SlideShare a Scribd company logo
1 of 38
Download to read offline
Information Systems Division and Technical Services Unit
                Digital Deadly Force
                Narrative of a Digital Life Destroyed




Matthew Jett Hall         Kevin Williams                         26 Oct 2012
Assistant Director, ISD   SAC, TSU
The Victim: Matt Honan

             “In the space of one
              hour, my entire
              digital life was
              destroyed.”
Who is Matt Honan

            Tech Journalist
            Highly cloud
             dependent
            Astute
            Tech Savvy
            Knows the rules of
             the road
The Harm
         Google account deleted.

         Twitter account
          compromised, and used to
          broadcast racist and
          homophobic messages.

         AppleID account was seized.
The Harm
         Wiped from existence

             iPhone
             MacBook Pro
             iPad
             Two years of baby pictures
Timeline: 3 Aug 12 @ 1633

          “… according to Apple’s
           tech support records,
           someone called
           AppleCare claiming to be
           me.”

          Apple issued the hacker a
           temporary password
Timeline: 3 Aug 12 @ 1650

          “password reset
           confirmation arrived in my
           inbox. … the hackers ….
           permanently reset my
           AppleID password.”
Timeline: 3 Aug 12 @ 1652

          “Gmail password …
           password had changed.
Timeline: 3 Aug 12 @ 1700

          “… they used iCloud’s
           “Find My” tool to remotely
           wipe my iPhone.”
Timeline: 3 Aug 12 @ 1700

          “my iPhone suddenly
           powered down.”

          “When I opened my
           laptop … my Gmail
           account information was
           wrong.”
Timeline: 3 Aug 12 @ 1702

          “they reset my Twitter
           password…”
Timeline: 3 Aug 12 @ 1705

          “they remotely wiped my
           MacBook.…”
Timeline: 3 Aug 12 @ 1705

          “they remotely wiped my
           MacBook.…”


          “… they deleted my
           Google account. “
Timeline: 3 Aug 12 @ 1710

          “I placed the call to
           AppleCare.”
Timeline: 3 Aug 12 @ 1712

          “attackers posted a
           message to my account
           on Twitter taking credit for
           the hack.”
Why Matt Honan

        "I asked him why. Was I targeted
        specifically? Was this just to get to
        Gizmodo's Twitter account [that had been
        linked to mine]?

        No, Phobia said, they hadn't even been
        aware that my account was linked to
        Gizmodo's, that the Gizmodo linkage was
        just gravy.

        He said the hack was simply a grab for
        my three-character Twitter handle.
        That's all they wanted.

        They just wanted to take it, and [mess it]
        up, and watch it burn. It wasn't personal.”
Social Engineering

              “the art of
               manipulating people
               into performing
               actions or divulging
               confidential
               information”
The Sequence of Social
       1.   Amazon
       2.   Apple
       3.   Google
       4.   Twitter
Sara Palin 2008

         •   September 16, 2008
         •   Yahoo! Mail account of
             Sarah Palin
         •   Cracked by “Rubico”
         •   Social Engineering
         •   From Date of Birth Info
             on Wikipedia
TBI’s CIA

   Confidentiality
   Integrity
   Availability
Identity

              Non-repudiation

              Access

              Factors of Identification
                 Something you know
                 Something you have
                 Something you are
Password and PIN

   “Something you know”

   “a secret word or string of characters that is
    used for authentication, to prove identity or
    gain access to a resource”
Password Fatigue

