journalist for over 10 years
                       ✴ Privacy International (London, UK http://www.privacyinternational.org/)
                           ✴advisory board member
                       ✴ Computer Professionals for Social Responsibility (http://cpsr.org/)
                           ✴Japan chapter founding supporter




Friday, November 4, 2011
A
                           Attacks




Friday, November 4, 2011
"what happened in the last 2 years"

                    •      OperationAurora, ShadyRAT,     ,      ...

                    •      Stuxnet, Duqu

                    •      Sony PSN

                    •      Wikileaks *new

                    •      Anonymous *new

                    •                       (MENA) *new

                    •      Indira Gandhi

Friday, November 4, 2011
"what happened in the last 2 years"

                    •      OperationAurora, ShadyRAT,             ,            ...
                           =                    = APT (Advanced Persistent Threat)

                    •      Stuxnet = SCADA

                    •      Sony PSN:        3       , DDoS,           ,

                    •      Wikileaks *new =                   :

                    •      Anonymous *new =                       +

                    •                           *new=

                    •      Indira Gandhi        =
Friday, November 4, 2011
"whom targeted, why"




                      http://paulsparrows.wordpress.com/category/security/cyber-attacks-timeline/
Friday, November 4, 2011
"whom targeted, why"

                    •                   ,

                    •      Sony PSN, Sony

                    •              ,

                    •
                    •              :




Friday, November 4, 2011
"Stuxnet"




Friday, November 4, 2011
"Anonymous"




                            http://www.youtube.com/watch?v=2Tm7UKo4IBc
                           http://www.youtube.com/watch?v=kZNDV4hGUGw
Friday, November 4, 2011
"know your enemy: techniques"

                    •      phishing            •   website spoofing
                    •      targeted phishing   •   content altering
                    •      trojan              •   XSRF
                    •      spyware             •   XSS
                    •      keylogger           •   code injection
                    •      rootkit             •   IP hijacking
                    •      botnet DDoS         •   rogue WiFi AP
                                               •   sniffer



Friday, November 4, 2011
"emerging attack techniques"

                    •      malware:                                 ,


                    •      VM                       , bios
                    •                         : VNC, Spycam,

                    •                     : keylogger, GPS logger
                    •                         : Stuxnet

                    •       DDoS:
                           JavaScript    (LOIC)
                                                                    ($8/h~),



Friday, November 4, 2011
"know your enemy: techniques"




                              http://www.ipa.go.jp/security/vuln/newattack.html
Friday, November 4, 2011
"layer approach"




                                •examle: OSI model




Friday, November 4, 2011
"a security layer model "

                                 7 Psychological       ,
                                 6 Custom (Habit)      ,
                                 5 Operation
                                 4 Content
                                 3 OS/Application
                                 2 Hardware
                                 1 Physical
Friday, November 4, 2011
"a security layer model "

                                 7 Psychological       ,
       Human Factor              6 Custom (Habit)      ,
                                 5 Operation
                                 4 Content
            Intangibles
                                 3 OS/Application
                                 2 Hardware
               Tangibles
                                 1 Physical
Friday, November 4, 2011
"attacks vs. counter measures "

                             APT, espionage, phishing,
   Psychological
                                social engineering                   ?
                                spoofing, pharming,    accustomed best practice,
            Custom           phishing spam, XSS, XSRF,   awareness, CIRT, PKI,
                              spyware, ID spoof/theft digital ID, SSL certificate
                             DoS, spam, ransom-ware,     routing, filtering, policy,
        Operation
                                  sabotage-ware                  audit, CIRT

                             sniffing, spyware, spam,      encryption, filtering,
           Content
                                    alteration             content-scan, host IDS

          OS/                DoS, vuln exploit, 0day,    Firewall, network IDS, IPS,
      Application                 rootkit, botnet         anti-virus, OS/app patch

                             direct access, tampering,     perimeter guard, anti-
         Hardware
                                    alteration              tampering, hard seal

                               lock pick, break in,       surveillance, perimeter
         Physical
                                     vandalism               alarm, armed guard
Friday, November 4, 2011
"spoofing, phishing & targeted attack"
                            /                   1




