際際滷

際際滷Share a Scribd company logo
Adapting to the Age of Anonymous
      SOURCE Barcelona - November 17, 2011
                       Joshua Corman
               Director of Security Intelligence
                        @joshcorman
         http://cognitivedissidents.wordpress.com/




                                                     息2011 Akamai
About Joshua Corman
    Director of Security Intelligence for Akamai Technologies
    Former Research Director, Enterprise Security [The 451 Group]
    Former Principal Security Strategist [IBM ISS]

    Industry Experience
    Expert Faculty: The Institute for Applied Network Security (IANS)
    2009 NetworkWorld Top 10 Tech People to Know
    Co-Founder of Rugged Software www.ruggedsoftware.org

    Things Ive been researching
    Compliance vs Security
    Disruptive Security for Disruptive Innovations
    Chaotic Actors
    Espionage
    Security Metrics

2                                                                        息2011 Akamai
Agenda

 Understanding Anonymous in under 7 minutes

 Deconstructing Anonymous

 Adapting to Anonymous

 Building a Better Anonymous?




                                               息2011 Akamai
Understanding Anonymous:
The Rise of the Chaotic Actor

            Joshua Corman
            @joshcorman
            Director of Security Intelligence
            Akamai Technologies



            2011 FlashTalks powered by PechaKucha




                                                息2011 Akamai
5   息2011 Akamai
息2011 Akamai
Paradox 際際滷/Deliberate Disinformation




                                          息2011 Akamai
http://www.csoonline.com/article/682511/the-rise-of-the-chaotic-actor-understanding-anonymous-and-ourselves
                                                                                                              息2011 Akamai
Some men just want to see the world burn




                      9                     息2011 Akamai
Lots & Lots of Anonymous Sects




                      10         息2011 Akamai
Your Headline Here (in Title Caps)




                       11            息2011 Akamai
You Choose Your Own Level of Involvement




                     12                    息2011 Akamai
Anonymous* Unmasked? [*Alleged]




                                  息2011 Akamai
You Choose Your Own Level of Involvement




                     14                    息2011 Akamai
You Choose Your Own Level of Involvement




                     15                    息2011 Akamai
Escalation?




              16   息2011 Akamai
Anomalous Anonymous?




                   17   息2011 Akamai
False Flags: Adaptive Persistent Adversaries




    Anonymous is Gods gift to the Chinese  CISO

                                                      息2011 Akamai
Cyber-Neo-McCarthyism

 I am not now
nor have I ever
   been
 a member of
  Anonymous.
                        息2011 Akamai
Building a Better Anonymous




                     20        息2011 Akamai
Building a Better Anonymous




                     21        息2011 Akamai
The easy answers Suggested Background




                                        息2011 Akamai
Joshua Corman
 @joshcorman



     23         息2011 Akamai
Agenda

 Understanding Anonymous in under 7 minutes

 Deconstructing Anonymous

 Adapting to Anonymous

 Building a Better Anonymous?




                                               息2011 Akamai
PANEL: Whoever Fights Monsters




                                  息2011 Akamai
息2011 Akamai
息2011 Akamai
息2011 Akamai
息2011 Akamai
Operation Payback
(Anonymous Takes Center Stage)


August-December 2010
Initial Targets
      MPAA
      RIAA
      Intellectual Property Offices
In December, switched to WikiLeaks defense
    Financial services: PayPal, Mastercard, Visa
    Public personas: Lieberman, Palin
    Others: Lawyers, security researchers
Stats:
    1k-3k attackers in IRC
    1500 copies of LOIC in Hivemind (# in IRC/2)
    1.5 Gbps peak attack traffic (# in IRC/2)
    750 Mbps sustained traffic (# in IRC/4)

                                                    息2011 Akamai
息2011 Akamai
息2011 Akamai
息2011 Akamai
Discussion



             息2011 Akamai
息2011 Akamai
息2011 Akamai
息2011 Akamai
息2011 Akamai
http://cognitivedissidents.wordpress.com/2011/11/11/an-anonymous-ink-blot-rorschach/
  An Anonymous Ink Blot Rorschach What do you see in the Anonymous Ink Blot ?