        •   Excessive amount of
            passwords

        •   Leads to careless
            password or pin
            construction
PIN Formulation
         PIN       Freq
#1    1234     10.713%    •   Usually 4 digits
#2    1111      6.016%    •   Don’t use common
#3    0000      1.881%
#4    1212      1.197%
                              PINs
#5    7777      0.745%    •   Don’t use personal
#6    1004      0.616%
#7    2000      0.613%
                              information
#8    4444      0.526%        • SSN
#9    2222      0.516%
                              • Birthdate
#10   6969      0.512%
                              • Birth year
Password Formulation
•   A`?KUJ'j
•   47k0O#qt
•   4'vn1iSA   •   Passwords must contain
•   nwDSB/OL       characters from three of the
•   5*vFXggx
•   tF0ylI59       these categories:
•   PvmYk^k
•   $;T+qha2
•
•
    UnJJ:8c8
    bU4DuwUM
               •   Password generator in KeePass
•   bU1H&@56   •   Upper Case Character
•
•
    BeU;i$X;
    4q+!kkgg
               •   Lower Case Character
•   $qDsrT35   •   Base 10 Digit (0 through 9)
•   %:WbFlzk
•   HRvqt9j9   •   Non-alphanumeric characters:
•   RcgR^cMt       • ~!@#$%^&*_-+=`|(){}[]:;"'<>,.?/
•   dM/`nxR
Password Formulation
•   A`?KUJ'j
•   47k0O#qt
•   4'vn1iSA   •   Since these are tough
•   nwDSB/OL
•   5*vFXggx
•   tF0ylI59   •   Try a PassPhrase:
•   PvmYk^k
•   $;T+qha2
•
•
    UnJJ:8c8
    bU4DuwUM
               •   SteveFound4ApplesAndAFlute@hischair
•   bU1H&@56   •   6TacosAreDelicious@YourLocalTacoMart
•   BeU;i$X;
•   4q+!kkgg
•   $qDsrT35
•   %:WbFlzk
•   HRvqt9j9
•   RcgR^cMt
•   dM/`nxR
Where to Store Passwords

                 •   Password
                     Vault

                 •   In your
                     mind!
Password Commandments

Thou shalt …
1. construct a complex
   password
2. Use a password vault
3. Use dual factor
   authentication
4. Protect thy mobile
   devices
Password Commandments

       Thou Shalt Not ….
       1. Share thy Password
       2. Use thy dog’s name
       3. Write passwords on
          sticky notes
       4. Use common words
       5. Keep passwords in
          word documents
Before you lose a device ….

        Learn if the device has “find
         me” features
        Encrypt critical data at rest
        Think carefully about what
         goes on the device
        Don’t let unauthorized
         personnel utilize your device
        Lock your device whenever
         you step away
If you lose a device ….

   Report it immediately

   BAD NEWS DOES NOT AGE WELL!
   FASTER RESPONSE THE BETTER

   Consumer in Control
      Apple: iCloud.com
      Microsoft Exchange
      Blackberry: No self service
Example: iCloud
If you lose a device ….

   Locate it
If you lose a device ….

   If you can’t retrieve it, wipe it!
Data Classification Concept

   Impact to the TBI Mission
      High
      Medium
      Low


   High
      Reputation and Credibility
      Exposing Personal Information
      Exposing Sensitive Operations Information
On cloud computing

           It’s here
           It’s not going away

               Windows 8
               SkyDrive
               DropBox
               Google Drive
               Google Applications
               iCloud
On cloud computing

         Guidance

             No PII
             Nothing Mission Sensitive
             Experiment and learn
             Preserve CIA
             REALLY read terms of
              service
References

   “How Apple and Amazon Security Flaws Led to My Epic Hacking” Wired Magazine August 6, 2012
    http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/
   Flickr Baby Photo: http://goo.gl/q2hSO
   Datagenetics.com PIN Anlaysis: http://goo.gl/bCGGW
   Security Now Episode 364: Twit.tv
   Security Now Episode 364: Transcript from grc.com
   Apple iCloud How to: http://www.apple.com/icloud/setup/ios.html
   Apple iCloud: icloud.com
   Sara Palin Email Hack: http://en.wikipedia.org/wiki/Sarah_Palin_email_hack
   Clipart: openclipart.org
   Social Engineering: http://en.wikipedia.org/wiki/Social_engineering_(security)
   Password: http://en.wikipedia.org/wiki/Password

More Related Content

What's hot

Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conferenceMolly Immendorf
 
Internet use issues
Internet use issues Internet use issues
Internet use issues computers 11
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy onlineMolly Immendorf
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conferencecetechservices
 
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee_UK
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: UpdatedAmanda L. Goodman
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe onlineScott Schober
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Pii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkPii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkpii2011
 