Friday, November 4, 2011
"cybercrime, cyber espionage & identity "

                    ✴ APT,
                     •                   =

                     •
                     •               :           ,   ,

                     •       →   →           →
                    ✴            (                       )
                     •                   =

                     •
                     •
Friday, November 4, 2011
                                     →
"cybercrime, cyber espionage,
                           primary target = individual identity"




Friday, November 4, 2011
B
                           Behavior




Friday, November 4, 2011
"social change on Internet"
                               2000
                    •
                    •
                           •
                           •
                           •
                           •




Friday, November 4, 2011
"social change on Internet"
                               2001
                    •                            •
                    •                            •
                    •                            •
                    •                            •
                           •                     •
                           •                     •
                           •                     •             (Wiki   )

                           •        /            •
                           •                     •   3D

                                                 •
Friday, November 4, 2011
Friday, November 4, 2011
"real world vs. social data world"




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




              $Money



                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money



                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money



                                                   -
                                                   -
                                                   -
                                                   -


                                       Control
Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money                                         Ideology



                                                   -
                                                   -
                                                   -
                                                   -


                                       Control
Friday, November 4, 2011
"disseminate motives"
                           Autocracy, Crime, Extremism, Hacker
                                                 Power

                                                 Autocratic
                                                Government

                                                          Infra
                                              APT      Disruption

                                 Organized                        Extremist
              $Money              Crime                           Hacktivist   Ideology
                                             Theft      Hacktivism
                                             Fraud
                                                      Lulz
                                                                       :
                                                              -
                                                 Hacker       -
                                                 Cracker      -
                                                              -


                                               Control
Friday, November 4, 2011
I
                           Identity




Friday, November 4, 2011
"Identity"


                           entity, identity, relationship

                                   me = entity

                                 me{Attributes}

Friday, November 4, 2011
Identification & Authentication

          Identity             Identification          Authentication   Authorization
                              Credential{Identifier}




                                                                           Validation




     me{Attributes}
       me = entity




Friday, November 4, 2011
Identification & Authentication

          Identity             Identification                     Authentication   Authorization
                              Credential{Identifier}




                                                                                      Validation




     me{Attributes}
       me = entity




                                                      Identity


                                             Identification


Friday, November 4, 2011
"Identity"

                            Erik H. Erikson
                                 1967




                                              Sydney Shoemaker
                                                    1963




Friday, November 4, 2011
"Identity"


                           me{Attributes} * t→




Friday, November 4, 2011
"Identity"


                           me{Attributes} * t→




Friday, November 4, 2011
AxBxI
                            = WTF?




Friday, November 4, 2011
"state of security methodology"

                    ✴                                   (F/W)
                     •(                                 +                    )
                    ✴
                     •=                  (                               )
                    ✴                :       100%
                     • (                                        ?)
                    ✴ PKI                    = DigiNotar
                    ✴                               =

                     •(
Friday, November 4, 2011
                                                                     )
"perspective for counter strategy"
                              set basic security measures:

                    ✴                           ,
                                                    =                    ,


                    ✴                           (APT                )
                           ✴   PET (        )

                    ✴                  prevention, detection, response

                     •
                     •
                     •
Friday, November 4, 2011
"perspective for counter strategy"
                                      be creative:

                    ✴ counter social engineering
                     •
                     •
                    ✴ social intelligence
                    ✴ soft power
                     •
                     •                       PR    deflective PR


Friday, November 4, 2011
"perspective for counter strategy"
                     be creative: Counter Social Engineering

                    •
                    •
                    •
                           •
                           •
                    •
                    •
                           •   (
                                   )
Friday, November 4, 2011
"perspective for counter strategy"
                                be creative: Soft Power

                    •         Soft Power = 1990        Joseph Nye


                    •                Hard Power
                    •
                    •      http://en.wikipedia.org/wiki/Soft_power
                    •                                     /

                    •
Friday, November 4, 2011
Friday, November 4, 2011
references

                    •      CEOs - the new corporate fraudstersds http://www.iol.co.za/
                           sundayindependent/ceos-the-new-corporate-fraudstersds-1.1144649

