Global Anti-Abuse Working Groups
Severin Walker
Apricot 2019
Severin Walker
• M3AAWG
– Board Chairman
– Technical Committee Co-Chair
• Comcast
– Director, Service Policy Assurance
– 15 Years in Anti-Abuse, Compliance, and Law
Enforcement Collaboration
“The Messaging, Malware and Mobile
Anti-Abuse Working Group
(M3AAWG) is where the industry
comes together to work against
botnets, malware, spam, viruses,
DoS attacks and other online
exploitation”
➔200 member orgs
worldwide
➔300-600 conference
participants
Who is M3AAWG?
“The Messaging, Malware and Mobile
Anti-Abuse Working Group
(M3AAWG) is where the industry
comes together to work against
botnets, malware, spam, viruses,
DoS attacks and other online
exploitation”
➔200 member orgs
worldwide
➔300-500 conference
participants
Too many US voices
Who is M3AAWG?
“The Messaging, Malware and Mobile
Anti-Abuse Working Group
(M3AAWG) is where the industry
comes together to work against
botnets, malware, spam, viruses,
DoS attacks and other online
exploitation”
➔200 member orgs
worldwide
➔300-500 conference
participants
Not enough global voices,
not enough AP voices!
Who is M3AAWG?
The “M” cubed:
➔ Messaging: abuse on any messaging
platform, from email to SMS texting
➔ Malware: abuse is often just a symptom
and vector for viruses and malicious code
➔ Mobile: addressing messaging and
malware issues emerging on mobile as
an increasingly ubiquitous platform
Develop and Publish:
➔ Best practice papers
➔ Position statements
➔ Training and educational
What does M3AAWG Do?
Types of Documents Produced by M3AAWG
BCPs Best Common Practices codify industry
knowledge, hallway conversations and
experience, into guidelines and
authoritative statements on the state of
industry practices and dynamics
Technical
Whitepapers
Provide state-of-the-industry reports on
technologies at play in the messaging
industry, how they are being used, and
how they contribute to anti-abuse
efforts
Public Policy Actively seeks to provide the necessary
technical and strategic guidance to
protect end-users’ online experience as
government, Internet and public policy
agencies worldwide develop new
Internet policies and legislation*
*https://www.m3aawg.org/for-the-industry/published-comments
Types of Output
Individual industry actors can’t …
➔ effectively or efficiently fight online abuse alone
➔ protect end-users and customers in a vacuum
As an active working group M3AAWG can …
➔ effectively and efficiently fight online abuse together
➔ collaboratively protect end-users and customers
M3AAWG’s successes are rooted in …
➔ working group participation, in service of
➔ cooperation, to create
➔ effective and efficient anti-abuse outcomes
➔ in a trusted environment
Dynamics of a Working Group
M3AAWG provides a trusted forum and framework for open discussion of
abuse issues in an atmosphere of confidentiality and cooperation.
A trusted environment facilitates a level of free, open participation
key to anti-abuse efforts.
Creating and maintaining such an environment is the platform on
which all of the other cooperative efforts are built.
A Circle of Trust for Participants
➔Unsolicited Commercial Enforcement Net
– Operation Safety Net
➔Internet Society
– Provided training material
➔i2Coalition
– Hosting BCP
➔EastWest Institute
– 2013 Cyber Security Award for China &
India Work
➔Anti-Phishing Working Group (APWG)
– Anti-Phishing Best Practices for ISPs and
Mailbox Providers
➔LACNIC
– BCPs to reflect dynamics in the LAC region
– LAC-AAWG Started in 2017
Who do we work with?
San Francisco 2019
• We had 602 attendees from 24 countries,
including 139 new attendees
• Approximately 175 people attended the Monday
Training sessions
• Open Roundtables had 165 attendees
Upcoming Meeting
46th General Meeting
June 3-6, 2019
Corinthia Hotel
Budapest, Hungary
Submit your ideas and topics for sessions and training early
and often at the Members Meeting Submission Forms webpage
• https://m3aawg.org/submissions
• https://m3aawg.org/roundtable-ideas
Current Work
Committee Work or Accomplishment
Abuse Desk Training materials currently being developed for ISPs and
service platform operators.
Data and ID
Protection
Several BCPs produced concerning encryption, 3rd party DNS
providers, and other communications security topics
DDoS BGP Flowspec Best Practices published last week
Full day workshop with NANOG held
DNS Abuse Ongoing commentary and focus on GDPR impact to WHOIS
in ICANN
Hosting Cryptomining Anti-Abuse BCP
Mobile Collaboration with GSMA on RCS Anti-Abuse
recommendations and training
LAC-AAWG Device Security BCOP under review for M3AAWG co-
publishing

Global Anti-Abuse Working Groups: Trends and Current Work

  • 1.