Using Social networks for Recruiting
Using Social networks for RecruitingUsing Social networks for Recruiting
Using Social networks for RecruitingJason Frostholm
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
WCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security studentsWCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security studentsJoel Cardella
 

What's hot (17)

Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy online
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
Molly protecting your privacy online county leadership conference
Molly protecting your privacy online  county leadership conferenceMolly protecting your privacy online  county leadership conference
Molly protecting your privacy online county leadership conference
 
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: Updated
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Pii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkPii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalk
 
Using Social networks for Recruiting
Using Social networks for RecruitingUsing Social networks for Recruiting
Using Social networks for Recruiting
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
WCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security studentsWCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security students
 

Similar to Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker

Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Luis Grangeia
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital Worldalxdvs
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015 Andrew Schwabe
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebJamie Reffell
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentationdelmount
 
(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of Identity(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of IdentityBayCHI
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?Garland Technology
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?Mark Fisher
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keysdimitrist
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVAdam Compton
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Andrew Schwabe
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 

Similar to Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker (20)

Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
IT Security Awareness Posters
IT Security Awareness PostersIT Security Awareness Posters
IT Security Awareness Posters
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentation
 
(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of Identity(Ab)using Identifiers: Indiscernibility of Identity
(Ab)using Identifiers: Indiscernibility of Identity
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keys
 
Social Engineering : To Err is Human...
Social Engineering : To Err is Human...Social Engineering : To Err is Human...
Social Engineering : To Err is Human...
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

More from Tennessee Bureau of Investigation

More from Tennessee Bureau of Investigation (20)

Darius Dwayne Hyde
Darius Dwayne HydeDarius Dwayne Hyde
Darius Dwayne Hyde
 
Rodney Jennings Jr.
Rodney Jennings Jr.Rodney Jennings Jr.
Rodney Jennings Jr.
 
Keith Jamar Thomas
Keith Jamar ThomasKeith Jamar Thomas
Keith Jamar Thomas
 
Rico Derell Sterling
Rico Derell SterlingRico Derell Sterling
Rico Derell Sterling
 
Stephen Daryl Melton
Stephen Daryl MeltonStephen Daryl Melton
Stephen Daryl Melton
 
Albert Jones Smith Jr.
Albert Jones Smith Jr.Albert Jones Smith Jr.
Albert Jones Smith Jr.
 
Deterines Cortae Cathey aka "Weeda"
Deterines Cortae Cathey aka "Weeda"Deterines Cortae Cathey aka "Weeda"
Deterines Cortae Cathey aka "Weeda"
 
Tiffany Lynne Jordan-Johnson
Tiffany Lynne Jordan-JohnsonTiffany Lynne Jordan-Johnson
Tiffany Lynne Jordan-Johnson
 
Dequan Bertrand
Dequan BertrandDequan Bertrand
Dequan Bertrand
 
Kevin Cooper Jr.
Kevin Cooper Jr.Kevin Cooper Jr.
Kevin Cooper Jr.
 
Tevin Mantez Harris aka Tevin "
Tevin Mantez Harris aka Tevin "Tevin Mantez Harris aka Tevin "
Tevin Mantez Harris aka Tevin "
 
Cedric Dion Laster Jr.
Cedric Dion Laster Jr.Cedric Dion Laster Jr.
Cedric Dion Laster Jr.
 
Top Ten Most Wanted Fugitive Alonso Howard
Top Ten Most Wanted Fugitive Alonso HowardTop Ten Most Wanted Fugitive Alonso Howard
Top Ten Most Wanted Fugitive Alonso Howard
 
Derrick Carr and Shawn Betty
Derrick Carr and Shawn BettyDerrick Carr and Shawn Betty
Derrick Carr and Shawn Betty
 
Jeffrey Lynn Carter Jr.
Jeffrey Lynn Carter Jr.Jeffrey Lynn Carter Jr.
Jeffrey Lynn Carter Jr.
 