                    •      PwC Survey Says: Telecoms Are Overconfident About Security http://
                           www.readwriteweb.com/cloud/2011/09/pwc-survey-says-telecoms-are-o.php

                    •      Cyber attack led to IGI shutdown http://www.indianexpress.com/news/
                           cyber-attack-led-to-igi-shutdown/851365/

                    •      Anonymous announces global plans http://www.digitaltrends.com/
                           computing/video-anonymous-announces-global-plans/

                    •      ANONYMOUS - OPERATION PAYBACK - Sony Press Release http://
                           www.youtube.com/watch?v=2Tm7UKo4IBc

                    •      Operation Payback - Anonymous Message About ACTA Laws, Internet
                           Censorship and Copyright http://www.youtube.com/watch?
                           v=kZNDV4hGUGw

                    •      Anonymous: Message to Scientology http://www.youtube.com/watch?
                           v=JCbKv9yiLiQ

                    •                        Anonymous                 http://www.atmarkit.co.jp/
                           fsecurity/special/161dknight/dknight01.html
Friday, November 4, 2011
references

                    •      28 Nation States With Cyber Warfare Capabilities http://
                           jeffreycarr.blogspot.com/2011/09/27-nation-states-with-cyber-warfare.html

                    •                                                                         Far East
                           Research    http://scan.netsecurity.ne.jp/archives/52017036.html

                    •      CVE-2011-0611 : Adobe Flash Player SWF Memory Corruption Vulnerability
                           http://www.youtube.com/watch?v=DP_rRf468_Y

                    •      MYBIOS. Is BIOS infection a reality? http://www.securelist.com/en/analysis/
                           204792193/MYBIOS_Is_BIOS_infection_a_reality

                    •      McAfee Virtual Criminology Report 2007 http://us.mcafee.com/en-us/local/
                           html/identity_theft/NAVirtualCriminologyReport07.pdf

                    •                  Google Zeitgeist                          http://blog.f-secure.jp/
                           archives/50630539.html

                    •       "The Tragedies in Oslo and on Utøya island" Speech held by King Harald V
                           http://www.kongehuset.no/c27262/nyhet/vis.html?tid=92959



Friday, November 4, 2011
references

                    •                                                             -- DEFCON CTF
                                   http://scan.netsecurity.ne.jp/archives/52002536.html

                    •      PET
                                                  http://www.soumu.go.jp/denshijiti/pdf/
                           jyumin_p_s3.pdf

                    •      PIA
                           http://www.soumu.go.jp/denshijiti/pdf/jyumin_p_s2.pdf

                    •                                                                      http://
                           jp.reuters.com/article/topNews/idJPJAPAN-21406320110527

                    •                                         GIE
                           http://d.hatena.ne.jp/ukky3/20110829/1314685819

                    •         Diginotar      Black.Spook
                           http://blog.f-secure.jp/archives/50626009.html


Friday, November 4, 2011
references

                    •       Computer virus hits US Predator and Reaper drone fleet http://
                           arstechnica.com/business/news/2011/10/exclusive-computer-virus-hits-
                           drone-fleet.ars

                    •      F-Secure: Possible Governmental Backdoor found, MD5 hashes ("case
                           R2D2") http://www.f-secure.com/weblog/archives/00002249.html

                    •       State-sponsored spies collaborate with crimeware gang | The Unholy APT-
                           botnet union http://www.theregister.co.uk/2011/09/13/
                           apt_botnet_symbiosis/

                    •       NISC                              10 7     http://www.nisc.go.jp/
                           conference/seisaku/index.html#seisaku27

                    •
                                                 http://news.livedoor.com/article/detail/5685674/




Friday, November 4, 2011
references

                    •                                                       http://
                           www.sakimura.org/2011/06/1124/

                    •                  http://ja.wikipedia.org/wiki/

                    •                       http://ja.wikipedia.org/wiki/




Friday, November 4, 2011

More Related Content

Viewers also liked

Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
Gohsuke Takama
 
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナーGohsuke Takama
 
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...Gohsuke Takama
 
A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageA perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageGohsuke Takama
 
データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本Gohsuke Takama
 
Privacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーPrivacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシー
Gohsuke Takama
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Gohsuke Takama
 