  BRAND
POLLUTION

                                                                                 息2011 Akamai
BRAND
POLLUTION

            息2011 Akamai
BRAND
POLLUTION

            息2011 Akamai
False Cover: Criminal and State Actors




    Anonymous is Gods gift to the Chinese  CISO

                                                      息2011 Akamai
息2011 Akamai
Agenda

 Understanding Anonymous in under 7 minutes

 Deconstructing Anonymous

 Adapting to Anonymous

 Building a Better Anonymous?




                                               息2011 Akamai
息2011 Akamai
息2011 Akamai
息2011 Akamai
息2011 Akamai
DDoS is Legion

74% of surveyed
companies experienced
one or more DDoS attacks
in the past year, 31% of
these attacks resulting in
service disruption.1




1   Forrester Research


                             息2011 Akamai
Some of my data

                                                                     600
 Typical Attack Size: 3-10 Gbps
                                                                     500
 Large Attack Size: 100-200 Gbps
                                                                     400




                                                 Number of Attacks
 Attacks are originating from all geographies
  and are moving between geographies
                                                                     300
  during the attack

                                                                     200


                                                                     100


                                                                       0
                                                                           2009   2010   2011


                                                                                                息2011 Akamai
July 4th  7th 2009 DDoS Attack
400,000 Korean Bots Attack Key U.S. Government Web Sites



                                                           Times Above
        Agency  PROTECTED                 Peak Traffic    Normal Traffic
        U.S. Government Customer 1         124 Gbps        598x
        U.S. Government Customer 2         32 Gbps         369x
        U.S. Government Customer 3         9 Gbps          39x
        U.S. Government Customer 4         9 Gbps          19x
        U.S. Government Customer 5         2 Gbps          9x
        U.S. Government Customer 6         1.9 Gbps        6x
        New U.S. Government Customer       0.7 Gbps        SITE DOWN
                                                           before Akamai


                                                                            息2011 Akamai
Agenda

 Understanding Anonymous in under 7 minutes

 Deconstructing Anonymous

 Adapting to Anonymous

 Building a Better Anonymous?




                                               息2011 Akamai
Agenda




         息2011 Akamai
息2011 Akamai
息2011 Akamai
息2011 Akamai
息2011 Akamai
息2011 Akamai
Discussion



             息2011 Akamai
Thank You!
  Barcelona, November 17, 2011
              Joshua Corman
               @joshcorman
http://cognitivedissidents.wordpress.com/




                                            息2011 Akamai

More Related Content

Adapting To The Age Of Anonymous

Editor's Notes

  • #6: Rorschach Test: http://en.wikipedia.org/wiki/Rorschach_testWe see in Anonymous what we WANT to see.. We project. Our perceptions say more about us than they do about the multitude of subgroups/causes in Anonymous.
  • #7: There isnt AN anonymous either there are dozens.It is more of a franchise than an Organization.
  • #9: http://www.csoonline.com/article/682511/the-rise-of-the-chaotic-actor-understanding-anonymous-and-ourselves
  • #11: Family Tree IMG SOURCE: http://2.bp.blogspot.com/-XS0av6GQlIE/TheLlBBprTI/AAAAAAAAAIU/f6aABTtPyVE/s1600/tree.jpg
  • #14: Operation Payback LOIC-ers
  • #20: IMG Source: http://eandres.glogster.com/Whitchhunt-/
  • #21: IMG SOURCE: http://www.toonpool.com/cartoons/Leviathan_41513#img9Two logical outcomesA Hobbes-ian Leviathan will rise to police the brand borne of necessity and convenienceThe Brand will be contaminated and the MoralAnons will fleeThis is Social Contract Theory 101 stuffHobbes: The State of Nature is a State of WarLocke: The State of Nature is a State of Inconvenience
  • #22: IMG SOURCE: http://www.toonpool.com/cartoons/Leviathan_41513#img9Two logical outcomesA Hobbes-ian Leviathan will rise to police the brand borne of necessity and convenienceThe Brand will be contaminated and the MoralAnons will fleeThis is Social Contract Theory 101 stuffHobbes: The State of Nature is a State of WarLocke: The State of Nature is a State of Inconvenience