Bounthavy Mickey Mouthouta
Bounthavy Mickey MouthoutaBounthavy Mickey Mouthouta
Bounthavy Mickey Mouthouta
 
Anthony Dean Blackwell
Anthony Dean BlackwellAnthony Dean Blackwell
Anthony Dean Blackwell
 
Tyler Raybon-Tate
Tyler Raybon-TateTyler Raybon-Tate
Tyler Raybon-Tate
 
Terrace Dewayne Shaw
Terrace Dewayne ShawTerrace Dewayne Shaw
Terrace Dewayne Shaw
 
David gordon jenkins
David gordon jenkinsDavid gordon jenkins
David gordon jenkins
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Digital Deadly Force: How A Tech Expert Lost his Digital Life to a Hacker

  • 1. Information Systems Division and Technical Services Unit Digital Deadly Force Narrative of a Digital Life Destroyed Matthew Jett Hall Kevin Williams 26 Oct 2012 Assistant Director, ISD SAC, TSU
  • 2. The Victim: Matt Honan  “In the space of one hour, my entire digital life was destroyed.”
  • 3. Who is Matt Honan  Tech Journalist  Highly cloud dependent  Astute  Tech Savvy  Knows the rules of the road
  • 4. The Harm  Google account deleted.  Twitter account compromised, and used to broadcast racist and homophobic messages.  AppleID account was seized.
  • 5. The Harm  Wiped from existence  iPhone  MacBook Pro  iPad  Two years of baby pictures
  • 6. Timeline: 3 Aug 12 @ 1633  “… according to Apple’s tech support records, someone called AppleCare claiming to be me.”  Apple issued the hacker a temporary password
  • 7. Timeline: 3 Aug 12 @ 1650  “password reset confirmation arrived in my inbox. … the hackers …. permanently reset my AppleID password.”
  • 8. Timeline: 3 Aug 12 @ 1652  “Gmail password … password had changed.
  • 9. Timeline: 3 Aug 12 @ 1700  “… they used iCloud’s “Find My” tool to remotely wipe my iPhone.”
  • 10. Timeline: 3 Aug 12 @ 1700  “my iPhone suddenly powered down.”  “When I opened my laptop … my Gmail account information was wrong.”
  • 11. Timeline: 3 Aug 12 @ 1702  “they reset my Twitter password…”
  • 12. Timeline: 3 Aug 12 @ 1705  “they remotely wiped my MacBook.…”
  • 13. Timeline: 3 Aug 12 @ 1705  “they remotely wiped my MacBook.…”  “… they deleted my Google account. “
  • 14. Timeline: 3 Aug 12 @ 1710  “I placed the call to AppleCare.”
  • 15. Timeline: 3 Aug 12 @ 1712  “attackers posted a message to my account on Twitter taking credit for the hack.”
  • 16. Why Matt Honan "I asked him why. Was I targeted specifically? Was this just to get to Gizmodo's Twitter account [that had been linked to mine]? No, Phobia said, they hadn't even been aware that my account was linked to Gizmodo's, that the Gizmodo linkage was just gravy. He said the hack was simply a grab for my three-character Twitter handle. That's all they wanted. They just wanted to take it, and [mess it] up, and watch it burn. It wasn't personal.”
  • 17. Social Engineering  “the art of manipulating people into performing actions or divulging confidential information”
  • 18. The Sequence of Social 1. Amazon 2. Apple 3. Google 4. Twitter
  • 19. Sara Palin 2008 • September 16, 2008 • Yahoo! Mail account of Sarah Palin • Cracked by “Rubico” • Social Engineering • From Date of Birth Info on Wikipedia
  • 20. TBI’s CIA  Confidentiality  Integrity  Availability
  • 21. Identity  Non-repudiation  Access  Factors of Identification  Something you know  Something you have  Something you are
  • 22. Password and PIN  “Something you know”  “a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource”
  • 23. Password Fatigue • Excessive amount of passwords • Leads to careless password or pin construction
  • 24. PIN Formulation PIN Freq #1 1234 10.713% • Usually 4 digits #2 1111 6.016% • Don’t use common #3 0000 1.881% #4 1212 1.197% PINs #5 7777 0.745% • Don’t use personal #6 1004 0.616% #7 2000 0.613% information #8 4444 0.526% • SSN #9 2222 0.516% • Birthdate #10 6969 0.512% • Birth year