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本Gohsuke Takama
 
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Gohsuke Takama
 
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Gohsuke Takama
 
TGC Planning Sheet 1.30
TGC  Planning Sheet 1.30TGC  Planning Sheet 1.30
TGC Planning Sheet 1.30
Gohsuke Takama
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-Identification
Mike Nowakowski
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?
Winston & Strawn LLP
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
arx-deidentifier
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymization
arx-deidentifier
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
 

Viewers also liked (16)

Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
 
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
 
A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageA perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionage
 
データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本
 
Privacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーPrivacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシー
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
 
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
 
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
 
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
 
TGC Planning Sheet 1.30
TGC  Planning Sheet 1.30TGC  Planning Sheet 1.30
TGC Planning Sheet 1.30
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-Identification
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymization
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 

Similar to サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011

Censorship Detection Techniques
Censorship Detection TechniquesCensorship Detection Techniques
Censorship Detection Techniques
Arturo Filastò
 
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith Jones, PhD
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
Gianluca Varisco
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdf
netisBin
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
Touhami Kasbaoui
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
Charles Lim
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
Splunk
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
Bruce Abernethy
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
DetSersi
 
Guy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeGuy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node Code
DevSecCon
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
refaeli
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques
begmohsin
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
inf8nity
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
Intel IT Center
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Osint
OsintOsint
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
Bhaskarasai Chitturi
 

Similar to サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011 (20)

Censorship Detection Techniques
Censorship Detection TechniquesCensorship Detection Techniques
Censorship Detection Techniques
 
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysis
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdf
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Guy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeGuy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node Code
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Osint
OsintOsint
Osint
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011