    Global Anti-Abuse WorkingGroups Severin Walker Apricot 2019
  • 2.
    Severin Walker • M3AAWG –Board Chairman – Technical Committee Co-Chair • Comcast – Director, Service Policy Assurance – 15 Years in Anti-Abuse, Compliance, and Law Enforcement Collaboration
  • 3.
    “The Messaging, Malwareand Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against botnets, malware, spam, viruses, DoS attacks and other online exploitation” ➔200 member orgs worldwide ➔300-600 conference participants Who is M3AAWG?
  • 4.
    “The Messaging, Malwareand Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against botnets, malware, spam, viruses, DoS attacks and other online exploitation” ➔200 member orgs worldwide ➔300-500 conference participants Too many US voices Who is M3AAWG?
  • 5.
    “The Messaging, Malwareand Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against botnets, malware, spam, viruses, DoS attacks and other online exploitation” ➔200 member orgs worldwide ➔300-500 conference participants Not enough global voices, not enough AP voices! Who is M3AAWG?
  • 6.
    The “M” cubed: ➔Messaging: abuse on any messaging platform, from email to SMS texting ➔ Malware: abuse is often just a symptom and vector for viruses and malicious code ➔ Mobile: addressing messaging and malware issues emerging on mobile as an increasingly ubiquitous platform Develop and Publish: ➔ Best practice papers ➔ Position statements ➔ Training and educational What does M3AAWG Do?
  • 7.
    Types of DocumentsProduced by M3AAWG BCPs Best Common Practices codify industry knowledge, hallway conversations and experience, into guidelines and authoritative statements on the state of industry practices and dynamics Technical Whitepapers Provide state-of-the-industry reports on technologies at play in the messaging industry, how they are being used, and how they contribute to anti-abuse efforts Public Policy Actively seeks to provide the necessary technical and strategic guidance to protect end-users’ online experience as government, Internet and public policy agencies worldwide develop new Internet policies and legislation* *https://www.m3aawg.org/for-the-industry/published-comments Types of Output
  • 8.
    Individual industry actorscan’t … ➔ effectively or efficiently fight online abuse alone ➔ protect end-users and customers in a vacuum As an active working group M3AAWG can … ➔ effectively and efficiently fight online abuse together ➔ collaboratively protect end-users and customers M3AAWG’s successes are rooted in … ➔ working group participation, in service of ➔ cooperation, to create ➔ effective and efficient anti-abuse outcomes ➔ in a trusted environment Dynamics of a Working Group
  • 9.
    M3AAWG provides atrusted forum and framework for open discussion of abuse issues in an atmosphere of confidentiality and cooperation. A trusted environment facilitates a level of free, open participation key to anti-abuse efforts. Creating and maintaining such an environment is the platform on which all of the other cooperative efforts are built. A Circle of Trust for Participants
  • 10.
    ➔Unsolicited Commercial EnforcementNet – Operation Safety Net ➔Internet Society – Provided training material ➔i2Coalition – Hosting BCP ➔EastWest Institute – 2013 Cyber Security Award for China & India Work ➔Anti-Phishing Working Group (APWG) – Anti-Phishing Best Practices for ISPs and Mailbox Providers ➔LACNIC – BCPs to reflect dynamics in the LAC region – LAC-AAWG Started in 2017 Who do we work with?
  • 11.
    San Francisco 2019 •We had 602 attendees from 24 countries, including 139 new attendees • Approximately 175 people attended the Monday Training sessions • Open Roundtables had 165 attendees
  • 12.
    Upcoming Meeting 46th GeneralMeeting June 3-6, 2019 Corinthia Hotel Budapest, Hungary Submit your ideas and topics for sessions and training early and often at the Members Meeting Submission Forms webpage • https://m3aawg.org/submissions • https://m3aawg.org/roundtable-ideas
  • 13.
    Current Work Committee Workor Accomplishment Abuse Desk Training materials currently being developed for ISPs and service platform operators. Data and ID Protection Several BCPs produced concerning encryption, 3rd party DNS providers, and other communications security topics DDoS BGP Flowspec Best Practices published last week Full day workshop with NANOG held DNS Abuse Ongoing commentary and focus on GDPR impact to WHOIS in ICANN Hosting Cryptomining Anti-Abuse BCP Mobile Collaboration with GSMA on RCS Anti-Abuse recommendations and training LAC-AAWG Device Security BCOP under review for M3AAWG co- publishing