  • 25. Password Formulation • A`?KUJ'j • 47k0O#qt • 4'vn1iSA • Passwords must contain • nwDSB/OL characters from three of the • 5*vFXggx • tF0ylI59 these categories: • PvmYk^k • $;T+qha2 • • UnJJ:8c8 bU4DuwUM • Password generator in KeePass • bU1H&@56 • Upper Case Character • • BeU;i$X; 4q+!kkgg • Lower Case Character • $qDsrT35 • Base 10 Digit (0 through 9) • %:WbFlzk • HRvqt9j9 • Non-alphanumeric characters: • RcgR^cMt • ~!@#$%^&*_-+=`|(){}[]:;"'<>,.?/ • dM/`nxR
  • 26. Password Formulation • A`?KUJ'j • 47k0O#qt • 4'vn1iSA • Since these are tough • nwDSB/OL • 5*vFXggx • tF0ylI59 • Try a PassPhrase: • PvmYk^k • $;T+qha2 • • UnJJ:8c8 bU4DuwUM • SteveFound4ApplesAndAFlute@hischair • bU1H&@56 • 6TacosAreDelicious@YourLocalTacoMart • BeU;i$X; • 4q+!kkgg • $qDsrT35 • %:WbFlzk • HRvqt9j9 • RcgR^cMt • dM/`nxR
  • 27. Where to Store Passwords • Password Vault • In your mind!
  • 28. Password Commandments Thou shalt … 1. construct a complex password 2. Use a password vault 3. Use dual factor authentication 4. Protect thy mobile devices
  • 29. Password Commandments Thou Shalt Not …. 1. Share thy Password 2. Use thy dog’s name 3. Write passwords on sticky notes 4. Use common words 5. Keep passwords in word documents
  • 30. Before you lose a device ….  Learn if the device has “find me” features  Encrypt critical data at rest  Think carefully about what goes on the device  Don’t let unauthorized personnel utilize your device  Lock your device whenever you step away
  • 31. If you lose a device ….  Report it immediately  BAD NEWS DOES NOT AGE WELL!  FASTER RESPONSE THE BETTER  Consumer in Control  Apple: iCloud.com  Microsoft Exchange  Blackberry: No self service
  • 33. If you lose a device ….  Locate it
  • 34. If you lose a device ….  If you can’t retrieve it, wipe it!
  • 35. Data Classification Concept  Impact to the TBI Mission  High  Medium  Low  High  Reputation and Credibility  Exposing Personal Information  Exposing Sensitive Operations Information
  • 36. On cloud computing  It’s here  It’s not going away  Windows 8  SkyDrive  DropBox  Google Drive  Google Applications  iCloud
  • 37. On cloud computing  Guidance  No PII  Nothing Mission Sensitive  Experiment and learn  Preserve CIA  REALLY read terms of service
  • 38. References  “How Apple and Amazon Security Flaws Led to My Epic Hacking” Wired Magazine August 6, 2012 http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/  Flickr Baby Photo: http://goo.gl/q2hSO  Datagenetics.com PIN Anlaysis: http://goo.gl/bCGGW  Security Now Episode 364: Twit.tv  Security Now Episode 364: Transcript from grc.com  Apple iCloud How to: http://www.apple.com/icloud/setup/ios.html  Apple iCloud: icloud.com  Sara Palin Email Hack: http://en.wikipedia.org/wiki/Sarah_Palin_email_hack  Clipart: openclipart.org  Social Engineering: http://en.wikipedia.org/wiki/Social_engineering_(security)  Password: http://en.wikipedia.org/wiki/Password

Editor's Notes

  1. amazon: Call the customer service to add a credit card to his file.Amazon: hang up and call back. My account is locked out. Here is my credit card last four digits and billing address. Please add a new email address. Send account recovery to new email address.Amazon: log in with recovery info and reset password. Can see all the Credit Card numbers on file last 4 digits.Apple: Use original credit card last 4 digits and billing address after claiming amnesia on the security questions.Apple: He gets the mobile me accountGoogle: He goes to google. He resets the google mhonan@gmail.com and the reset is sent to the comprosomised apple mobile me EMAIL account.Twitter: Password reset to the compromised google account.