  • 1. Gohsuke Takama / , Meta Associates, 2011 11 http://www.slideshare.net/gohsuket Friday, November 4, 2011
  • 2. about… ✴ Gohsuke Takama ✴ Meta Associates (http://www.meta-associates.com/) ✴founder & president, connector, analyst, planner ✴ local organizer of security conferences: BlackHat Japan, PacSec ✴ liaison of security businesses: Patch Advisor, SecWest ✴ security news: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/ ✴ organizer of tech entrepreneur / startup support events ✴ independent tech journalist for over 10 years ✴ Privacy International (London, UK http://www.privacyinternational.org/) ✴advisory board member ✴ Computer Professionals for Social Responsibility (http://cpsr.org/) ✴Japan chapter founding supporter Friday, November 4, 2011
  • 3. A Attacks Friday, November 4, 2011
  • 4. "what happened in the last 2 years" • OperationAurora, ShadyRAT, , ... • Stuxnet, Duqu • Sony PSN • Wikileaks *new • Anonymous *new • (MENA) *new • Indira Gandhi Friday, November 4, 2011
  • 5. "what happened in the last 2 years" • OperationAurora, ShadyRAT, , ... = = APT (Advanced Persistent Threat) • Stuxnet = SCADA • Sony PSN: 3 , DDoS, , • Wikileaks *new = : • Anonymous *new = + • *new= • Indira Gandhi = Friday, November 4, 2011
  • 6. "whom targeted, why" http://paulsparrows.wordpress.com/category/security/cyber-attacks-timeline/ Friday, November 4, 2011
  • 7. "whom targeted, why" • , • Sony PSN, Sony • , • • : Friday, November 4, 2011
  • 9. "Anonymous" http://www.youtube.com/watch?v=2Tm7UKo4IBc http://www.youtube.com/watch?v=kZNDV4hGUGw Friday, November 4, 2011
  • 10. "know your enemy: techniques" • phishing • website spoofing • targeted phishing • content altering • trojan • XSRF • spyware • XSS • keylogger • code injection • rootkit • IP hijacking • botnet DDoS • rogue WiFi AP • sniffer Friday, November 4, 2011
  • 11. "emerging attack techniques" • malware: , • VM , bios • : VNC, Spycam, • : keylogger, GPS logger • : Stuxnet • DDoS: JavaScript (LOIC) ($8/h~), Friday, November 4, 2011
  • 12. "know your enemy: techniques" http://www.ipa.go.jp/security/vuln/newattack.html Friday, November 4, 2011
  • 13. "layer approach" •examle: OSI model Friday, November 4, 2011
  • 14. "a security layer model " 7 Psychological , 6 Custom (Habit) , 5 Operation 4 Content 3 OS/Application 2 Hardware 1 Physical Friday, November 4, 2011
  • 15. "a security layer model " 7 Psychological , Human Factor 6 Custom (Habit) , 5 Operation 4 Content Intangibles 3 OS/Application 2 Hardware Tangibles 1 Physical Friday, November 4, 2011
  • 16. "attacks vs. counter measures " APT, espionage, phishing, Psychological social engineering ? spoofing, pharming, accustomed best practice, Custom phishing spam, XSS, XSRF, awareness, CIRT, PKI, spyware, ID spoof/theft digital ID, SSL certificate DoS, spam, ransom-ware, routing, filtering, policy, Operation sabotage-ware audit, CIRT sniffing, spyware, spam, encryption, filtering, Content alteration content-scan, host IDS OS/ DoS, vuln exploit, 0day, Firewall, network IDS, IPS, Application rootkit, botnet anti-virus, OS/app patch direct access, tampering, perimeter guard, anti- Hardware alteration tampering, hard seal lock pick, break in, surveillance, perimeter Physical vandalism alarm, armed guard Friday, November 4, 2011
  • 17. "spoofing, phishing & targeted attack" / 1 Friday, November 4, 2011
  • 18. "cybercrime, cyber espionage & identity " ✴ APT, • = • • : , , • → → → ✴ ( ) • = • • Friday, November 4, 2011 →
  • 19. "cybercrime, cyber espionage, primary target = individual identity" Friday, November 4, 2011
  • 20. B Behavior Friday, November 4, 2011
  • 21. "social change on Internet" 2000 • • • • • • Friday, November 4, 2011
  • 22. "social change on Internet" 2001 • • • • • • • • • • • • • • (Wiki ) • / • • • 3D • Friday, November 4, 2011
  • 24. "real world vs. social data world" Friday, November 4, 2011
  • 25. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 26. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 27. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 28. "disseminate motives" Law, Market, Norm, Architecture - - - - Friday, November 4, 2011
  • 29. "disseminate motives" Law, Market, Norm, Architecture $Money - - - - Friday, November 4, 2011
  • 30. "disseminate motives" Law, Market, Norm, Architecture Power $Money - - - - Friday, November 4, 2011
  • 31. "disseminate motives" Law, Market, Norm, Architecture Power $Money - - - - Control Friday, November 4, 2011
  • 32. "disseminate motives" Law, Market, Norm, Architecture Power $Money Ideology - - - - Control Friday, November 4, 2011
  • 33. "disseminate motives" Autocracy, Crime, Extremism, Hacker Power Autocratic Government Infra APT Disruption Organized Extremist $Money Crime Hacktivist Ideology Theft Hacktivism Fraud Lulz : - Hacker - Cracker - - Control Friday, November 4, 2011
  • 34. I Identity Friday, November 4, 2011
  • 35. "Identity" entity, identity, relationship me = entity me{Attributes} Friday, November 4, 2011
  • 36. Identification & Authentication Identity Identification Authentication Authorization Credential{Identifier} Validation me{Attributes} me = entity Friday, November 4, 2011
  • 37. Identification & Authentication Identity Identification Authentication Authorization Credential{Identifier} Validation me{Attributes} me = entity Identity Identification Friday, November 4, 2011
  • 38. "Identity" Erik H. Erikson 1967 Sydney Shoemaker 1963 Friday, November 4, 2011
  • 39. "Identity" me{Attributes} * t→ Friday, November 4, 2011
  • 40. "Identity" me{Attributes} * t→ Friday, November 4, 2011
  • 41. AxBxI = WTF? Friday, November 4, 2011
  • 42. "state of security methodology" ✴ (F/W) •( + ) ✴ •= ( ) ✴ : 100% • ( ?) ✴ PKI = DigiNotar ✴ = •( Friday, November 4, 2011 )
  • 43. "perspective for counter strategy" set basic security measures: ✴ , = , ✴ (APT ) ✴ PET ( ) ✴ prevention, detection, response • • • Friday, November 4, 2011
  • 44. "perspective for counter strategy" be creative: ✴ counter social engineering • • ✴ social intelligence ✴ soft power • • PR deflective PR Friday, November 4, 2011
  • 45. "perspective for counter strategy" be creative: Counter Social Engineering • • • • • • • • ( ) Friday, November 4, 2011
  • 46. "perspective for counter strategy" be creative: Soft Power • Soft Power = 1990 Joseph Nye • Hard Power • • http://en.wikipedia.org/wiki/Soft_power • / • Friday, November 4, 2011
  • 48. references • CEOs - the new corporate fraudstersds http://www.iol.co.za/ sundayindependent/ceos-the-new-corporate-fraudstersds-1.1144649 • PwC Survey Says: Telecoms Are Overconfident About Security http:// www.readwriteweb.com/cloud/2011/09/pwc-survey-says-telecoms-are-o.php • Cyber attack led to IGI shutdown http://www.indianexpress.com/news/ cyber-attack-led-to-igi-shutdown/851365/ • Anonymous announces global plans http://www.digitaltrends.com/ computing/video-anonymous-announces-global-plans/ • ANONYMOUS - OPERATION PAYBACK - Sony Press Release http:// www.youtube.com/watch?v=2Tm7UKo4IBc • Operation Payback - Anonymous Message About ACTA Laws, Internet Censorship and Copyright http://www.youtube.com/watch? v=kZNDV4hGUGw • Anonymous: Message to Scientology http://www.youtube.com/watch? v=JCbKv9yiLiQ • Anonymous http://www.atmarkit.co.jp/ fsecurity/special/161dknight/dknight01.html Friday, November 4, 2011
  • 49. references • 28 Nation States With Cyber Warfare Capabilities http:// jeffreycarr.blogspot.com/2011/09/27-nation-states-with-cyber-warfare.html • Far East Research http://scan.netsecurity.ne.jp/archives/52017036.html • CVE-2011-0611 : Adobe Flash Player SWF Memory Corruption Vulnerability http://www.youtube.com/watch?v=DP_rRf468_Y • MYBIOS. Is BIOS infection a reality? http://www.securelist.com/en/analysis/ 204792193/MYBIOS_Is_BIOS_infection_a_reality • McAfee Virtual Criminology Report 2007 http://us.mcafee.com/en-us/local/ html/identity_theft/NAVirtualCriminologyReport07.pdf • Google Zeitgeist http://blog.f-secure.jp/ archives/50630539.html • "The Tragedies in Oslo and on Utøya island" Speech held by King Harald V http://www.kongehuset.no/c27262/nyhet/vis.html?tid=92959 Friday, November 4, 2011
  • 50. references • -- DEFCON CTF http://scan.netsecurity.ne.jp/archives/52002536.html • PET http://www.soumu.go.jp/denshijiti/pdf/ jyumin_p_s3.pdf • PIA http://www.soumu.go.jp/denshijiti/pdf/jyumin_p_s2.pdf • http:// jp.reuters.com/article/topNews/idJPJAPAN-21406320110527 • GIE http://d.hatena.ne.jp/ukky3/20110829/1314685819 • Diginotar Black.Spook http://blog.f-secure.jp/archives/50626009.html Friday, November 4, 2011
  • 51. references • Computer virus hits US Predator and Reaper drone fleet http:// arstechnica.com/business/news/2011/10/exclusive-computer-virus-hits- drone-fleet.ars • F-Secure: Possible Governmental Backdoor found, MD5 hashes ("case R2D2") http://www.f-secure.com/weblog/archives/00002249.html • State-sponsored spies collaborate with crimeware gang | The Unholy APT- botnet union http://www.theregister.co.uk/2011/09/13/ apt_botnet_symbiosis/ • NISC 10 7 http://www.nisc.go.jp/ conference/seisaku/index.html#seisaku27 • http://news.livedoor.com/article/detail/5685674/ Friday, November 4, 2011
  • 52. references • http:// www.sakimura.org/2011/06/1124/ • http://ja.wikipedia.org/wiki/ • http://ja.wikipedia.org/wiki/ Friday, November 4, 2011